Claims
- 1. A method for use in an RFID system comprising at least one RFID device and at least one reader which communicates with the RFID device, the method comprising the steps of:
associating a plurality of pseudonyms with the RFID device; and transmitting from the RFID device different ones of the pseudonyms in response to different reader queries of the RFID device; wherein an authorized verifier is able to determine that the different transmitted pseudonyms are associated with the same RFID device.
- 2. The method of claim 1 wherein the transmitted pseudonyms are authenticated by the reader.
- 3. The method of claim 1 wherein the transmitted pseudonyms are authenticated by a verifier other than the reader.
- 4. The method of claim 1 wherein the RFID device is configured to authenticate itself to a verifier only after the verifier has authenticated itself to the RFID device.
- 5. The method of claim 4 wherein the verifier authenticates itself to the RFID device by releasing to the RFID device an authentication value βi unique to a given pseudonym αi transmitted by the RFID device.
- 6. The method of claim 4 wherein the RFID device authenticates itself to the verifier by releasing to the verifier an authentication value γi unique to a given pseudonym αi transmitted by the RFID device.
- 7. The method of claim 1 wherein one or more of the pseudonyms each comprise an identifier of the RFID device.
- 8. The method of claim 1 wherein one or more of the pseudonyms each comprise a portion of an identifier of the RFID device.
- 9. The method of claim 1 wherein the pseudonyms are stored in the RFID device as an ordered list of pseudonyms, the method further including the steps of designating a particular one of the pseudonyms as a current pseudonym and, in response to a given reader query, transmitting the current pseudonym, wherein over a plurality of reader queries the pseudonym designated as the current pseudonym periodically cycles through the list of pseudonyms.
- 10. The method of claim 9 wherein after the current pseudonym is transmitted by the RFID device responsive to the given query, a different one of the plurality of stored pseudonyms is designated as the current pseudonym to be transmitted responsive to a subsequent query.
- 11. The method of claim 1 wherein one or more of the pseudonyms are generated on an as-needed basis within the RFID device.
- 12. The method of claim 1 wherein one or more of the pseudonyms are generated externally to the RFID device.
- 13. The method of claim 1 further including the step of limiting a rate at which the RFID device is permitted to transmit pseudonyms responsive to reader queries.
- 14. The method of claim 1 further including the step of periodically altering one or more of the plurality of pseudonyms.
- 15. The method of claim 14 wherein the altering step is implemented responsive to receipt of refresh information in the RFID device from a verifier.
- 16. The method of claim 15 wherein the refresh information comprises one or more refresh values transmitted from the verifier to the RFID device after mutual authentication of the RFID device and the verifier.
- 17. The method of claim 1 wherein for a given value κ utilized in the RFID device, a vector Δκ={δκ(1),δκ(2), . . . ,δκ(m)} of one-time pads is maintained in the RFID device, wherein the one-time pad δκ(1) is designated as a live pad and is used by the RFID device to update the value κ, where m denotes a number of authentication sessions over which one-time pads are constructed.
- 18. The method of claim 17 wherein the value κ is updated by computing κ←κ⊕δK (1).
- 19. The method of claim 17 wherein in conjunction with updating the value κ, the vector Δκ is updated utilizing a vector {tilde over (Δ)}κ={{tilde over (δ)}κ(1),{tilde over (δ)}κ(2), . . . ,{tilde over (δ)}κ(m)} of one-time pads, the vector Δκ being updated by discarding the previous live pad {tilde over (δ)}κ(1), setting δκ(i)=δκ(i+1) for 1≦i≦n−1, setting δκ(m)=0l, and performing an element-wise exclusive-or of Δκ and {tilde over (Δ)}κ by computing δκ(i)=δκ(i)⊕{tilde over (δ)}κ(i), such that the updated vector Δκ comprises a set of m one-time pads with decreasing levels of backward secrecy.
- 20. The method of claim 1 wherein a verifier of the system is configured to store for a given RFID device Tx a static identifier idx corresponding to at least one pseudonym of Tx.
- 21. The method of claim 20 wherein the pseudonyms for Tx are obtained by encrypting idx∥zx under a symmetric key Kα for the verifier, where zx comprises a pseudonym counter.
- 22. The method of claim 21 wherein when the verifier receives a pseudonym from the RFID device, the verifier decrypts the pseudonym using Kα to obtain the corresponding static identifier idx.
- 23. The method of claim 1 wherein a verifier of the system in conjunction with an authentication session with the RFID device specifies a value identifying a particular pseudonym to be transmitted by the RFID device.
- 24. The method of claim 1 wherein the RFID device determines which of the plurality of pseudonyms to transmit responsive to a given reader query based at least in part on timing information.
- 25. The method of claim 1 wherein the RFID device incorporates a pseudorandom number generator, where ƒκx (i) represents an output of the pseudorandom number generator for index i, where κx is a seed associated with the RFID device.
- 26. The method of claim 25 wherein the RFID device generates the plurality of pseudonyms as pseudonyms α1=ƒ(1),α2=ƒ(2), . . . , αk=ƒ(k).
- 27. The method of claim 25 wherein the RFID device and a verifier of the system attempt to maintain a common counter dx unique to the RFID device, and share the seed κx.
- 28. The method of claim 27 wherein in order to determine which RFID device is associated with a given incoming value α, the verifier performs a lookup in a list {ƒκx (dx)} of current α values for a plurality of RFID devices.
- 29. The method of claim 27 wherein for a given counter value d, the RFID device computes αd=ƒ(bk+d), where b denotes a base value, and the verifier provides a subsequent instruction to the RFID device to increment the base value b.
- 30. An apparatus for use in an RFID system, the apparatus comprising:
an RFID device having a plurality of pseudonyms associated therewith and being operative to communicate with one or more readers of the system; the RFID device being further operative to transmit different ones of the pseudonyms in response to different reader queries of the RFID device; wherein an authorized verifier is able to determine that the different transmitted pseudonyms are associated with the same RFID device.
- 31. An RFID system comprising:
a plurality of RFID devices; and a plurality of readers which communicate with at least a subset of the RFID devices; wherein a plurality of pseudonyms are associated with a given one of the RFID devices, the given RFID device being configurable to transmit different ones of the pseudonyms in response to different reader queries of the given RFID device; wherein an authorized verifier is able to determine that the different transmitted pseudonyms are associated with the same RFID device.
- 32. An apparatus for use in an RFID system, the apparatus comprising:
a reader which communicates with one or more RFID devices; wherein a plurality of pseudonyms are associated with a given one of the RFID devices, the given RFID device transmitting different ones of the pseudonyms in response to different reader queries of the given RFID device; wherein an authorized verifier is able to determine that the different transmitted pseudonyms are associated with the same RFID device.
- 33. A method for use in a system comprising at least one device and at least one reader which communicates with the device, the method comprising the steps of:
associating a plurality of pseudonyms with the device; and transmitting from the device different ones of the pseudonyms in response to different reader queries of the device; wherein the pseudonyms are determined utilizing an updateable set of one or more one-time pads maintained in the device.
RELATED APPLICATIONS(S)
[0001] The present application claims the priority of U.S. Provisional Patent Application Ser. No. 60/468,200, filed May 6, 2003 and entitled “Privacy and Authentication in Low-cost RFID Tags,” the disclosure of which is incorporated by reference herein.
[0002] The present application is also related to U.S. Patent Application Ser. No. 10/673,540, filed Sep. 29, 2003 and entitled “Method And Apparatus For Selective Blocking Of Radio Frequency Identification Devices,” which is commonly assigned herewith and incorporated by reference herein.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60468200 |
May 2003 |
US |