WO2012011979A1 - Fully secure item-level tagging - Google Patents

Fully secure item-level tagging Download PDF

Info

Publication number
WO2012011979A1
WO2012011979A1 PCT/US2011/030608 US2011030608W WO2012011979A1 WO 2012011979 A1 WO2012011979 A1 WO 2012011979A1 US 2011030608 W US2011030608 W US 2011030608W WO 2012011979 A1 WO2012011979 A1 WO 2012011979A1
Authority
WO
WIPO (PCT)
Prior art keywords
rfid
tag
secure
encoder
rfid transponder
Prior art date
Application number
PCT/US2011/030608
Other languages
French (fr)
Inventor
Clarke Mcallister
Daniel Campbell
Original Assignee
Clarke Mcallister
Daniel Campbell
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Clarke Mcallister, Daniel Campbell filed Critical Clarke Mcallister
Publication of WO2012011979A1 publication Critical patent/WO2012011979A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Definitions

  • the present invention relates to anti-counterfeiting technologies and electronic privacy.
  • Counterfeit products are a duplicate or an imitation of legitimate branded products which infringe upon a production monopoly held by an individual or a corporation. Counterfeit products are produced with the intent to bypass the legitimate brand owner's monopoly and take advantage of the high market value of branded products. Counterfeit products frequently include clothing, software, pharmaceuticals, watches, electronics, recreational equipment and other branded goods resulting in patent infringement or trademark infringement.
  • Counterfeiters are deceptive; they attempt to either deceive consumers into thinking they are purchasing a legitimate item, or to convince the consumer that they could deceive others with a counterfeit product.
  • Some counterfeits products are made in the same factory that produces the original, authentic product, using the same tooling, procedures, and materials. Owners and operators of a factory run a counterfeiting operation within their own four walls without the permission of the trademark owner. Excess product is produced and distributed without the use of anti-counterfeiting measures making it impossible to distinguish a 'perfect' counterfeit from the authentic product.
  • Radio frequency identification means the use of electromagnetic radiating waves or reactive field coupling in the radio frequency portion of the spectrum to communicate to or from a tag through a variety of modulation and encoding schemes to uniquely read the identity of a radio frequency tag or other data stored on it. Assuming certain criteria are met, as disclosed in the present invention, RFID can be used as part of a comprehensive item identification tool to combat counterfeiting.
  • An RFID tag or 'tag' or 'transponder' means either an RFID device having the ability to produce a radio signal or an RFID device which re-couples, backscatters or reflects (depending on the type of device) and modulates a carrier signal received from a reader, writer, or encoder.
  • Gen2 RFID tags would have been the perfect universal badge of authenticity that any product made anywhere in the world could bear in order to distinguish a perfect counterfeit from an authentic product.
  • the Gen2 RFID tag lacks a crypto engine because it was deemed to require too many transistors and too much power to operate as a passive RFID tag. Lacking this, brand owners have been presented with an unsatisfactory means of preventing duplication of Gen2 tags that would at face value been an unambiguous indication of the true authenticity of a product that appears to be one of theirs.
  • Gen2 system architects decided to move the authentication process to a system of globally interconnected computers servers. The operation of and data shared by each server is under the control of each trading partner. They decide what information is provided for any information query.
  • a cryptographic engine could be placed onto an RFID tag, and a challenge -response authentication process can be utilized whereby the challenger can be certain that the challenged RFID tag in fact bears the secret code without directly divulging it, then the authenticity can be confirmed with a very high degree of confidence.
  • the scope of this invention disclosure relates to RFID tags that lack a cryptographic engine, and only have publicly observable information. So, despite recent advances in RFID technology, the state-of-the-art does not fully address the needs of authenticating wireless sensors that are already in broad public use. Large-scale adoption and deployment of RFID transponders depends on brand owners realizing substantial new levels of supply chain security that surpasses the short comings of traditional anti-counterfeiting technologies and methods.
  • the present invention teaches systems, methods, and devices for making the existing EPC Gen2 RFID tags and inlays secure within a set of prescribed conditions and precautions to prevent and mitigate the risks of eavesdropping.
  • the present invention includes embodiments for increased security when blocks of Gen2 transponder memory are available to support additional layers of security and cryptographic key management as taught herein.
  • the present invention uses encoders and readers that have at least one microprocessor and fast access to security devices that have a FIPS 140-2 secure cryptographic boundary that defeat cryptographic attacks. Using localized secure cryptographic devices, the security algorithms described in this patent application deliver extremely fast and deterministic RFID tag authentication performance.
  • Authentication performance is not subject to Internet network delays because all necessary resources for authentication and for computing cryptographic algorithms are local within a microprocessor that is designed to FIPS 140-2 security standards.
  • Cryptographic key updates are conducted infrequently and in a manner that is similar to anti-virus updates on personal computers.
  • the solution optionally incorporates physically verifiable attributes including fingerprints, micro taggants, and other marks to augment transponder authentication. Certain embodiments include reversibly 'flipping' of the publicly decipherable tag identity into an encrypted form for security purposes.
  • the present invention is an RFID tag security system with two major purposes: (1) secure and efficient encoding and verification of RFID tags with unique identifiers and secret passwords; and (2) reversibly changing an unprotected UII to an encrypted UII, the ability to 'flip' between unprotected UII and an encrypted UII
  • the secure supply chain visibility and transponder authentication system is comprised of: RFID transponders containing a data set comprising primary identifying information, an access and kill password, and cryptographic key index components; a security server managing and providing a changing set of cryptographic keys over a network; and one or more secure RFID encoders using the set of cryptographic keys provided by the security server and storing them in protected memory and encoding into the RFID transponders the data set comprising primary identifying information, cryptographic key index components, and access and kill passwords that were internally computed from the primary identifying information; and one or more secure RFID authenticators determining that an RFID transponder is authentic by using a local set of securely stored cryptographic keys provided by the security server and cryptographic key index components from the RFID transponder to internally compute the previously encoded passwords to authenticate the RFID transponder using a challenge-response interaction.
  • RFID tags with SGTIN encoding convey a certain level of confidence that the products that they are attached to conform to quality and ethical standards that are established by their brand owners.
  • the brand owners are responsible for the brand quality and also for making certain that the company and people that produce them adhere to established quality control standards.
  • the brand owners are also interested in knowing that their high quality products are not being sold to their customer based by their supplier.
  • counterfeit products those without RFID tags, those with factory-made RFID tags, those with RFID tags that were duplicated in distribution
  • Brand protection requires secret information that is observable by authorized individuals, preferably at a distance, and with high throughput. Numerous anti-counterfeiting technologies exist, but none have struck a successful commercial balance between these three key attributes: (1) Cost, (2) Inspection range, (3) and Effectiveness.
  • the novelty of this invention is the optimization of all three of these key attributes in a unique manner so as to provide a powerful and cost effective deterrent to counterfeiting.
  • the present invention combines remote item sensing, definitive item authentication, and heuristics; where heuristics strategies are used on readily accessible, though partially interrelated, information to automatically assess from a distance the probability that goods are counterfeit.
  • the heuristic information is collected and assessed over time, using a large number of field samples. This will be discussed in more detail below.
  • Secure RFID tag authenticator 17 is disclosed for use to determine if supply chain goods have an authentic RFID tag on them or not. Secure RFID tag authenticator 17 is intended to be used by a brand owner, a distributor, a retailer, a secure authentication kiosk for consumers, a shipper, or a law enforcement officer that is accepting receipt of or inspecting goods 22a from a supplier.
  • a novel anti-counterfeit system 20 wherein goods such as sellable item 22a are tagged with radio frequency identification (RFID) tag 70 in 'manufacturing plant or distribution point A' 21 and are subsequently scanned for authenticity at a second location 'distribution point B or retail facility' 19.
  • RFID tags are used to identify and authenticate goods, including pallets, cases, inner packs, and sellable items (or sellable units, or sales units).
  • Sellable item 22a is an example of a sellable item that was previously tagged at 'manufacturing plant or distribution point A' 21 using RFID tag 70.
  • an authorization is an XML message with an encrypted payload.
  • the payload at least contains the unique encoder number, an authorization sequence number, and a number representing the number of tags or inlays that the encoder is authorized to encode.
  • the authorization sequence number is incremented by both the encoder and the security server so that an XML authorization can only be used once, and then only by the designated encoder. A replay of a previously used XML authorization does not result in additional encoding credits.
  • Fingerprint Scanner (FPS) 12c of Management Station 12a is used to create an operator-specific uniquely numbered computer record that contains a specification of the fingerprint of the finger or fingers that the operator normally uses to remove an encoded RFID tag from secure encoder 16. That record is preferably stored in Fingerprint Database 69 of a trusted source such as Security Server 10a. Additional biometric information, such as face, eyes, retina, iris, or voice are preferably also sensed and collected by BIO sensor 12d and stored in Security Server 10a to provide additional identifying characteristics of each operator. In other preferred embodiments, biometric sensors (not shown) are installed on Secure Tag Encoder 16 and communicated with Secure Server 10a for a variety of security purposes.
  • Each operator preferably logs into Secure RFID Tag Encoder 16.
  • Secure RFID Tag Encoder 16 There are a wide range of methods for securely logging in an operator that are well known to those skilled in the art. There are generally three types of login information that are used: passwords are what you know, security tokens are what you have, and biometrics are what you are. Using any secure combination of these, an operator can log into Secure RFID Tag Encoder 16. The result is that the operator's unique record number (that references Fingerprint Database 69) is then defined as the current Data Carrier Mark DCM 147d in Secure RFID Tag Encoder 16.
  • RFID tags are bonded or attached to sellable item 22a in any of four ways: (1) Tags are encoded by Secure RFID Tag Encoder 16 and placed onto sellable item 22a manually using human labor; or (2) Tags are encoded by Secure RFID Tag Encoder 16 and transferred directly onto sellable item 22a.
  • Preferred embodiments of this type of Secure RFID Tag Encoder 16 are either handheld or fixed mounted to a conveyor line where sellable items travel past Secure RFID Tag Encoder 16 while being tagged in an automated manner; or (3) Printed and chipless RFID transponders are encoded by Secure RFID Tag Encoder 16 as each sellable item 22a traverses along a production line and enters the encoding field of Secure RFID Tag Encoder 16 in a completely automated procedure; or (4) Batch encoding a roll of tags for operators to apply in a secondary tagging process.
  • the embodiments described herein provide improved degrees of security for verification and authentication of tags 70 and also because of their physical attachment to sellable item (i.e. object or product) 22athat is associated with tag 70.
  • Preferred embodiments of this invention include human readable messages to the consumer, the distributor, or anyone who is in a position of purchasing, procuring, or accepting delivery of sellable item 22a that warn that the absence of RFID tag 40 is an indication that the goods are counterfeit.
  • Counterfeit Label 22b is preferably printed on the product or the packaging material, printed in the user's manual and on the warrantee card, and printed on the company's website.
  • Possible forms of the message are: (1) 'Goods are considered counterfeit if a Radio Frequency Identification (RFID) tag is not present before delivery'; or (2) uthentic goods have an RFID tag located here. If one is not present please contact customer service at phone number xxx-xxx-xxxx to report counterfeit goods'; or (3) An anti-counterfeiting electronic tag should be located here, if not, then please return these goods for one that does'.
  • RFID Radio Frequency Identification
  • the purpose of this invention is to increase the cost of counterfeiting to the point where it is too costly to conduct.
  • Changes to cryptographic keys are inherently supported in the present invention, including ways to communicate key changes through the RFID tags themselves, without taxing the resources of a global online network for frequent database queries.
  • the dissemination of RFID tags provides for an efficient, and now secure, method of distributing information about which cryptographic key sets are to be used on any given tag. There is no incentive for a counterfeiter to alter this since the default condition of a no -math result is that the goods are counterfeit and receipt of them is rejected, and payment will not be made to the supplier.
  • Cryptographic key changes are preferably frequent and at random and unpredictable times.
  • the keys preferably have very high entropy and are generated by pseudorandom number generators.
  • EPCglobal Class 1 Gen 2 RFID tag An exemplary RFID tag for brand protection that has already gained wide commercial adoption is the EPCglobal Class 1 Gen 2 RFID tag.
  • Gen 2-type tag A complete description of the Gen 2-type tag can be found in EPC Radio -Frequency Identity Protocols, Class- 1 Generation-2 UHF RFID, Protocol for Communications at 860 MHz-960 MHz,' Version 1.0.9, EPCglobal, Inc., copyright 2004, which is incorporated by reference herein in its entirety.
  • EPC Electronic Product Code
  • UAI Unique Item Identifier
  • EPC Gen 2 RFID tags are vulnerable to fraud since there is nothing to prevent counterfeiters from copying the Unique Item Identifier (UII) product identification numbers such as EPC codes from one tag to another.
  • Valid EPC numbers can for example be skimmed (i.e. copied) from a population of 'valid' RFID tags that are associated with authentic products, and copied onto similar data carriers (i.e. EPC Gen 2 RFID tags) and attaching them to counterfeit or knock-off products.
  • a counterfeit supply chain 30 counterfeit products are often made by the same manufacturer 21 that manufactures the same authentic goods for brand owner 32, except at a higher profit level.
  • the presence of a look-alike EPC Gen 2 RFID tag would be sufficient to allow even more efficient movement of fake products through alternate channel 34 of supply chains and be ultimately sold to unsuspecting consumers 35.
  • counterfeit products are inferior to authentic products and pose a risk to the public and tarnish the brand image to the detriment of the brand owner 32.
  • a significant financial loss is realized by brand owner 32 and retailer 19 for lost sales; consumer 35 is often lured to alternate channel 34 by prices that are lower than that of retailer 19. This is because the cost structures are very different when the established sales channel of brand owner 32 is illegally bypassed.
  • the present invention is a secure supply chain visibility and transponder authentication system which is an end-to-end supply chain visibility and product authentication system 20 to improve supply chain efficiency and to assist brand owners in the protection of their brand.
  • secure RFID tag encoder 16 At the front of the system is secure RFID tag encoder 16, and downstream in the supply chain is secure RFID tag authenticator 17; both are intermittently coupled through a trusted source such as security server 10a. Real time connections are not required.
  • a pay-to-encode business model is enforced by operation of the system such that secure RFID encoders receive authorizations from the security server 10a that enable and limit the encoding of up to a maximum number of transponders
  • the owner has a finite amount of risk associated with having an inventory of RFID tags that bear a standard, unencrypted SGTIN. This is true whether the owner is a consumer, a retailer, or the United States Military.
  • the EPC Gen2 specification did not specifically provide for encrypted identification information, the present invention discloses a secure way to change unencrypted EPC information into encrypted item-level information, and then convert it back to the original unencrypted form again if needed (e.g. such as store returns).
  • the management of the cryptographic keys is the domain of the retailer or the U.S. Government, whichever is the channel master for the applicable supply chain.
  • the present invention teaches best practices that are prescribed by FIPS 140-2, the Federal Information Processing Standards Publication 140-2 for SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC
  • the present invention teaches a preferred set of devices and methods for securely managing the commissioning of RFID tags with unique numbers on a global scale, without presuming the availability of modern communication infrastructure such as the Internet, telephone, or GPRS.
  • the present invention teaches a method by which the Access Password that is forwarded from the tag encoding process is used by retailers or government officers (for example) to reversibly change the publicly observable EPC SGTIN into a cryptographically secured version of that representation.
  • the invention provides for reversibly altering the transponder identity from a publicly readable, decodable, decipherable form to an alternate identity that is cryptographically related to the first identity.
  • the alteration of the identity is based upon steps that access a changeable set of cryptographic keys that are locally stored in an RFID reader.
  • This preferred embodiment has advantages over prior art that depends on fast network access to for example an EPC Information Services (EPCIS) network database implementations as recommended by
  • EPCglobal The goal of EPCIS is to enable various applications to utilize Electronic Product Code (EPC) data via EPC-related data sharing, both within and across enterprises.
  • EPC Electronic Product Code
  • network activity is a background task that does not hamper worker's productivity. This is accomplished by locally (i.e. preferably in a secure manner within each RFID Reader 17) providing all of the data that is required to perform the following functions.
  • An example of a reader embodiment that benefits from this is an RFID-enabled mobile phone wherein data throughput is slower and less reliable than a wired network connection such as Ethernet.
  • the present invention meets the tacit requirements of product authentication demanded by retailers, government and consumers: (1) the costs and effort of using the authentication system remains low; (2) authentication of tags encoded by third party (i.e. non-secure encoders) are supported; (3) the system can be operated by multiple parties from multiple locations; and (4) the system maintains a level of security that limits counterfeits and malicious acts by properly managing the risk-return profile.
  • the source-to-shelf system disclosed herein provides for an efficient, secure, flexible, and scalable solution for encoding item-level RFID tags, including metal mount tags in remote factory environments, including secret passwords to enable authorized RFID interrogators to change or kill the RFID tags in retail environments.
  • Information regarding the condition during the original encoding of the RFID tag (e.g. location, date, and time) is observable by an audit function by using cryptographic algorithms that enable privileged access to RFID tag data for auditing and forensic tag analysis.
  • the present invention works with a range of standard EPC Gen2 tag types and to an extent with third party (i.e. non-secured) RFID tag encoding equipment.
  • Preferred embodiments use EPC Class 1 Gen 2 UHF RFID tags with 64, 128, or more bits of optional User Memory 74 and have both Access Password 71b and Kill Password 71 a features for operating tag 70 in a secured state only when a valid Access Password 7 lb is sent to it.
  • RFID is an enabling technology for faster and more efficient supply chains by using uniquely numbered shipping containers and items that are read in large numbers simultaneously without requiring a direct line of sight. It is this presumption of uniqueness that is the central subject matter of this invention. If the numbers in the RFID tags are not unique, then false information is present on the goods and in the systems that track them from their sources to their destinations.
  • a key benefit of utilizing information from uniquely numbered items is that RFID enables improved top line sales to manufacturers and retailers by minimizing out-of-stock occurrences where a consumer's intent to purchase is adversely disrupted by the temporary unavailability of a product that they wish to purchase.
  • the example embodiments described herein are provided for illustrative purposes, and are not meant to be limiting.
  • the examples described herein may be adapted to various types of radio frequency identification tags, transponders, encoders, and verifiers, for a variety of applications, including manufactured goods, retail goods, apparel, pharmaceuticals, and other products that are bought and sold. Derivative embodiments, including modifications or alterations, may become apparent to persons skilled in the art from the teachings herein.
  • the word 'transponder' is in many cases interchangeable with the word 'tag', in reference to RFID tags. Where the words are not interchangeable, the word transponder is used to convey a meaning where it is known that substrate layers and face stock that are typical of an RFID tag are not all necessarily present, as in the case of an inlay or a printed chipless transponder.
  • the systems, methods, and devices of the present invention utilize an RFID transponder or wireless sensors as a component.
  • Certain RFID transponders and wireless sensors operate at Low Frequencies (LF), High Frequencies (HF), Ultra High Frequencies (UHF), and microwave frequencies.
  • HF is the band of the electromagnetic spectrum that is centered around 13.56MHz.
  • UHF for RFID applications spans globally from about 860MHz to 960MHz.
  • Transponders and tags responsive to these frequency bands generally have some form of antenna.
  • Such RFID transponders and wireless sensors utilize any range of possible modulation schemes including amplitude modulation, amplitude shift keying (ASK), double-sideband ASK, phase-shift keying, phase-reversal ASK, frequency- shift keying (FSK), phase jitter modulation, time-division multiplexing (TDM), or Ultra Wide Band (UWB) method of transmitting radio pulses across a very wide spectrum of frequencies spanning several gigahertz of bandwidth.
  • Modulation techniques may also include the use of Orthogonal Frequency Division Multiplexing (OFDM) to derive superior data encoding and data recovery from low power radio signals.
  • OFDM Orthogonal Frequency Division Multiplexing
  • OFDM and UWB provide a robust radio link in RF noisy or multi- path environments and improved performance through and around RF absorbing or reflecting materials compared to narrowband, spread spectrum, or frequency-hopping radio systems.
  • Wireless sensors are reused according to certain methods disclosed herein.
  • UWB wireless sensors may be combined with narrowband, spread spectrum, or frequency-hopping inlays or wireless sensors.
  • a secure RFID tag encoder 16 wherein plaintext information and cryptographic keys are stored and effectively hidden in the protected memory of tagging controller 45.
  • Preferred embodiments of tagging controller 45 use a single chip microcontroller with non- volatile block memory protection features such as those which are available on Freescale MC9S08 8-bit microcontrollers.
  • the MC9S08GB/GT microcontrollers include circuitry to prevent unauthorized access to the contents of FLASH and RAM memory. When security is engaged, FLASH and RAM are considered secure resources.
  • FIPS 140-2 is the Federal Information Processing Standards Publication 140-2 for SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES which is incorporated by reference herein.
  • the standard provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4.
  • the purpose of this document is to provide a security metric for equipment containing cryptographic modules.
  • Preferred embodiments of the present invention utilize tagging controller 45 as a single chip cryptographic module inside of which all plaintext safely resides. Any attempts to extract plain text information or cryptographic keys are prevented from physical or logical access. Information in the protected memory space of tagging controller 45 cannot be viewed from the outside, not even with a debugger. Protected memory of that type cannot be accessed from the outside of the chip without first erasing the contents of the memory.
  • the chip itself is preferably maintained with program updates outside of the protected memory area using a secure boot loader that operates from within the protected memory area.
  • Wi-Fi modules that are capable of performing or hosting the functions that are required for network node 42b, operating system 43, and Anti-counterfeit network client 42a.
  • Anti-counterfeit network client 42a communicates through network node 42b to anti -counterfeit encoder socket 61 in security server 10a as shown in Figs. 2, 4, and 6.
  • Socket 61 has various implementations on different networks.
  • RFID interrogator 48a is a module such as an M9 from SkyeTek of Riverside, CO or an M5e Compact from ThingMagic of Cambridge, MA. Certain preferred embodiments also incorporate anti -eavesdropping jammer 48b as described below and are made from similar components as an M9 or M5e, but also include additional amplifiers, filters, and digital signal processing means as described below that in some preferred embodiments radiate jamming signals from antenna 48c.
  • Antenna 48c is in some embodiments a compound structure that has near field radiating parts for selectively coupling with a single RFID tag, and another part that radiates a jamming signal, and the two parts of the antenna are constructed such that the jammer antenna cannot be defeated without also defeating the tag encoding coupler.
  • RFID interrogator 48a communicates to RFID tags only in a well defined interrogation zone that is shaped by shields, RF absorbing materials, and the near field coupling characteristics of antenna 48c.
  • the interrogation zone is collocated with a tag peel device that separates the RFID tags from the release liner for programming and in preferred embodiments also for removal from the release liner for attachment to a target item or object.
  • RFID tags are transported into the encoding and interrogation field by tag transport 47. Movement is controlled and coordinated by tagging controller 45.
  • Tag database 44 is referenced by tagging controller 45 for determining what information is to be encoded into the RFID tag that is immediately within the interrogation zone.
  • Scanner 46 is preferably a laser bar code scanner that is used to read the SKU information that is used to generate a GTIN (Global Trade Item Number).
  • GTIN Global Trade Item Number
  • a Motorola Symbol SE-955 laser scan engine is used to scan bar codes that are presented to secure RFID tag encoder 16.
  • EPCglobal Tag Data Standards Version 1.4 Copyright 2004-2008 EPCglobal is incorporated by reference herein.
  • SGTIN EPC Serialized Global Trade Item Number
  • the site number and the unit number are the upper and middle most significant digits of the serial number field.
  • SGTIN-96 serial numbers are 38 bits long, and SGTIN-198 serial number fields are 140 bits long.
  • the Site and unit numbers are used to segment the numbering space for each SKU in order to assure that there is never duplication of any SGTIN even when there is infrequent communication between encoding devices 16 and a central database (i.e. a trusted source of data and cryptography) such as security server 10a.
  • the formulated SGTIN, regardless of the length is recorded in Tag Database 44 of each Secure RFID Tag Encoder 16.
  • GPS 41 is used in certain preferred embodiments where the location of the encoder cannot be assured through normal business communication methods. GPS 41 is used to feed global location information that is transmitted from satellites that orbit the earth. This information is fed into tagging controller 45 for processing as described below. In certain configurations, GPS information is relayed through operating system 43 and is monitored by anti-counterfeiting network client 42a. In a procedure that is remotely controlled, a prescribed pattern of streets or other hard geographic references is traversed in order to monitor the indicated movement of secure encoder 16.
  • object transport 49 is used to automatically move items or objects that are to be tagged and present them into the interrogation near field of antenna 48c. Movement or changes in a continuous movement are preferably coordinated with tagging controller 45.
  • a secure RFID tag authenticator 17 that preferably includes GPS receiver 51 for recording the location of observations, especially in mobile applications. In some brand enforcement applications, authenticator 17 is deployed into marketplaces where illicit sales of counterfeit goods are likely to be found. GPS receiver 51 has sufficient resolution to mark the exact locations of vendor stalls in crowded marketplace locations where counterfeit goods are identified using a covert radio link from antenna 58c.
  • an enforcer can walk with secure RFID tag authenticator in a backpack, scanning goods that hang from racks or are still in boxes at the rear of stalls or warehouse locations, marking locations of counterfeit goods without revealing their law enforcement identity. Law enforcement intervention strategies can then be planned using the covertly collected surveillance data. Heuristic information is exchanged between secure RFID tag authenticator 17 and anti -counterfeit authentication socket 62 through network node 66 in security server 10a where authentication database 68 is updated in order to drive counterfeit heuristics engine 64. Findings, results, and controls for counterfeit heuristics engine 64 are monitored and controlled through human interface 67.
  • Device firmware store 65 is used to update secure RFID tag encoders 16 and secure RFID tag authenticators 17 through anti-counterfeit encoder socket 61 and anti -counterfeit authenticator socket 62. Firmware, cryptographic keys, and control parameters are updated through this secure mechanism.
  • FIG. 7 there is a representation of a preferred embodiment for a secure and remotely 'authenticatable' RFID tag 70 of the present invention.
  • This RFID tag is comprised of some fixed purpose and some general purpose parts, in much the same manner as a microcontroller contains programmable resources that are arranged in unique ways to accomplish a specific task, function, or purpose.
  • the codes and parameter settings that are programmed into non-volatile memory locations of RFID tag 70 are like the object code that is loaded into a microcontroller in order to create new and novel functions.
  • RFID tag 70 has a charge pump, antenna interface, protocol control logic, security lock bits, and four memory banks: Bank 00 - Reserved 71 ; Bank 01 - EPC 72; Bank 10 - TID 73; and Bank 11 - User Memory 74.
  • Reserved memory 71 is comprised of kill password 71a, access password 71b, and potentially other reserved features. These password storage means are also referenced in Fig. 2 as reserved memory 71b, and are protected by Lock 74c and Lock 74f.
  • Kill password 71a is a 32-bit value stored in Reserved Bank 71b memory location OOh to lFh, most significant bit first.
  • access password 71b is a 32 -bit value stored in Reserved Bank 71b at memory location 20h to 3Fh, most significant bit first, and is used to transition EPC Tag 70 to a secure state.
  • Access password 71b can be set to a non-zero value and used to require that when RFID tag 70 powers up, it requires an interrogator to issue the correct access password 71b before it enters the secured state where lock bits 74f can be altered to change the security settings of the RFID tag. Details of this are described in the document from EPCglobal called EPCTM Radio-Frequency Identity Protocols, Class- 1 Generation-2 UHF RFID, Protocol for Communications at 860 MHz-960 MHz. Relevant to the present invention is the ability to use that mechanism to hide kill password 71a from being disclosed without an interrogator using the correct access password 71b to make kill password 71a visible.
  • Secret Access and Kill passwords are crypto graphically derived from unencrypted data on RFID Tag 70.
  • the default (unprogrammed) value shall be zero.
  • An Interrogator shall use a Tag's kill password once, to kill the Tag and render it silent thereafter.
  • a Tag shall not execute a kill operation if its kill password is zero.
  • a Tag that does not implement a kill password acts as though it had a zero -valued kill password that is permanently read/write locked.
  • Tag ID Memory 73 (Bank 10) contains Tag ID information 73a which is not intended to be written by anyone except the manufacturers of the RFID chip itself is present because the chip foundry wrote a unique 32-bit serial number into the TID that is now advantageously used as Meta-Key Master Index 73b.. Recently though there are selected RFID chips that differ from this norm by allowing interrogators to write to this bank and then locking it. In preferred embodiments, Meta-Key Master Index 73b is written into this bank by secure RFID tag encoder 16.
  • Tag ID 241a is a 32 bits or more that shall contain an 8-bit ISO/IEC 15963 allocation class identifier (1 11000102 for EPCglobal) at memory locations OOh to 07h.
  • TID memory shall contain sufficient identifying information above 07h for an Interrogator to uniquely identify the custom commands and/or optional features that a Tag supports.
  • this identifying information shall comprise a 12-bit Tag mask-designer identifier (free to members of EPCglobal) at memory locations 08h to 13h and a 12-bit Tag model number at memory locations 14h to lFh.
  • Tags may contain Tag- and vendor specific data (for example, a Tag serial number) in TID memory above lFh.
  • QCC 74a Quality Control Code (QCC), which is comprised of several novel elements that enable an ordinary EPC tag to become secure identity EPC tag 70.
  • QCC Quality Control Code
  • RFID tags 70 can be screened for counterfeits and clones at a significant distance at speeds of up to tens of thousands of items per minute. This is a core benefit that the present invention brings to thwart counterfeiting.
  • User Memory Bank 74 is divided into two partitions. One is to store User Memory SI 74c and the other for User Memory S2 74d.
  • User Memory S 1 74c is preferably used to store header information and an index into a table of cryptographic keys.
  • User Memory S2 74d is preferably used for audit information.
  • cryptographic key index components is used to describe data fields within any of the EPC memory banks: 00, 01, 10, and 11 that are used either as complete keys, an index into a table of keys, or a portion of an index into a table of keys, or an encrypted or obfuscated component of an index into a table of keys.
  • Preferred embodiments are described in this document that further explain the utilization of cryptographic key index components by Fixed-Key Indexer 92, Meta-Key Indexer 102, Meta-Key Master Index 130a, Meta-Key Index 130c and 140c, and Radio Key Index RKI 133a and 145a.
  • a trusted tag converter company writes Encrypted TPC 74b into EPC Bank 01 or User Memory Bank 11. Encrypted TPC 74b is later overwritten by Encrypted QCC 74a, possibly occupying the same blocks of memory. Overwriting is allowed after Encrypted TPC 74b has been read from RFID tag 70 by and into a protected memory location of secure RFID tag encoder 16, forming part of internal QCC 134.
  • Kill Password for retailers preferred embodiments of this invention use subsets of the brand authentication features in order to enable retail stores to kill EPC tags for consumers that want their tags killed as defined in the EPC global specifications. Retailers will need to be given the cryptographic keys to compute the kill password using the UII (EPC) and QCC data (if present).
  • EPC UII
  • QCC data if present.
  • Cryptographic Key Management preferred embodiments manage key changes between authenticated and authorized recipients. Keys are changed because keys can potentially be discovered by a cryptographic adversary. Certain preferred embodiments use asymmetric key algorithms to distribute symmetric keys to authorized recipients. Symmetric-key algorithms are generally much less computationally intensive than asymmetric key algorithms which are typically hundreds to thousands of times slower than symmetric key algorithms. Asymmetric algorithms are used to distribute symmetric -keys on a regular basis to authenticated and authorized machines and entities. Cryptographic keys and initialization vectors are preferably generated using pseudorandom key generators in order to assure a high level of entropy to thwart cryptanalysis attacks. Encrypting the QCC: a block cipher is preferably used to encrypt and decrypt the QCC.
  • the encryption functions are all performed off-tag. That is to say that the RFID tag does not necessarily have a built-in cryptographic engine inside the RFID chip. This is a design decision that the market has made based on cost and read range.
  • RFID tags consume very low amounts of power (on the order of tens of microwatts), which is several orders of magnitudes less than newer smart card chips with cryptographic security coprocessors. The significant difference in power would reduce read range, a primary performance metric to make supply chain applications work. If an RFID tag cannot be read, especially and item-level tag, then the customer cannot be charged. To the retailer, this is a worse problem than counterfeiting and therefore tips that balance away from a cryptographic engine on each RFID tag.
  • passwords are encoded into transponders or wireless sensors when they are commissioned.
  • Passwords are safeguarded using cloaking, obfuscation, cryptographic techniques, secure and trusted channels, locked memory, and other methods that are commonly used to protect confidential information.
  • Passwords are generated or retrieved from data encoded in an RFID transponder to generate an index into one or more databases that contain a one dimensional array of passwords, a two dimensional array of passwords, a multidimensional array of passwords, or an array of actual or pointers to algorithms used to generate passwords from transponder data, for example.
  • cryptographic algorithms are used generate passwords from transponder data.
  • Skip32 is a 32-bit block cipher based on SKIPJACK. Skip32 is a 'not copyright, no rights reserved' public domain cipher written by Greg Rose, QUALCOMM Australia in 1999. Skip32 is based on an implementation of the Skipjack algorithm written by Panu Rissanen.
  • Blowfish is a block cipher that has a 64-bit block size and a variable key length from 32 up to 448 bits. It is a 16- round Feistel cipher and uses large key-dependent S-boxes. Although there is a complex initialization phase required before any encryption can take place, the actual encryption of data is very efficient on large microprocessors; and is much faster than DES and IDEA . Blowfish is unpatented and license-free, and is available free for all uses.
  • AES-128 and AES-256 are block ciphers that are part of the Advanced Encryption Standard (AES) which is an encryption standard adopted by the U.S. government.
  • the standard comprises three block ciphers, AES-128, AES- 192 and AES-256, adopted from a larger collection originally published as Rijndael.
  • Each AES cipher has a 128- bit block size, with key sizes of 128, 192 and 256 bits, respectively.
  • the AES ciphers have been analyzed extensively and are now used worldwide.
  • AES is based on a design principle known as a Substitution permutation network. It is fast in both software and hardware, is relatively easy to implement, and requires little memory. Unlike its predecessor DES, AES does not use a Feistel network.
  • Quality Control Code this invention makes use of parts of memory within an RFID tag, such as an EPCglobal RFID tag that do not have a standard use.
  • a special Quality Control Code (QCC) is written into one of the otherwise unused parts of the tag's memory, such as User Memory or writable parts of TID (i.e. the Tag ID Memory Bank), or extended parts of the main EPC Memory that exceed the standard code lengths (i.e. at the end of a 240-bit EPC memory bank when only a 96-bit EPC code is stored there).
  • QCC Quality Control Code
  • the QCC quality control code is used to reveal where, when, and how products were tagged.
  • a QCC is not able to be interpreted by unauthorized persons.
  • Authorized persons are brand owners that are entitled to protect the integrity of their branded products from counterfeiting.
  • a cryptographic key is needed for reading a QCC, and an understanding of the encoding algorithm is required to make sense of the data.
  • a part of the QCC takes advantage of the various differences in length of the various memory banks inside various RFID tags.
  • RFID tag types There are a large number of RFID tag types that are manufactured with various sizes of TID, EPC, and User Memory banks.
  • the QCC is set for a specific memory capacity, and unless the counterfeiter uses an identical memory footprint to encode counterfeit tags, the result will be a copied QCC that does not match the memory footprint of the tag that it was copied onto.
  • the QCC is a powerful tool for a quick off-line appraisal of goods that are moving through critical choke points such as freight forwarders and national ports of entry.
  • the off-line aspect of this invention is important where transporting large amounts of encrypted data to a remote server may be impractical to meet throughput goals.
  • Embodiments that depend on secure high bandwidth communication with a remote server may not be available, especially in hostile or foreign environments and marketplaces where counterfeit goods are typically sold.
  • Such marketplaces may be back alleys, flea markets, or leased warehouses where high speed Internet connections are not available.
  • Covert surveillance of such areas requires small, powerful, compact processing means with small, fast, and rugged data storage means, all of which could be covertly carried in a backpack. Observations are preferably recorded and associated in real time with the GPS coordinates of where troves of counterfeit items are detected. This allows for intervention and apprehension plans and actions to be decoupled from the scanning process in illicit marketplaces.
  • Countermeasures to thwart brand thieves and counterfeiters preferably include: (1) FIPS 140-2 rated encoders and verifiers with fast acting algorithms that promptly execute cryptographic key zeroization (i.e. clearing of cryptographic keys) when an attack is detected by sensors including tamper detection switches and devices that detect physical and environmental attacks such as extreme temperatures (outside of the device's rated operating limits), tamper resistant covers, shields, RF noise, low power encoding, and obfuscation techniques to befuddle eavesdroppers; (2) Tagging logs reported to brand owner - accountability required on part of manufacturer; (3) Encoder does not duplicate any numbers; (4) QCC used for forward intelligence reporting to authorized observers; (5) A preprinted logo on the data carrier conveys confidence in brands that use the teachings of this patent to assure product authenticity.
  • Certain preferred screening methods use information that is stored in a part of the RFID tag that is not directly associated with the identification of the product that it identifies.
  • User Memory 74 is available for storing supplemental information, and is well suited for the type of information that is useful for determining the origin of a tagged product and the characteristics of the intended data carrier.
  • an Encrypted Quality Control Code (QCC) 74a of Fig. 7 is computed and encoded into each RFID tag by a secure RFID tag encoder 16.
  • Encrypted QCC 74a is adaptable to the amount of available tag memory, and in the case of most EPC tags, the amount of User Memory 74. Currently, 64 bits of User Memory is readily available. As time goes on, the amount of user memory will increase and the utility of Encrypted QCC 74a will expand with it.
  • a preferred composition of the 64-bit implementation of Encrypted QCC 74a is described here with the preferred number of bits for each QCC Field: GLC 18, Encoder 11, Day 0, Time 0, TPC 14, RKI 6, CRC 10, CCC 5, Total 64 bits.
  • Encrypted QCC 74a For RFID tags that can store up to 128 bits, 128 -bit implementation of Encrypted QCC 74a is shown here with additional space allocated for each field, plus space for the Day and Time fields. GLC 20, Encoder 20, Day 12, Time 17, TPC 32, RKI 10, CRC 12, CCC 5, Total 128 bits.
  • Encrypted QCC 74a The plaintext version of Encrypted QCC 74a is only present at time of its creation within protected memory of tagging controller 45 of secure RFID tag encoder 16 and there it is referred to as QCC 134.
  • QCC 134 is also recreated within the protected memory of Counterfeit Heuristics Engine 64 of secure RFID tag authenticator 17 as QCC 146.
  • GLC Global Location Code, a field that indicates a representation of the latitude and the longitude of the location where the encoder was operating when the current tag was encoded.
  • AED Aggregated Extended Data
  • Encoder - A unique number that is assigned to each RFID tag encoder.
  • Day - A counter that indicates the date that the current tag is encoded in the form of a delta offset from a fixed date.
  • Time - A counter that subdivides each day into time slots and represents the time of day that the current tag is encoded.
  • TPC - Tag Physical Characteristics is an encrypted field that is created from two plaintext descriptors that are designated by a tag converter during the tag conversion process: TMA and DCM.
  • TPC 74b is preferably written by the tag converter and stored on the RFID tag in a secure form during the conversion process. It is transformed by the tag converter and within secure RFID tag authenticator 17 by TPC Key 147b and TPC Transform 147a.
  • Tag Memory Architecture (TMA) 147c is a field that is an index into a table of distinctive tag memory footprints. In the 128-bit version of QCC 146, this field can specify up to 256 different types of tag memory architecture footprints using an 8-bit TMA. A mismatch of this field to the actual tag memory footprint during the Tag Memory Architecture Authentication Function 149a is an immediate red flag TMH 149d for detecting counterfeit tags at a distance and is reported to Authenticator Heuristics Engine 166 as a security violation.
  • Data Carrier Mark (DCM) 147d is an index into a table that specifies the characteristics of anti -counterfeit marks 70b that are embedded into data carrier of RFID tag 70.
  • the marks may be a combination of microdots, microtaggant, printing, watermarks, human fingerprints, or other distinctive characteristics of face stock 75, adhesive 79, or other parts of the physical data carrier of tag 70.
  • this field can specify up to 16,777,216 different combinations of 24-bit DCM data carrier marks.
  • a mismatch of this field to the actual anti-counterfeiting features during the Data Carrier Mark Authentication Function 149b is an immediate red flag DCH 149e for detecting counterfeit tags and is reported to Authenticator Heuristics Engine 166 as a security violation.
  • Data Carrier Mark (DCM) 147d alternatively contains a unique operator record number that points to a fingerprint record in Fingerprint Database 69 that is associated with the operator that was authorized to encode and place tag 70 onto sellable item 22a in factory 21.
  • additional bits are allocated to DCM 147d to hold greater numbers of operator record numbers, possibly reducing the number of bits in other fields, such as TMA 147c. That operator left fingerprint 79a on tag 70.
  • a descriptor of fingerprint 79a is stored in fingerprint database 69 as either a pattern image or in the form of minutia that describe the ridge pattern types, bifurcations, ridge endings, their location, strength, and significant direction.
  • Pattern-based images in uncompressed form require about 1024 bytes per fingerprint, or 300-400 bytes when compressed. In minutia form only 125 to 400 bytes are required, depending on the number of minutia per fingerprint. For a typical finger, 35 to 40 minutiae are normal. Often times a match can be made with as little as 12 of the 40 minutiae.
  • RKI (for Encoders) - Radio Key Index RKI 133a is a field that is an index into Radio Key Table 133b in secure RFID tag encoder 16 that is used to select a cryptographic key for use in Radio Key Hash Function 133c to generate the over-the -radio -link Radio Passwords 138 from selected plain text fields of formulated EPC SGTIN 124 and is comprised of kill password 138a and access password 138b.
  • those passwords are written into reserved memory 71 as kill password 71a and access password 71b respectively. Lock bits 74c are then set.
  • RKI (for Authenticators) - Radio Key Index RKI 145a is a field that is an index into Radio Key Table 145b in secure RFID tag authenticator 17 that is used to select a cryptographic key for use in Radio Key Hash Function 145c that is used to generate the over-the -radio-link Radio Passwords 149f from selected plain text fields of EPC SGTIN 72a and is comprised of kill password 149f and access password 149h.
  • Password Authentication Function 149i compares or evaluates these values through a challenge-response interaction with tag 70 to determine the contents of reserved memory bank 71 and to verify kill password 71a and access password 71b.
  • the term challenge-response is not defined in the EPC Radio -Frequency Identity Protocols, Class-1 Generation-2 UHF
  • RFID Protocol for Communications at 860 MHz-960 MHz,' Version 1.0.9 document, and is therefore defined here for clarification.
  • challenge -response interaction is a family of authentication protocols in which one party presents a question (“challenge") and another party must provide a valid answer (“response”) in order to be authenticated.
  • the simplest example of a challenge -response interaction is password authentication, where the challenge is asking for or offering the password and the valid response is observed when the password is correct.
  • a correct Access Password will cause the RFID tag to transition into the secured state.
  • CCC - Counterfeit Control Code 164c a code that is assigned based on the heuristic incidence model that runs in Counterfeit Heuristics Engine 64 of security server 10a. The value is based on historic patterns of abuse by the manufacturer, the relevant distribution channels, and varies by SKU and encoder number.
  • Counterfeit Control Code 164c is a feed forward code that is encoded with heuristics that are representative of previously observed incidents and patterns of occurrences.
  • each secure RFID tag encoder 16 is managed by Encoder Security Manager 112 which maintains in protected memory of tagging controller 45 CCC Table 152a.
  • CCC Selector 152b uses EPC SGTIN 124 as input to select which CCC to use in QCC 134 since each CCC is encoder and SKU specific.
  • counterfeit heuristics engine 64 of security server 10a is in complete control of each SKU that is encoded by each secure RFID tag encoder 16.
  • Updates to CCC table 152a take effect immediately and are meant to effectively send a 'silent alarm' to remote tagging locations anywhere in the world without notification.
  • CRC - Cyclical Redundancy Check CRC 156b is a field that confirms data integrity of TID 73 (which may or may not be field writeable depending upon the inlay supplier's chip specifications), formulated EPC 124, and Cloaked QCC Payload 155a. It is important to note that if a counterfeiter copies EPC 72a and Encrypted QCC 74a onto an RFID tag with a fixed and different TID, then the CRC will have a high probability of not matching.
  • CRC 156b is calculated by CRC Calculation 155d in secure RFID tag encoder 16 before Cloaked QCC Payload 155a is encrypted and written to EPC Memory 72 of EPC RFID tag 70.
  • Face Stock 75 An optional cover layer that is preferably comprised of paper or plastic materials and is usually printed or marked in a manner that is needed for the security functions described herein, for human handling, or for EPC global branding (i.e. the EPC global logo).
  • the surface may contain holograms, printed, or micro -features as anti-counterfeiting features.
  • RFID Chip 76 - preferably manufactured by a silicon foundry in accordance with EPC global specifications.
  • Antenna 77 preferably a stamped, etched, or printed metallic structure of a particular shape and thickness for coupling with the air interface and with RFID chip 76.
  • Substrate 78 - preferably PET or some other plastic or paper which carriers the antenna 77, RFID chip 76, and adhesive 79.
  • Adhesive 79 preferably a pressure sensitive adhesive layer that initially bonds substrate 78 to a release liner for conveyance through or under secure RFID tag encoder 16. After RFID chip 76 is encoded and verified, adhesive 79 is transferred to sellable item 22a, whereupon adhesive 79 begins a process of wetting-in and foirning a semipermanent bond. This bond layer will securely retain fingerprint 79a of the operator that placed the tag onto sellable item 22a. If facestock 75 is not present or clear such as a PET plastic material, then fingerprint 79a can be observed through facestock 75 by using a proper source of illumination, such as light source 17b and fingerprint imager 17c.
  • a proper source of illumination such as light source 17b and fingerprint imager 17c.
  • Face Stock 75 in certain embodiments has holographic, micro-scribed threads, printed features, or other micro- features embedded into the materials that are visible (or identifiable) at some magnification from the top, bottom, or within the constituent materials of face stock 75.
  • DCM 147d provides an index into a table (or directly describes) that describes the anti-counterfeiting therein;
  • Antenna 77 is under face stock 75;
  • Substrate 78 is under Antenna 77 and adhered directly to face stock 75.
  • Substrate 78 may be flat, or comprised of a layer of foam, or folded in order to produce a flag tag.
  • Dielectric spacing between antenna 77 and adhesive 79 in the form of air (as would be the case for a folded flag tag) or foam as in the case of a foam-backed tag are important for preventing detuning of antenna 77 by metallic substances or RF-absorbing liquids (including water molecules) within sellable item 22a to which adhesive 79 is attached;
  • Adhesive 79 in some preferred embodiments has micro -features blended in with the adhesive emulsions that can be inspected at some magnification level.
  • tag 70 When tag 70 is manually applied from secure encoder 16, the operator leaves at least one unique fingerprint 79a that is molded into adhesive 79; (a) DCM 147d provides an index into a table (or directly describes) that describes the anti-counterfeiting features therein.
  • Each fingerprint 79a can be imaged and reduced to a set of minutiae that describe each fingerprint 79a.
  • Substrate 78 is in direct contact with adhesive 79;
  • EPC tag 70 is bonded to the object that is tagged through adhesive 79. For manually applied tags, the operator leaves at least one unique fingerprint 79a that is molded into adhesive 79 and preserved for forensics analysis.
  • TMA 147c is an index into a table that describes the physical memory layout of an authentic RFID chip 76 for the current tagged object.
  • Kill password 71a serves two purposes: it is used to disable the RFID tag and it is used to prove that an authentic tag holds a secret number, (a) Access password 71 b is a gateway to unlock the lock bits of the EPC tag so that the kill password 71a can be verified; (b) RKI 145a is an index that points to Radio-Key Table 145b that contains the current set of cryptographic keys that are used to create the kill password 71 a and Access password 71b from EPC SGTIN 72a.
  • Access password 71b is a gateway to unlock the lock bits of the EPC tag.
  • RKI 145a is an index that points to Radio-Key Table 145b that contains the current set of cryptographic keys that are used to create the kill password 71a and access password 71b from EPC 72a.
  • Meta-Key Master Index 73b is used whenever possible to select from a changing set of cryptographic keys to decrypt Encrypted QCC 74a.
  • Preferred encoder embodiments use Meta-Key Master Index 130a that are updated by Encoder Security Manager 112 and used whenever there is a writeable TID 73 in the tag stock that is loaded into secure RFID tag encoder 16.
  • Preferred embodiments include: (a) Tag 70 wherein TID Memory 73 is writable.
  • the original EPC UHF Gen2 chips only have factory programmable Bank 01. Whenever chips are available with a writable Bank 01 (such as the XCTF family from Invengo Information Technology Co., Ltd.
  • Meta-Key Master Index 73b is preferably written by RFID tag encoder 16;
  • Tag 70 wherein TID Memory 73 has a permanent factory-programmed 32-bit serial number in for example a 64-bit TID. The lower 16-bits are for example used as Meta-Key Master Index 73b;
  • Tag 70 wherein EPC memory 72 wherein there are more bits available than are needed to store EPC SGTIN 72a and provide an adequate way to store Meta-Key Master Index as an alternative embodiment;
  • QCC 74a is encrypted by Secure RFID tag encoder 16 and decrypted by Secure RFID Tag Authenticator 17 using a static cryptographic key. This is not preferred since cryptographic keys can eventually be cracked if there is sufficient incentive.
  • QCC 146 subpart DAY is used to identify when the current tag was programmed. This is important for forensic analysis.
  • QCC 146 subpart TIME is used to assist in the apprehension of illegal manufacturing operations that work for the brand owner by day and work for themselves by night, (a) QCC 146 subpart CCC may be changed by Counterfeit Heuristics Engine 64 if there is a correlation between confirmed counterfeit goods and QCC 146 subpart TIME.
  • QCC 146 subpart GLC is used to confirm that secure RFID tag encoder 16 is operating in a pre-authorized location, (a) QCC 146 subpart ENC is authorized to operate in locations that are approved by the brand owner.
  • CRC 143a is used to confirm through CRC Calculation 161 and CRC Validation Logic 162 that all data banks hold valid representations of the intended data. This is a trap for counterfeiters that opt to merely copy an Encrypted QCC 74a and EPC SGTIN 72a onto an RFID tag that lacks a valid TID. If there is a mismatch, then it is reported through to Authenticator Heuristics Engine 166. (a) EPC SGTIN 72a is correctly represented; (b) TID Memory 73 matches what CRC 143a was computed to; (c) QCC 146 parts other than subpart CRC are correctly represented.
  • QCC 146 subpart CCC captures any historic errors that are processed by the heuristic analysis tools for any noteworthy anomalies in: (a) Reserved Memory 71 ; (b) UII Memory 72; (c) TID Memory 73; (d) User Memory 74; (e) Authenticity of printed or micro-features in Face Stock 75; (f) Authenticity of micro-features in Adhesive 79.
  • the DCM information is preferably provided to the RFID tag encoder from the tag converter in a form that can be read from each RFID tag as it's about to be programmed for the first time by secure RFID tag encoder 16.
  • the DCM information is encrypted as part of the TPC field that is read from TPC 74b of User Memory 74 and copied unchanged into the TPC field of QCC 134.
  • a method of detecting counterfeit RFID tags is to make part of the identification very hard to duplicate. Examples of that are in currency where specific linen fibers are used that can only be procured through controlled suppliers.
  • Preferred anti-counterfeit technology for the data carrier of RFID tag 70 includes micro-scribed fibers, holograms, Data Glyphs, Embedded Data Characters (EDC), microdots, microtaggant, nanoart, nanohthography, human finger prints, and other steganographic marks to hide a code that helps to validate the authenticity of tags, which in turn authenticate the items that they are attached to.
  • micro -features which are any mass- producible, small, non-obvious, or microscopic traits or characteristics that can be incorporated into a data carrier and a brief exact description (or reference to a description) of them conveyed to both encoder 16 and secure RFID tag authenticator 17.
  • DataGlyphs are a technology for encoding machine readable data onto paper documents or other physical media. They encode information into thousands of tiny, individual glyph elements. Each element consists of a small 45 degree diagonal line, as short as 1/lOOfh of an inch or less, depending on the resolution of the printing and scanning that is used. Each one represents a single binary 0 or 1 , depending on whether it slopes to the left or right.
  • Sequences of these can be used to encode numeric, textual or other information.
  • the individual glyphs are grouped together on the page, where they form unobtrusive, evenly textured gray areas, like half-toned pictures.
  • One of the reasons for using diagonal glyph elements is because research has shown that the patterns that they form when massed together are not visually distracting.
  • Steganographic features are marks that have hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
  • the word steganography is of Greek origin and means 'concealed writing'.
  • Such features are preferably printed onto the physical data carrier part of tag 70.
  • the physical data carrier part of a tag is the mechanical device that carries electronically stored information in a chip type data carrier and/or printed information on a surface such as the face of a data carrier (also referred to as face stock).
  • a microdot is text or an image substantially reduced in size onto a 1mm disc to prevent detection by unintended recipients.
  • Microdots are normally circular around one millimeter in diameter but can be made into different shapes and sizes and made from various materials such as polyester. The name comes from the fact that the microdots have often been about the size and shape of a typographical dot.
  • Microtaggant® is a microscopic and traceable identification particle used to trace explosives or other hazardous materials or to prevent counterfeiting. Preferred embodiments use layers of various materials and colors to construct uniquely coded patterns. The patterns are the same from one particle to the next within the same coded group. Like particles are preferably mixed with adhesive or paper to make a uniquely coded element of secure RFID tag 70.
  • Nanoart and nanolithography are applied as anti-counterfeiting measures by incorporating uniquely identifiable symbols or information into nano-scopic features that can be embedded into data carriers, including parts of the face stock or adhesive materials. The point is that the symbols are so small that they are difficult to detect without prior detailed knowledge, and are therefore nearly impossible to duplicate.
  • the RFID tag encoder uses tag stock or adhesive that is printed or impregnated with identifiable features that preferably have a high degree of entropy. In other words there are preferably millions, billions, or trillions of unique combinations of uniquely identifiable features that are hidden in a data carrier.
  • the tag stock carries with it an identifier such as a bar code, a secure microchip, or an RFID tag to refer to the feature or features that are present in or on the data carriers.
  • a secure RFID tag is attached to or contained within a cartridge that contains the RFID tag stock, and that tag is used as a secure reference to the hidden features.
  • the objective is to securely transfer information about the tag stock, including steganographic details about the microdots, microtaggant, nanolithography, or printed features so that the information can be securely incorporated into the information encoded on the RFID tag. That way, every tag that is encoded on that tag stock will have data that matches up to the data carrier. If a counterfeiter were to copy the RFID tag data onto another data carrier, that carrier would need to have the identical printed or micro-features as the original in order not to be caught.
  • the secure RFID tag attached to or contained within the cartridge serves as a license to ensure an authentic stock of RFID tags and to monitor cartridge and encoder use.
  • the RFID tag attached to the cartridge becomes a license input for the secure RFID encoder that is preferably read from and written to by the same RFID interrogator module of the encoder during the encoding and dispensing of the RFID tag in the cartridges.
  • Preferred embodiments of the cartridge license use an EPCglobal compliant RFID inlay that is attached to or near the peel device or peel plate that is preferably located with the interrogation field of the antenna or near field coupler.
  • the cartridge license inlay is only readable and writeable at slightly higher RF power levels than for reading or encoding the supply of encodable tags or inlays.
  • reradiation from an encodable tag/inlay at or near the peel plate and the resulting near field retuning of the near field coupler also plays a role in effectively increasing the range of the interrogator to extend to the cartridge license which is preferably at the fringe of the near field coupler's normal tag reading, verifying, and encoding field.
  • the cartridge RFID tag/inlay is distinguished from the nearby stock of RFID tags by a distinctive data header, an ISO (International Organization for Standardization) Application Family Identifier (AFI) as defined in ISO 15961 , or by being responsive to interrogation in a different frequency band from the supply of encodable tags that are carried by the cartridge.
  • AFI International Organization for Standardization
  • the preferred embodiment of a cartridge license uses an encrypted count of remaining transponders that are authorized to be encoded. In order to prevent unauthorized duplication or rewriting of the license and its associated count, critical parts of those numbers are the encrypted cipher text result that is at least partially generated from secret values that are also stored in the Access and Kill Passwords. All or part of the license and count are preferably stored in User Memory.
  • a Data Storage Format Identifier (DFSID) as specified in IS015961 and IS015962 preferably specifies the format for the user memory Bank 11. The DSFID is typically eight bits in length, but may be extended further as specified in ISO 15961.
  • Authentication of the license and associated transponder encoding authority requires the Access and Kill Passwords to be formulated using methods described elsewhere within the present invention, and used to decrypt the encrypted license and associated count. Additional security features are also preferably used, including Data Carrier Marks (DCM's). Without the license, or with a depleted license, the secure RFID encoder preferably ceases to function.
  • DCM's Data Carrier Marks
  • Fingerprints Molded into Adhesive Layer the fingerprint of the operator that encoded and applied a manually- applied RFID tag did so by handling each tag 70.
  • a single fingerprint 79a was left in adhesive layer 79 as shown in Fig. 7.
  • Each human fingerprint can be uniquely described by a set of minutia. The minutia that is associated with each fingerprint can be compared a reference that is preferably stored in Fingerprint Database 69 in Security Server 10a of Fig. 6.
  • Stegano graphic or Micro -Feature Descriptor in a preferred embodiment of the RFID tag encoder, an internal optical reader is used to directly read printed or embedded features in the tag face stock in order to respond to the unique characteristics of each tag (i.e. data carrier) and cryptographically connect the data to the data carrier.
  • the printed or embedded features may be analog or digital representations that can be recognized, processed, imaged, measured, quantified, or decoded.
  • the data carrier contains printed or micro -features and also digital data inside each data carrier that references a descriptor that describes those features.
  • the data carrier and matching descriptor data are both placed there by a trusted tag converter.
  • a trusted tag converter is a trustworthy company that produces RFID tags by combining RFID tag inlays with face stock and usually an adhesive layer and a release liner.
  • a trusted tag converter would for example purchase or make inlays (which typically contain an RFID chip, an antenna, and a substrate material), and adhere them to face stock material that may have printed or micro -features on either the top or the bottom surface, add an adhesive layer (which may have micro -features blended in with the adhesive), and a release liner which is used as a conveyance web.
  • the hidden features are described in a secure document, preferably in digital machine readable form, and referenced by a number that is then stored into a portion of memory in the RFID tag.
  • Preferred memory banks for storing TPC 74b feature descriptor into EPC Gen 2 tags are the EPC (Bank 01), TID (Bank 10), or User Memory (Bank 11).
  • TPC:DCM 147d information regarding the tag converter's printed or micro-feature descriptor is read from the memory of each tag in the first step of the tag encoding process. Then the descriptor may be altered, encrypted, or re-encrypted before being stored into QCC 134 as Encrypted QCC 74a on RFID tag 70.
  • QCC 134 is cloaked using Cloak Transform 135 to obfuscate the QCC features by churning the cloaking characteristics through CCE control 131b from Cloak Code Table 131a that is driven by the least significant bits of the serial number of EPC SGTIN 124. This extends the useful life of the Meta-Keys by making it considerably more difficult to conduct crypto analysis of Encrypted QCC 74a by observing inputs such as TPC 74b that can be read by a cryptographic adversary.
  • EPC SGTIN 124 By using the least significant bits of EPC SGTIN 124, for example, the lower 2 bits of the serial number are used (whether hashed or not) there will be a new group of 4 key indices when the SKU's begin to reach serial numbers that have higher order bits set that are included in this EPC-based key selection method (regardless whether it is hashed or not).
  • a site location and a unit number for that site comprise the most and next-most significant bits of the serial number respectively. This results in controlled Meta-Key and Cloak Code changes across all enterprise locations and SKUs for all secure RFID tag encoders 16.
  • QCC 136 is encrypted by Block Cipher 137 using MKE key 130e from Meta-Key Table 130d that is selected by Meta-Key Index 130c that is derived from the upper bits of EPC SGTIN 124 and preferably also from Meta-Key Master Index 130a if a writeable TID 73 is utilized and carries inside of it Meta- Key Master Index 73b that was stored there and locked by secure RFID encoder 16 or is present because the chip foundry wrote a unique 32-bit serial number into the TID that is now advantageously used as Meta-Key Master Index 73b.
  • GLC Precision GPS data is provided by a constellation of satellites that orbit the earth emitting GPS signals preferably to GPS receiver 41.
  • the Global Location Code is a high precision latitude and longitude geographic coordinate that uses a limited number of bits in GLC 119 of Fig. 11, in GLC 129 of Fig. 12, and in the GLC subpart of QCC 134 of encoder 16, and in the GLC subpart of QCC 146 of authenticator 17.
  • the global location code is based on a 20-bit longitude and a 20-bit latitude. Assuming an equatorial radius of 20,938,815 feet, and an equatorial circumference of 131,562,344 feet, the longitudinal feet per bit for a 20-bit longitude representation would be 125 feet; whereas a 9-bit representation would be 256,958 feet per bit.
  • the latitudinal feet per bit for a 20-bit representation would be 63 feet; whereas a 9-bit representation would be 512 feet per bit.
  • a 20x20-bit resolution would cover 7,845 square feet, and a 9x9-bit resolution would cover 1180 square miles. Therefore, in terms of value to law enforcement, a 20-bit longitude and latitude precision would be preferred over a 9 -bit version.
  • GLC and Aggregate Extended Data are extended data that is algorithmically combined from an aggregated group of similar RFID tags. This is a novel method of providing more detailed information than what is written onto a single tag. The limited amount of data that is written may be limited by the actual amount of memory storage space on an RFID tag or it may be by design to hide information from people that do not ordinarily have access to large populations of similarly tagged items, such as individual consumers. AED information is readily aggregated for example in distribution centers where cartons and inner packs are still intact. It is this latter example that provides for a convenient and more secure method for brand protection enforcement activities to aggregate data that reveals selected encoding information in greater detail with higher security.
  • Brand owners may opt to encode a variety of sensitive information and spread that information over a smaller or larger number of RFID tags in order to assist them in solving their particular supply chain or counterfeiting problems.
  • one or more different types of spreading functions are used to spread shared data across multiple tags.
  • the inverse of the function is used to reassemble the data collected from multiple tags and reconstruct the original data that is shared by the group of tags.
  • One example of a simple spreading function is to use the lower 3- bits of the EPC serial number to spread one-eighth of the shared data across eight sequentially numbered EPC RFID tags for the same SKU (i.e. the same Global Trade Item Number or GTIN).
  • Other preferred spreading functions use the UII data and run it through a hashing function to produce an n-bit digest that is then used to multiplex and demultiplex the shared data across 2 n tags.
  • Fig. 11 is an example of a preferred embodiment whereby full -resolution global location information is spread across multiple RFID tags 70 by secure RFID tag encoder 16 using the AED-based GLC Transform 1 18 described herein.
  • GPS Receiver 41 and/or Encoder Security Manager 112 load current location information into GLC Coordinate Transform 112a where minutes and degrees are converted into straight binary longitude and latitude.
  • Those binary representations are binary coordinates 113 comprised of a full 20-bit representation each of longitude and latitude.
  • Longitude 113a is the upper 9 bits and Xlong 113b is the lower 11 bits of longitude.
  • Latitude 113c is the upper 9 bits and Xlat 113d is the lower 11 bits of latitude.
  • AED 119a is the result from multiplexor MUX 117.
  • the control signals for MUX 117 are the fixed-length digest of secure hash function 115, the inputs of which are secret AED Key 116 and plaintext that is selected from EPC SGTIN 114 (or other publicly readable information on the RFID tag).
  • the combination of EPC SGTIN 114, Secure Hash 115, AED Key 119a, and MUX 117 comprise a spreading function that uses selected data that is securely held inside Secure RFID Tag Encoder 16 and spreads it across multiple RFID tags.
  • Fig. 12 is a preferred embodiment for reassembling GLC 129 fields from multiple RFID tags to reconstruct the full 20x20 bit resolution of the encoding origin of a population of similar RFID tags (i.e. tags from the same encoder for the same SKU on the same day, etc.).
  • GLC 129 is comprised of Longitude 123a, Latitude 123c, and AED 129a which are originally from their counterparts Longitude 113a, Latitude 113c, and AED 119a of Fig. 11.
  • EPC SGTIN 124 is a copy of the SGTIN that is being processed by authenticator 17.
  • Secure Hash 125 is used with AED Key 126 to produce a digest that is used by Extended Data Aggregator 127 to organize GLC 129 readings from a population of RFID tags to create Extended Global Location 123 which is comprised of Longitude 123a, Xlong 123b, Latitude 123c, and Xlat 123d. This result is then displayed by Human Interface 56 and/or reported to Counterfeit Heuristics Engine 54.
  • QCC Encryption for the preferred embodiments, the QCC-64, QCC-128, QCC-192, or another QCC implementation the preferred method of encryption is a block cipher with a block size that matches the amount of available User Memory (for embodiments that store Encrypted QCC 74a in User Memory 74).
  • Preferred block cipher choices are: Blowfish for QCC 64, AES-128 for QCC 128, AES-192 for QCC 192, and AES-256 for QCC 256.
  • QCC encryption key selection is preferably managed through Encoder Security Manager 112, while QCC decryption is preferably managed through Authenticator Security Manager 142. Both are under the direct control of remotely located Authentication Database 68 and Counterfeit Heuristics Engine 64 through Anti-Counterfeit Encoder Sockets 61 and Anti-Counterfeit Authentication Sockets 62 over open Internet connections. Preferred embodiments use a hybrid of asymmetric and symmetric cryptographic keys during session establishment and secure updates of encoders 16 and authenticators 17.
  • Fig. 17 is a preferred method 170 of authenticating RFID tags and by extension the goods that they are attached to.
  • goods arrive at a location such as a shipping dock, a border crossing, a warehouse, or a retail location.
  • step 172a the goods are scanned for an RFID tag preferably using secure RFID tag authenticator 17. If one is not detected, then the package is visually inspected for Counterfeit (Warning) Label 22b imprinted onto sellable item 22a. If Counterfeit Label 22b is present, then the goods are counterfeit and are forwarded to step 172c for legal, forensics, and logistics handling. On the other hand, if there is no Counterfeit Label 22b, then the goods are suspect and forwarded to step 172d as Suspect Goods. In either case Authenticator Heuristics Engine 166 is updated with a record of the incidence and correlated with GPS coordinates from GPS receiver 51.
  • Counterfeit (Warning) Label 22b imprinted onto sellable item 22a. If Counterfeit Label 22b is present, then the goods are counterfeit and are forwarded to step 172c for legal, forensics, and logistics handling. On the other hand, if there is no Counterfeit Label 22b, then the goods are suspect and forwarded to step 172d
  • step 173 is executed wherein the tag is read.
  • Tag ID 73a is first checked in step 174 against a list of RFID tags that are known to have a writeable TID memory bank 73 or alternatively having uniquely serialized TID numbers. Lacking that ability or any other standard memory location to use as an index to continually update the keys for decrypting Encrypted QCC 74a, in step 175 control skips step 176 to proceed at step 177 below with default Meta-Key Master Index value of zero.
  • a writeable TID is used advantageously to provide a Meta-Key Master Index. For example, if there are 64-bits of writeable TID, then the lower 16- bits are preferably used to select from a table of up to 65,536 Meta-Key key groups.
  • step 176 the writeable or uniquely serialized TID 73 is read to extract Meta-Key Master Index 73b.
  • step 177 EPC SGTIN 72a is read and the upper (i.e. most significant) bits of the serial number of the SGTIN are merged with the Meta-Key Master Index to form Meta-Key Index 140c which is used in step 179 to fetch a Meta- Key from Meta-Key Table 140d.
  • This structure provides for a remotely and locally controlled Meta-Key change mechanism to thwart counterfeiting.
  • step 182e RFID tag 70 is scanned for Encrypted QCC 74a. If a string of bits of the correct length for an Encrypted QCC is found and preferably has a certain minimum Hamming Weight, then the advanced tag authentication procedure 190 of Fig. 19 is used beginning at step 191a where Encrypted QCC 74a is read into secure RFID tag authenticator 17.
  • step 191b Encrypted QCC 74a is decrypted by symmetric block cipher 141 of Figs. 14 and 16 using Meta-Key MKA 140e from Meta-Key Table 140d.
  • step 191c the plaintext result of block cipher 141 is comprised of Cloaked QCC Payload 143 and CRC 143a.
  • Cloaked QCC Payload 143 is uncloaked using Uncloak Transform 144 and Cloak Code CCA 141b.
  • Preferred cloaking transforms include XOR, bit shifting, byte shifting, and block rotation operations that have inverse counterparts.
  • step 192a of Fig. 19 the CRC of Fig. 16 is computed by CRC Calculation 161 using Cloaked QCC Payload 143, EPC SGTIN 72a, and TID 73.
  • CRC Validation 162 is performed by comparing the calculated CRC from CRC Calculation 161 with CRC 143a. If they do not match, then this may be an initial indication that a counterfeiter has attempted to clone a valid RFID tag 70 onto a data carrier that lacks the proper TID or a malformed QCC was used in a cloning effort; therefore the goods are suspect and process flow is diverted to step 192c.
  • TPC Tag Physical Characteristics
  • the transformation process is a 32 -bit cryptographic block transformation or another symmetric key process. It is well known that a 32-bit cipher is not suitable for high security applications.
  • TPC Transform 147a is part of a comprehensive security system, and by itself does not expose any significant vulnerability. Preferred embodiments use Skip32 which is a 32-bit block cipher based on SKIPJACK.
  • TPC Transform 147a is the inverse of the 32-bit block cipher encryption process that is used by preferred RFID tag converter companies while preparing tag stock for secure RFID tag encoder 16. Therefore TPC Key 147b is shared between all tag converters and all secure RFID tag authenticators 17. TPC Key 147b is updatable through Authenticator Security Manager 142, but steps must be taken to synchronize key changes between all parties. A preferred embodiment (not shown) uses the DAY field of QCC 146 to synchronize TPC Key changes by selecting the key changes based on the DAY that each RFID tag 70 was encoded.
  • TPC Transform 147a is two parts: TMA 147c and DCM 147d, two elements that are used to describe the physical characteristics of the data carrier and do not refer to the data that is stored in the data carrier. These elements were defined when the data carrier was manufactured by the tag converter and they are unchanged by secure RFID tag encoder 16.
  • step 194c Tag Memory Architecture Authentication Function 149a is performed where Memory Footprint 70a of RFID tag 70 is compared with TMA 147c, step 194d.
  • this step there is no secret information that is revealed by the tag reading process that could be advantageously used by a cryptographic adversary that may be 'snooping' a covert verification process.
  • This is an important initial qualification step that can be performed in public, even in a crowded street market where illicit goods are sold. If the foot prints do not match, the goods are marked as suspect goods . If this is part of a covert surveillance scan in an open market, the immediate GP S 51 reading of secure RFID tag authenticator 17 is preferably recorded with this reading.
  • step 195a radio key index RKI 145a is used to fetch a radio key from Radio Key Table 145b and in subsequent step 195b execute Radio Key Hash function 145c as shown in Fig. 14 to produce Radio Password result 149f that contains kill password 149f and access password 149h.
  • step 195e access password 149h is sent to RFID tag 70 so that it will traverse to the secured state if it was a valid access password (if not valid it is flagged as a counterfeit in step 196c) and in step 196a will transfer flow to step 201a of Fig. 20 wherein the lock bits are cleared and then in step 202a the kill password 71a is read from reserved memory 71 and in step 202b it is compared with kill password 149f in Password Authentication Function 149i of Fig. 14. If the comparison does not match, as in step 202d, the tagged item is flagged as a suspect good. At which point, results can be sent to Password Authentication Heuristics 149j.
  • step 196a If in step 196a tag 70 did not traverse to the secured state, then it and the goods that tag 70 are attached to are deemed to be counterfeit and are rejected. If in step 202b described above the result is a mismatch between the stored and the computed kill passwords, then again the conclusion is that tag 70 and the associated goods are counterfeit and are rejected as may be instructed by Human Interface 56 of Fig. 5. These are screening steps that that are performed over the air, preferably under controlled conditions where there is not a danger of detection by cryptographic adversaries. Jammer 58b of Fig.
  • Interrogator 58a and antenna 58c are preferably used with Interrogator 58a and antenna 58c in preferred embodiments in order to enhance security and reduce vulnerability to cryptographic attack when secure RFID tag authenticator 17 is used to perform these critical steps 195e through 202c in an uncontrolled space where electromagnetic waves can propagate to someone who is eavesdropping on the process.
  • a kiosk is used in a retail environment such as a store or a shopping mall where consumers can verify tagged items and observe quantitative results on a display panel of Human Interface 56 of secure RFID tag authenticator 17.
  • wave propagation from antenna 58c is confined to the boundaries of a shielded Faraday cage into which a consumer places retail items for secure authentication.
  • a Secure Tag Authenticator embodiment can incorporate an imaging device 55 for documentation or authentication of physical, printed, or micro-features and for collecting, storing, and processing optical images as heuristic information.
  • Network node 52b is used to periodically communicate with security server 10a and exchange important heuristics data on a global scale. Image data can be collected, especially to document counterfeit goods that do not have an authentic RFID tag.
  • Object Transport 59 of Fig. 5 is preferably used to automatically assist with the scanning of thousands of items per minute by moving goods through the RF field of Fig. 5 under controlled conditions.
  • step 203a of Fig. 20 the goods are passed because tag 70 was determined by over-the-air verification methods to be authentic.
  • step 204a tag 70 is relocked and in step 204b tag 70 exits the secured state.
  • step 205a the goods are accepted as authentic.
  • step 182e if at step 182e the result was that there was no Encrypted QCC in User Memory 74 of tag 70, then control will flow to step 183a where EPC SGTIN 72a is read then in step 183b it is hashed or a 64- bit portion of it is run through a 64 -bit Block Cipher using Direct-Key which is a cryptographic key that is maintained by Encoder Security Manager 112.
  • step 183c The converted result is used in step 183c to provide the 32-bit kill password and 32-bit access password.
  • Interrogator 48a is used to send that access password to tag 70 to transition it into the secured state.
  • step 184a If in step 184a it is determined that tag 70 is in the secured state, then control will flow to step 184b, otherwise tag 70 is deemed to be suspect at step 184c.
  • step 184b tag 70 is unlocked and the kill password is read. If in step 185a it is determined that the kill password was incorrect, then control is diverted to step 185c where tag 70 and the associated goods are deemed to be counterfeit. Otherwise, if the kill password is correct, tag 70 and the goods are deemed to be authentic at step 185b. Tag 70 is then resecured.
  • Fig. 22 there is a preferred method 220 of authenticating goods wherein there is a combination of over-the-air testing and up close inspection of tags and goods.
  • goods are for example received at a receiving dock.
  • step 222 the goods are subjected to over-the-air Radio Authentication using the steps disclosed in Figs. 17 through 16.
  • step 223 certain goods are selected for up close inspection of printed, holographic, micro -scribed, micro- features, or human fingerprints 79a to determine authenticity.
  • DCM 147d is used to determine what features are expected to be present.
  • DCM 147d is preferably used to reference a table or other secure document to authorized inspectors that specifies the feature details.
  • the unique operator number is acquired from DCM 147d so that a fingerprint record can be accessed from Fingerprint Database 69 and preferably locally cached in Authenticator 17.
  • Authenticator 17 contains Light Source 17b and Imager 17c to illuminate and read fingerprint 79a that was left in adhesive 79 when RFID tag 70 was manually applied to sellable item 22a in Manufacturing Plant or Distribution Point A 21.
  • Light Source 17b preferably emits light in either the visible or the ultraviolet range of the light spectrum at such an angel to reveal the molded impressions from the ridges on the operator's finger. If there are oils, salt, or amino acids left adhered to adhesive 79, they will be highlighted by the UV light.
  • photometric stereo imaging is used to accentuate the topographical components and remove the albedo variations in fingerprint 79a.
  • facestock 75 is clear so that fingerprint 79a can be seen by Imager 17c through facestock 75 with proper illumination from Light Source 17b.
  • the image is then processed by Anti -Counterfeit Network Client 52a to produce an image or minutia that are compared to reference images of the designated operator that are stored in Fingerprint Database 69 in Security Server 10a. If there is a match, then tag 70 is authentic. If there is not a match, then the tag sample may be a clone of an authentic tag and is therefore counterfeit. This determination and response is further described in the following step 224.
  • step 224 a determination is made as to whether the features are what they should be. If yes, heuristics receives a positive update in step 225, if not then the process diverts to step 226 where goods are deemed to be counterfeit and they are removed from the supply chain. Accordingly, in step 227 Authentication Database 57 and Counterfeit Heuristics Engine 54 are updated and reported through Anti-Counterfeit Network Client 52a running on Operating System 53 (all of Fig. 5) to Anti -Counterfeit Authentication Socket 62 and on to Authentication Database 68 and Counterfeit Heuristics Engine 64 of Security Server 10a all of Fig. 6. The process is done at step 228 and is repeated for additional items.
  • step 224 If in step 224 the features matched, then the goods are deemed authentic and the same databases and heuristics engines are updated with positive results that indicate an improved level of trust for the related SKU, encoder, and trading partner. The process of inspecting the current item is thus done in step 228.
  • Counterfeit Control Code is the result of historical supply chain performance data that is interpreted by Counterfeit Heuristics Engine 54 of secure RFID tag authenticator 17 and Counterfeit Heuristics Engine 64 of Security Server 10a.
  • Each SKU of each secure RFID tag encoder 16 preferably has an independently controllable CCC that resides in CCC Table 152a. Whenever a tag is encoded, CCC Table 152a is referenced for the current CCC and it is merged into QCC 134.
  • the purpose of the CCC is to assist analysts and trademark enforcers in conducting more efficient screening with RFID.
  • Factors that affect the CCC include but are not limited to: (1) History of counterfeits found from a particular location; (2) History of counterfeits found from a particular encoder; (3) History of counterfeits found within a certain distribution network; (4) History of counterfeits found for a particular SKU or product category; (5) Irregularities found in remote monitoring of encoding activity; (6) Counterfeits of tag stock found that was originally sent to a tagging location; (7) Statistically high incidence of certain numbers that is indicative of someone having cracked or obtained a cryptographic key that is referenced by for example the same Meta-Key Master Index 73b or ranges of SGTIN serial numbers that occur with unusually high frequency.
  • the CCC is used to insert controlled changes in the QCC that can then be measured downstream throughout an entire distribution network.
  • counterfeiters copy a QCC with the CCC at a first setting, and through closer analysis are found by brand enforcement officials to be counterfeit, then the CCC is changed on legitimate products to a different value and all 'real' goods bear a second CCC value. This change is then detected and red- flagged in the distribution channel and counterfeiters are soon tracked down.
  • Anti- Eavesdropping Jammer a radio frequency signal jammer is used in preferred embodiments to prevent an eavesdropper from securing the RN16 random numbers or the access or kill passwords that are backscattered from a tag to an encoder's interrogator.
  • the RN16 is fully described in the EPC air interface protocol specification and two of them are used for bitwise-XOR with the first and second halves respectively of the 32-bit access and kill passwords in order to hide them from eavesdroppers.
  • This is an EPC tag security measure called cover coding that is used to hide the identity of the secret passwords as they are transmitted to the RFID tag that is being encoded or queried.
  • the backscattered signal is tens of decibels below the carrier wave that is transmitted by the interrogator.
  • Preferred embodiments of RFID tag encoders use near field coupling to communicate with a RFID tag, and a far field antenna for radiating a jamming signal into the air surrounding the RFID tag encoder.
  • the near field coupler communicates with the tag primarily through magnetic fields that alter the impedance seen by the interrogator to bring the near field coupler into a closer impedance match with the interrogator's antenna port.
  • the result is that the only time that the interrogator radiates efficiently is when an RFID tag is in close enough proximity to change the complex impedance of the near field coupler. This is similar to how a transformer operates whereby there is mutual impedance that alters the impedance of both coils (i.e. coils or loops in the interrogator's near field coupler and the RFID tag).
  • a far field antenna for the jammer preferably radiates much more electric field than it does magnetic field. The result is that the communications between the tag and the near field coupler are not appreciably affected, but observers at any distance outside of the covers of the RFID tag encoder are unable to separate the jamming signals from the low level backscatter signals from the tag.
  • the interrogator is set to transmit at less than lOdBm, and often at 5dBm or less. This means that the backscattered signal from the RFID tag is substantially less than that, making detection difficult in the presence of an active jammer that is operating at the same or similar radio frequencies as the interrogator's carrier wave.
  • a jamming signal is produced by allowing a separate frequency hopping signal be emitted from the jamming antenna.
  • the signal may have modulated information on it that obfuscates the actual tag encoding and interrogation process.
  • the modulation may include simulation of interrogator commands and (weaker) backscattered tag responses. Care must be taken to not engage nearby tags in an actual dialog to prevent accidental programming or interrogation of any tags by the jammer.
  • the interrogator's transmitted signals are routed from the output of the RF amplifier to the jamming antenna such that the carrier wave that is emitted to a tag while the tag is backscattering information is also radiated from the jamming antenna as an un-modulated carrier signal.
  • the result for properly configured antennae is that the eavesdropper is unable to detect the modulated backscatter because the carrier wave signal is so much stronger when observed outside of the enclosure.
  • the interrogator's transmitted signals are routed from the interrogator, through a modulator that simulates a low level backscatter modulation from an RFID tag and transmits that out on the jamming antenna.
  • the simulated backscatter would be implemented whenever the tag is expected to emit a secret number (such as an RN16, an access password, or a kill password that is read from reserved memory), and uses a separate pseudorandom number generator to produce different RN-16 numbers that are modulated onto the carrier wave at a low modulation depth.
  • the low modulation depth serves two purposes: (1) to simulate tag backscatter; and (2) to reduce the chance that the interrogator is confused by the simulated backscatter from the jamming antenna.
  • a fourth jamming method takes advantage of the heterodyne of the interrogator and the interrogator's advantageous use of the pseudo-random hopping that is required by governmental regulatory authorities. It is nearly impossible for an eavesdropper to know what the frequency of the next hop, and is therefore required to scan for RF energy across the entire band of operation.
  • the UHF band for RFID is 902-928 MHz, a span of 26Mhz that must be accepted by the eavesdropper.
  • the interrogator in the RFID encoder has a receiver that needs to only cover the channel width which is typically 200KHz to 500KHz. This gives the interrogator a significant advantage by having a receiver that is responsive to signals in only small part of the entire band at any one time.
  • the jamming antenna is physically positioned such that it does not significantly radiate onto the RFID tag.
  • the interrogation antenna and the jamming antenna are a single shared radiating structure.
  • the heterodyne of an eavesdropper's receiver is detected and used to invoke appropriate countermeasures.
  • Long range verification can be performed on populations of RFID tags that have been encoded with the secure RFID encoder.
  • the EPC SGTIN, QCC, Access Password, and Kill Password can be read and checked for data integrity and also checked against a database.
  • Range can be enhanced by using narrow beam width antennae, high transmit power, and ultra sensitive receivers to observe suspected counterfeit goods at a safe distance.
  • a narrow beam width antenna is also a high gain antenna, such as a helical or a dish antenna.
  • the short range verifier is used on each selected item.
  • a short range verifier is capable of inspecting a tag by reading the hidden printed features and reading data from the tag's chip and verifying that the two match.
  • the jamming antenna (whether or not it is implemented as a separate radiating structure) is used to simultaneously transmit a second signal in another in-band channel that is not necessarily the same channel as the interrogator is using to communicate with the RFID tag.
  • the jamming signal preferably has a simulated backscatter data transmission modulated onto it.
  • a highly mobile authenticator uses a GPS- enabled smart phone to provide GPS 51, Anti-Counterfeit Network Client 52a, Operating System 53 (such as Embedded Linux or Android), Counterfeit Heuristics 54, Network Node 52b (as TCP/IP over a wireless carrier using GPRS, 3G, or 4G telecommunications), Authentication Database 57, a camera as Imaging Device 55, and Human Interface 56.
  • Bluetooth is preferably used to communicate over an authenticated and encrypted wireless connection to a battery- powered mobile RFID verification device that is preferably comprised of Interrogator 58a, Jammer 58b, and Antenna 58c. Cached copies of data are securely stored in protected memory of the battery-powered mobile RFID verification device in order to reduce the amount of secure data that would be exchanged across the Bluetooth link.
  • Imager 17c is used to scan human fingerprint 79a that has been preserved in adhesive layer 79 of RFID tag 70. Fingerprint 79a is scanned and compared to the fingerprint information that is conveyed by the RFID tag or stored in Fingerprint Database 69. If fingerprint 79a matches the fingerprint that is on record in the RFID tag, then it is an authentic tag that was produced by a valid tag encoder 16 with a proper set of encryption keys that were used to encode the fingerprint information into RFID tag 70.
  • Object Transport 59 is in this embodiment not implemented as a conveyor but rather as hand, body, motorcycle, Segway Human Transporter, or moped motion to sweep past numerous tagged goods.
  • Fig. 21 illustrates a preferred method 210 of securely identifying goods for shipment to another location.
  • goods are identified preferably using an error-proof means of identification, such as reading an object class bar code such as a UPC-A, UPC-E, EAN, a GTIN, or another similar symbol that uniquely identifies the class or type of an object that is to be tagged.
  • Bar code symbols are preferably read from scanner 46 of Fig. 4 which may be built-in, tethered by a cable or a gooseneck, or electronically tethered through a wireless connection such as Bluetooth or Wi-Fi to Secure RFID tag encoder 16.
  • scanner 46 may be upstream of the encoding antenna 48c in order to allow time for executing computations in step 212 below.
  • step 212 all of the various types of information that is disclosed in this patent are compiled and presented in a coded numerical format that can be encoded into an RFID tag.
  • Information is acquired from GPS 41 which may also provide updated date and time information to real time clock 151a and transformed by RTC Transform 151b into DAY and TIME fields of QCC 134, and also preferably encrypted TPC 74b information that was written into a memory bank by a tag converter.
  • the entire information set may include, but is not limited to the current location, date, time, tag memory architecture, Encoder Number 150, TPC, Counterfeit Control Code (CCC), radio key index RKI, EPC SGTIN 72a, tag ID 73a, Meta-Key Master Index 73b, kill password 71a , access password 71b, and a cyclical redundancy check CRC.
  • spreading function 118 may be utilized to spread more detailed information into a population of RFID tags 70.
  • Cloaked QCC Payload 155a, EPC SGTIN 124, and TID 73 are all used by CRC Calculation 155d to produce CRC 156b which is merged with Cloaked QCC Payload 155a to produce merged result 'Cloaked QCC Payload and CRC 156a. That result is then put into Block Cipher 157a using Meta-Key 157b to produce encrypted result Encrypted QCC 158.
  • Encrypted QCC 158, Writeable part of TID, and EPC SGTIN 124 are all encoded into RFID tag 70 using a sequence of programming and verification steps. Information is written into each writeable memory bank of RFID chip 76.
  • step 216 the process is done.
  • Tag Management Server 10a Central to the global system of RFID tag encoders is Tag Management Server 10a
  • Tag Management Server 10a preferably hosts a database that contains all of the SKU's that are under the care of Tagging System 10.
  • Tag Management Server 10a is a trusted source of data for Tagging System 10.
  • the database preferably contains a record for each 14-digit GTIN (Global Trade Item Number) at each packaging level that is defined for that GTIN.
  • GTIN Global Trade Item Number
  • Each GTIN record preferably contains a child record for each block of serial numbers that is assigned to an encoder.
  • Each child record preferably contains information about one batch or group of same-
  • GTIN RFID tags (1) A globally consistent and unique encoder number. Each Encoder is preferably specified by a GS1 asset identifier, SGTIN, or general identifier GID-96. A GID-96 General Manager Number is preferably assigned to the manufacturer of the RFID tag encoder. The GID-96 Object Class would be the model number of the tag encoder, and the Serial Number field would be uniquely numbered with the serial number of the tag encoder. This method of numbering each and every RFID tag encoder in a uniform manner assures that consistent and unique numbers are assigned to each RFID tag encoder, regardless of what GS1 member company manufactured it. (2) The starting serial number for the given GTIN batch. (3) The number of tags in the current batch (how many tags are authorized for encoding) starting with the specified serial number. (4) Optionally include the current date. (5) Optionally include an 'encode by' date.
  • Management Stations 11a and 12a are representative of multiple management stations that are preferably connected to Tag Management Server 10a through secure Internet connections that use crypto graphically secure protocols that are well known to those skilled in the art. Each Management Station is required to authenticate itself to Tag Management Server 10a at the beginning of any communications session in order to exchange data with that trusted source and repository of system data.
  • Tag Management Server 10a preferably implements database security systems, processes, and procedures that protect Tag Management Server 10a from unintended activity.
  • Unintended activity includes authenticated misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes.
  • Tag Management Server 10a is preferably protected from rogue external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network. Additional network security devices that detect and alert on malicious database protocol traffic include network intrusion detection systems along with host-based intrusion detection systems.
  • Tag Management Server 10a preferably has many layers and types of information security, including: Access control, Auditing, Authentication, Encryption, and Integrity controls.
  • Management Stations 11a and 12a each have Token Interface l ib and 12b respectively that communicate tagging information to and from Secure Encoder 16 through Token Interface 16b.
  • Token Interface preferably includes a range of wired, wireless, or physical token devices 13 that are used to pass information between management stations and secure encoders.
  • Wired connections include networks and telephone lines.
  • Wireless connections include WiFi (802.11) and cellular phone networks that carry GPRS and 3G cellular data communications.
  • Physical tokens include silicon devices of various types which are preferably hardened for industrial applications including durable RFID tags, ButtonMemory devices from MacSema of Bend, Oregon, and iButton products from Maxim Integrated Products, Inc. of Sunnyvale, California.
  • iButton 13 uses its stainless steel 'can' as an electronic communications interface. Each can has a data contact, called the 'lid', and a ground contact, called the 'base'. Each of these contacts is connected to the silicon chip inside.
  • the lid is the top of the can; the base forms the sides and the bottom of the can and includes a flange to simplify attaching the button to just about anything.
  • the two contacts are separated by a polypropylene grommet.
  • Each iButton 13 has a unique and unalterable address laser etched onto its chip inside the can. The address can be used as a key or identifier for each iButton.
  • a preferred device is the DS1996L-F5 which offers 64K bits of read/write non- volatile memory.
  • the token is a physical token such as the iButton or a wired or wireless communications channel
  • Information is passed using cryptographically secure continuous or intermittent connections.
  • the information that passes from the management station to the encoders preferably includes: (1) Management Station Number (preferably as a GID- 96); (2) Encoder number (preferably as a GID-96); (3) GTIN (preferably the full 14 digit GTIN); (4) Starting serial number; (5) Batch size (or ending serial number); (6) Confirmation of successful upload of data to tag management server; (7) Filter Value; (7) Partition Value; (8) Authorization Date; (9) Encode By Date; (9) Cryptographic keys that are associated with Fixed-Password Table 93; (10) Cryptographic keys that are associated with Meta-Key Table 103.
  • Encoder number preferably as a GID-96
  • GTIN preferably the full 14 digit GTIN
  • Starting serial number preferably the full 14 digit GTIN
  • Starting serial number preferably the full 14 digit GTIN
  • Ending serial number preferably the full 14 digit GTIN
  • Filter Value preferably the full 14 digit GTIN
  • Filter Value preferably the full 14 digit GTIN
  • Filter Value preferably the full 14 digit GTIN
  • (6) Partition Value (7) Current date; (8) Current time; (9) Last known GPS location
  • Encoder status (11) Encoder hardware version; (12) Encoder firmware version; (13) Encoder interrogator hardware version; (14) Encoder interrogator firmware version; (15) Security violations; (16) Environmental data log associated with each serial number .
  • records are segmented by time to report information at regular intervals such as hourly updates. Such updates are stored and forwarded when a communications channel becomes available or when a physical token is updated for transit back to a management station.
  • Secure Encoder 16 preferably operates in either of two modes: applicator and batch.
  • Applicator mode is for encoding and applying RFID tags in real time
  • batch mode is for encoding a roll of RFID tags for use in a secondary process.
  • One such secondary process is to encode UII information onto each batch-encoded tag that is initially encoded with Access and Kill passwords on Secure Encoder 16.
  • Another secondary process is to hand- apply RFID tags or use a legacy label applicator to apply tags to sellable items or other objects.
  • Secure RFID Encoder 16 is used to sequentially number groups of tags, with sequentially numbered serial numbers that share the same GTIN at the same packaging level, filter value, and partition value.
  • Secure Encoder 16 stores in secure memory the cryptographic keys that are associated with Fixed -Password Table 93 for RFID tags that are pre-encoded with Access Password 96b and Kill Password 96c; and cryptographic keys that are associated with Meta-Key Table 103 for RFID tags that are encoded with Access Password 106b, Kill Password 106c, User Memory SI 74c, User Memory S2 74d, and EPC SGTIN 72a all at nominally the same time and place.
  • User Memory S 1 74c is preferably encoded with a header that identifies the data type and structure and a key selector index that selects which cryptographic key is used with the applicable RFID Tag 70.
  • RFID Reader 17 is a mobile terminal or smart phone device.
  • the secure data transfers assure that each RFID Tag 70 moving from Secure Tag Encoder 16 or Tag Encoder 14a to RFID Reader 17 can be successfully queried for audit information, flipped to an encrypted identity, unflipped to a publicly decodable identity, or killed.
  • goods arrive into a retail store or a military depot with a publicly decodable EPC UII.
  • the identity is preferably flipped to the encrypted version of the EPC UII.
  • the flipping process is in certain preferred embodiments conducted as part of another business process, such as stocking the shelves of a retail store, during customer checkout, shipment to a customer to fulfill a catalog or Internet order, or loading the cargo bed of a military vehicle.
  • Fixed, portal, mobile, wearable, and handheld RFID readers are all preferred embodiments for RFID Reader 17 that contains the secure EPC Flip 17a functionality.
  • a preferred mode of operation of RFID Reader 17 is to conduct inventory reads of large populations of EPC RFID tags. During that process tags that have been flipped (i.e. converted to the encrypted version) can also be included in the inventory count. Since the filter value is distinctly different (as described in the following few pages), RFID Reader 17 can efficiently determine which tags have been flipped and which have not. When reading tags that have been flipped to an encrypted form, the EPC identifier may be decrypted without saving the decrypted (i.e. unflipped) version back to the tag.
  • Tag Encoder 14a encodes RFID Tag 14b that was previously encoded with Access Password 96b and Kill Password 96c as shown in Fig. 9 and is more fully described below.
  • Tagging System 10 therefore includes a number of Tag Encoders that do not have secure tag encoding means, but can be used to encode EPC UII information for use in Retail Store 19.
  • unsecured Tag Encoder 14a is not afforded the passwords and methods to generate and send Access Password 96b to unlock the EPC memory bank of RFID Tag 14b so that the EPC can be programmed. Therefore, in the process described here, it is presumed that those lock bits remain in the unlocked state, just as they are for most applications in use today.
  • TID 90b is preferably hashed by TID Hash 91 over the total number of available TID bits which usually ranges from 32 to 64 bits.
  • the resulting hash digest is used in conjunction with any available key selection bits in User Memory 74c, if present to create an index in Fixed-Key Indexer 92.
  • the index is used to select a single Password Key 96a from Fixed Password Table 93.
  • the preferred fallback is to use fixed tag selector bit combination, such as all zeroes or some fixed pseudorandom number. This then accounts for the case of an unsecured tag encoder and RFID tags that have no User Memory but have non -fixed Access and Kill Passwords 96a.
  • Tag Encoder 18a that encodes RFID Tag 18b with static Access and Kill passwords, including zero-valued Access and Kill passwords.
  • Retail Store 19 and/or RFID Reader 17 must access a database of EPC numbers in order to determine what the Access and Kill passwords are for EPC Flip 17a to perform its intended function.
  • RFID Reader 17 can preferably read RFID tags from any category of RFID Tag Encoder 14a or 18a, or Secure Encoder 16.
  • the Access Password is preferably in each case calculable through any of the following methods: (1) Fixed Passwords, including password 00000000H; (2) Pre -Encoded Passwords 96a of Fig.; and (3)
  • RFID Reader 17 preferably determines the appropriate method for determining the Access and Kill Passwords 96a or 106a by attempting to read a header that is preferably stored in User Memory SI 74c or another memory partition such as the extended portion of a large EPC Bank 01. If such a header is present, it provides a specification of the method that RFID Reader 17 must use to acquire or formulate the passwords, generally as either a fixed password, a password acquired from a table as shown in Fig. 9, or passwords that are formulated according to Fig. 10. A header of this type described here and throughout this disclosure is referred to as a password specification header.
  • a 240-bit Bank 01 is preferably configured to hold for example an SGTIN-96, SGTIN- 198, SGLN-195, GRAI-170, GIAI-202 or some other UII with bits left over for a password specification header and certain cryptographic key index components.
  • the advantage is that User Memory Bank 11 would not be required for key management and if present could be used for other purposes, including an Encrypted QCC 74a.
  • RFID Reader 17 in Retail Store 19 preferably uses EPC Flip 17a which is a combination of RFID hardware and specialized firmware operating in a secure manner, preferably in accordance with FIPS 140-2 to flip, unflip, or alter the UII primary identifying information of RFID Tag 70 in EPC/UII Memory 72 into an altered identity.
  • the alteration is based upon steps that access a changeable set of cryptographic keys that are locally stored in RFID Reader 17.
  • EPC Flip 17a is to flip the primary identifying information of EPC SGTIN 72a of Fig. 24 that is stored in EPC Memory Bank 72 of RFID Tag 70 into an altered identity.
  • GS1 Key 240a is a header that identifies the GS 1 Key Type as an SGTIN-96 identifier and must remain at that value so that the altered identity of Tag 70 can be processed by existing RFID readers and is directly copied into the same bit locations of Encrypted SGTIN 244.
  • the filter value FV 240b must be the value 001 for 'Retail Consumer Trade Item' for this preferred embodiment. If it is not, then alternative operations must be employed to handle other values such that FV will be properly reconstructed during a deciphering operation.
  • FV is set to 000 b for 'All Others' in Encrypted SGTIN 244.
  • a filter value of 000 b means that the object to which the tag is affixed does not match any of the logistic types defined as other filter values in this specification.
  • tags conforming to earlier versions of this specification, in which 000 b was the only value approved for use, will have filter value equal to 000 b , but following the ratification of this standard, the filter value should be set to match the object to which the tag is affixed, and use 000 b only if the filter value for such object does not exist in the specification.
  • An RFID tag with an alternate identity therefore has a filter value of 000 b in certain preferred embodiments in order to identify itself as having non- publicly decodable UII information.
  • An RFID transponder's primary identifying information is comprised of EPC SGTIN 72a (or some other UII), at the core of which are four fields: Partition value PV 240c, Company Prefix CP 240d, Indicator Digit and Item Reference IR 240e, and the upper 17 bits of the serial number designated in Fig. 24 as SN-1 240f. In one embodiment these are combined into a 64 -bit vector with additional bitsSN-2 240g and SN-3 240h that are separately encrypted and decrypted as described herein. That vector is encrypted by Block Cipher 242 which is preferably a symmetric block cipher with both encryption and decryption counterpart operations.
  • Block Cipher 242 is preferably a symmetric block cipher with both encryption and decryption counterpart operations.
  • Block Cipher 242 and 246 can be extended to larger bit lengths such as 128 or 256 bits as long as there are enough bits in the tag to store the entire result of the cryptographic result. This is essential since the flipping process to an altered identity is reversible and all bits must be written to the transponder in either the flipped altered identity or unflipped primary identifying information states.
  • the size of the block cipher and the number of additional bits can be changed or rearranged without departing from the scope and spirit of the present invention.
  • Preferred embodiments use 64-bit block ciphers. 80-bit, 96-bit, 128-bit and longer block sizes could be used with alternate embodiments. Preferred embodiments use 64 -bit block sizes and the XXTEA block cipher. It was designed by David Wheeler and Roger Needham of the Cambridge Computer Laboratory; it was first presented at the Fast Software
  • XXTEA is a block cipher that was designed to correct weaknesses in the original Block
  • TEA Tey Encryption Algorithm
  • TEA operates on 64-bit blocks and uses a 128-bit key. It has a Feistel structure with a suggested 64 rounds, typically implemented in pairs termed cycles. It has an extremely simple key schedule, mixing all of the key material in exactly the same way for each cycle. Different multiples of a magic constant are used to prevent simple attacks based on the symmetry of the rounds.
  • the magic constant, 2654435769 or 9E3779B916 is chosen to be 2 32 / ⁇ , where ⁇ is the golden ratio.
  • XXTEA is a consistent incomplete source -heavy heterogeneous UFN (unbalanced Feistel network) block cipher.
  • XXTEA operates on variable-length blocks that are some arbitrary multiple of 32 bits in size (minimum 64 bits). The number of full cycles depends on the block size, but there are at least six (rising to 32 for small block sizes).
  • the original Block TEA applies the XTEA round function to each word in the block and combines it additively with its leftmost neighbor. Slow diffusion rate of the decryption process was immediately exploited to break the cipher.
  • Corrected Block TEA uses a more involved round function which makes use of both immediate neighbors in processing each word in the block. If the block size is equal to the entire message, as is the case in the present invention, XXTEA has the property that it does not need a mode of operation: the cipher can be directly applied to encrypt the entire message.
  • Block Cipher 242 is the encrypted ESGTIN 244 which is an altered identity of the primary identifying information of SGTIN 72a.
  • the 128-bit cryptographic key Kl is selected from Key Table 243a using the 8-bit digest of Hash-8 241c.
  • the inputs of Hash-8 241c are TID 241a and SN-3 240h.
  • some or all of the SN-3 240h bits bypass Hash-8 241c to have a direct selection affect of keys in Key-Table 243a and in so doing provide for a progressively updatable table of keys.
  • bypassed SN-3 240h bits are in addition to the 8 bit digest from Hash-8 241c, then a larger table can be implemented, for example 10 bits would result in a 1024 128-bit key table instead of the 256 key table shown in Fig. 24.
  • Hash functions Hash-8 241c, Hash-8 243f, and Hash- 13 243c for example are deterministic procedures that take a block of data and return a fixed-size bit string, the hash value. For hash values of less than 16 bits, it is difficult to claim any real cryptographic qualities. In fact, anything with an output of less than 128 bits does not provide much cryptographic strength. Therefore, the hash functions Hash-8 241c, Hash-8 243f, Hash- 13 243c, Hash-8 245c, Hash-8 245d, and Hash- 13 247c for example preferably use a computationally efficient algorithm such as a Fletcher checksum or other hash function.
  • the 8-bit Fletcher checksum algorithm is documented in RFCl 146.
  • A will contain the 8 -bit l's complement sum of all octets in the datagram, and that B will contain (N)D[1] + (N-1)D[2] + ... + D[N].
  • B is preferably used as the hash value output.
  • Initialization vectors IV-8 241b, IV- 13 243b, IV-8 245b, and 247b are preferably used to preload the value A above with a non-zero value in order to change the final result and to obfuscate the overall operation.
  • Initialization values IV-8 241b, IV-13 243b, IV-8 245b, and 247b are in preferred embodiments stored in a different location and manner than the random numbers that comprise the cryptographic keys of Key Table 243a and 247a.
  • Block Cipher 246 is used to decrypt the core of the altered identity ESGTIN 244 and revert it back into primary identifying information core fields PV 248c, CP 248d, IR 248e, and SN-1 248f to the standard bit positions of an SGTIN. This is in contrast to the encrypted altered identity form of ESGTIN 244 wherein the bit order is altered, and is in the preferred embodiment aligned onto byte boundaries.
  • SN-2 240g and SN-3 240h are both separately XOR'd to cover their identity.
  • the discovery of these bit values by a cryptographic adversary has very limited value, especially without knowledge of the base product that they serialize. Therefore, those lower serial number bits do not warrant strong cryptography for most operating environments.
  • an overlapping Block Cipher-64 is used to cover these remaining bits and to include some of the bits that are output from Block Cipher 242.
  • XOR 243d uses a 13 -bit hash value from Hash-13 243c which uses initialization vector IV-13 243b and a 128-bit key K2 from Key Table 243a.
  • Key K2 is preferably at some fixed offset from Kl , and may be for example the next or previous key in Key Table
  • XOR 247d reverses the result using K2 from Key Table 247a and IV-13 247b to uncover SN-2 to create SN- 2 248g.
  • SN-3 240h is used as an input to Hash-8 241c.
  • XOR 243e must therefore be followed by XOR 245e before being used as an input to Hash-8 245d. This is done by running Hash-8 245c using TID 245a and IV-245b as fixed inputs, and using them again with the uncovered SN-3 248h at Hash-8 245d to compute a key index into Key Table 247a.
  • some or all of the SN-3 248h bits bypass Hash-8 245d to have a direct selection affect of keys in Key-Table 247a and in so doing provide for a progressively updatable table of keys.
  • bypassed SN-3 248h bits are in addition to the 8 bit digest from Hash-8 245d, then a larger table can be implemented, for example 10 bits would result in a 1024 128-bit key table instead of the 256 key table shown in Fig. 24.
  • the resulting key Kl is used with Block Cipher 246 for decryption of the 64-bit SGTIN core identity. Once FV 248c is restored to the original value of 001 the entire SGTIN-96 is therefore reconstructed.
  • any of four fundamental EPC RFID Tag 70 functions (1) Encrypting the SGTIN (i.e. 'Flipping' the identity); (2) Decrypting the encrypted SGTIN (i.e. 'Unflipping the identity); (3) Decrypting tag encoding audit information; and (4) Killing the tag.
  • EPC UII Memory 72 Two of the functions (i.e. flipping and unflipping EPC SGTIN 72a) involve changing the state of EPC/UII Memory 72.
  • EPC UII Memory 72 is locked to prevent tampering by unauthorized interrogators.
  • the subroutine steps 235a through 235f must be followed, and then control must return to the step that this flow chart subroutine was called from.
  • Access Subroutine 235 begins at step 235a where TID 100b is hashed by TID Hash 101 as shown in Fig. 10, and the hash digest is appended with User Memory SI 74c at Meta-Key Indexer 102 in step 235b.
  • the purpose is to provide a way of centrally changing the cryptographic keys under the control of Tag Management Server 10a by altering the value of User Memory S 1 74c.
  • the hash digest is used as an index into Meta-Key Table 103 to produce Meta-Key MK2 which is used in step 235d to decrypt Lower EPC lOOe to construct Formulated Passwords 106a.
  • Access Password 106b is sent to Tag 70 and causes it to transition to secured state upon receiving a valid access command and Access Password 106b, maintaining the same handle that it previously backscattered when it transitioned from the acknowledged to the open state.
  • Tags in the secured state can execute all access commands.
  • step 235f the lock command and lock command payload are sent to Tag 70. If Tag 70 permalock bits have not been previously set, then Tag 70 will unlock the requested memory bank, including EPC UII Memory 72 and backscatter the handle of Tag 70 and the corresponding CRC-16 within 20ms. Access Subroutine 235 is concluded and flow returns to the step that it was called from.
  • step 230a an EPC RFID tag is read by an RFID interrogator, preferably including
  • the tag kill function begins at step 233a where the TID is hashed as shown in block 101 of Fig. 10.
  • Section 1 of User Memory Bank 74a (if present in Tag 70) is User Memory SI 74c and is appended (if present, otherwise a default value is used) to the result of the hash to become an index value in step 233c.
  • step 233d if Tag 70 was pre-encoded as determined by a header value in User Memory SI 74c of Fig. 9 or Fig. 10, then Kill Password 96c is obtained from Fixed-Password Table 93 at a location determined by the index value at Fixed-Key Indexer 92 in Fig. 9. If Tag 70 was not pre-encoded, as represented by Tag 100a in Fig. 10, then Meta-Key Indexer 102 is used in Fig. 10 to point to a key MK2 in Meta-Key Table 103. Key MK2 is used with Block Cipher 105 to formulate Kill Password 106c using the hash digest of EPC Hash 104, which is fed by the lower 85 bits of EPC SGTIN 1 OOe.
  • step 233e the RFID interrogator sends the Kill password to Tag 70 using a 16-bit handle to identify the proper tag, whereupon Tag 70 returns the 16-bit handle and a 16-bit CRC to confirm that it has been killed.
  • Tag 70 then transitions to the Killed state and ceases to respond to interrogations. Immediately after this reply the Tag shall render itself silent and shall not respond to an Interrogator thereafter. If the Interrogator observes this reply within 20 ms then the Kill completed successfully.
  • step 230c If the required operation is to flip the identity of Tag 70 from a publicly viewable EPC SGTIN to an encrypted version of the STGIN, then the branch is made to step 230g. In that step the current state of Tag 70 is assessed by examining the filter value bits FV 240b of EPC SGTIN 72a. If those three bits are 000 b then Tag 70 has already been flipped, and the operation is aborted by branching to the Done state from step 230g. If Tag 70 has not yet been flipped, then control flows to step 234a.
  • step 234a Access Subroutine 235 is called and executed as described above. This results in Tag 70 transitioning to the secured state and EPC/UII Memory 72 being unlocked for writing, if it was not already in the unlocked state. Flow returns to this step.
  • TID 241a, SN-3 240h, and initialization vector 241b are hashed by Hash-8 241c in Fig. 24 using as many TID bits as are available from the RFID chip manufacturer as defined in the EPCglobal Class 1 Generation 2 Protocol VI.0.9 paragraph 6.3.2.1.
  • step 234c the hash digest of step 234b is used as an index into Key Table 243a to obtain key Kl from Key Table 243a.
  • Kl is used as a 128-bit key in Block Cipher 242, using PV 240c, CP 240d, IR 240e, and SN-1 240f to produce the 64 -bit ESGTIN result in 244.
  • Block Cipher 242 is preferably an unpatented, public domain, bidirectional, strong 64 -bit block cipher such as XXTEA by David Wheeler and Roger Needham.
  • bit group SN-2 240g there are 13 additional bits that need to be flipped; these are 13 bits in the central part of the SGTIN serial number field that is herein referred to as bit group SN-2 240g.
  • Hash- 13 243c is preferably used on key K2 of Key Table 243a and initialization vector IV- 13 243b.
  • the hash digest is in step
  • TID 241a is hashed by Hash-8 243f, the digest of which is used at XOR 243e to flip least significant serial number bits SN-3 240h in step 234h.
  • Step 234i is to clear FV 240b bits to 000 b and to store everything in encrypted ESGTIN 244 in EPC/UII Memory 72 of Tag 70.
  • EPC UII Memory 72 bank of Tag 70 is then preferably locked and Tag 70 is preferably commanded to exit the secured state. The flip function is then done.
  • step 230b if the required operation was not to flip Tag 70, then control flows to step 230d. If the required operation was to unflip Tag 70 (i.e. decrypt it), then control flows to step 230f where FV 240c filter value bits are checked for the value 000 b . If they are 000 b , then Tag 70 has been flipped and control flows to step 23 la, otherwise it ships to step 23 lk.
  • initialization vector IV-8 245b are hashed by Hash-8 245c and used by XOR 245e in step 23 lb to unflip SN-3 of encrypted ESGTIN 244.
  • the result is stored in SN-3 248h and used in step 23 lc in Hash-8 245d to create a key index for Key Table 247a in step 231 d.
  • Key K 1 is used in step 231 e by Block Cipher 246 to reconstruct PV 248c, CP 248d, IR 248e, and SN-1 248f as shown in Fig. 24.
  • Hash- 13 247c uses initialization vector IV- 13 247b and key K2 from Key Table 247a which is preferably at a fixed offset from Kl within Key Table 247a.
  • the 13-bit hash digest is used to unflip SN-2 to reconstruct SN-2 248g in step 231 g.
  • filter value bits FV 248b are restored to 001 b .
  • step 23 li Access Subroutine 235 is called and executed as described above if Tag 70 is to retain the unflipped version of EPC SGTIN 72a.
  • li Access Subroutine 235 is called and executed as described above if Tag 70 is to retain the unflipped version of EPC SGTIN 72a.
  • large populations of RFID tags are read, both flipped and unflipped.
  • the business process may or may not involve saving the unflipped version of the encrypted EPC in Tag 70, but instead just using that information as part of the inventory process.
  • Tag 70 If Tag 70 is to be modified, then upon return to this step, reconstructed EPC bit fields SGTIN 248a through 248h are stored in Tag 70 as EPC SGTIN 72a. EPC/UII Memory 72 bank of Tag 70 is then preferably locked.
  • step 23 lk it is determined if Tag 70 audit information is also to be extracted, in which case control flows to step 232a, otherwise this unflip function is done.
  • This logical path is shared in the case of the required operation at step 230e was the audit function. If so, control would have flowed as before to step 230f to determine if Tag 70 had previously been flipped, and needed to be unflipped in order to recover audit information.
  • TID 100b is hashed by TID Hash 101 as shown in Fig. 10, and the hash digest is appended with User Memory SI 74c at Meta-Key Indexer 102 in step 232b. The purpose is to provide a way of centrally changing the cryptographic keys under the control of Tag Management Server 10a by altering the value of User Memory SI 74c.
  • the hash digest is used as an index into Meta-Key Table 103 to produce Meta-Key MK1 which is used with block cipher 105 in step 232d to decrypt User Memory S2 74d to reconstruct the decrypted User Memory S2 108 which contains tag audit information.
  • the result is a fast, low cost, system of interconnected security points that act upon low cost EPC Gen2 RFID transponders, both tags and inlays.
  • the result is the lowest possible cost secure transponder that cannot be copied and that consumes the least amount of energy, and therefore results in maximum operating range for a passive transponder.
  • the system and devices are forward compatible with future versions of EPCglobal and ISO-compliant transponders since the present invention uses transponder resources that are part of the core requirements for Gen2 compliance.
  • Fig. 1 is a drawing of the system according to one embodiment of the present invention.
  • Fig. 2 is a drawing of the system according to one embodiment of the present invention.
  • Fig. 3 is a drawing of the supply chain macro environment.
  • Fig. 4 is a drawing of a secure RFID tag encoder according to one embodiment of the present invention.
  • Fig. 5 is a drawing of a secure RFID tag authenticator according to an embodiment of the invention.
  • Fig. 6 is a drawing of a security server according to one embodiment of the present invention.
  • Fig. 7 is a drawing of a secured RFID tag according to one embodiment of the present invention.
  • Fig. 8 is a drawing of an RFID tag according to one embodiment of the present invention.
  • Fig. 9 is a drawing of a RFID Tag Password Pre-Encoding process.
  • Fig. 10 is a drawing of a secure RFID tag encryption and decryption process.
  • Fig. 11 is a drawing of a GPS coordinates compression and data spreading apparatus.
  • Fig. 12 is a drawing of a GPS coordinate aggregation and reconstruction apparatus.
  • Fig. 13 is a drawing of a password and QCC generation apparatus for a secure RFID tag encoder.
  • Fig. 14 is a drawing of a password and QCC decoding apparatus for a secure RFID tag authenticator.
  • Fig. 15 is a drawing of a QCC encryption apparatus for a secure RFID tag encoder.
  • Fig. 16 is a drawing of a QCC decryption apparatus for a secure RFID tag authenticator.
  • Fig. 17 is a Meta-Key Master Index flow chart according to one embodiment of the present invention.
  • Fig. 18 is a fixed key password verification flow chart according to one embodiment of the invention.
  • Fig. 19 is a drawing of comprehensive item authentication flow.
  • Fig. 20 is a final confirmation of authenticity flow chart according to an embodiment of the invention.
  • Fig. 21 is a secure tagging flow chart according to one embodiment of the present invention.
  • Fig. 22 is a total authentication flow chart according to one embodiment of the present invention.
  • Fig. 23 is a drawing of a secure RFID tag processing method.
  • Fig. 24 is a drawing of the cryptographic encoding and decoding.
  • the best mode of the present invention is the mode that best solves the problems that a customer needs to solve.
  • the present invention includes many possible modes.
  • the best mode for a lightweight cryptographically secured transponder is to encrypt the Access and Kill passwords for authentication by secure RFID readers that are downstream in a supply chain.
  • the best mode for a highly secure transponder additionally uses security modes that incorporate physical marks and digitally encoded references to them within the transponder's memory.
  • the best mode for consumer privacy is one that converts (i.e. flips) the identity from a publicly standardized format such as an SGTIN, into an encrypted version of that identity, with the ability for authorized persons and devices to flip it back again.
  • the present invention discloses numerous systems, methods, and devices for authenticating and flipping the primary identity of RFID tags and inlays. Alternate and simplified variations of the present invention are possible for creating the password specification header and cryptographic key index components on transponders with various memory sizes and partitions. Not all of the encryption and decryption steps need to be utilized within any single embodiment; rather parts of the present invention can be selectively used in certain industrial applications. In common with each method is the recreation of the Kill Password and the Access Password and using Password Authentication Function 149i for at least a first level of authentication. In certain preferred embodiments where additional security is required, there are additional tests that have been described herein to authenticate an RFID tag or inlay. Although the descriptions have relied upon EPCglobal Class 1 Gen2 standards, the spirit and scope of this invention also extends to other standards such as ISO18000 and its various parts.
  • certain embodiments are described in a possible environment - as identification means for containers.
  • certain methods make reference to containers such as loaded pallets, paperboard boxes, corrugated cartons, pharmaceutical containers, and conveyable cases, but other containers may be used by these methods.
  • Certain embodiments of the present invention are directed for use with steel drums, commercial corrugated shipping cartons, tagged pallet-loads of shrink-wrapped cases, consumer- goods packaging, consumer goods, automobile windshields, industrial components, or other methods of identifying objects using RFID transponders or wireless sensors, or both.
  • the target surface to which a transponder will be attached is a container.
  • the target surface is moving while the encoder device is stationary.
  • the moving target surface may be objects on a conveyor.
  • the RFID tag encoder is fixed to an assembly line in a stationary manner.
  • the stationary-mounted encoder further includes machine-controlled devices for extracting a commissioned RFID transponder from the encoder and places the transponder on the container of interest by means well understood in the art.
  • the target surface may be a web of release liner from which encoded transponders will be later removed and applied to an object for identification.
  • the methods, systems, and devices herein are useful for the authentication of RFID tags that are attached or associated with physical objects that pass through supply chains, across national borders, and among trading partners. Furthermore Counterfeit Control Codes are useful as a feed forward data item that is encoded with heuristics that are representative of previously observed incidents and patterns of occurrences. The methods, systems, and devices herein are also useful for protecting the identity of certain objects by reversibly encrypting primary identifying information on RFID transponders that are attached to the objects and items.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Automation & Control Theory (AREA)
  • Quality & Reliability (AREA)
  • Electromagnetism (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides anti-counterfeiting capabilities through the use of radio frequency identification, stenography, nanolithography, fingerprints, novel heuristic threat evaluation, indication, and detection model. Additionally, using cryptography, tag passwords are formulated and identities are reversibly flipped, thus allowing item identities to remain secret to unauthorized observers. The present invention uses heuristics and transponder authentication technologies to locate and prove the actuality of counterfeit products within supply chains. The present invention includes radio frequency identification (RFID) tags, encoders, servers, identity changers, and authenticity verifiers to make this perform this task.

Description

FULLY SECURE ITEM-LEVEL TAGGING
TECHNICAL FIELD
The present invention relates to anti-counterfeiting technologies and electronic privacy. Counterfeit products are a duplicate or an imitation of legitimate branded products which infringe upon a production monopoly held by an individual or a corporation. Counterfeit products are produced with the intent to bypass the legitimate brand owner's monopoly and take advantage of the high market value of branded products. Counterfeit products frequently include clothing, software, pharmaceuticals, watches, electronics, recreational equipment and other branded goods resulting in patent infringement or trademark infringement.
Hundreds of billions of U.S. Dollars of international trade account for losses to brand owners. Counterfeit consumer goods, especially products that bear highly desirable brand marks and command high retail values usually originate in parts of the world where low labor rates prevail and cultural attitudes tolerate and even approve of the illegal activity. In many cases foreign workers and managers of production have little or no loyalty to the brand owner. With the means of legitimate production in their hands, there has been little to prevent them from distributing those products in a manner to reap higher profits. Counterfeiters do not have to amortize the costs of product development and advertizing that boosts the value of the branded products. To achieve their objectives, counterfeiters bypass the brand owner's approved channels, often marketing directly to consumers. Since counterfeiters have a lower cost structure, they offer prices that are below prices on products that are delivered through approved distribution channels with their associated pricing policies. Sales of counterfeit products are driven by consumers that want a good deal.
Counterfeiters are deceptive; they attempt to either deceive consumers into thinking they are purchasing a legitimate item, or to convince the consumer that they could deceive others with a counterfeit product. Some counterfeits products are made in the same factory that produces the original, authentic product, using the same tooling, procedures, and materials. Owners and operators of a factory run a counterfeiting operation within their own four walls without the permission of the trademark owner. Excess product is produced and distributed without the use of anti-counterfeiting measures making it impossible to distinguish a 'perfect' counterfeit from the authentic product.
BACKGROUND ART
Radio frequency identification (RFID) means the use of electromagnetic radiating waves or reactive field coupling in the radio frequency portion of the spectrum to communicate to or from a tag through a variety of modulation and encoding schemes to uniquely read the identity of a radio frequency tag or other data stored on it. Assuming certain criteria are met, as disclosed in the present invention, RFID can be used as part of a comprehensive item identification tool to combat counterfeiting.
An RFID tag or 'tag' or 'transponder' means either an RFID device having the ability to produce a radio signal or an RFID device which re-couples, backscatters or reflects (depending on the type of device) and modulates a carrier signal received from a reader, writer, or encoder.
Thorsten Staake of the Institute of Technology Management, University of St. Gallen, Auto-ID Lab and M-Lab St. Gallen / Zurich called for a cryptographic solution for securing EPC RFID tags in February 2005 in his presentation entitled: Extending the EPC Network - The Potential of RFID in Anti-Counterfeiting. Jaemin Park, Junchae Na and Minjeong Kim also wrote an IEEE paper entitled "A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag". Claus Wonnemann and Jens Struker of Deptartment of Telematics at the Albert - Ludwigs-Universitat Freiburg in Freiburg, Germany write in their IEEE paper that the cover coding of EPC Access and Kill Passwords can be intercepted by an attacker. Wonnemann and Struker state that brute force methods of attacking EPC Class 1 Gen 2 RFID tags require 231 attempts on average. At a rate of 25 attacks per second, cracking the security on each separately locked tag would require 2.7 years for each tag. They also argue that a side channel attack can crack the EPC tag's passwords using techniques described by Oren and Shamir in their IEEE paper Power Analysis of Gen 1 RFID Tags.
Other prior art of interest includes: U.S. Patent Applications 2009/0033464, 2008/0196106, 2005/0280537, 2005/0058292, 2007/0177738, 2002/0059880, 2007/0152033, 2002/0067264, 2005/0242957, 2005/0275540, 2006/0017570, 2006/0061475, 2006/0132313, 2008/0181398, 2007/0194889, 2008/0001724, and US Patents US7532104, US7205897, US7633376, US7073712, US7360714, US7055750, US6848616, US7320432, US7066667, US6963351 , US7664257, US7034689, US6995652, US7411503, US7425897, US7477151, US5874902, US6025780, US6181248, US6933848, US7012531, and US7629888.
Additional prior art of interest includes: US6227643, US6312106, US6409401, US6687634, US6694884, US6708005, US6714745; US6722753, US6735399, US6738903, US6748182, US6791704, US6793307, US6798997, US6802659, US6807380, US6808255, US6820039, US6832866, US6879785, US6894711 ,
US6932527, US6954533, US6963351, US6986057, US7018117, US7147165, US7183505, US patent applications 2002/0062898, 2004/0109715, 2004/0114981, 2005/0275708, 2006/0123471, 2007/0056027, 2007/0057057, and patent WO/2001/057807, and WO/2003/019459.
TECHNICAL PROBLEM EPCglobal Gen2 RFID tags would have been the perfect universal badge of authenticity that any product made anywhere in the world could bear in order to distinguish a perfect counterfeit from an authentic product. However, the Gen2 RFID tag lacks a crypto engine because it was deemed to require too many transistors and too much power to operate as a passive RFID tag. Lacking this, brand owners have been presented with an unsatisfactory means of preventing duplication of Gen2 tags that would at face value been an unambiguous indication of the true authenticity of a product that appears to be one of theirs. Instead of providing an electronic badge of authenticity, Gen2 system architects decided to move the authentication process to a system of globally interconnected computers servers. The operation of and data shared by each server is under the control of each trading partner. They decide what information is provided for any information query.
An additional anti-cloning feature of Gen2 tags that was somewhat of a deterrent to duplication of legitimate tags was the use of factory -programmed serial numbers in the TID memory bank. For awhile, the chip manufacturers only offered Read-Only Memory (ROM) in the TID bank, making it infeasible for counterfeiters to copy both the EPC and TID of a legitimate RFID tag. It is expected that at least one chip and inlay manufacturer will sell EPC inlays with a reprogrammable TID Memory Bank, making EPC Gen2 tag cloning a simple matter of 'skimming' valid number pairs from populations of authentic RFID tags.
If a cryptographic engine could be placed onto an RFID tag, and a challenge -response authentication process can be utilized whereby the challenger can be certain that the challenged RFID tag in fact bears the secret code without directly divulging it, then the authenticity can be confirmed with a very high degree of confidence. However, the scope of this invention disclosure relates to RFID tags that lack a cryptographic engine, and only have publicly observable information. So, despite recent advances in RFID technology, the state-of-the-art does not fully address the needs of authenticating wireless sensors that are already in broad public use. Large-scale adoption and deployment of RFID transponders depends on brand owners realizing substantial new levels of supply chain security that surpasses the short comings of traditional anti-counterfeiting technologies and methods.
Most prior art addresses consumer privacy concerns by rendering portions of an RFID tag inoperable. Other prior art alters an RFID tag's read performance by mechanically altering its antenna. Though some of these mechanical methods are reversible, they don't protect the retailer from competitor reads. Prior art that disclose encryption methods for hiding an RFID tag's unique identity generally do not recognize the throughput and scalability requirements of tagging consumer package goods at the item level. A retailer is not able to afford the time to query a real time database over an open, global network connection. The present invention does not require such a realtime infrastructure and the associated time delays and connection uncertainties. In conclusion, none of the prior art introduces novel ideas to efficiently and cost effectively encrypt an RFID tag's unique numbering to protect the retailer from competitor reads and to protect the consumers' privacy.
TECHNICAL SOLUTION
The present invention teaches systems, methods, and devices for making the existing EPC Gen2 RFID tags and inlays secure within a set of prescribed conditions and precautions to prevent and mitigate the risks of eavesdropping. The present invention includes embodiments for increased security when blocks of Gen2 transponder memory are available to support additional layers of security and cryptographic key management as taught herein. The present invention uses encoders and readers that have at least one microprocessor and fast access to security devices that have a FIPS 140-2 secure cryptographic boundary that defeat cryptographic attacks. Using localized secure cryptographic devices, the security algorithms described in this patent application deliver extremely fast and deterministic RFID tag authentication performance.
Authentication performance is not subject to Internet network delays because all necessary resources for authentication and for computing cryptographic algorithms are local within a microprocessor that is designed to FIPS 140-2 security standards. Cryptographic key updates are conducted infrequently and in a manner that is similar to anti-virus updates on personal computers. The solution optionally incorporates physically verifiable attributes including fingerprints, micro taggants, and other marks to augment transponder authentication. Certain embodiments include reversibly 'flipping' of the publicly decipherable tag identity into an encrypted form for security purposes.
The present invention is an RFID tag security system with two major purposes: (1) secure and efficient encoding and verification of RFID tags with unique identifiers and secret passwords; and (2) reversibly changing an unprotected UII to an encrypted UII, the ability to 'flip' between unprotected UII and an encrypted UII
More explicitly the secure supply chain visibility and transponder authentication system is comprised of: RFID transponders containing a data set comprising primary identifying information, an access and kill password, and cryptographic key index components; a security server managing and providing a changing set of cryptographic keys over a network; and one or more secure RFID encoders using the set of cryptographic keys provided by the security server and storing them in protected memory and encoding into the RFID transponders the data set comprising primary identifying information, cryptographic key index components, and access and kill passwords that were internally computed from the primary identifying information; and one or more secure RFID authenticators determining that an RFID transponder is authentic by using a local set of securely stored cryptographic keys provided by the security server and cryptographic key index components from the RFID transponder to internally compute the previously encoded passwords to authenticate the RFID transponder using a challenge-response interaction.
Secure and efficient encoding and verification of RFID tags for item-level supply chain tagging on a global scale requires the issuance of encoding authorizations, protection of tag secrets by not revealing secret information to cryptographic adversaries, and flexibility in the communication of critical information as taught in the present invention.
RFID tags with SGTIN encoding convey a certain level of confidence that the products that they are attached to conform to quality and ethical standards that are established by their brand owners. The brand owners are responsible for the brand quality and also for making certain that the company and people that produce them adhere to established quality control standards. The brand owners are also interested in knowing that their high quality products are not being sold to their customer based by their supplier.
There are the following types of counterfeit products: those without RFID tags, those with factory-made RFID tags, those with RFID tags that were duplicated in distribution
Brand protection requires secret information that is observable by authorized individuals, preferably at a distance, and with high throughput. Numerous anti-counterfeiting technologies exist, but none have struck a successful commercial balance between these three key attributes: (1) Cost, (2) Inspection range, (3) and Effectiveness.
The novelty of this invention is the optimization of all three of these key attributes in a unique manner so as to provide a powerful and cost effective deterrent to counterfeiting. The present invention combines remote item sensing, definitive item authentication, and heuristics; where heuristics strategies are used on readily accessible, though partially interrelated, information to automatically assess from a distance the probability that goods are counterfeit. The heuristic information is collected and assessed over time, using a large number of field samples. This will be discussed in more detail below.
The present invention also combines secure key management procedures, and methods of making counterfeit tags more difficult to pass as being authentic. Secure RFID tag authenticator 17 is disclosed for use to determine if supply chain goods have an authentic RFID tag on them or not. Secure RFID tag authenticator 17 is intended to be used by a brand owner, a distributor, a retailer, a secure authentication kiosk for consumers, a shipper, or a law enforcement officer that is accepting receipt of or inspecting goods 22a from a supplier.
Referring to Fig. 2 a novel anti-counterfeit system 20 is disclosed wherein goods such as sellable item 22a are tagged with radio frequency identification (RFID) tag 70 in 'manufacturing plant or distribution point A' 21 and are subsequently scanned for authenticity at a second location 'distribution point B or retail facility' 19. RFID tags are used to identify and authenticate goods, including pallets, cases, inner packs, and sellable items (or sellable units, or sales units). Sellable item 22a is an example of a sellable item that was previously tagged at 'manufacturing plant or distribution point A' 21 using RFID tag 70.
Referring to Secure RFID System 10 of Fig. 1, Management Station 12a in Manufacturing Plant or Distribution Point A 21 is used to control the authorizations for operation of Secure Tag Encoder 16. Authorizations include enablement of encoding a maximum number of tags for a given specified list of SKU's and enablement of certain persons as authorized operators of secure encoder 16. Secure Tag Encoder 16 will therefore enforce the authorizations that limit encoding to a maximum number of RFID transponders. In one embodiment, an authorization is an XML message with an encrypted payload. The payload at least contains the unique encoder number, an authorization sequence number, and a number representing the number of tags or inlays that the encoder is authorized to encode. The authorization sequence number is incremented by both the encoder and the security server so that an XML authorization can only be used once, and then only by the designated encoder. A replay of a previously used XML authorization does not result in additional encoding credits.
In the case of manually applied tags, operators are preferably enrolled at Management Station 12a, creating a record for each operator. In preferred embodiments, Fingerprint Scanner (FPS) 12c of Management Station 12a is used to create an operator-specific uniquely numbered computer record that contains a specification of the fingerprint of the finger or fingers that the operator normally uses to remove an encoded RFID tag from secure encoder 16. That record is preferably stored in Fingerprint Database 69 of a trusted source such as Security Server 10a. Additional biometric information, such as face, eyes, retina, iris, or voice are preferably also sensed and collected by BIO sensor 12d and stored in Security Server 10a to provide additional identifying characteristics of each operator. In other preferred embodiments, biometric sensors (not shown) are installed on Secure Tag Encoder 16 and communicated with Secure Server 10a for a variety of security purposes.
Each operator preferably logs into Secure RFID Tag Encoder 16. There are a wide range of methods for securely logging in an operator that are well known to those skilled in the art. There are generally three types of login information that are used: passwords are what you know, security tokens are what you have, and biometrics are what you are. Using any secure combination of these, an operator can log into Secure RFID Tag Encoder 16. The result is that the operator's unique record number (that references Fingerprint Database 69) is then defined as the current Data Carrier Mark DCM 147d in Secure RFID Tag Encoder 16.
RFID tags are bonded or attached to sellable item 22a in any of four ways: (1) Tags are encoded by Secure RFID Tag Encoder 16 and placed onto sellable item 22a manually using human labor; or (2) Tags are encoded by Secure RFID Tag Encoder 16 and transferred directly onto sellable item 22a. Preferred embodiments of this type of Secure RFID Tag Encoder 16 are either handheld or fixed mounted to a conveyor line where sellable items travel past Secure RFID Tag Encoder 16 while being tagged in an automated manner; or (3) Printed and chipless RFID transponders are encoded by Secure RFID Tag Encoder 16 as each sellable item 22a traverses along a production line and enters the encoding field of Secure RFID Tag Encoder 16 in a completely automated procedure; or (4) Batch encoding a roll of tags for operators to apply in a secondary tagging process.
The embodiments described herein provide improved degrees of security for verification and authentication of tags 70 and also because of their physical attachment to sellable item (i.e. object or product) 22athat is associated with tag 70.
Preferred embodiments of this invention include human readable messages to the consumer, the distributor, or anyone who is in a position of purchasing, procuring, or accepting delivery of sellable item 22a that warn that the absence of RFID tag 40 is an indication that the goods are counterfeit. Counterfeit Label 22b is preferably printed on the product or the packaging material, printed in the user's manual and on the warrantee card, and printed on the company's website. Possible forms of the message are: (1) 'Goods are considered counterfeit if a Radio Frequency Identification (RFID) tag is not present before delivery'; or (2) uthentic goods have an RFID tag located here. If one is not present please contact customer service at phone number xxx-xxx-xxxx to report counterfeit goods'; or (3) An anti-counterfeiting electronic tag should be located here, if not, then please return these goods for one that does'.
The purpose of this invention is to increase the cost of counterfeiting to the point where it is too costly to conduct.
This is achieved by allowing brand owners to easily and at low cost make changes to anti-counterfeiting marks and cryptographic keys so that the cost of detecting and duplicating or reverse engineering the brand owner's changes become prohibitively high for counterfeiters to continue their illegal activities. This rebalancing of costs combined with more effective law enforcement efforts will result in a global reduction in counterfeit goods.
Changes to cryptographic keys are inherently supported in the present invention, including ways to communicate key changes through the RFID tags themselves, without taxing the resources of a global online network for frequent database queries. The dissemination of RFID tags provides for an efficient, and now secure, method of distributing information about which cryptographic key sets are to be used on any given tag. There is no incentive for a counterfeiter to alter this since the default condition of a no -math result is that the goods are counterfeit and receipt of them is rejected, and payment will not be made to the supplier.
Cryptographic key changes are preferably frequent and at random and unpredictable times. The keys preferably have very high entropy and are generated by pseudorandom number generators.
An exemplary RFID tag for brand protection that has already gained wide commercial adoption is the EPCglobal Class 1 Gen 2 RFID tag. A complete description of the Gen 2-type tag can be found in EPC Radio -Frequency Identity Protocols, Class- 1 Generation-2 UHF RFID, Protocol for Communications at 860 MHz-960 MHz,' Version 1.0.9, EPCglobal, Inc., copyright 2004, which is incorporated by reference herein in its entirety.
Current Electronic Product Code (EPC) Class 1 Gen 2 RFID tags are vulnerable to fraud since there is nothing to prevent counterfeiters from copying the Unique Item Identifier (UII) product identification numbers such as EPC codes from one tag to another. Valid EPC numbers can for example be skimmed (i.e. copied) from a population of 'valid' RFID tags that are associated with authentic products, and copied onto similar data carriers (i.e. EPC Gen 2 RFID tags) and attaching them to counterfeit or knock-off products.
Referring now to Fig. 3, a counterfeit supply chain 30, counterfeit products are often made by the same manufacturer 21 that manufactures the same authentic goods for brand owner 32, except at a higher profit level. To many people and automated systems, the presence of a look-alike EPC Gen 2 RFID tag would be sufficient to allow even more efficient movement of fake products through alternate channel 34 of supply chains and be ultimately sold to unsuspecting consumers 35. In many cases counterfeit products are inferior to authentic products and pose a risk to the public and tarnish the brand image to the detriment of the brand owner 32. Also a significant financial loss is realized by brand owner 32 and retailer 19 for lost sales; consumer 35 is often lured to alternate channel 34 by prices that are lower than that of retailer 19. This is because the cost structures are very different when the established sales channel of brand owner 32 is illegally bypassed.
The presence of any of the warning messages like Counterfeit Label 22b on sellable item 22a described above will deter manufacturer 21 from not applying an RFID tag in order to avoid detection of goods through alternate channel 34. Therefore manufacturer 21 is likely to apply some sort of RFID tag in order to avoid simple visual detection of counterfeit goods in the alternate channel 34 by consumer 35. If manufacturer 21 opts to use other RFID tag encoding equipment other than secure RFID tag encoder 16 to clone a legitimate RFID tag 70 then the security functions of this invention will prevent sustained counterfeiting activities.
Referring again to Fig. 2, the present invention is a secure supply chain visibility and transponder authentication system which is an end-to-end supply chain visibility and product authentication system 20 to improve supply chain efficiency and to assist brand owners in the protection of their brand. At the front of the system is secure RFID tag encoder 16, and downstream in the supply chain is secure RFID tag authenticator 17; both are intermittently coupled through a trusted source such as security server 10a. Real time connections are not required. A pay-to-encode business model is enforced by operation of the system such that secure RFID encoders receive authorizations from the security server 10a that enable and limit the encoding of up to a maximum number of transponders
In addition to the owner of the tagged object facing the risk of counterfeiting, the owner has a finite amount of risk associated with having an inventory of RFID tags that bear a standard, unencrypted SGTIN. This is true whether the owner is a consumer, a retailer, or the United States Military. Although the EPC Gen2 specification did not specifically provide for encrypted identification information, the present invention discloses a secure way to change unencrypted EPC information into encrypted item-level information, and then convert it back to the original unencrypted form again if needed (e.g. such as store returns). The management of the cryptographic keys is the domain of the retailer or the U.S. Government, whichever is the channel master for the applicable supply chain. The present invention teaches best practices that are prescribed by FIPS 140-2, the Federal Information Processing Standards Publication 140-2 for SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC
MODULES.
Brand owners that purchase EPC numbers from GS1 accept a commitment to assure that each and every RFID tag is uniquely numbered. The present invention teaches a preferred set of devices and methods for securely managing the commissioning of RFID tags with unique numbers on a global scale, without presuming the availability of modern communication infrastructure such as the Internet, telephone, or GPRS.
The present invention teaches a method by which the Access Password that is forwarded from the tag encoding process is used by retailers or government officers (for example) to reversibly change the publicly observable EPC SGTIN into a cryptographically secured version of that representation.
The invention provides for reversibly altering the transponder identity from a publicly readable, decodable, decipherable form to an alternate identity that is cryptographically related to the first identity. The alteration of the identity is based upon steps that access a changeable set of cryptographic keys that are locally stored in an RFID reader. This preferred embodiment has advantages over prior art that depends on fast network access to for example an EPC Information Services (EPCIS) network database implementations as recommended by
EPCglobal. The goal of EPCIS is to enable various applications to utilize Electronic Product Code (EPC) data via EPC-related data sharing, both within and across enterprises. However, this requires frequent queries across one or more networks wherein multiple non-deterministic delays will be encountered, forcing the operator to wait for unknown and variable amounts of time. This ultimately slows the operator's productivity, causing even workers with the best of intentions to become frustrated and ineffective in the performance of their duties. This is in stark contrast to the present invention wherein network activity is a background task that does not hamper worker's productivity. This is accomplished by locally (i.e. preferably in a secure manner within each RFID Reader 17) providing all of the data that is required to perform the following functions. An example of a reader embodiment that benefits from this is an RFID-enabled mobile phone wherein data throughput is slower and less reliable than a wired network connection such as Ethernet.
The present invention meets the tacit requirements of product authentication demanded by retailers, government and consumers: (1) the costs and effort of using the authentication system remains low; (2) authentication of tags encoded by third party (i.e. non-secure encoders) are supported; (3) the system can be operated by multiple parties from multiple locations; and (4) the system maintains a level of security that limits counterfeits and malicious acts by properly managing the risk-return profile. The source-to-shelf system disclosed herein provides for an efficient, secure, flexible, and scalable solution for encoding item-level RFID tags, including metal mount tags in remote factory environments, including secret passwords to enable authorized RFID interrogators to change or kill the RFID tags in retail environments.
Furthermore, the change that authorized RFID interrogators can make to such RFID tags is encrypted, detectable, and reversible.
Information regarding the condition during the original encoding of the RFID tag (e.g. location, date, and time) is observable by an audit function by using cryptographic algorithms that enable privileged access to RFID tag data for auditing and forensic tag analysis.
Furthermore, the present invention works with a range of standard EPC Gen2 tag types and to an extent with third party (i.e. non-secured) RFID tag encoding equipment. Preferred embodiments use EPC Class 1 Gen 2 UHF RFID tags with 64, 128, or more bits of optional User Memory 74 and have both Access Password 71b and Kill Password 71 a features for operating tag 70 in a secured state only when a valid Access Password 7 lb is sent to it.
RFID is an enabling technology for faster and more efficient supply chains by using uniquely numbered shipping containers and items that are read in large numbers simultaneously without requiring a direct line of sight. It is this presumption of uniqueness that is the central subject matter of this invention. If the numbers in the RFID tags are not unique, then false information is present on the goods and in the systems that track them from their sources to their destinations.
A key benefit of utilizing information from uniquely numbered items is that RFID enables improved top line sales to manufacturers and retailers by minimizing out-of-stock occurrences where a consumer's intent to purchase is adversely disrupted by the temporary unavailability of a product that they wish to purchase.
The example embodiments described herein are provided for illustrative purposes, and are not meant to be limiting. The examples described herein may be adapted to various types of radio frequency identification tags, transponders, encoders, and verifiers, for a variety of applications, including manufactured goods, retail goods, apparel, pharmaceuticals, and other products that are bought and sold. Derivative embodiments, including modifications or alterations, may become apparent to persons skilled in the art from the teachings herein. The word 'transponder' is in many cases interchangeable with the word 'tag', in reference to RFID tags. Where the words are not interchangeable, the word transponder is used to convey a meaning where it is known that substrate layers and face stock that are typical of an RFID tag are not all necessarily present, as in the case of an inlay or a printed chipless transponder.
The systems, methods, and devices of the present invention utilize an RFID transponder or wireless sensors as a component. Certain RFID transponders and wireless sensors operate at Low Frequencies (LF), High Frequencies (HF), Ultra High Frequencies (UHF), and microwave frequencies. HF is the band of the electromagnetic spectrum that is centered around 13.56MHz. UHF for RFID applications spans globally from about 860MHz to 960MHz. Transponders and tags responsive to these frequency bands generally have some form of antenna. For LF or HF there is typically an inductive loop. For UHF there is often an inductive element and one or more dipoles or a microstrip patch or other microstrip elements in their antenna structure. Such RFID transponders and wireless sensors utilize any range of possible modulation schemes including amplitude modulation, amplitude shift keying (ASK), double-sideband ASK, phase-shift keying, phase-reversal ASK, frequency- shift keying (FSK), phase jitter modulation, time-division multiplexing (TDM), or Ultra Wide Band (UWB) method of transmitting radio pulses across a very wide spectrum of frequencies spanning several gigahertz of bandwidth. Modulation techniques may also include the use of Orthogonal Frequency Division Multiplexing (OFDM) to derive superior data encoding and data recovery from low power radio signals. OFDM and UWB provide a robust radio link in RF noisy or multi- path environments and improved performance through and around RF absorbing or reflecting materials compared to narrowband, spread spectrum, or frequency-hopping radio systems. Wireless sensors are reused according to certain methods disclosed herein. UWB wireless sensors may be combined with narrowband, spread spectrum, or frequency-hopping inlays or wireless sensors.
Referring now to Fig. 4, the preferred embodiment for a secure RFID tag encoder 16 is disclosed wherein plaintext information and cryptographic keys are stored and effectively hidden in the protected memory of tagging controller 45. Preferred embodiments of tagging controller 45 use a single chip microcontroller with non- volatile block memory protection features such as those which are available on Freescale MC9S08 8-bit microcontrollers. The MC9S08GB/GT microcontrollers include circuitry to prevent unauthorized access to the contents of FLASH and RAM memory. When security is engaged, FLASH and RAM are considered secure resources.
FIPS 140-2 is the Federal Information Processing Standards Publication 140-2 for SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES which is incorporated by reference herein. The standard provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. The purpose of this document is to provide a security metric for equipment containing cryptographic modules.
Preferred embodiments of the present invention utilize tagging controller 45 as a single chip cryptographic module inside of which all plaintext safely resides. Any attempts to extract plain text information or cryptographic keys are prevented from physical or logical access. Information in the protected memory space of tagging controller 45 cannot be viewed from the outside, not even with a debugger. Protected memory of that type cannot be accessed from the outside of the chip without first erasing the contents of the memory. The chip itself is preferably maintained with program updates outside of the protected memory area using a secure boot loader that operates from within the protected memory area.
In accordance with FIPS 140-2 requirements, maintenance of the information or executable code inside of the protected memory must be performed only after first clearing that data. Program updates and remote key management are managed through operating system 43, Anti -counterfeit network client 42a which is used for mobile device management, including SNMP and MIB table updates. Operating system 43 is preferably an operating system that is well suited to mobile devices such as Linux or Android. Network node 42b represents the MAC layer for access to a network, including GPRS, WWAN, 3G, 4G, 5G, IEEE802.11 (also known as Wi-Fi), Bluetooth, or Ethernet. Quatech Inc. of Hudson, Ohio manufactures Wi-Fi modules that are capable of performing or hosting the functions that are required for network node 42b, operating system 43, and Anti-counterfeit network client 42a. Anti-counterfeit network client 42a communicates through network node 42b to anti -counterfeit encoder socket 61 in security server 10a as shown in Figs. 2, 4, and 6. Socket 61 has various implementations on different networks.
RFID interrogator 48a is a module such as an M9 from SkyeTek of Westminster, CO or an M5e Compact from ThingMagic of Cambridge, MA. Certain preferred embodiments also incorporate anti -eavesdropping jammer 48b as described below and are made from similar components as an M9 or M5e, but also include additional amplifiers, filters, and digital signal processing means as described below that in some preferred embodiments radiate jamming signals from antenna 48c. Antenna 48c is in some embodiments a compound structure that has near field radiating parts for selectively coupling with a single RFID tag, and another part that radiates a jamming signal, and the two parts of the antenna are constructed such that the jammer antenna cannot be defeated without also defeating the tag encoding coupler. RFID interrogator 48a communicates to RFID tags only in a well defined interrogation zone that is shaped by shields, RF absorbing materials, and the near field coupling characteristics of antenna 48c. In preferred embodiments, the interrogation zone is collocated with a tag peel device that separates the RFID tags from the release liner for programming and in preferred embodiments also for removal from the release liner for attachment to a target item or object.
RFID tags are transported into the encoding and interrogation field by tag transport 47. Movement is controlled and coordinated by tagging controller 45. Tag database 44 is referenced by tagging controller 45 for determining what information is to be encoded into the RFID tag that is immediately within the interrogation zone. Scanner 46 is preferably a laser bar code scanner that is used to read the SKU information that is used to generate a GTIN (Global Trade Item Number). In a preferred embodiment, a Motorola Symbol SE-955 laser scan engine is used to scan bar codes that are presented to secure RFID tag encoder 16. EPCglobal Tag Data Standards Version 1.4 Copyright 2004-2008 EPCglobal is incorporated by reference herein. Information from database 44, such as the selected GS1 Key type (SGTIN-96, SGTIN- 198, SSCC-96, GRAI-96, etc.), filter value, partition value, site number, unit number, and the last serial number issued for that SKU are used to formulate EPC Serialized Global Trade Item Number (SGTIN) 124. The site number and the unit number are the upper and middle most significant digits of the serial number field. SGTIN-96 serial numbers are 38 bits long, and SGTIN-198 serial number fields are 140 bits long. The Site and unit numbers are used to segment the numbering space for each SKU in order to assure that there is never duplication of any SGTIN even when there is infrequent communication between encoding devices 16 and a central database (i.e. a trusted source of data and cryptography) such as security server 10a. The formulated SGTIN, regardless of the length is recorded in Tag Database 44 of each Secure RFID Tag Encoder 16.
GPS 41 is used in certain preferred embodiments where the location of the encoder cannot be assured through normal business communication methods. GPS 41 is used to feed global location information that is transmitted from satellites that orbit the earth. This information is fed into tagging controller 45 for processing as described below. In certain configurations, GPS information is relayed through operating system 43 and is monitored by anti-counterfeiting network client 42a. In a procedure that is remotely controlled, a prescribed pattern of streets or other hard geographic references is traversed in order to monitor the indicated movement of secure encoder 16.
Lacking a playback of the correct GPS longitudes and latitudes to correctly match the prescribed course will raise suspicions that the GPS device has been tampered with or replaced by a dummy device that feeds incorrect information into tagging controller 45. Evidence of tampering would be reported through anti-counterfeiting socket 61, of operating system 63, into counterfeit heuristics engine 64, an application program that uses authentication database 68 to record, study, and counteract the illegal activities of counterfeiters.
In certain preferred embodiments object transport 49 is used to automatically move items or objects that are to be tagged and present them into the interrogation near field of antenna 48c. Movement or changes in a continuous movement are preferably coordinated with tagging controller 45.
Referring to Fig. 5 there is a preferred embodiment for a secure RFID tag authenticator 17 that preferably includes GPS receiver 51 for recording the location of observations, especially in mobile applications. In some brand enforcement applications, authenticator 17 is deployed into marketplaces where illicit sales of counterfeit goods are likely to be found. GPS receiver 51 has sufficient resolution to mark the exact locations of vendor stalls in crowded marketplace locations where counterfeit goods are identified using a covert radio link from antenna 58c.
In preferred covert applications, an enforcer can walk with secure RFID tag authenticator in a backpack, scanning goods that hang from racks or are still in boxes at the rear of stalls or warehouse locations, marking locations of counterfeit goods without revealing their law enforcement identity. Law enforcement intervention strategies can then be planned using the covertly collected surveillance data. Heuristic information is exchanged between secure RFID tag authenticator 17 and anti -counterfeit authentication socket 62 through network node 66 in security server 10a where authentication database 68 is updated in order to drive counterfeit heuristics engine 64. Findings, results, and controls for counterfeit heuristics engine 64 are monitored and controlled through human interface 67.
Device firmware store 65 is used to update secure RFID tag encoders 16 and secure RFID tag authenticators 17 through anti-counterfeit encoder socket 61 and anti -counterfeit authenticator socket 62. Firmware, cryptographic keys, and control parameters are updated through this secure mechanism.
Referring to Fig. 7 there is a representation of a preferred embodiment for a secure and remotely 'authenticatable' RFID tag 70 of the present invention. This RFID tag is comprised of some fixed purpose and some general purpose parts, in much the same manner as a microcontroller contains programmable resources that are arranged in unique ways to accomplish a specific task, function, or purpose. The codes and parameter settings that are programmed into non-volatile memory locations of RFID tag 70 are like the object code that is loaded into a microcontroller in order to create new and novel functions.
Constructed in accordance with the EPC specifications, RFID tag 70 has a charge pump, antenna interface, protocol control logic, security lock bits, and four memory banks: Bank 00 - Reserved 71 ; Bank 01 - EPC 72; Bank 10 - TID 73; and Bank 11 - User Memory 74.
Reserved memory 71 is comprised of kill password 71a, access password 71b, and potentially other reserved features. These password storage means are also referenced in Fig. 2 as reserved memory 71b, and are protected by Lock 74c and Lock 74f. Kill password 71a is a 32-bit value stored in Reserved Bank 71b memory location OOh to lFh, most significant bit first. And access password 71b is a 32 -bit value stored in Reserved Bank 71b at memory location 20h to 3Fh, most significant bit first, and is used to transition EPC Tag 70 to a secure state.
Access password 71b can be set to a non-zero value and used to require that when RFID tag 70 powers up, it requires an interrogator to issue the correct access password 71b before it enters the secured state where lock bits 74f can be altered to change the security settings of the RFID tag. Details of this are described in the document from EPCglobal called EPC™ Radio-Frequency Identity Protocols, Class- 1 Generation-2 UHF RFID, Protocol for Communications at 860 MHz-960 MHz. Relevant to the present invention is the ability to use that mechanism to hide kill password 71a from being disclosed without an interrogator using the correct access password 71b to make kill password 71a visible.
In the present invention, Secret Access and Kill passwords are crypto graphically derived from unencrypted data on RFID Tag 70. The default (unprogrammed) value shall be zero. An Interrogator shall use a Tag's kill password once, to kill the Tag and render it silent thereafter. A Tag shall not execute a kill operation if its kill password is zero. A Tag that does not implement a kill password acts as though it had a zero -valued kill password that is permanently read/write locked.
Bank Olcontains EPC code 72a which is always sent promiscuously to interrogating readers; it is not protected from duplication. Tag ID Memory 73 (Bank 10) contains Tag ID information 73a which is not intended to be written by anyone except the manufacturers of the RFID chip itself is present because the chip foundry wrote a unique 32-bit serial number into the TID that is now advantageously used as Meta-Key Master Index 73b.. Recently though there are selected RFID chips that differ from this norm by allowing interrogators to write to this bank and then locking it. In preferred embodiments, Meta-Key Master Index 73b is written into this bank by secure RFID tag encoder 16. Tag ID 241a is a 32 bits or more that shall contain an 8-bit ISO/IEC 15963 allocation class identifier (1 11000102 for EPCglobal) at memory locations OOh to 07h. TID memory shall contain sufficient identifying information above 07h for an Interrogator to uniquely identify the custom commands and/or optional features that a Tag supports. For Tags whose ISO/IEC 15963 allocation class identifier is 111000102, this identifying information shall comprise a 12-bit Tag mask-designer identifier (free to members of EPCglobal) at memory locations 08h to 13h and a 12-bit Tag model number at memory locations 14h to lFh. Tags may contain Tag- and vendor specific data (for example, a Tag serial number) in TID memory above lFh.
User Memory 74 (Bank 11) contains Encrypted QCC 74a is a Quality Control Code (QCC), which is comprised of several novel elements that enable an ordinary EPC tag to become secure identity EPC tag 70. A powerful aspect of the QCC is that RFID tags 70 can be screened for counterfeits and clones at a significant distance at speeds of up to tens of thousands of items per minute. This is a core benefit that the present invention brings to thwart counterfeiting.
In a further embodiment, User Memory Bank 74 is divided into two partitions. One is to store User Memory SI 74c and the other for User Memory S2 74d. User Memory S 1 74c is preferably used to store header information and an index into a table of cryptographic keys. User Memory S2 74d is preferably used for audit information.
In the present invention the term cryptographic key index components is used to describe data fields within any of the EPC memory banks: 00, 01, 10, and 11 that are used either as complete keys, an index into a table of keys, or a portion of an index into a table of keys, or an encrypted or obfuscated component of an index into a table of keys. Preferred embodiments are described in this document that further explain the utilization of cryptographic key index components by Fixed-Key Indexer 92, Meta-Key Indexer 102, Meta-Key Master Index 130a, Meta-Key Index 130c and 140c, and Radio Key Index RKI 133a and 145a.
In preferred embodiments, a trusted tag converter company writes Encrypted TPC 74b into EPC Bank 01 or User Memory Bank 11. Encrypted TPC 74b is later overwritten by Encrypted QCC 74a, possibly occupying the same blocks of memory. Overwriting is allowed after Encrypted TPC 74b has been read from RFID tag 70 by and into a protected memory location of secure RFID tag encoder 16, forming part of internal QCC 134. The
interrelationships and the material properties of the elements shown in Fig. 7 are the means by which EPC tag 70 becomes strongly resistant to cloning, and by which it can be verified as authentic from a safe distance by brand owners and law enforcement professionals.
Kill Password for retailers: preferred embodiments of this invention use subsets of the brand authentication features in order to enable retail stores to kill EPC tags for consumers that want their tags killed as defined in the EPC global specifications. Retailers will need to be given the cryptographic keys to compute the kill password using the UII (EPC) and QCC data (if present).
Cryptographic Key Management: preferred embodiments manage key changes between authenticated and authorized recipients. Keys are changed because keys can potentially be discovered by a cryptographic adversary. Certain preferred embodiments use asymmetric key algorithms to distribute symmetric keys to authorized recipients. Symmetric-key algorithms are generally much less computationally intensive than asymmetric key algorithms which are typically hundreds to thousands of times slower than symmetric key algorithms. Asymmetric algorithms are used to distribute symmetric -keys on a regular basis to authenticated and authorized machines and entities. Cryptographic keys and initialization vectors are preferably generated using pseudorandom key generators in order to assure a high level of entropy to thwart cryptanalysis attacks. Encrypting the QCC: a block cipher is preferably used to encrypt and decrypt the QCC. In these preferred embodiments, the encryption functions are all performed off-tag. That is to say that the RFID tag does not necessarily have a built-in cryptographic engine inside the RFID chip. This is a design decision that the market has made based on cost and read range. RFID tags consume very low amounts of power (on the order of tens of microwatts), which is several orders of magnitudes less than newer smart card chips with cryptographic security coprocessors. The significant difference in power would reduce read range, a primary performance metric to make supply chain applications work. If an RFID tag cannot be read, especially and item-level tag, then the customer cannot be charged. To the retailer, this is a worse problem than counterfeiting and therefore tips that balance away from a cryptographic engine on each RFID tag.
In certain applications passwords are encoded into transponders or wireless sensors when they are commissioned. Passwords are safeguarded using cloaking, obfuscation, cryptographic techniques, secure and trusted channels, locked memory, and other methods that are commonly used to protect confidential information. Passwords are generated or retrieved from data encoded in an RFID transponder to generate an index into one or more databases that contain a one dimensional array of passwords, a two dimensional array of passwords, a multidimensional array of passwords, or an array of actual or pointers to algorithms used to generate passwords from transponder data, for example. Alternatively, cryptographic algorithms are used generate passwords from transponder data. These methods are described in the inventor's U.S. Patent 7,551,087 with a priority date of 19 Aug. 2005 from U.S. Provisional Patent Application Ser. No. 60/709,713.
Several encryption tools are needed depending on the functions described in the present invention. For reference Skip32, Blowfish, and AES are briefly described here and are used where 32, 64, 128, or more bits are encrypted and decrypted.
For encrypting 32-bit numbers there is no algorithm that is really considered strong enough to be used as a primary tool for stopping determined counterfeiters. That said, there is value in a 32-bit symmetric block cipher that is used to obfuscate information that is a part of a larger block size that uses stronger encryption tools as described below. Skip32 is a 32-bit block cipher based on SKIPJACK. Skip32 is a 'not copyright, no rights reserved' public domain cipher written by Greg Rose, QUALCOMM Australia in 1999. Skip32 is based on an implementation of the Skipjack algorithm written by Panu Rissanen.
Blowfish is a block cipher that has a 64-bit block size and a variable key length from 32 up to 448 bits. It is a 16- round Feistel cipher and uses large key-dependent S-boxes. Although there is a complex initialization phase required before any encryption can take place, the actual encryption of data is very efficient on large microprocessors; and is much faster than DES and IDEA . Blowfish is unpatented and license-free, and is available free for all uses.
AES-128 and AES-256 are block ciphers that are part of the Advanced Encryption Standard (AES) which is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES- 192 and AES-256, adopted from a larger collection originally published as Rijndael. Each AES cipher has a 128- bit block size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide. AES is based on a design principle known as a Substitution permutation network. It is fast in both software and hardware, is relatively easy to implement, and requires little memory. Unlike its predecessor DES, AES does not use a Feistel network.
Quality Control Code: this invention makes use of parts of memory within an RFID tag, such as an EPCglobal RFID tag that do not have a standard use. A special Quality Control Code (QCC) is written into one of the otherwise unused parts of the tag's memory, such as User Memory or writable parts of TID (i.e. the Tag ID Memory Bank), or extended parts of the main EPC Memory that exceed the standard code lengths (i.e. at the end of a 240-bit EPC memory bank when only a 96-bit EPC code is stored there).
The QCC quality control code is used to reveal where, when, and how products were tagged. A QCC is not able to be interpreted by unauthorized persons. Authorized persons are brand owners that are entitled to protect the integrity of their branded products from counterfeiting. A cryptographic key is needed for reading a QCC, and an understanding of the encoding algorithm is required to make sense of the data.
A part of the QCC takes advantage of the various differences in length of the various memory banks inside various RFID tags. There are a large number of RFID tag types that are manufactured with various sizes of TID, EPC, and User Memory banks. The QCC is set for a specific memory capacity, and unless the counterfeiter uses an identical memory footprint to encode counterfeit tags, the result will be a copied QCC that does not match the memory footprint of the tag that it was copied onto.
The QCC is a powerful tool for a quick off-line appraisal of goods that are moving through critical choke points such as freight forwarders and national ports of entry. The off-line aspect of this invention is important where transporting large amounts of encrypted data to a remote server may be impractical to meet throughput goals.
Embodiments that depend on secure high bandwidth communication with a remote server may not be available, especially in hostile or foreign environments and marketplaces where counterfeit goods are typically sold. Such marketplaces may be back alleys, flea markets, or leased warehouses where high speed Internet connections are not available. Covert surveillance of such areas requires small, powerful, compact processing means with small, fast, and rugged data storage means, all of which could be covertly carried in a backpack. Observations are preferably recorded and associated in real time with the GPS coordinates of where troves of counterfeit items are detected. This allows for intervention and apprehension plans and actions to be decoupled from the scanning process in illicit marketplaces.
Countermeasures to thwart brand thieves and counterfeiters preferably include: (1) FIPS 140-2 rated encoders and verifiers with fast acting algorithms that promptly execute cryptographic key zeroization (i.e. clearing of cryptographic keys) when an attack is detected by sensors including tamper detection switches and devices that detect physical and environmental attacks such as extreme temperatures (outside of the device's rated operating limits), tamper resistant covers, shields, RF noise, low power encoding, and obfuscation techniques to befuddle eavesdroppers; (2) Tagging logs reported to brand owner - accountability required on part of manufacturer; (3) Encoder does not duplicate any numbers; (4) QCC used for forward intelligence reporting to authorized observers; (5) A preprinted logo on the data carrier conveys confidence in brands that use the teachings of this patent to assure product authenticity.
Certain preferred screening methods use information that is stored in a part of the RFID tag that is not directly associated with the identification of the product that it identifies. In certain preferred embodiments using EPC Class 1 Gen 2 RFID tags, User Memory 74 is available for storing supplemental information, and is well suited for the type of information that is useful for determining the origin of a tagged product and the characteristics of the intended data carrier.
In preferred embodiments, an Encrypted Quality Control Code (QCC) 74a of Fig. 7 is computed and encoded into each RFID tag by a secure RFID tag encoder 16. Encrypted QCC 74a is adaptable to the amount of available tag memory, and in the case of most EPC tags, the amount of User Memory 74. Currently, 64 bits of User Memory is readily available. As time goes on, the amount of user memory will increase and the utility of Encrypted QCC 74a will expand with it.
A preferred composition of the 64-bit implementation of Encrypted QCC 74a is described here with the preferred number of bits for each QCC Field: GLC 18, Encoder 11, Day 0, Time 0, TPC 14, RKI 6, CRC 10, CCC 5, Total 64 bits.
For RFID tags that can store up to 128 bits, 128 -bit implementation of Encrypted QCC 74a is shown here with additional space allocated for each field, plus space for the Day and Time fields. GLC 20, Encoder 20, Day 12, Time 17, TPC 32, RKI 10, CRC 12, CCC 5, Total 128 bits.
The plaintext version of Encrypted QCC 74a is only present at time of its creation within protected memory of tagging controller 45 of secure RFID tag encoder 16 and there it is referred to as QCC 134.
QCC 134 is also recreated within the protected memory of Counterfeit Heuristics Engine 64 of secure RFID tag authenticator 17 as QCC 146.
Due to memory constraints on the RFID tags, the QCC is designed to be very space efficient. An explanation of the QCC plaintext fields as they are in QCC 134 or QCC 146 are:
GLC - Global Location Code, a field that indicates a representation of the latitude and the longitude of the location where the encoder was operating when the current tag was encoded. Using Aggregated Extended Data (AED) 119a of Fig. 11 the resolution can be expanded significantly beyond the number of bits allocated as shown above.
Encoder - A unique number that is assigned to each RFID tag encoder.
Day - A counter that indicates the date that the current tag is encoded in the form of a delta offset from a fixed date.
Time - A counter that subdivides each day into time slots and represents the time of day that the current tag is encoded.
TPC - Tag Physical Characteristics is an encrypted field that is created from two plaintext descriptors that are designated by a tag converter during the tag conversion process: TMA and DCM. TPC 74b is preferably written by the tag converter and stored on the RFID tag in a secure form during the conversion process. It is transformed by the tag converter and within secure RFID tag authenticator 17 by TPC Key 147b and TPC Transform 147a.
Tag Memory Architecture (TMA) 147c is a field that is an index into a table of distinctive tag memory footprints. In the 128-bit version of QCC 146, this field can specify up to 256 different types of tag memory architecture footprints using an 8-bit TMA. A mismatch of this field to the actual tag memory footprint during the Tag Memory Architecture Authentication Function 149a is an immediate red flag TMH 149d for detecting counterfeit tags at a distance and is reported to Authenticator Heuristics Engine 166 as a security violation.
Data Carrier Mark (DCM) 147d is an index into a table that specifies the characteristics of anti -counterfeit marks 70b that are embedded into data carrier of RFID tag 70. The marks may be a combination of microdots, microtaggant, printing, watermarks, human fingerprints, or other distinctive characteristics of face stock 75, adhesive 79, or other parts of the physical data carrier of tag 70. In the 128-bit version of QCC 146, this field can specify up to 16,777,216 different combinations of 24-bit DCM data carrier marks. A mismatch of this field to the actual anti-counterfeiting features during the Data Carrier Mark Authentication Function 149b is an immediate red flag DCH 149e for detecting counterfeit tags and is reported to Authenticator Heuristics Engine 166 as a security violation.
In certain preferred embodiments, Data Carrier Mark (DCM) 147d alternatively contains a unique operator record number that points to a fingerprint record in Fingerprint Database 69 that is associated with the operator that was authorized to encode and place tag 70 onto sellable item 22a in factory 21. In certain embodiments, additional bits are allocated to DCM 147d to hold greater numbers of operator record numbers, possibly reducing the number of bits in other fields, such as TMA 147c. That operator left fingerprint 79a on tag 70. A descriptor of fingerprint 79a is stored in fingerprint database 69 as either a pattern image or in the form of minutia that describe the ridge pattern types, bifurcations, ridge endings, their location, strength, and significant direction. Pattern-based images in uncompressed form require about 1024 bytes per fingerprint, or 300-400 bytes when compressed. In minutia form only 125 to 400 bytes are required, depending on the number of minutia per fingerprint. For a typical finger, 35 to 40 minutiae are normal. Often times a match can be made with as little as 12 of the 40 minutiae.
RKI (for Encoders) - Radio Key Index RKI 133a is a field that is an index into Radio Key Table 133b in secure RFID tag encoder 16 that is used to select a cryptographic key for use in Radio Key Hash Function 133c to generate the over-the -radio -link Radio Passwords 138 from selected plain text fields of formulated EPC SGTIN 124 and is comprised of kill password 138a and access password 138b. When tag 70 is programmed, those passwords are written into reserved memory 71 as kill password 71a and access password 71b respectively. Lock bits 74c are then set.
RKI (for Authenticators) - Radio Key Index RKI 145a is a field that is an index into Radio Key Table 145b in secure RFID tag authenticator 17 that is used to select a cryptographic key for use in Radio Key Hash Function 145c that is used to generate the over-the -radio-link Radio Passwords 149f from selected plain text fields of EPC SGTIN 72a and is comprised of kill password 149f and access password 149h. Password Authentication Function 149i compares or evaluates these values through a challenge-response interaction with tag 70 to determine the contents of reserved memory bank 71 and to verify kill password 71a and access password 71b. The term challenge-response is not defined in the EPC Radio -Frequency Identity Protocols, Class-1 Generation-2 UHF
RFID, Protocol for Communications at 860 MHz-960 MHz,' Version 1.0.9 document, and is therefore defined here for clarification. In computer security, challenge -response interaction is a family of authentication protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") in order to be authenticated. The simplest example of a challenge -response interaction is password authentication, where the challenge is asking for or offering the password and the valid response is observed when the password is correct. When this form of challenge response is applied to an EPC Gen2 tag or inlay, a correct Access Password will cause the RFID tag to transition into the secured state. Alternatively when an interrogator sends an incorrect password to the tag the interrogator will detect that the Access Password was invalid. Further authentication steps are described in this invention that includes the unlocking and reading of the Kill Password. This added step is further evidence to an authentication device that the RFID tag was encoded by an RFID encoder that is operating properly within the same Secure RFID System 10 or anti -counterfeit system 20 using validly managed cryptographic keys from a trusted source such as Security Server 10a or Tag Management Server 10a.
If the EPC Gen2 protocol is revised to include encrypted challenge-response authentication, then the present invention shall utilize such protocols in order to reduce the risks of eavesdropping by cryptographic adversaries. CCC - Counterfeit Control Code 164c, a code that is assigned based on the heuristic incidence model that runs in Counterfeit Heuristics Engine 64 of security server 10a. The value is based on historic patterns of abuse by the manufacturer, the relevant distribution channels, and varies by SKU and encoder number. Counterfeit Control Code 164c is a feed forward code that is encoded with heuristics that are representative of previously observed incidents and patterns of occurrences. This aspect of each secure RFID tag encoder 16 is managed by Encoder Security Manager 112 which maintains in protected memory of tagging controller 45 CCC Table 152a. CCC Selector 152b uses EPC SGTIN 124 as input to select which CCC to use in QCC 134 since each CCC is encoder and SKU specific. In other words, counterfeit heuristics engine 64 of security server 10a is in complete control of each SKU that is encoded by each secure RFID tag encoder 16. Updates to CCC table 152a take effect immediately and are meant to effectively send a 'silent alarm' to remote tagging locations anywhere in the world without notification.
CRC - Cyclical Redundancy Check CRC 156b is a field that confirms data integrity of TID 73 (which may or may not be field writeable depending upon the inlay supplier's chip specifications), formulated EPC 124, and Cloaked QCC Payload 155a. It is important to note that if a counterfeiter copies EPC 72a and Encrypted QCC 74a onto an RFID tag with a fixed and different TID, then the CRC will have a high probability of not matching. CRC 156b is calculated by CRC Calculation 155d in secure RFID tag encoder 16 before Cloaked QCC Payload 155a is encrypted and written to EPC Memory 72 of EPC RFID tag 70.
The elements described above are the means of Fig. 7 that relate to Fig. 2 for the purpose of performing the function of providing a secure, 'unclonable' identity for sellable item 22a are:
Face Stock 75 - An optional cover layer that is preferably comprised of paper or plastic materials and is usually printed or marked in a manner that is needed for the security functions described herein, for human handling, or for EPC global branding (i.e. the EPC global logo). The surface may contain holograms, printed, or micro -features as anti-counterfeiting features.
RFID Chip 76 - preferably manufactured by a silicon foundry in accordance with EPC global specifications.
Bank 00 - Reserved Memory 71, Kill password 71a , Access Password 71b
Bank 01 - UII Memory 72, EPC SGTIN 72a
Bank 10 - TID Memory 73, Tag ID 73a, Meta-Key Master Index 73b
Bank 11 - User Memory 74, Encrypted QCC 74a
Antenna 77 - preferably a stamped, etched, or printed metallic structure of a particular shape and thickness for coupling with the air interface and with RFID chip 76.
Substrate 78 - preferably PET or some other plastic or paper which carriers the antenna 77, RFID chip 76, and adhesive 79.
Adhesive 79 - preferably a pressure sensitive adhesive layer that initially bonds substrate 78 to a release liner for conveyance through or under secure RFID tag encoder 16. After RFID chip 76 is encoded and verified, adhesive 79 is transferred to sellable item 22a, whereupon adhesive 79 begins a process of wetting-in and foirning a semipermanent bond. This bond layer will securely retain fingerprint 79a of the operator that placed the tag onto sellable item 22a. If facestock 75 is not present or clear such as a PET plastic material, then fingerprint 79a can be observed through facestock 75 by using a proper source of illumination, such as light source 17b and fingerprint imager 17c. The individual elements listed above and detailed below are means by which preferred functions and interrelationships exist between the elements in order to perform the overall secure identity function of EPC tag 70:
1. Face Stock 75 in certain embodiments has holographic, micro-scribed threads, printed features, or other micro- features embedded into the materials that are visible (or identifiable) at some magnification from the top, bottom, or within the constituent materials of face stock 75. (a) DCM 147d provides an index into a table (or directly describes) that describes the anti-counterfeiting therein; (b) Antenna 77 is under face stock 75; (c)Substrate 78 is under Antenna 77 and adhered directly to face stock 75.
2. Substrate 78 may be flat, or comprised of a layer of foam, or folded in order to produce a flag tag. (a) Dielectric spacing between antenna 77 and adhesive 79 in the form of air (as would be the case for a folded flag tag) or foam as in the case of a foam-backed tag are important for preventing detuning of antenna 77 by metallic substances or RF-absorbing liquids (including water molecules) within sellable item 22a to which adhesive 79 is attached; (b) Secure RFID tag encoder 16 through which EPC tag 70 passes for encoding and verification regardless of thickness or mechanical properties of substrate 78.
3. Adhesive 79 in some preferred embodiments has micro -features blended in with the adhesive emulsions that can be inspected at some magnification level. When tag 70 is manually applied from secure encoder 16, the operator leaves at least one unique fingerprint 79a that is molded into adhesive 79; (a) DCM 147d provides an index into a table (or directly describes) that describes the anti-counterfeiting features therein. Each fingerprint 79a can be imaged and reduced to a set of minutiae that describe each fingerprint 79a. That typically requires 200 to 400 bytes, which can either be carried in a larger version of DCM 147d or referenced indirectly through fingerprint database 69 in security server 10a; (b) Substrate 78 is in direct contact with adhesive 79; (c) EPC tag 70 is bonded to the object that is tagged through adhesive 79. For manually applied tags, the operator leaves at least one unique fingerprint 79a that is molded into adhesive 79 and preserved for forensics analysis.
4. The memory footprint of RFID chip 76 varies from foundry to foundry and from model to model, (a) TMA 147c is an index into a table that describes the physical memory layout of an authentic RFID chip 76 for the current tagged object.
5. Kill password 71a serves two purposes: it is used to disable the RFID tag and it is used to prove that an authentic tag holds a secret number, (a) Access password 71 b is a gateway to unlock the lock bits of the EPC tag so that the kill password 71a can be verified; (b) RKI 145a is an index that points to Radio-Key Table 145b that contains the current set of cryptographic keys that are used to create the kill password 71 a and Access password 71b from EPC SGTIN 72a.
6. Access password 71b is a gateway to unlock the lock bits of the EPC tag. (a) RKI 145a is an index that points to Radio-Key Table 145b that contains the current set of cryptographic keys that are used to create the kill password 71a and access password 71b from EPC 72a.
7. Meta-Key Master Index 73b is used whenever possible to select from a changing set of cryptographic keys to decrypt Encrypted QCC 74a. Preferred encoder embodiments use Meta-Key Master Index 130a that are updated by Encoder Security Manager 112 and used whenever there is a writeable TID 73 in the tag stock that is loaded into secure RFID tag encoder 16. Preferred embodiments include: (a) Tag 70 wherein TID Memory 73 is writable. The original EPC UHF Gen2 chips only have factory programmable Bank 01. Whenever chips are available with a writable Bank 01 (such as the XCTF family from Invengo Information Technology Co., Ltd. of Shenzhen China), then Meta-Key Master Index 73b is preferably written by RFID tag encoder 16; (b) Tag 70 wherein TID Memory 73 has a permanent factory-programmed 32-bit serial number in for example a 64-bit TID. The lower 16-bits are for example used as Meta-Key Master Index 73b; (c) Tag 70 wherein EPC memory 72 wherein there are more bits available than are needed to store EPC SGTIN 72a and provide an adequate way to store Meta-Key Master Index as an alternative embodiment; (d) QCC 74a is encrypted by Secure RFID tag encoder 16 and decrypted by Secure RFID Tag Authenticator 17 using a static cryptographic key. This is not preferred since cryptographic keys can eventually be cracked if there is sufficient incentive.
8. QCC 146 subpart DAY is used to identify when the current tag was programmed. This is important for forensic analysis.
9. QCC 146 subpart TIME is used to assist in the apprehension of illegal manufacturing operations that work for the brand owner by day and work for themselves by night, (a) QCC 146 subpart CCC may be changed by Counterfeit Heuristics Engine 64 if there is a correlation between confirmed counterfeit goods and QCC 146 subpart TIME.
10. QCC 146 subpart GLC is used to confirm that secure RFID tag encoder 16 is operating in a pre-authorized location, (a) QCC 146 subpart ENC is authorized to operate in locations that are approved by the brand owner.
11. CRC 143a is used to confirm through CRC Calculation 161 and CRC Validation Logic 162 that all data banks hold valid representations of the intended data. This is a trap for counterfeiters that opt to merely copy an Encrypted QCC 74a and EPC SGTIN 72a onto an RFID tag that lacks a valid TID. If there is a mismatch, then it is reported through to Authenticator Heuristics Engine 166. (a) EPC SGTIN 72a is correctly represented; (b) TID Memory 73 matches what CRC 143a was computed to; (c) QCC 146 parts other than subpart CRC are correctly represented.
12. QCC 146 subpart CCC captures any historic errors that are processed by the heuristic analysis tools for any noteworthy anomalies in: (a) Reserved Memory 71 ; (b) UII Memory 72; (c) TID Memory 73; (d) User Memory 74; (e) Authenticity of printed or micro-features in Face Stock 75; (f) Authenticity of micro-features in Adhesive 79.
Stegano graphic or Micro -Feature Information: the DCM information is preferably provided to the RFID tag encoder from the tag converter in a form that can be read from each RFID tag as it's about to be programmed for the first time by secure RFID tag encoder 16. In certain preferred embodiments, the DCM information is encrypted as part of the TPC field that is read from TPC 74b of User Memory 74 and copied unchanged into the TPC field of QCC 134.
A method of detecting counterfeit RFID tags is to make part of the identification very hard to duplicate. Examples of that are in currency where specific linen fibers are used that can only be procured through controlled suppliers. Preferred anti-counterfeit technology for the data carrier of RFID tag 70 includes micro-scribed fibers, holograms, Data Glyphs, Embedded Data Characters (EDC), microdots, microtaggant, nanoart, nanohthography, human finger prints, and other steganographic marks to hide a code that helps to validate the authenticity of tags, which in turn authenticate the items that they are attached to. This invention makes use of micro -features which are any mass- producible, small, non-obvious, or microscopic traits or characteristics that can be incorporated into a data carrier and a brief exact description (or reference to a description) of them conveyed to both encoder 16 and secure RFID tag authenticator 17. DataGlyphs are a technology for encoding machine readable data onto paper documents or other physical media. They encode information into thousands of tiny, individual glyph elements. Each element consists of a small 45 degree diagonal line, as short as 1/lOOfh of an inch or less, depending on the resolution of the printing and scanning that is used. Each one represents a single binary 0 or 1 , depending on whether it slopes to the left or right. Sequences of these can be used to encode numeric, textual or other information. The individual glyphs are grouped together on the page, where they form unobtrusive, evenly textured gray areas, like half-toned pictures. One of the reasons for using diagonal glyph elements is because research has shown that the patterns that they form when massed together are not visually distracting.
Steganographic features are marks that have hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means 'concealed writing'. Such features are preferably printed onto the physical data carrier part of tag 70. The physical data carrier part of a tag is the mechanical device that carries electronically stored information in a chip type data carrier and/or printed information on a surface such as the face of a data carrier (also referred to as face stock).
A microdot is text or an image substantially reduced in size onto a 1mm disc to prevent detection by unintended recipients. Microdots are normally circular around one millimeter in diameter but can be made into different shapes and sizes and made from various materials such as polyester. The name comes from the fact that the microdots have often been about the size and shape of a typographical dot.
Microtaggant® is a microscopic and traceable identification particle used to trace explosives or other hazardous materials or to prevent counterfeiting. Preferred embodiments use layers of various materials and colors to construct uniquely coded patterns. The patterns are the same from one particle to the next within the same coded group. Like particles are preferably mixed with adhesive or paper to make a uniquely coded element of secure RFID tag 70.
Nanoart and nanolithography are applied as anti-counterfeiting measures by incorporating uniquely identifiable symbols or information into nano-scopic features that can be embedded into data carriers, including parts of the face stock or adhesive materials. The point is that the symbols are so small that they are difficult to detect without prior detailed knowledge, and are therefore nearly impossible to duplicate.
The RFID tag encoder uses tag stock or adhesive that is printed or impregnated with identifiable features that preferably have a high degree of entropy. In other words there are preferably millions, billions, or trillions of unique combinations of uniquely identifiable features that are hidden in a data carrier. The tag stock carries with it an identifier such as a bar code, a secure microchip, or an RFID tag to refer to the feature or features that are present in or on the data carriers.
In one embodiment, a secure RFID tag is attached to or contained within a cartridge that contains the RFID tag stock, and that tag is used as a secure reference to the hidden features. The objective is to securely transfer information about the tag stock, including steganographic details about the microdots, microtaggant, nanolithography, or printed features so that the information can be securely incorporated into the information encoded on the RFID tag. That way, every tag that is encoded on that tag stock will have data that matches up to the data carrier. If a counterfeiter were to copy the RFID tag data onto another data carrier, that carrier would need to have the identical printed or micro-features as the original in order not to be caught. Encrypted License on Supply Cartridge: i n a preferred embodiment, the secure RFID tag attached to or contained within the cartridge serves as a license to ensure an authentic stock of RFID tags and to monitor cartridge and encoder use. The RFID tag attached to the cartridge becomes a license input for the secure RFID encoder that is preferably read from and written to by the same RFID interrogator module of the encoder during the encoding and dispensing of the RFID tag in the cartridges. Preferred embodiments of the cartridge license use an EPCglobal compliant RFID inlay that is attached to or near the peel device or peel plate that is preferably located with the interrogation field of the antenna or near field coupler. In preferred embodiments the cartridge license inlay is only readable and writeable at slightly higher RF power levels than for reading or encoding the supply of encodable tags or inlays. Preferably reradiation from an encodable tag/inlay at or near the peel plate and the resulting near field retuning of the near field coupler also plays a role in effectively increasing the range of the interrogator to extend to the cartridge license which is preferably at the fringe of the near field coupler's normal tag reading, verifying, and encoding field. The cartridge RFID tag/inlay is distinguished from the nearby stock of RFID tags by a distinctive data header, an ISO (International Organization for Standardization) Application Family Identifier (AFI) as defined in ISO 15961 , or by being responsive to interrogation in a different frequency band from the supply of encodable tags that are carried by the cartridge. The preferred embodiment of a cartridge license uses an encrypted count of remaining transponders that are authorized to be encoded. In order to prevent unauthorized duplication or rewriting of the license and its associated count, critical parts of those numbers are the encrypted cipher text result that is at least partially generated from secret values that are also stored in the Access and Kill Passwords. All or part of the license and count are preferably stored in User Memory. A Data Storage Format Identifier (DFSID) as specified in IS015961 and IS015962 preferably specifies the format for the user memory Bank 11. The DSFID is typically eight bits in length, but may be extended further as specified in ISO 15961.
Authentication of the license and associated transponder encoding authority requires the Access and Kill Passwords to be formulated using methods described elsewhere within the present invention, and used to decrypt the encrypted license and associated count. Additional security features are also preferably used, including Data Carrier Marks (DCM's). Without the license, or with a depleted license, the secure RFID encoder preferably ceases to function.
Fingerprints Molded into Adhesive Layer: the fingerprint of the operator that encoded and applied a manually- applied RFID tag did so by handling each tag 70. In preferred embodiments, a single fingerprint 79a was left in adhesive layer 79 as shown in Fig. 7. Each human fingerprint can be uniquely described by a set of minutia. The minutia that is associated with each fingerprint can be compared a reference that is preferably stored in Fingerprint Database 69 in Security Server 10a of Fig. 6.
Stegano graphic or Micro -Feature Descriptor: in a preferred embodiment of the RFID tag encoder, an internal optical reader is used to directly read printed or embedded features in the tag face stock in order to respond to the unique characteristics of each tag (i.e. data carrier) and cryptographically connect the data to the data carrier. The printed or embedded features may be analog or digital representations that can be recognized, processed, imaged, measured, quantified, or decoded.
In preferred embodiments the data carrier contains printed or micro -features and also digital data inside each data carrier that references a descriptor that describes those features. The data carrier and matching descriptor data are both placed there by a trusted tag converter. A trusted tag converter is a trustworthy company that produces RFID tags by combining RFID tag inlays with face stock and usually an adhesive layer and a release liner. A trusted tag converter would for example purchase or make inlays (which typically contain an RFID chip, an antenna, and a substrate material), and adhere them to face stock material that may have printed or micro -features on either the top or the bottom surface, add an adhesive layer (which may have micro -features blended in with the adhesive), and a release liner which is used as a conveyance web. The hidden features are described in a secure document, preferably in digital machine readable form, and referenced by a number that is then stored into a portion of memory in the RFID tag. Preferred memory banks for storing TPC 74b feature descriptor into EPC Gen 2 tags are the EPC (Bank 01), TID (Bank 10), or User Memory (Bank 11).
TPC:DCM 147d information regarding the tag converter's printed or micro-feature descriptor is read from the memory of each tag in the first step of the tag encoding process. Then the descriptor may be altered, encrypted, or re-encrypted before being stored into QCC 134 as Encrypted QCC 74a on RFID tag 70. In preferred embodiments, QCC 134 is cloaked using Cloak Transform 135 to obfuscate the QCC features by churning the cloaking characteristics through CCE control 131b from Cloak Code Table 131a that is driven by the least significant bits of the serial number of EPC SGTIN 124. This extends the useful life of the Meta-Keys by making it considerably more difficult to conduct crypto analysis of Encrypted QCC 74a by observing inputs such as TPC 74b that can be read by a cryptographic adversary.
By using the least significant bits of EPC SGTIN 124, for example, the lower 2 bits of the serial number are used (whether hashed or not) there will be a new group of 4 key indices when the SKU's begin to reach serial numbers that have higher order bits set that are included in this EPC-based key selection method (regardless whether it is hashed or not). In preferred embodiments, a site location and a unit number for that site comprise the most and next-most significant bits of the serial number respectively. This results in controlled Meta-Key and Cloak Code changes across all enterprise locations and SKUs for all secure RFID tag encoders 16.
Referring to Fig. 13 Cloaked QCC 136 is encrypted by Block Cipher 137 using MKE key 130e from Meta-Key Table 130d that is selected by Meta-Key Index 130c that is derived from the upper bits of EPC SGTIN 124 and preferably also from Meta-Key Master Index 130a if a writeable TID 73 is utilized and carries inside of it Meta- Key Master Index 73b that was stored there and locked by secure RFID encoder 16 or is present because the chip foundry wrote a unique 32-bit serial number into the TID that is now advantageously used as Meta-Key Master Index 73b.
Legitimate operators have no incentive to misuse the DCM code. It is there to facilitate the efficient programming of copy-proof RFID tags. Counterfeiters can alter the code, but that only breaks the connection between the tag data and the hidden indicia in the data carrier, doing them no good because that condition would be detected during a quality control check. Similarly, counterfeiters have no clear incentive to copy the number to use on fake data carriers because again that would be detected at the first quality control check point. Reuse of the DCM code would only point to them as the authorized recipient of blank tag stock that bears that DCM code and would result in a downgrading of their CCC (Counterfeit Control Code).
Hidden Digital Information: as explained on page 61 of the EPC Radio -Frequency Identity Protocols, Class-1 Generation-2 UHF RFID, Protocol for Communications at 860 MHz-960 MHz,' Version 1.0.9, EPCglobal specification, the kill and access passwords can both be hidden from public view in Reserved Memory 74b by setting lock bits 10 and 12 of the lock command payload and lock control section 74c and 74f of EPC tag 70 respectively.
This is an especially effective technique for hiding a secret 32 -bit number (that is also used as the kill password) when combined with the jamming techniques described below to prevent eavesdropping of the password setting or verification processes. Extending GLC Precision: GPS data is provided by a constellation of satellites that orbit the earth emitting GPS signals preferably to GPS receiver 41. At full resolution, the Global Location Code (GLC) is a high precision latitude and longitude geographic coordinate that uses a limited number of bits in GLC 119 of Fig. 11, in GLC 129 of Fig. 12, and in the GLC subpart of QCC 134 of encoder 16, and in the GLC subpart of QCC 146 of authenticator 17.
The global location code is based on a 20-bit longitude and a 20-bit latitude. Assuming an equatorial radius of 20,938,815 feet, and an equatorial circumference of 131,562,344 feet, the longitudinal feet per bit for a 20-bit longitude representation would be 125 feet; whereas a 9-bit representation would be 256,958 feet per bit.
Assuming a polar radius of 20,869,204.98 feet, and a polar half-circumference of 65,562,486 feet, the latitudinal feet per bit for a 20-bit representation would be 63 feet; whereas a 9-bit representation would be 512 feet per bit.
In terms of area, a 20x20-bit resolution would cover 7,845 square feet, and a 9x9-bit resolution would cover 1180 square miles. Therefore, in terms of value to law enforcement, a 20-bit longitude and latitude precision would be preferred over a 9 -bit version.
GLC and Aggregate Extended Data (AED): Aggregate Extended Data (AED) is extended data that is algorithmically combined from an aggregated group of similar RFID tags. This is a novel method of providing more detailed information than what is written onto a single tag. The limited amount of data that is written may be limited by the actual amount of memory storage space on an RFID tag or it may be by design to hide information from people that do not ordinarily have access to large populations of similarly tagged items, such as individual consumers. AED information is readily aggregated for example in distribution centers where cartons and inner packs are still intact. It is this latter example that provides for a convenient and more secure method for brand protection enforcement activities to aggregate data that reveals selected encoding information in greater detail with higher security.
Brand owners may opt to encode a variety of sensitive information and spread that information over a smaller or larger number of RFID tags in order to assist them in solving their particular supply chain or counterfeiting problems.
Making the GLC: one or more different types of spreading functions are used to spread shared data across multiple tags. The inverse of the function is used to reassemble the data collected from multiple tags and reconstruct the original data that is shared by the group of tags. One example of a simple spreading function is to use the lower 3- bits of the EPC serial number to spread one-eighth of the shared data across eight sequentially numbered EPC RFID tags for the same SKU (i.e. the same Global Trade Item Number or GTIN). Other preferred spreading functions use the UII data and run it through a hashing function to produce an n-bit digest that is then used to multiplex and demultiplex the shared data across 2n tags.
Fig. 11 is an example of a preferred embodiment whereby full -resolution global location information is spread across multiple RFID tags 70 by secure RFID tag encoder 16 using the AED-based GLC Transform 1 18 described herein. In Fig. 11 GPS Receiver 41 and/or Encoder Security Manager 112 load current location information into GLC Coordinate Transform 112a where minutes and degrees are converted into straight binary longitude and latitude. Those binary representations are binary coordinates 113 comprised of a full 20-bit representation each of longitude and latitude. Longitude 113a is the upper 9 bits and Xlong 113b is the lower 11 bits of longitude. Latitude 113c is the upper 9 bits and Xlat 113d is the lower 11 bits of latitude. Longitude 113a and Latitude 113c are copied into GLC 119. AED 119a is the result from multiplexor MUX 117. The control signals for MUX 117 are the fixed-length digest of secure hash function 115, the inputs of which are secret AED Key 116 and plaintext that is selected from EPC SGTIN 114 (or other publicly readable information on the RFID tag). The combination of EPC SGTIN 114, Secure Hash 115, AED Key 119a, and MUX 117 comprise a spreading function that uses selected data that is securely held inside Secure RFID Tag Encoder 16 and spreads it across multiple RFID tags.
Reassembling GLC Data: Fig. 12 is a preferred embodiment for reassembling GLC 129 fields from multiple RFID tags to reconstruct the full 20x20 bit resolution of the encoding origin of a population of similar RFID tags (i.e. tags from the same encoder for the same SKU on the same day, etc.).
GLC 129 is comprised of Longitude 123a, Latitude 123c, and AED 129a which are originally from their counterparts Longitude 113a, Latitude 113c, and AED 119a of Fig. 11.
EPC SGTIN 124 is a copy of the SGTIN that is being processed by authenticator 17. Secure Hash 125 is used with AED Key 126 to produce a digest that is used by Extended Data Aggregator 127 to organize GLC 129 readings from a population of RFID tags to create Extended Global Location 123 which is comprised of Longitude 123a, Xlong 123b, Latitude 123c, and Xlat 123d. This result is then displayed by Human Interface 56 and/or reported to Counterfeit Heuristics Engine 54.
QCC Encryption: for the preferred embodiments, the QCC-64, QCC-128, QCC-192, or another QCC implementation the preferred method of encryption is a block cipher with a block size that matches the amount of available User Memory (for embodiments that store Encrypted QCC 74a in User Memory 74). Preferred block cipher choices are: Blowfish for QCC 64, AES-128 for QCC 128, AES-192 for QCC 192, and AES-256 for QCC 256.
QCC encryption key selection is preferably managed through Encoder Security Manager 112, while QCC decryption is preferably managed through Authenticator Security Manager 142. Both are under the direct control of remotely located Authentication Database 68 and Counterfeit Heuristics Engine 64 through Anti-Counterfeit Encoder Sockets 61 and Anti-Counterfeit Authentication Sockets 62 over open Internet connections. Preferred embodiments use a hybrid of asymmetric and symmetric cryptographic keys during session establishment and secure updates of encoders 16 and authenticators 17.
Secure Tag Authentication Method: Fig. 17 is a preferred method 170 of authenticating RFID tags and by extension the goods that they are attached to. In the first step 171 goods arrive at a location such as a shipping dock, a border crossing, a warehouse, or a retail location.
In step 172a the goods are scanned for an RFID tag preferably using secure RFID tag authenticator 17. If one is not detected, then the package is visually inspected for Counterfeit (Warning) Label 22b imprinted onto sellable item 22a. If Counterfeit Label 22b is present, then the goods are counterfeit and are forwarded to step 172c for legal, forensics, and logistics handling. On the other hand, if there is no Counterfeit Label 22b, then the goods are suspect and forwarded to step 172d as Suspect Goods. In either case Authenticator Heuristics Engine 166 is updated with a record of the incidence and correlated with GPS coordinates from GPS receiver 51.
If there is an RFID tag then step 173 is executed wherein the tag is read. Tag ID 73a is first checked in step 174 against a list of RFID tags that are known to have a writeable TID memory bank 73 or alternatively having uniquely serialized TID numbers. Lacking that ability or any other standard memory location to use as an index to continually update the keys for decrypting Encrypted QCC 74a, in step 175 control skips step 176 to proceed at step 177 below with default Meta-Key Master Index value of zero.
Therefore EPC RFID tags that would otherwise be made vulnerable to counterfeiting by having a writeable TID, a writeable TID is used advantageously to provide a Meta-Key Master Index. For example, if there are 64-bits of writeable TID, then the lower 16- bits are preferably used to select from a table of up to 65,536 Meta-Key key groups.
In step 176 the writeable or uniquely serialized TID 73 is read to extract Meta-Key Master Index 73b.
In step 177 EPC SGTIN 72a is read and the upper (i.e. most significant) bits of the serial number of the SGTIN are merged with the Meta-Key Master Index to form Meta-Key Index 140c which is used in step 179 to fetch a Meta- Key from Meta-Key Table 140d. This structure provides for a remotely and locally controlled Meta-Key change mechanism to thwart counterfeiting.
Continuing on to Fig. 18, in step 182e RFID tag 70 is scanned for Encrypted QCC 74a. If a string of bits of the correct length for an Encrypted QCC is found and preferably has a certain minimum Hamming Weight, then the advanced tag authentication procedure 190 of Fig. 19 is used beginning at step 191a where Encrypted QCC 74a is read into secure RFID tag authenticator 17.
In step 191b Encrypted QCC 74a is decrypted by symmetric block cipher 141 of Figs. 14 and 16 using Meta-Key MKA 140e from Meta-Key Table 140d.
In step 191c the plaintext result of block cipher 141 is comprised of Cloaked QCC Payload 143 and CRC 143a. In the following step 19 Id Cloaked QCC Payload 143 is uncloaked using Uncloak Transform 144 and Cloak Code CCA 141b. Preferred cloaking transforms include XOR, bit shifting, byte shifting, and block rotation operations that have inverse counterparts.
In step 192a of Fig. 19 the CRC of Fig. 16 is computed by CRC Calculation 161 using Cloaked QCC Payload 143, EPC SGTIN 72a, and TID 73.
In step 192b CRC Validation 162 is performed by comparing the calculated CRC from CRC Calculation 161 with CRC 143a. If they do not match, then this may be an initial indication that a counterfeiter has attempted to clone a valid RFID tag 70 onto a data carrier that lacks the proper TID or a malformed QCC was used in a cloning effort; therefore the goods are suspect and process flow is diverted to step 192c.
If the CRC matched, then flow passes to step 194a where attention is focused on the function block diagram of Fig. 14 wherein Tag Physical Characteristics (TPC) filed of QCC 146 is read and subsequently transformed by TPC Transform 147a in step 194b. In preferred embodiments the transformation process is a 32 -bit cryptographic block transformation or another symmetric key process. It is well known that a 32-bit cipher is not suitable for high security applications. In the present invention, TPC Transform 147a is part of a comprehensive security system, and by itself does not expose any significant vulnerability. Preferred embodiments use Skip32 which is a 32-bit block cipher based on SKIPJACK.
TPC Transform 147a is the inverse of the 32-bit block cipher encryption process that is used by preferred RFID tag converter companies while preparing tag stock for secure RFID tag encoder 16. Therefore TPC Key 147b is shared between all tag converters and all secure RFID tag authenticators 17. TPC Key 147b is updatable through Authenticator Security Manager 142, but steps must be taken to synchronize key changes between all parties. A preferred embodiment (not shown) uses the DAY field of QCC 146 to synchronize TPC Key changes by selecting the key changes based on the DAY that each RFID tag 70 was encoded.
The plaintext result of TPC Transform 147a is two parts: TMA 147c and DCM 147d, two elements that are used to describe the physical characteristics of the data carrier and do not refer to the data that is stored in the data carrier. These elements were defined when the data carrier was manufactured by the tag converter and they are unchanged by secure RFID tag encoder 16.
In step 194c Tag Memory Architecture Authentication Function 149a is performed where Memory Footprint 70a of RFID tag 70 is compared with TMA 147c, step 194d. During this step, there is no secret information that is revealed by the tag reading process that could be advantageously used by a cryptographic adversary that may be 'snooping' a covert verification process. This is an important initial qualification step that can be performed in public, even in a crowded street market where illicit goods are sold. If the foot prints do not match, the goods are marked as suspect goods . If this is part of a covert surveillance scan in an open market, the immediate GP S 51 reading of secure RFID tag authenticator 17 is preferably recorded with this reading.
If the tag memory footprint was valid, then flow progresses to step 195a wherein radio key index RKI 145a is used to fetch a radio key from Radio Key Table 145b and in subsequent step 195b execute Radio Key Hash function 145c as shown in Fig. 14 to produce Radio Password result 149f that contains kill password 149f and access password 149h.
In step 195e access password 149h is sent to RFID tag 70 so that it will traverse to the secured state if it was a valid access password (if not valid it is flagged as a counterfeit in step 196c) and in step 196a will transfer flow to step 201a of Fig. 20 wherein the lock bits are cleared and then in step 202a the kill password 71a is read from reserved memory 71 and in step 202b it is compared with kill password 149f in Password Authentication Function 149i of Fig. 14. If the comparison does not match, as in step 202d, the tagged item is flagged as a suspect good. At which point, results can be sent to Password Authentication Heuristics 149j.
If in step 196a tag 70 did not traverse to the secured state, then it and the goods that tag 70 are attached to are deemed to be counterfeit and are rejected. If in step 202b described above the result is a mismatch between the stored and the computed kill passwords, then again the conclusion is that tag 70 and the associated goods are counterfeit and are rejected as may be instructed by Human Interface 56 of Fig. 5. These are screening steps that that are performed over the air, preferably under controlled conditions where there is not a danger of detection by cryptographic adversaries. Jammer 58b of Fig. 5 is preferably used with Interrogator 58a and antenna 58c in preferred embodiments in order to enhance security and reduce vulnerability to cryptographic attack when secure RFID tag authenticator 17 is used to perform these critical steps 195e through 202c in an uncontrolled space where electromagnetic waves can propagate to someone who is eavesdropping on the process.
In a preferred embodiment, a kiosk is used in a retail environment such as a store or a shopping mall where consumers can verify tagged items and observe quantitative results on a display panel of Human Interface 56 of secure RFID tag authenticator 17. In this embodiment wave propagation from antenna 58c is confined to the boundaries of a shielded Faraday cage into which a consumer places retail items for secure authentication.
A Secure Tag Authenticator embodiment can incorporate an imaging device 55 for documentation or authentication of physical, printed, or micro-features and for collecting, storing, and processing optical images as heuristic information. Network node 52b is used to periodically communicate with security server 10a and exchange important heuristics data on a global scale. Image data can be collected, especially to document counterfeit goods that do not have an authentic RFID tag.
In a controlled setting such as a customs inspection or a warehouse receiving process, Object Transport 59 of Fig. 5 is preferably used to automatically assist with the scanning of thousands of items per minute by moving goods through the RF field of Fig. 5 under controlled conditions.
In step 203a of Fig. 20 the goods are passed because tag 70 was determined by over-the-air verification methods to be authentic. In step 204a tag 70 is relocked and in step 204b tag 70 exits the secured state. Then in step 205a the goods are accepted as authentic.
Referring now back to Fig. 18, if at step 182e the result was that there was no Encrypted QCC in User Memory 74 of tag 70, then control will flow to step 183a where EPC SGTIN 72a is read then in step 183b it is hashed or a 64- bit portion of it is run through a 64 -bit Block Cipher using Direct-Key which is a cryptographic key that is maintained by Encoder Security Manager 112.
The converted result is used in step 183c to provide the 32-bit kill password and 32-bit access password. In step 183d Interrogator 48a is used to send that access password to tag 70 to transition it into the secured state.
If in step 184a it is determined that tag 70 is in the secured state, then control will flow to step 184b, otherwise tag 70 is deemed to be suspect at step 184c.
In step 184b tag 70 is unlocked and the kill password is read. If in step 185a it is determined that the kill password was incorrect, then control is diverted to step 185c where tag 70 and the associated goods are deemed to be counterfeit. Otherwise, if the kill password is correct, tag 70 and the goods are deemed to be authentic at step 185b. Tag 70 is then resecured.
Note that further testing can optionally be performed on a sample basis as shown in step 223 of Fig. 22 wherein printed, holographic, or micro-features are inspected.
Comprehensive Authentication Process: Fig. 22 there is a preferred method 220 of authenticating goods wherein there is a combination of over-the-air testing and up close inspection of tags and goods. In step 221 goods are for example received at a receiving dock. In step 222 the goods are subjected to over-the-air Radio Authentication using the steps disclosed in Figs. 17 through 16.
In step 223 certain goods are selected for up close inspection of printed, holographic, micro -scribed, micro- features, or human fingerprints 79a to determine authenticity. In preferred embodiments, DCM 147d is used to determine what features are expected to be present. DCM 147d is preferably used to reference a table or other secure document to authorized inspectors that specifies the feature details.
In preferred embodiments, the unique operator number is acquired from DCM 147d so that a fingerprint record can be accessed from Fingerprint Database 69 and preferably locally cached in Authenticator 17. Authenticator 17 contains Light Source 17b and Imager 17c to illuminate and read fingerprint 79a that was left in adhesive 79 when RFID tag 70 was manually applied to sellable item 22a in Manufacturing Plant or Distribution Point A 21. Light Source 17b preferably emits light in either the visible or the ultraviolet range of the light spectrum at such an angel to reveal the molded impressions from the ridges on the operator's finger. If there are oils, salt, or amino acids left adhered to adhesive 79, they will be highlighted by the UV light. In preferred embodiments photometric stereo imaging is used to accentuate the topographical components and remove the albedo variations in fingerprint 79a. In certain preferred embodiments, facestock 75 is clear so that fingerprint 79a can be seen by Imager 17c through facestock 75 with proper illumination from Light Source 17b. The image is then processed by Anti -Counterfeit Network Client 52a to produce an image or minutia that are compared to reference images of the designated operator that are stored in Fingerprint Database 69 in Security Server 10a. If there is a match, then tag 70 is authentic. If there is not a match, then the tag sample may be a clone of an authentic tag and is therefore counterfeit. This determination and response is further described in the following step 224.
In step 224 a determination is made as to whether the features are what they should be. If yes, heuristics receives a positive update in step 225, if not then the process diverts to step 226 where goods are deemed to be counterfeit and they are removed from the supply chain. Accordingly, in step 227 Authentication Database 57 and Counterfeit Heuristics Engine 54 are updated and reported through Anti-Counterfeit Network Client 52a running on Operating System 53 (all of Fig. 5) to Anti -Counterfeit Authentication Socket 62 and on to Authentication Database 68 and Counterfeit Heuristics Engine 64 of Security Server 10a all of Fig. 6. The process is done at step 228 and is repeated for additional items.
If in step 224 the features matched, then the goods are deemed authentic and the same databases and heuristics engines are updated with positive results that indicate an improved level of trust for the related SKU, encoder, and trading partner. The process of inspecting the current item is thus done in step 228.
Counterfeit Control Code (CCC) is the result of historical supply chain performance data that is interpreted by Counterfeit Heuristics Engine 54 of secure RFID tag authenticator 17 and Counterfeit Heuristics Engine 64 of Security Server 10a. Each SKU of each secure RFID tag encoder 16 preferably has an independently controllable CCC that resides in CCC Table 152a. Whenever a tag is encoded, CCC Table 152a is referenced for the current CCC and it is merged into QCC 134.
The purpose of the CCC is to assist analysts and trademark enforcers in conducting more efficient screening with RFID. Factors that affect the CCC include but are not limited to: (1) History of counterfeits found from a particular location; (2) History of counterfeits found from a particular encoder; (3) History of counterfeits found within a certain distribution network; (4) History of counterfeits found for a particular SKU or product category; (5) Irregularities found in remote monitoring of encoding activity; (6) Counterfeits of tag stock found that was originally sent to a tagging location; (7) Statistically high incidence of certain numbers that is indicative of someone having cracked or obtained a cryptographic key that is referenced by for example the same Meta-Key Master Index 73b or ranges of SGTIN serial numbers that occur with unusually high frequency.
The CCC is used to insert controlled changes in the QCC that can then be measured downstream throughout an entire distribution network. In one example, counterfeiters copy a QCC with the CCC at a first setting, and through closer analysis are found by brand enforcement officials to be counterfeit, then the CCC is changed on legitimate products to a different value and all 'real' goods bear a second CCC value. This change is then detected and red- flagged in the distribution channel and counterfeiters are soon tracked down.
Anti- Eavesdropping Jammer: a radio frequency signal jammer is used in preferred embodiments to prevent an eavesdropper from securing the RN16 random numbers or the access or kill passwords that are backscattered from a tag to an encoder's interrogator. The RN16 is fully described in the EPC air interface protocol specification and two of them are used for bitwise-XOR with the first and second halves respectively of the 32-bit access and kill passwords in order to hide them from eavesdroppers. This is an EPC tag security measure called cover coding that is used to hide the identity of the secret passwords as they are transmitted to the RFID tag that is being encoded or queried. The backscattered signal is tens of decibels below the carrier wave that is transmitted by the interrogator. This helps to reduce the signal to noise ratio of the signal that is available to the eavesdropper. The signal that is available to the eavesdropper that is listening outside of the enclosure is further reduced by metallic shielding and radio frequency energy absorbing materials. Creation of an actual Faraday cage would of course require very limited access to the tag encoding zone, possibly using a door that closes for encoding and opens for tag dispensing. Such a security mechanism would have to be tamper-proof to prevent an eavesdropper from defeating this electro-mechanical lockout.
Preferred embodiments of RFID tag encoders use near field coupling to communicate with a RFID tag, and a far field antenna for radiating a jamming signal into the air surrounding the RFID tag encoder. The near field coupler communicates with the tag primarily through magnetic fields that alter the impedance seen by the interrogator to bring the near field coupler into a closer impedance match with the interrogator's antenna port. The result is that the only time that the interrogator radiates efficiently is when an RFID tag is in close enough proximity to change the complex impedance of the near field coupler. This is similar to how a transformer operates whereby there is mutual impedance that alters the impedance of both coils (i.e. coils or loops in the interrogator's near field coupler and the RFID tag).
A far field antenna for the jammer preferably radiates much more electric field than it does magnetic field. The result is that the communications between the tag and the near field coupler are not appreciably affected, but observers at any distance outside of the covers of the RFID tag encoder are unable to separate the jamming signals from the low level backscatter signals from the tag. In preferred embodiments the interrogator is set to transmit at less than lOdBm, and often at 5dBm or less. This means that the backscattered signal from the RFID tag is substantially less than that, making detection difficult in the presence of an active jammer that is operating at the same or similar radio frequencies as the interrogator's carrier wave.
In one embodiment, a jamming signal is produced by allowing a separate frequency hopping signal be emitted from the jamming antenna. The signal may have modulated information on it that obfuscates the actual tag encoding and interrogation process. For example, the modulation may include simulation of interrogator commands and (weaker) backscattered tag responses. Care must be taken to not engage nearby tags in an actual dialog to prevent accidental programming or interrogation of any tags by the jammer.
In another embodiment, the interrogator's transmitted signals are routed from the output of the RF amplifier to the jamming antenna such that the carrier wave that is emitted to a tag while the tag is backscattering information is also radiated from the jamming antenna as an un-modulated carrier signal. The result for properly configured antennae is that the eavesdropper is unable to detect the modulated backscatter because the carrier wave signal is so much stronger when observed outside of the enclosure.
In yet a third preferred embodiment, the interrogator's transmitted signals are routed from the interrogator, through a modulator that simulates a low level backscatter modulation from an RFID tag and transmits that out on the jamming antenna. The simulated backscatter would be implemented whenever the tag is expected to emit a secret number (such as an RN16, an access password, or a kill password that is read from reserved memory), and uses a separate pseudorandom number generator to produce different RN-16 numbers that are modulated onto the carrier wave at a low modulation depth. The low modulation depth serves two purposes: (1) to simulate tag backscatter; and (2) to reduce the chance that the interrogator is confused by the simulated backscatter from the jamming antenna. A fourth jamming method takes advantage of the heterodyne of the interrogator and the interrogator's advantageous use of the pseudo-random hopping that is required by governmental regulatory authorities. It is nearly impossible for an eavesdropper to know what the frequency of the next hop, and is therefore required to scan for RF energy across the entire band of operation. In the U.S. the UHF band for RFID is 902-928 MHz, a span of 26Mhz that must be accepted by the eavesdropper. The interrogator in the RFID encoder has a receiver that needs to only cover the channel width which is typically 200KHz to 500KHz. This gives the interrogator a significant advantage by having a receiver that is responsive to signals in only small part of the entire band at any one time.
In some embodiments, the jamming antenna is physically positioned such that it does not significantly radiate onto the RFID tag. In some embodiments, the interrogation antenna and the jamming antenna are a single shared radiating structure. An advantage of using the same antenna for both interrogation and jamming is that the adversaries cannot defeat the jammer by disabling the jammer's antenna without also defeating the interrogator as well; thus the antenna tampering incentive is eliminated.
Different antenna arrangements and power levels are preferred for RFID tag encoding as are for RFID tag interrogation when used in covert RFID tag interrogations where there are dangers of detection by cryptographic adversaries. In a preferred embodiment, the heterodyne of an eavesdropper's receiver is detected and used to invoke appropriate countermeasures.
Long range verification can be performed on populations of RFID tags that have been encoded with the secure RFID encoder. At long range, the EPC SGTIN, QCC, Access Password, and Kill Password can be read and checked for data integrity and also checked against a database. Range can be enhanced by using narrow beam width antennae, high transmit power, and ultra sensitive receivers to observe suspected counterfeit goods at a safe distance. A narrow beam width antenna is also a high gain antenna, such as a helical or a dish antenna. When is there is sufficient suspicion of the goods to warrant a close visual inspection, the short range verifier is used on each selected item. A short range verifier is capable of inspecting a tag by reading the hidden printed features and reading data from the tag's chip and verifying that the two match.
The jamming antenna (whether or not it is implemented as a separate radiating structure) is used to simultaneously transmit a second signal in another in-band channel that is not necessarily the same channel as the interrogator is using to communicate with the RFID tag. As described above, the jamming signal preferably has a simulated backscatter data transmission modulated onto it. The result is that a part of the jamming signal will impinge upon the RFID tag and be backscattered slightly to where an eavesdropper can intercept it, however in a properly designed system, the real backscatter from the RFID tag will be significantly less than the simulated backscatter, making it all but impossible for an eavesdropper to detect the RN16's that are necessary to decrypt the passwords as they are subsequently sent to the RFID tag or the access and kill passwords that are read from a tag during a tag authentication process. The interrogator is not appreciably affected by the jamming signal since out-of-channel noise is rejected as required for dense-interrogator environments in the EPC air interface protocol specification. Signal separation of an interrogator's fake backscatter from the tag's real backscatter is also possible using advanced signal processing means to remove the known fake backscatter modulation from the incoming signal.
This novel design for hiding the RN16's that are used for cover-coding the passwords sent to the tag or the passwords that are read directly from the tag will prevent eavesdroppers from detecting secret passwords at either the tag encoding or the tag verification points in the supply chains where this invention is used for secure tag authentication. Highly Mobile Authenticator: preferred embodiment of Fig. 5 for a highly mobile authenticator uses a GPS- enabled smart phone to provide GPS 51, Anti-Counterfeit Network Client 52a, Operating System 53 (such as Embedded Linux or Android), Counterfeit Heuristics 54, Network Node 52b (as TCP/IP over a wireless carrier using GPRS, 3G, or 4G telecommunications), Authentication Database 57, a camera as Imaging Device 55, and Human Interface 56.
Bluetooth is preferably used to communicate over an authenticated and encrypted wireless connection to a battery- powered mobile RFID verification device that is preferably comprised of Interrogator 58a, Jammer 58b, and Antenna 58c. Cached copies of data are securely stored in protected memory of the battery-powered mobile RFID verification device in order to reduce the amount of secure data that would be exchanged across the Bluetooth link. In a preferred embodiment, Imager 17c is used to scan human fingerprint 79a that has been preserved in adhesive layer 79 of RFID tag 70. Fingerprint 79a is scanned and compared to the fingerprint information that is conveyed by the RFID tag or stored in Fingerprint Database 69. If fingerprint 79a matches the fingerprint that is on record in the RFID tag, then it is an authentic tag that was produced by a valid tag encoder 16 with a proper set of encryption keys that were used to encode the fingerprint information into RFID tag 70.
Object Transport 59 is in this embodiment not implemented as a conveyor but rather as hand, body, motorcycle, Segway Human Transporter, or moped motion to sweep past numerous tagged goods.
Method of Encoding Secure RFID Tags: Fig. 21 illustrates a preferred method 210 of securely identifying goods for shipment to another location. In step 211 goods are identified preferably using an error-proof means of identification, such as reading an object class bar code such as a UPC-A, UPC-E, EAN, a GTIN, or another similar symbol that uniquely identifies the class or type of an object that is to be tagged. Bar code symbols are preferably read from scanner 46 of Fig. 4 which may be built-in, tethered by a cable or a gooseneck, or electronically tethered through a wireless connection such as Bluetooth or Wi-Fi to Secure RFID tag encoder 16. For implementations on a conveyor belt under the control of object transport 49, scanner 46 may be upstream of the encoding antenna 48c in order to allow time for executing computations in step 212 below.
In step 212 all of the various types of information that is disclosed in this patent are compiled and presented in a coded numerical format that can be encoded into an RFID tag. Information is acquired from GPS 41 which may also provide updated date and time information to real time clock 151a and transformed by RTC Transform 151b into DAY and TIME fields of QCC 134, and also preferably encrypted TPC 74b information that was written into a memory bank by a tag converter. The entire information set may include, but is not limited to the current location, date, time, tag memory architecture, Encoder Number 150, TPC, Counterfeit Control Code (CCC), radio key index RKI, EPC SGTIN 72a, tag ID 73a, Meta-Key Master Index 73b, kill password 71a , access password 71b, and a cyclical redundancy check CRC. As an optional step, spreading function 118 may be utilized to spread more detailed information into a population of RFID tags 70.
Referring to Fig. 15, once the entire QCC 134 data fields are all loaded (except for CRC) the image is cloaked by Cloak Transform 154a using Cloak Key CCE 154b that is generated by Cloak Code Table 131a. The resulting
Cloaked QCC Payload 155a, EPC SGTIN 124, and TID 73 are all used by CRC Calculation 155d to produce CRC 156b which is merged with Cloaked QCC Payload 155a to produce merged result 'Cloaked QCC Payload and CRC 156a. That result is then put into Block Cipher 157a using Meta-Key 157b to produce encrypted result Encrypted QCC 158. In step 213 Encrypted QCC 158, Writeable part of TID, and EPC SGTIN 124 are all encoded into RFID tag 70 using a sequence of programming and verification steps. Information is written into each writeable memory bank of RFID chip 76.
The process is repeated from steps 212 until all tags are programmed and tagged, at which point control flows to step 215 wherein goods are shipped. This step optionally includes reporting of tagged goods to the recipient in the form of an advance ship notice or a similar record of transfer. In step 216 the process is done.
Global System: referring to Fig. 1 there is a further embodiment of secure, global system of RFID tag encoders and retailers (including military organizations that for the purposes of this disclosure consume and distribute goods to people in ways that are similar to retail organizations). Central to the global system of RFID tag encoders is Tag Management Server 10a
Tag Management Server 10a preferably hosts a database that contains all of the SKU's that are under the care of Tagging System 10. Tag Management Server 10a is a trusted source of data for Tagging System 10. The database preferably contains a record for each 14-digit GTIN (Global Trade Item Number) at each packaging level that is defined for that GTIN. Each GTIN record preferably contains a child record for each block of serial numbers that is assigned to an encoder. Each child record preferably contains information about one batch or group of same-
GTIN RFID tags: (1) A globally consistent and unique encoder number. Each Encoder is preferably specified by a GS1 asset identifier, SGTIN, or general identifier GID-96. A GID-96 General Manager Number is preferably assigned to the manufacturer of the RFID tag encoder. The GID-96 Object Class would be the model number of the tag encoder, and the Serial Number field would be uniquely numbered with the serial number of the tag encoder. This method of numbering each and every RFID tag encoder in a uniform manner assures that consistent and unique numbers are assigned to each RFID tag encoder, regardless of what GS1 member company manufactured it. (2) The starting serial number for the given GTIN batch. (3) The number of tags in the current batch (how many tags are authorized for encoding) starting with the specified serial number. (4) Optionally include the current date. (5) Optionally include an 'encode by' date.
Management Stations 11a and 12a are representative of multiple management stations that are preferably connected to Tag Management Server 10a through secure Internet connections that use crypto graphically secure protocols that are well known to those skilled in the art. Each Management Station is required to authenticate itself to Tag Management Server 10a at the beginning of any communications session in order to exchange data with that trusted source and repository of system data.
Tag Management Server 10a preferably implements database security systems, processes, and procedures that protect Tag Management Server 10a from unintended activity. Unintended activity includes authenticated misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Tag Management Server 10a is preferably protected from rogue external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network. Additional network security devices that detect and alert on malicious database protocol traffic include network intrusion detection systems along with host-based intrusion detection systems. Tag Management Server 10a preferably has many layers and types of information security, including: Access control, Auditing, Authentication, Encryption, and Integrity controls.
Management Stations 11a and 12a each have Token Interface l ib and 12b respectively that communicate tagging information to and from Secure Encoder 16 through Token Interface 16b. Token Interface preferably includes a range of wired, wireless, or physical token devices 13 that are used to pass information between management stations and secure encoders. Wired connections include networks and telephone lines. Wireless connections include WiFi (802.11) and cellular phone networks that carry GPRS and 3G cellular data communications.
Physical tokens include silicon devices of various types which are preferably hardened for industrial applications including durable RFID tags, ButtonMemory devices from MacSema of Bend, Oregon, and iButton products from Maxim Integrated Products, Inc. of Sunnyvale, California. iButton 13 uses its stainless steel 'can' as an electronic communications interface. Each can has a data contact, called the 'lid', and a ground contact, called the 'base'. Each of these contacts is connected to the silicon chip inside. The lid is the top of the can; the base forms the sides and the bottom of the can and includes a flange to simplify attaching the button to just about anything. The two contacts are separated by a polypropylene grommet. By simply touching the iButton to two reader contacts an operator can communicate with it through Maxim's 1 -Wire protocol. The 1 -Wire interface has two communication speeds: standard mode at 16kbps, and overdrive mode at 142kbps. Each iButton 13 has a unique and unalterable address laser etched onto its chip inside the can. The address can be used as a key or identifier for each iButton. A preferred device is the DS1996L-F5 which offers 64K bits of read/write non- volatile memory.
Whether the token is a physical token such as the iButton or a wired or wireless communications channel, there is no need for continuous communication connections between encoders and management stations. Information is passed using cryptographically secure continuous or intermittent connections. The information that passes from the management station to the encoders preferably includes: (1) Management Station Number (preferably as a GID- 96); (2) Encoder number (preferably as a GID-96); (3) GTIN (preferably the full 14 digit GTIN); (4) Starting serial number; (5) Batch size (or ending serial number); (6) Confirmation of successful upload of data to tag management server; (7) Filter Value; (7) Partition Value; (8) Authorization Date; (9) Encode By Date; (9) Cryptographic keys that are associated with Fixed-Password Table 93; (10) Cryptographic keys that are associated with Meta-Key Table 103.
Information that is returned from encoders to the management stations preferably includes: (1) Encoder number (preferably as a GID-96); (2) GTIN (preferably the full 14 digit GTIN); (3) Starting serial number; (4) Ending serial number; (5) Filter Value; (6) Partition Value; (7) Current date; (8) Current time; (9) Last known GPS location; (10) Encoder status; (11) Encoder hardware version; (12) Encoder firmware version; (13) Encoder interrogator hardware version; (14) Encoder interrogator firmware version; (15) Security violations; (16) Environmental data log associated with each serial number .
In preferred embodiments, records are segmented by time to report information at regular intervals such as hourly updates. Such updates are stored and forwarded when a communications channel becomes available or when a physical token is updated for transit back to a management station.
Secure Encoder 16 preferably operates in either of two modes: applicator and batch. Applicator mode is for encoding and applying RFID tags in real time, batch mode is for encoding a roll of RFID tags for use in a secondary process. One such secondary process is to encode UII information onto each batch-encoded tag that is initially encoded with Access and Kill passwords on Secure Encoder 16. Another secondary process is to hand- apply RFID tags or use a legacy label applicator to apply tags to sellable items or other objects.
In either Applicator or Batch mode, Secure RFID Encoder 16 is used to sequentially number groups of tags, with sequentially numbered serial numbers that share the same GTIN at the same packaging level, filter value, and partition value.
Secure Encoder 16 stores in secure memory the cryptographic keys that are associated with Fixed -Password Table 93 for RFID tags that are pre-encoded with Access Password 96b and Kill Password 96c; and cryptographic keys that are associated with Meta-Key Table 103 for RFID tags that are encoded with Access Password 106b, Kill Password 106c, User Memory SI 74c, User Memory S2 74d, and EPC SGTIN 72a all at nominally the same time and place. In either case, User Memory S 1 74c is preferably encoded with a header that identifies the data type and structure and a key selector index that selects which cryptographic key is used with the applicable RFID Tag 70.
It is therefore through a comprehensive set of secure data transfers that the same set of cryptographic keys are shared among Tag Management Server 10a, Tag Management Station 11a and 12a, Secure Encoder 16, and secure RFID Reader 17. In a preferred embodiment, RFID Reader 17 is a mobile terminal or smart phone device. The secure data transfers assure that each RFID Tag 70 moving from Secure Tag Encoder 16 or Tag Encoder 14a to RFID Reader 17 can be successfully queried for audit information, flipped to an encrypted identity, unflipped to a publicly decodable identity, or killed.
In certain preferred embodiments, goods arrive into a retail store or a military depot with a publicly decodable EPC UII. At some point thereafter the identity is preferably flipped to the encrypted version of the EPC UII. The flipping process is in certain preferred embodiments conducted as part of another business process, such as stocking the shelves of a retail store, during customer checkout, shipment to a customer to fulfill a catalog or Internet order, or loading the cargo bed of a military vehicle. Fixed, portal, mobile, wearable, and handheld RFID readers are all preferred embodiments for RFID Reader 17 that contains the secure EPC Flip 17a functionality.
A preferred mode of operation of RFID Reader 17 is to conduct inventory reads of large populations of EPC RFID tags. During that process tags that have been flipped (i.e. converted to the encrypted version) can also be included in the inventory count. Since the filter value is distinctly different (as described in the following few pages), RFID Reader 17 can efficiently determine which tags have been flipped and which have not. When reading tags that have been flipped to an encrypted form, the EPC identifier may be decrypted without saving the decrypted (i.e. unflipped) version back to the tag.
In a two-step encoding method, Tag Encoder 14a encodes RFID Tag 14b that was previously encoded with Access Password 96b and Kill Password 96c as shown in Fig. 9 and is more fully described below. Tagging System 10 therefore includes a number of Tag Encoders that do not have secure tag encoding means, but can be used to encode EPC UII information for use in Retail Store 19. In certain preferred embodiments, unsecured Tag Encoder 14a is not afforded the passwords and methods to generate and send Access Password 96b to unlock the EPC memory bank of RFID Tag 14b so that the EPC can be programmed. Therefore, in the process described here, it is presumed that those lock bits remain in the unlocked state, just as they are for most applications in use today. The RFID Tag 90a of Fig. 9, pre-encoded with EPC Memory 90d, preferably has a User Memory bank 74c to contain header information and key selector bits that are used by Fixed-Key Indexer 92. TID 90b is preferably hashed by TID Hash 91 over the total number of available TID bits which usually ranges from 32 to 64 bits. The resulting hash digest is used in conjunction with any available key selection bits in User Memory 74c, if present to create an index in Fixed-Key Indexer 92. The index is used to select a single Password Key 96a from Fixed Password Table 93. In the event that there is no User Memory 74c available, as indicated by the capabilities associated with TID 90b or by trial and error by testing for User Memory 74c, the preferred fallback is to use fixed tag selector bit combination, such as all zeroes or some fixed pseudorandom number. This then accounts for the case of an unsecured tag encoder and RFID tags that have no User Memory but have non -fixed Access and Kill Passwords 96a.
The worst case situation is Tag Encoder 18a that encodes RFID Tag 18b with static Access and Kill passwords, including zero-valued Access and Kill passwords. In such cases, Retail Store 19 and/or RFID Reader 17 must access a database of EPC numbers in order to determine what the Access and Kill passwords are for EPC Flip 17a to perform its intended function.
RFID Reader 17 can preferably read RFID tags from any category of RFID Tag Encoder 14a or 18a, or Secure Encoder 16. The Access Password is preferably in each case calculable through any of the following methods: (1) Fixed Passwords, including password 00000000H; (2) Pre -Encoded Passwords 96a of Fig.; and (3)
Cryptographically Formulated Passwords 106a.
RFID Reader 17 preferably determines the appropriate method for determining the Access and Kill Passwords 96a or 106a by attempting to read a header that is preferably stored in User Memory SI 74c or another memory partition such as the extended portion of a large EPC Bank 01. If such a header is present, it provides a specification of the method that RFID Reader 17 must use to acquire or formulate the passwords, generally as either a fixed password, a password acquired from a table as shown in Fig. 9, or passwords that are formulated according to Fig. 10. A header of this type described here and throughout this disclosure is referred to as a password specification header. In a preferred embodiment where extended EPC Bank 01 memory can be used and read in a single fast operation a 240-bit Bank 01 is preferably configured to hold for example an SGTIN-96, SGTIN- 198, SGLN-195, GRAI-170, GIAI-202 or some other UII with bits left over for a password specification header and certain cryptographic key index components. The advantage is that User Memory Bank 11 would not be required for key management and if present could be used for other purposes, including an Encrypted QCC 74a.
RFID Reader 17 in Retail Store 19 (or a military logistics center or a forward battle position) preferably uses EPC Flip 17a which is a combination of RFID hardware and specialized firmware operating in a secure manner, preferably in accordance with FIPS 140-2 to flip, unflip, or alter the UII primary identifying information of RFID Tag 70 in EPC/UII Memory 72 into an altered identity. The alteration is based upon steps that access a changeable set of cryptographic keys that are locally stored in RFID Reader 17.
The operation of EPC Flip 17a is to flip the primary identifying information of EPC SGTIN 72a of Fig. 24 that is stored in EPC Memory Bank 72 of RFID Tag 70 into an altered identity. GS1 Key 240a is a header that identifies the GS 1 Key Type as an SGTIN-96 identifier and must remain at that value so that the altered identity of Tag 70 can be processed by existing RFID readers and is directly copied into the same bit locations of Encrypted SGTIN 244. The filter value FV 240b must be the value 001 for 'Retail Consumer Trade Item' for this preferred embodiment. If it is not, then alternative operations must be employed to handle other values such that FV will be properly reconstructed during a deciphering operation. In this embodiment for an altered identity, FV is set to 000 b for 'All Others' in Encrypted SGTIN 244. According to EPCglobal Tag Data Standards Version 1.4 a filter value of 000 b means that the object to which the tag is affixed does not match any of the logistic types defined as other filter values in this specification. It should be noted that tags conforming to earlier versions of this specification, in which 000 b was the only value approved for use, will have filter value equal to 000 b, but following the ratification of this standard, the filter value should be set to match the object to which the tag is affixed, and use 000 b only if the filter value for such object does not exist in the specification. Since an encrypted EPC altered identity for an item-level object does not exist in the specification, then 000 must be used. An RFID tag with an alternate identity therefore has a filter value of 000b in certain preferred embodiments in order to identify itself as having non- publicly decodable UII information.
An RFID transponder's primary identifying information is comprised of EPC SGTIN 72a (or some other UII), at the core of which are four fields: Partition value PV 240c, Company Prefix CP 240d, Indicator Digit and Item Reference IR 240e, and the upper 17 bits of the serial number designated in Fig. 24 as SN-1 240f. In one embodiment these are combined into a 64 -bit vector with additional bitsSN-2 240g and SN-3 240h that are separately encrypted and decrypted as described herein. That vector is encrypted by Block Cipher 242 which is preferably a symmetric block cipher with both encryption and decryption counterpart operations. Although 96-bit EPC and UII identifiers are the most common forms now, some newer tags have 240-bits or more of EPC memory in Bank 01. Therefore those skilled in the art can appreciate how Block Cipher 242 and 246 can be extended to larger bit lengths such as 128 or 256 bits as long as there are enough bits in the tag to store the entire result of the cryptographic result. This is essential since the flipping process to an altered identity is reversible and all bits must be written to the transponder in either the flipped altered identity or unflipped primary identifying information states. The size of the block cipher and the number of additional bits (such as SN-2 240g and SN-3 240h) can be changed or rearranged without departing from the scope and spirit of the present invention.
There are several ciphers, stream and block, of various block sizes that could be used. Preferred embodiments use 64-bit block ciphers. 80-bit, 96-bit, 128-bit and longer block sizes could be used with alternate embodiments. Preferred embodiments use 64 -bit block sizes and the XXTEA block cipher. It was designed by David Wheeler and Roger Needham of the Cambridge Computer Laboratory; it was first presented at the Fast Software
Encryption workshop in Leuven in 1994, and first published in the proceedings of that workshop. The cipher is not subject to any patents. XXTEA is a block cipher that was designed to correct weaknesses in the original Block
TEA (Tiny Encryption Algorithm). TEA operates on 64-bit blocks and uses a 128-bit key. It has a Feistel structure with a suggested 64 rounds, typically implemented in pairs termed cycles. It has an extremely simple key schedule, mixing all of the key material in exactly the same way for each cycle. Different multiples of a magic constant are used to prevent simple attacks based on the symmetry of the rounds. The magic constant, 2654435769 or 9E3779B916 is chosen to be 232/ φ, where φ is the golden ratio. XXTEA is a consistent incomplete source -heavy heterogeneous UFN (unbalanced Feistel network) block cipher. XXTEA operates on variable-length blocks that are some arbitrary multiple of 32 bits in size (minimum 64 bits). The number of full cycles depends on the block size, but there are at least six (rising to 32 for small block sizes). The original Block TEA applies the XTEA round function to each word in the block and combines it additively with its leftmost neighbor. Slow diffusion rate of the decryption process was immediately exploited to break the cipher. Corrected Block TEA uses a more involved round function which makes use of both immediate neighbors in processing each word in the block. If the block size is equal to the entire message, as is the case in the present invention, XXTEA has the property that it does not need a mode of operation: the cipher can be directly applied to encrypt the entire message.
The result of Block Cipher 242 is the encrypted ESGTIN 244 which is an altered identity of the primary identifying information of SGTIN 72a. The 128-bit cryptographic key Kl is selected from Key Table 243a using the 8-bit digest of Hash-8 241c. In a preferred embodiment, the inputs of Hash-8 241c are TID 241a and SN-3 240h. In another preferred embodiment, some or all of the SN-3 240h bits bypass Hash-8 241c to have a direct selection affect of keys in Key-Table 243a and in so doing provide for a progressively updatable table of keys. If the bypassed SN-3 240h bits are in addition to the 8 bit digest from Hash-8 241c, then a larger table can be implemented, for example 10 bits would result in a 1024 128-bit key table instead of the 256 key table shown in Fig. 24.
Hash functions Hash-8 241c, Hash-8 243f, and Hash- 13 243c for example are deterministic procedures that take a block of data and return a fixed-size bit string, the hash value. For hash values of less than 16 bits, it is difficult to claim any real cryptographic qualities. In fact, anything with an output of less than 128 bits does not provide much cryptographic strength. Therefore, the hash functions Hash-8 241c, Hash-8 243f, Hash- 13 243c, Hash-8 245c, Hash-8 245d, and Hash- 13 247c for example preferably use a computationally efficient algorithm such as a Fletcher checksum or other hash function. The 8-bit Fletcher checksum algorithm is documented in RFCl 146. The 8-bit Fletcher Checksum Algorithm is calculated over a sequence of data octets (call them D[l] through D[N]) by maintaining 2 unsigned l's complement 8-bit accumulators A and B whose contents are initially zero, and performing the following loop where i ranges from 1 to N: {A := A + D[i]; B := B + A}
It can be shown that at the end of the loop A will contain the 8 -bit l's complement sum of all octets in the datagram, and that B will contain (N)D[1] + (N-1)D[2] + ... + D[N]. The value B is preferably used as the hash value output.
Initialization vectors IV-8 241b, IV- 13 243b, IV-8 245b, and 247b are preferably used to preload the value A above with a non-zero value in order to change the final result and to obfuscate the overall operation. Initialization values IV-8 241b, IV-13 243b, IV-8 245b, and 247b are in preferred embodiments stored in a different location and manner than the random numbers that comprise the cryptographic keys of Key Table 243a and 247a.
Block Cipher 246 is used to decrypt the core of the altered identity ESGTIN 244 and revert it back into primary identifying information core fields PV 248c, CP 248d, IR 248e, and SN-1 248f to the standard bit positions of an SGTIN. This is in contrast to the encrypted altered identity form of ESGTIN 244 wherein the bit order is altered, and is in the preferred embodiment aligned onto byte boundaries.
SN-2 240g and SN-3 240h are both separately XOR'd to cover their identity. The discovery of these bit values by a cryptographic adversary has very limited value, especially without knowledge of the base product that they serialize. Therefore, those lower serial number bits do not warrant strong cryptography for most operating environments. However, for extreme conditions, an overlapping Block Cipher-64 is used to cover these remaining bits and to include some of the bits that are output from Block Cipher 242. XOR 243d uses a 13 -bit hash value from Hash-13 243c which uses initialization vector IV-13 243b and a 128-bit key K2 from Key Table 243a. Key K2 is preferably at some fixed offset from Kl , and may be for example the next or previous key in Key Table
243a. XOR 247d reverses the result using K2 from Key Table 247a and IV-13 247b to uncover SN-2 to create SN- 2 248g.
SN-3 240h is used as an input to Hash-8 241c. XOR 243e must therefore be followed by XOR 245e before being used as an input to Hash-8 245d. This is done by running Hash-8 245c using TID 245a and IV-245b as fixed inputs, and using them again with the uncovered SN-3 248h at Hash-8 245d to compute a key index into Key Table 247a. In another preferred embodiment, some or all of the SN-3 248h bits bypass Hash-8 245d to have a direct selection affect of keys in Key-Table 247a and in so doing provide for a progressively updatable table of keys. If the bypassed SN-3 248h bits are in addition to the 8 bit digest from Hash-8 245d, then a larger table can be implemented, for example 10 bits would result in a 1024 128-bit key table instead of the 256 key table shown in Fig. 24.
The resulting key Kl is used with Block Cipher 246 for decryption of the 64-bit SGTIN core identity. Once FV 248c is restored to the original value of 001 the entire SGTIN-96 is therefore reconstructed.
Referring now to the flowchart of Fig. 23 there is a preferred method of processing any of four fundamental EPC RFID Tag 70 functions: (1) Encrypting the SGTIN (i.e. 'Flipping' the identity); (2) Decrypting the encrypted SGTIN (i.e. 'Unflipping the identity); (3) Decrypting tag encoding audit information; and (4) Killing the tag.
Two of the functions (i.e. flipping and unflipping EPC SGTIN 72a) involve changing the state of EPC/UII Memory 72. In preferred embodiments EPC UII Memory 72 is locked to prevent tampering by unauthorized interrogators. In order to transition Tag 70 to the secured state and unlock the lock bits that protect EPC/UII Memory 72, the subroutine steps 235a through 235f must be followed, and then control must return to the step that this flow chart subroutine was called from. Access Subroutine 235 begins at step 235a where TID 100b is hashed by TID Hash 101 as shown in Fig. 10, and the hash digest is appended with User Memory SI 74c at Meta-Key Indexer 102 in step 235b. The purpose is to provide a way of centrally changing the cryptographic keys under the control of Tag Management Server 10a by altering the value of User Memory S 1 74c.
At step 235c the hash digest is used as an index into Meta-Key Table 103 to produce Meta-Key MK2 which is used in step 235d to decrypt Lower EPC lOOe to construct Formulated Passwords 106a.
At step 235e Access Password 106b is sent to Tag 70 and causes it to transition to secured state upon receiving a valid access command and Access Password 106b, maintaining the same handle that it previously backscattered when it transitioned from the acknowledged to the open state. Tags in the secured state can execute all access commands.
At step 235f the lock command and lock command payload are sent to Tag 70. If Tag 70 permalock bits have not been previously set, then Tag 70 will unlock the requested memory bank, including EPC UII Memory 72 and backscatter the handle of Tag 70 and the corresponding CRC-16 within 20ms. Access Subroutine 235 is concluded and flow returns to the step that it was called from.
The process begins at step 230a where an EPC RFID tag is read by an RFID interrogator, preferably including
EPC, TID, and User Memory. The first branch at step 230b is made if the required operation is to kill Tag 70. The tag kill function begins at step 233a where the TID is hashed as shown in block 101 of Fig. 10. In step 233b, Section 1 of User Memory Bank 74a (if present in Tag 70) is User Memory SI 74c and is appended (if present, otherwise a default value is used) to the result of the hash to become an index value in step 233c.
For step 233d, if Tag 70 was pre-encoded as determined by a header value in User Memory SI 74c of Fig. 9 or Fig. 10, then Kill Password 96c is obtained from Fixed-Password Table 93 at a location determined by the index value at Fixed-Key Indexer 92 in Fig. 9. If Tag 70 was not pre-encoded, as represented by Tag 100a in Fig. 10, then Meta-Key Indexer 102 is used in Fig. 10 to point to a key MK2 in Meta-Key Table 103. Key MK2 is used with Block Cipher 105 to formulate Kill Password 106c using the hash digest of EPC Hash 104, which is fed by the lower 85 bits of EPC SGTIN 1 OOe.
In step 233e the RFID interrogator sends the Kill password to Tag 70 using a 16-bit handle to identify the proper tag, whereupon Tag 70 returns the 16-bit handle and a 16-bit CRC to confirm that it has been killed. Tag 70 then transitions to the Killed state and ceases to respond to interrogations. Immediately after this reply the Tag shall render itself silent and shall not respond to an Interrogator thereafter. If the Interrogator observes this reply within 20 ms then the Kill completed successfully.
Returning our attention again to step 230b, if the required operation was not to kill Tag 70, then control flows to step 230c. If the required operation is to flip the identity of Tag 70 from a publicly viewable EPC SGTIN to an encrypted version of the STGIN, then the branch is made to step 230g. In that step the current state of Tag 70 is assessed by examining the filter value bits FV 240b of EPC SGTIN 72a. If those three bits are 000b then Tag 70 has already been flipped, and the operation is aborted by branching to the Done state from step 230g. If Tag 70 has not yet been flipped, then control flows to step 234a.
In step 234a Access Subroutine 235 is called and executed as described above. This results in Tag 70 transitioning to the secured state and EPC/UII Memory 72 being unlocked for writing, if it was not already in the unlocked state. Flow returns to this step. In step 234b TID 241a, SN-3 240h, and initialization vector 241b are hashed by Hash-8 241c in Fig. 24 using as many TID bits as are available from the RFID chip manufacturer as defined in the EPCglobal Class 1 Generation 2 Protocol VI.0.9 paragraph 6.3.2.1.
In step 234c, the hash digest of step 234b is used as an index into Key Table 243a to obtain key Kl from Key Table 243a. In step 234d Kl is used as a 128-bit key in Block Cipher 242, using PV 240c, CP 240d, IR 240e, and SN-1 240f to produce the 64 -bit ESGTIN result in 244. Block Cipher 242 is preferably an unpatented, public domain, bidirectional, strong 64 -bit block cipher such as XXTEA by David Wheeler and Roger Needham.
In this preferred embodiment, there are 13 additional bits that need to be flipped; these are 13 bits in the central part of the SGTIN serial number field that is herein referred to as bit group SN-2 240g. In step 234e Hash- 13 243c is preferably used on key K2 of Key Table 243a and initialization vector IV- 13 243b. The hash digest is in step
234f used at XOR 243d to selectively flip the bits of SN-2 240g and place the result in a different and non-intuitive manner within the resulting encrypted ESGTIN 244, the exact structure of which is not fully disclosed herein for security reasons. Various bit mappings of encrypted ESGTIN 244 are preferred bit mappings without departing from the intent and spirit of the present invention.
In step 234g TID 241a is hashed by Hash-8 243f, the digest of which is used at XOR 243e to flip least significant serial number bits SN-3 240h in step 234h. Step 234i is to clear FV 240b bits to 000b and to store everything in encrypted ESGTIN 244 in EPC/UII Memory 72 of Tag 70. EPC UII Memory 72 bank of Tag 70 is then preferably locked and Tag 70 is preferably commanded to exit the secured state. The flip function is then done.
Returning our attention again to step 230b, if the required operation was not to flip Tag 70, then control flows to step 230d. If the required operation was to unflip Tag 70 (i.e. decrypt it), then control flows to step 230f where FV 240c filter value bits are checked for the value 000b. If they are 000b, then Tag 70 has been flipped and control flows to step 23 la, otherwise it ships to step 23 lk.
At step 23 la TID 245a, initialization vector IV-8 245b are hashed by Hash-8 245c and used by XOR 245e in step 23 lb to unflip SN-3 of encrypted ESGTIN 244. The result is stored in SN-3 248h and used in step 23 lc in Hash-8 245d to create a key index for Key Table 247a in step 231 d. Key K 1 is used in step 231 e by Block Cipher 246 to reconstruct PV 248c, CP 248d, IR 248e, and SN-1 248f as shown in Fig. 24.
In step 231 f Hash- 13 247c uses initialization vector IV- 13 247b and key K2 from Key Table 247a which is preferably at a fixed offset from Kl within Key Table 247a. The 13-bit hash digest is used to unflip SN-2 to reconstruct SN-2 248g in step 231 g. In step 23 lh, filter value bits FV 248b are restored to 001 b.
In step 23 li Access Subroutine 235 is called and executed as described above if Tag 70 is to retain the unflipped version of EPC SGTIN 72a. As described above, in certain operations such as store inventory, large populations of RFID tags are read, both flipped and unflipped. The business process may or may not involve saving the unflipped version of the encrypted EPC in Tag 70, but instead just using that information as part of the inventory process.
If Tag 70 is to be modified, then upon return to this step, reconstructed EPC bit fields SGTIN 248a through 248h are stored in Tag 70 as EPC SGTIN 72a. EPC/UII Memory 72 bank of Tag 70 is then preferably locked.
At step 23 lk it is determined if Tag 70 audit information is also to be extracted, in which case control flows to step 232a, otherwise this unflip function is done. This logical path is shared in the case of the required operation at step 230e was the audit function. If so, control would have flowed as before to step 230f to determine if Tag 70 had previously been flipped, and needed to be unflipped in order to recover audit information. In step 232a TID 100b is hashed by TID Hash 101 as shown in Fig. 10, and the hash digest is appended with User Memory SI 74c at Meta-Key Indexer 102 in step 232b. The purpose is to provide a way of centrally changing the cryptographic keys under the control of Tag Management Server 10a by altering the value of User Memory SI 74c.
At step 232c the hash digest is used as an index into Meta-Key Table 103 to produce Meta-Key MK1 which is used with block cipher 105 in step 232d to decrypt User Memory S2 74d to reconstruct the decrypted User Memory S2 108 which contains tag audit information.
ADVANTAGEOUS EFFECTS
The result is a fast, low cost, system of interconnected security points that act upon low cost EPC Gen2 RFID transponders, both tags and inlays. By not requiring each RFID transponder to contain a cryptographic engine, the result is the lowest possible cost secure transponder that cannot be copied and that consumes the least amount of energy, and therefore results in maximum operating range for a passive transponder. The system and devices are forward compatible with future versions of EPCglobal and ISO-compliant transponders since the present invention uses transponder resources that are part of the core requirements for Gen2 compliance.
DESCRIPTION OF DRAWINGS
Fig. 1 is a drawing of the system according to one embodiment of the present invention.
Fig. 2 is a drawing of the system according to one embodiment of the present invention.
Fig. 3 is a drawing of the supply chain macro environment.
Fig. 4 is a drawing of a secure RFID tag encoder according to one embodiment of the present invention.
Fig. 5 is a drawing of a secure RFID tag authenticator according to an embodiment of the invention.
Fig. 6 is a drawing of a security server according to one embodiment of the present invention.
Fig. 7 is a drawing of a secured RFID tag according to one embodiment of the present invention.
Fig. 8 is a drawing of an RFID tag according to one embodiment of the present invention.
Fig. 9 is a drawing of a RFID Tag Password Pre-Encoding process.
Fig. 10 is a drawing of a secure RFID tag encryption and decryption process.
Fig. 11 is a drawing of a GPS coordinates compression and data spreading apparatus.
Fig. 12 is a drawing of a GPS coordinate aggregation and reconstruction apparatus.
Fig. 13 is a drawing of a password and QCC generation apparatus for a secure RFID tag encoder. Fig. 14 is a drawing of a password and QCC decoding apparatus for a secure RFID tag authenticator.
Fig. 15 is a drawing of a QCC encryption apparatus for a secure RFID tag encoder.
Fig. 16 is a drawing of a QCC decryption apparatus for a secure RFID tag authenticator.
Fig. 17 is a Meta-Key Master Index flow chart according to one embodiment of the present invention.
Fig. 18 is a fixed key password verification flow chart according to one embodiment of the invention. Fig. 19 is a drawing of comprehensive item authentication flow.
Fig. 20 is a final confirmation of authenticity flow chart according to an embodiment of the invention.
Fig. 21 is a secure tagging flow chart according to one embodiment of the present invention.
Fig. 22 is a total authentication flow chart according to one embodiment of the present invention.
Fig. 23 is a drawing of a secure RFID tag processing method.
Fig. 24 is a drawing of the cryptographic encoding and decoding. BEST MODE
The best mode of the present invention is the mode that best solves the problems that a customer needs to solve. The present invention includes many possible modes. The best mode for a lightweight cryptographically secured transponder is to encrypt the Access and Kill passwords for authentication by secure RFID readers that are downstream in a supply chain. The best mode for a highly secure transponder additionally uses security modes that incorporate physical marks and digitally encoded references to them within the transponder's memory. The best mode for consumer privacy is one that converts (i.e. flips) the identity from a publicly standardized format such as an SGTIN, into an encrypted version of that identity, with the ability for authorized persons and devices to flip it back again.
MODE FOR INVENTION
The present invention discloses numerous systems, methods, and devices for authenticating and flipping the primary identity of RFID tags and inlays. Alternate and simplified variations of the present invention are possible for creating the password specification header and cryptographic key index components on transponders with various memory sizes and partitions. Not all of the encryption and decryption steps need to be utilized within any single embodiment; rather parts of the present invention can be selectively used in certain industrial applications. In common with each method is the recreation of the Kill Password and the Access Password and using Password Authentication Function 149i for at least a first level of authentication. In certain preferred embodiments where additional security is required, there are additional tests that have been described herein to authenticate an RFID tag or inlay. Although the descriptions have relied upon EPCglobal Class 1 Gen2 standards, the spirit and scope of this invention also extends to other standards such as ISO18000 and its various parts.
To clarify certain aspects of the present invention, certain embodiments are described in a possible environment - as identification means for containers. In these instances, certain methods make reference to containers such as loaded pallets, paperboard boxes, corrugated cartons, pharmaceutical containers, and conveyable cases, but other containers may be used by these methods. Certain embodiments of the present invention are directed for use with steel drums, commercial corrugated shipping cartons, tagged pallet-loads of shrink-wrapped cases, consumer- goods packaging, consumer goods, automobile windshields, industrial components, or other methods of identifying objects using RFID transponders or wireless sensors, or both.
In certain embodiments the target surface to which a transponder will be attached is a container. In some applications the target surface is moving while the encoder device is stationary. Furthermore the moving target surface may be objects on a conveyor. In such an embodiment, the RFID tag encoder is fixed to an assembly line in a stationary manner. Accordingly, the stationary-mounted encoder further includes machine-controlled devices for extracting a commissioned RFID transponder from the encoder and places the transponder on the container of interest by means well understood in the art. In yet other embodiments the target surface may be a web of release liner from which encoded transponders will be later removed and applied to an object for identification. INDUSTRIAL APPLICABILITY
The methods, systems, and devices herein are useful for the authentication of RFID tags that are attached or associated with physical objects that pass through supply chains, across national borders, and among trading partners. Furthermore Counterfeit Control Codes are useful as a feed forward data item that is encoded with heuristics that are representative of previously observed incidents and patterns of occurrences. The methods, systems, and devices herein are also useful for protecting the identity of certain objects by reversibly encrypting primary identifying information on RFID transponders that are attached to the objects and items.
Although the invention has been particularly shown and described with reference to certain embodiments, it will be understood by those skilled in the art that various changes in form and detail may be made without departing from the spirit and scope of the invention.

Claims

We claim:
1) A secure supply chain visibility and transponder authentication system comprised of:
RFID transponders containing a data set comprising primary identifying information, an access and kill password, and cryptographic key index components;
a security server managing and providing a changing set of cryptographic keys over a network;
one or more secure RFID encoders using the set of cryptographic keys provided by the security server and storing them in protected memory and encoding into the RFID transponders the data set comprising primary identifying information, cryptographic key index components, and access and kill passwords that were internally computed from the primary identifying information; and
one or more secure RFID authenticators to determining if the RFID transponder is authentic by using a local set of securely stored cryptographic keys provided by the security server and cryptographic key index components from the RFID transponder to internally compute the previously encoded passwords to authenticate the RFID transponder using a challenge-response interaction.
2) The system of Claim 1 , wherein the secure RFID encoder receives authorizations from the security server that enables the encoding of up to a maximum number of transponders.
3) The system of Claim 1, wherein the RFID transponder contains an encrypted Quality Control Code that is used to reveal where, when, and how the RFID transponder was encoded.
4) The system of Claim 1, wherein the RFID transponder contains a single fingerprint and a digital representation of the fingerprint minutia of the operator that applied the RFID transponder.
5) The system of Claim 1 further comprising a secure RFID transponder attached to a cartridge that contains a supply of the RFID transponders to be encoded, the attached RFID transponder is encrypted and is read from and written to by the secure RFID encoder during encoder operation.
6) The system of Claim 1, further comprising a Counterfeit Control Code to feed forward heuristics that are representative of previously observed incidents and patterns of occurrences.
7) The system of Claim 1 further comprising the secure RFID authenticator collecting and exchanging heuristic information with the security server.
8) A secure RFID transponder encoder enabled by authorizations to encode RFID transponders used to identify and authenticate goods, comprising:
a unique encoder number;
a set of cryptographic keys;
a microprocessor for computing cryptographic algorithms and controlling encoder actions;
an RFID transponder interrogator for encoding the RFID transponders;
a changing set of cryptographic keys stored in protected encoder memory;
authorizations that limit encoding to a maximum number of RFID transponders;
sensors to detect physical or environmental attacks on the encoder; and
fast acting algorithms to promptly clear the cryptographic keys when an attack is detected. 9) The secure RFID transponder encoder of Claim 8 further comprising a GPS receiver and a real-time clock for encoding the location, date, and time of the RFID transponder encoding.
10) The secure RFID transponder encoder of Claim 8 further comprising a Faraday cage or electronic device to prevent eavesdroppers from detecting secret passwords sent to the RFID transponder or secret passwords that are read directly from the RFID transponder.
11) The secure RFID transponder encoder of Claim 8 further comprising an operator log in mechanism that uses any combination of: a password, a security token, or a biometric feature.
12) The secure RFID transponder encoder of Claim 8, wherein sets of the cryptographic keys are received from a secure server through a wired or wireless network, or a physical token device.
13) An RFID transponder predisposed to backscatter its primary identifying information to an RFID reader without revealing its secret information to a cryptographic adversary is comprised of:
memory banks;
access and kill passwords stored in a partition of a memory bank;
an access password read lock for the kill password;
cryptographic key index components stored in a partition of the memory means;
a password specification header stored in one or more parts of the memory banks;
an alternate identity that replaces its cryptographically related primary identifying information; and an indication that the alternate identity has been stored.
14) The RFID transponder of Claim 13 further comprising an encrypted Quality Control Code comprised of a day and time field, an encoder number, and a Global Location Code that collectively represent the time and place that a specific encoder encoded an RFID transponder.
15) The RFID transponder of Claim 14, wherein the Quality Control Code is further comprised of a Data Carrier Mark that is an index into a table that specifies the characteristics of anti-counterfeit marks that are embedded into the data carrier of the RFID transponder.
16) The RFID transponder of Claim 13, wherein the password specification header specifies any of: a fixed password, a password acquired from a table, or a password that is cryptographically formulated.
17) An RFID authenticator for determining if an RFID transponder is authentic, while not requiring a real-time network connection, comprising:
a securely stored changing set of cryptographic keys provided from a security server;
an RFID interrogator for reading a password specification header and cryptographic key index components stored on the RFID transponder;
a microprocessor for cryptographically computing the access and kill passwords of the RFID transponder using the cryptographic keys and data read from the RFID transponder;
a challenge-response interaction for determining the authenticity of the RFID transponder; and a network interface for exchanging heuristic information with the security server. 18) The RFID authenticator means of Claim 17 further comprising an imaging device for collecting, storing, and processing optical images as heuristic information.
19) The RFID authenticator means of Claim 17 further comprising ajammer for hiding passwords sent to the RFID transponder or passwords that are read directly from the RFID transponder in order to prevent eavesdroppers from detecting the passwords.
20) An RFID interrogator for reversibly altering the primary identifying information of an RFID transponder from a publicly readable and decodable form to an alternate identity that is cryptographically related to the primary identifying information, the RFID interrogator comprising:
means to read information and cryptographic key index components from the RFID transponder;
means to acquire and use a changing set of cryptographic keys from a trusted source;
means to determine if the RFID transponder is in the primary identifying information state or the altered identification transponder state;
means to couple with the RFID transponder to affect the reversible changes.
PCT/US2011/030608 2010-07-22 2011-03-30 Fully secure item-level tagging WO2012011979A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/841,744 US8917159B2 (en) 2005-08-19 2010-07-22 Fully secure item-level tagging
US12/841,744 2010-07-22

Publications (1)

Publication Number Publication Date
WO2012011979A1 true WO2012011979A1 (en) 2012-01-26

Family

ID=45497116

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/030608 WO2012011979A1 (en) 2010-07-22 2011-03-30 Fully secure item-level tagging

Country Status (2)

Country Link
US (1) US8917159B2 (en)
WO (1) WO2012011979A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Families Citing this family (117)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7469338B2 (en) * 2002-07-29 2008-12-23 Broadcom Corporation System and method for cryptographic control of system configurations
CN101180856B (en) 2005-04-25 2013-03-06 Lg电子株式会社 Method for enquiring radio frequency identification label data
CN101246538A (en) * 2007-02-14 2008-08-20 日电(中国)有限公司 Radio frequency recognition system and method
US8955122B2 (en) 2007-04-04 2015-02-10 Sri International Method and apparatus for detecting malware infection
WO2008134443A1 (en) * 2007-04-24 2008-11-06 Visible Assets, Inc. Firearm visibility network
US7937298B2 (en) * 2007-05-17 2011-05-03 Oracle International Corporation Guaranteed RFID event delivery
CN101409614B (en) * 2007-10-12 2011-04-13 华为技术有限公司 Data synchronization method, system and equipment
US20100082485A1 (en) * 2008-09-30 2010-04-01 Apple Inc. Portable point of purchase devices and methods
US9026462B2 (en) * 2008-09-30 2015-05-05 Apple Inc. Portable point of purchase user interfaces
US8537016B2 (en) * 2008-10-27 2013-09-17 First Data Corporation Devices and methods for protecting a packaged radio frequency identification device from electronic reading
US9584176B2 (en) * 2010-04-08 2017-02-28 Comtech Ef Data Corp. Embedded meta-carrier with spread spectrum via overlaid carriers
US8838022B2 (en) * 2010-04-13 2014-09-16 Radeum, Inc. System and method for securely pairing a wireless device using wireless communication
WO2012011323A1 (en) * 2010-07-23 2012-01-26 日本電気株式会社 Laser light source module
CN102339495A (en) * 2010-07-23 2012-02-01 鸿富锦精密工业(深圳)有限公司 Automatic teller machine and method by utilizing automatic teller machine to deposit money
US8839459B2 (en) 2010-09-22 2014-09-16 Qualcomm Incorporated Product authentication using end-to-end cryptographic scheme
CA2726748A1 (en) * 2010-12-16 2012-06-16 Evgeny Lishak A method of providing brand assurance and item authenticity using payment card industry infrastructure
US20120161924A1 (en) * 2010-12-22 2012-06-28 Rfmarq, Inc. Automatic Authentication of Electronic Devices
US9443298B2 (en) * 2012-03-02 2016-09-13 Authentect, Inc. Digital fingerprinting object authentication and anti-counterfeiting system
JP2012199756A (en) * 2011-03-22 2012-10-18 Eastman Kodak Co Portable device
US8566295B2 (en) * 2011-05-31 2013-10-22 John E. G. Matze System and method for electronically storing essential data
US20130006877A1 (en) * 2011-06-30 2013-01-03 International Business Machines Corporation Nanostructure tracking of products
US20130006878A1 (en) * 2011-06-30 2013-01-03 International Business Machines Corporation Nanostructure tracking of product data signatures
KR20140101719A (en) * 2011-08-08 2014-08-20 미코 코포레이션 Radio frequency identification technology incorporating cryptographics
US9026041B2 (en) * 2011-11-10 2015-05-05 Avery Dennison Corporation Portable radio-frequency repeater
US20130181816A1 (en) * 2012-01-17 2013-07-18 International Business Machines Corporation Mechanism and method for rfid cable path labeling, identification, and inventory
WO2013121238A1 (en) * 2012-02-13 2013-08-22 Sony Ericsson Mobile Communications Ab Electronic devices, methods, and computer program products for detecting a tag having a sensor associated therewith and receiving sensor information therefrom
US9820016B2 (en) 2012-02-13 2017-11-14 Sony Mobile Communications Inc. Methods of communicating identification information and a responsive command via short-range communications, and related devices
US8687808B2 (en) 2012-04-10 2014-04-01 Comtech Ef Data Corp. Method and system for self synchronizing cryptographic parameters
US9166732B2 (en) * 2012-04-19 2015-10-20 At&T Mobility Ii Llc Facilitation of security employing a femto cell access point
US11423502B1 (en) * 2012-04-29 2022-08-23 Subject Packet Solutions, Llc System for facilitating the execution of law enforcement duties
US9218634B1 (en) * 2012-04-29 2015-12-22 Intel-Based Solutions, LLC System and method for facilitating the execution of law enforcement duties
US10755371B1 (en) * 2012-04-29 2020-08-25 Subject Packet Solutions, Llc System for facilitating the execution of law enforcement duties
CN103458496B (en) * 2012-06-04 2019-02-01 中兴通讯股份有限公司 A kind of method for synchronizing time and system using WiFi-direct
US9590959B2 (en) 2013-02-12 2017-03-07 Amazon Technologies, Inc. Data security service
US9286491B2 (en) 2012-06-07 2016-03-15 Amazon Technologies, Inc. Virtual service provider zones
US10075471B2 (en) 2012-06-07 2018-09-11 Amazon Technologies, Inc. Data loss prevention techniques
US10084818B1 (en) 2012-06-07 2018-09-25 Amazon Technologies, Inc. Flexibly configurable data modification services
FR2992759A1 (en) * 2012-06-29 2014-01-03 France Telecom METHOD FOR MANAGING THE OPERATING MODE OF A CONTACTLESS LABEL AND CORRESPONDING LABEL.
WO2014036001A1 (en) * 2012-08-27 2014-03-06 University Of Houston System System and method for securing backscatter wireless communication
US20160012498A1 (en) * 2012-09-12 2016-01-14 Chachi Prasad System and method for identifying, verifying and communicating about oem products using unique identifiers
US20140297545A1 (en) * 2012-09-12 2014-10-02 Chachi Prasad System and Method for Verifying and Communicating about OEM Products
US9361601B2 (en) * 2012-10-02 2016-06-07 Kiosk Information Systems, Inc. Systems and methods for locking and docking
US20140120196A1 (en) 2012-10-29 2014-05-01 Makerbot Industries, Llc Quick-release extruder
CA2891446C (en) * 2012-11-13 2019-08-06 Tracelink, Inc. Digitally secured electronic titles for products in supply chains
WO2014087381A1 (en) * 2012-12-07 2014-06-12 Visa International Service Association A token generating component
USD745875S1 (en) * 2012-12-13 2015-12-22 Symantec Corporation Display device with graphical user interface
US8994514B1 (en) * 2012-12-19 2015-03-31 Emc Corporation Event indicator creation using first and second sets of values
US10211977B1 (en) 2013-02-12 2019-02-19 Amazon Technologies, Inc. Secure management of information using a security module
US9367697B1 (en) * 2013-02-12 2016-06-14 Amazon Technologies, Inc. Data security with a security module
US9705674B2 (en) 2013-02-12 2017-07-11 Amazon Technologies, Inc. Federated key management
US10467422B1 (en) 2013-02-12 2019-11-05 Amazon Technologies, Inc. Automatic key rotation
US9300464B1 (en) 2013-02-12 2016-03-29 Amazon Technologies, Inc. Probabilistic key rotation
US10210341B2 (en) 2013-02-12 2019-02-19 Amazon Technologies, Inc. Delayed data access
US9489550B2 (en) * 2013-06-12 2016-11-08 The Boeing Company Positioning systems and methods
US9832171B1 (en) 2013-06-13 2017-11-28 Amazon Technologies, Inc. Negotiating a session with a cryptographic domain
US9565022B1 (en) 2013-07-02 2017-02-07 Impinj, Inc. RFID tags with dynamic key replacement
WO2015006212A2 (en) 2013-07-10 2015-01-15 Hoffman George Kevin Systems and methods for measuring and tracking radio-frequency identification tags
SI2827269T1 (en) 2013-07-17 2016-02-29 Kapsch Trafficcom Ag Method for authenticating an RFID tag
KR101373455B1 (en) * 2013-10-15 2014-03-13 펜타시큐리티시스템 주식회사 Apparatus for distinguishing the counterfeits and method thereof
US9260254B2 (en) * 2013-10-31 2016-02-16 Lateral Innovations Inc. Safety conveyor apparatus
US9444819B2 (en) * 2014-01-16 2016-09-13 International Business Machines Corporation Providing context-based visibility of cloud resources in a multi-tenant environment
RU2592385C2 (en) * 2014-04-29 2016-07-20 Федеральное государственное автономное образовательное учреждение высшего профессионального образования "Северо-Кавказский федеральный университет" Device preventing unauthorised use of vehicle due to application of pseudorandom sequences
US9397835B1 (en) 2014-05-21 2016-07-19 Amazon Technologies, Inc. Web of trust management in a distributed system
US9438421B1 (en) 2014-06-27 2016-09-06 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US9999924B2 (en) 2014-08-22 2018-06-19 Sigma Labs, Inc. Method and system for monitoring additive manufacturing processes
US9866392B1 (en) 2014-09-15 2018-01-09 Amazon Technologies, Inc. Distributed system web of trust provisioning
WO2016058027A1 (en) * 2014-10-13 2016-04-21 St Systems Pty Ltd Method and system for preventing sale and return of fraudulent goods and fraudulent return of goods
MY193487A (en) * 2014-11-06 2022-10-17 Altria Client Services Llc Methods and products for product tracing and authentication using conductive inks
US9729193B2 (en) * 2014-11-11 2017-08-08 Ut-Battelle, Llc Wireless sensor platform
US10786948B2 (en) 2014-11-18 2020-09-29 Sigma Labs, Inc. Multi-sensor quality inference and control for additive manufacturing processes
CN107428081B (en) 2015-01-13 2020-07-07 西格马实验室公司 Material identification system and method
CN104573968A (en) * 2015-01-20 2015-04-29 石丹杰 Consumable item management system
US20160300234A1 (en) * 2015-04-06 2016-10-13 Bitmark, Inc. System and method for decentralized title recordation and authentication
CA2983872C (en) * 2015-05-07 2023-06-20 Smart Wave Technologies Corp. Signal and detection system for pairing products
US9595038B1 (en) * 2015-05-18 2017-03-14 Amazon Technologies, Inc. Inventory confirmation
US11676235B1 (en) 2015-06-03 2023-06-13 Subject Packet Solutions, Llc Computer-based system for facilitating the execution of law enforcement duties
US10474678B1 (en) 2015-06-03 2019-11-12 Subject Packet Solutions, Llc Computer-based system for facilitating the execution of law enforcement duties
US11636158B1 (en) 2015-06-03 2023-04-25 Subject Packet Solutions, Llc Computer-based system for facilitating the execution of law enforcement duties
AU2016293610B2 (en) * 2015-07-16 2019-01-24 Dtc Communications, Inc. Covert surveillance system concealment kit for rapid development
US9594933B2 (en) * 2015-07-29 2017-03-14 Palo Alto Research Center Incorporated Printable, writeable article for tracking counterfeit and diverted products
US10176148B2 (en) * 2015-08-27 2019-01-08 Microsoft Technology Licensing, Llc Smart flip operation for grouped objects
WO2017040174A1 (en) 2015-09-04 2017-03-09 Ut-Battelle, Llc Direct write sensors
US10207489B2 (en) 2015-09-30 2019-02-19 Sigma Labs, Inc. Systems and methods for additive manufacturing operations
US10187787B2 (en) * 2015-12-18 2019-01-22 Korea Advanced Institute Of Science And Technology Beacon device using GS1 code, operating method thereof and service providing method using the same
US9514343B1 (en) * 2016-01-18 2016-12-06 Lorita Bolts Barcode inventory and payment management system
US10325082B2 (en) * 2016-02-03 2019-06-18 Ricoh Company, Ltd. Information processing apparatus, information processing system, authentication method, and recording medium
CN107294671B (en) * 2016-03-30 2021-07-30 中兴通讯股份有限公司 Method and device for sending random access subframe
US10650621B1 (en) 2016-09-13 2020-05-12 Iocurrents, Inc. Interfacing with a vehicular controller area network
WO2018151703A1 (en) * 2017-02-14 2018-08-23 Multipure International Systems and methods for authenticating a cartridge
CN106952190A (en) * 2017-03-22 2017-07-14 国信优易数据有限公司 False source of houses typing Activity recognition and early warning system
US10311224B1 (en) * 2017-03-23 2019-06-04 Amazon Technologies, Inc. Digitally sealing equipment for authentication of components
US10706139B2 (en) * 2017-04-05 2020-07-07 General Electric Company System and method for authenticating components
WO2019231616A1 (en) * 2018-05-31 2019-12-05 Applied Materials, Inc Unique part authentication
WO2019232420A2 (en) * 2018-06-01 2019-12-05 Culvert-Iot Corporation An intelligent tracking system and methods and systems therefor
US20190378146A1 (en) * 2018-06-09 2019-12-12 Sneaker Con Digital Inc. Systems, methods, and devices for authentication of a product
CN109635886A (en) * 2018-11-02 2019-04-16 立旃(上海)科技有限公司 Trade mark method and device based on block chain
US11741196B2 (en) 2018-11-15 2023-08-29 The Research Foundation For The State University Of New York Detecting and preventing exploits of software vulnerability using instruction tags
CR20210313A (en) * 2018-11-15 2021-11-22 Metrc Llc Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing rfid technology
US10467514B1 (en) * 2018-11-21 2019-11-05 Konica Minolta Laboratory U.S.A., Inc. Method for combining RFID tags
CN110084023A (en) * 2019-03-11 2019-08-02 广西贝莱德电子科技有限公司 Method for electronic seal with service content cipher
US20220171951A1 (en) * 2019-03-25 2022-06-02 Avery Dennison Retail Information Services, Llc Product labels, trust identifier systems containing the same, and methods of use thereof
US11715060B2 (en) 2019-05-31 2023-08-01 X Development Llc Intelligent tracking system and methods and systems therefor
US11030508B2 (en) * 2019-06-21 2021-06-08 eTEP Inc. Packaging system with code-based detection of product falsification
CN110390377B (en) * 2019-07-11 2023-01-10 柏仁新材料(广州)股份有限公司 Anti-copy RFID electronic tag system and method thereof
CN210454860U (en) * 2019-08-16 2020-05-05 灵动科技(北京)有限公司 Intelligent interaction module and trolley
US11394706B2 (en) 2019-09-03 2022-07-19 Seagate Technology Llc Password-less login
US11420259B2 (en) 2019-11-06 2022-08-23 General Electric Company Mated components and method and system therefore
US11395142B2 (en) * 2020-01-31 2022-07-19 Lowe's Companies, Inc. System and techniques for secret key transfer in benefit denial system
US10721224B1 (en) 2020-01-31 2020-07-21 Lowe's Companies, Inc. System and techniques for trans-account device key transfer in benefit denial system
US11424911B2 (en) * 2020-03-03 2022-08-23 International Business Machines Corporation Storage and communication environment for cryptographic tags
US11809943B2 (en) 2020-07-09 2023-11-07 MonoLets, Inc. Wireless node network to assess and model a physical characteristic associated with an object or space
US11816967B2 (en) * 2020-07-16 2023-11-14 MonoLets, Inc. Wireless node network for automatic serialization of objects
US11386761B2 (en) * 2020-09-08 2022-07-12 Sensormatic Electronics, LLC Methods and apparatuses for detecting an unauthorized RF device
US11748272B2 (en) * 2021-05-05 2023-09-05 Seagate Technology, Llc Shared keys for no PCBA cartridges
US20220383007A1 (en) * 2021-05-25 2022-12-01 Raxis, LLC Method of capturing, cloning, cracking, and brute-forcing rfid access badges
US11475993B1 (en) * 2021-12-31 2022-10-18 Scott Robert Hansen Method of unlocking an operation of a Class III medical device
CN114239629B (en) * 2022-02-22 2022-07-22 深圳市成为信息股份有限公司 Anti-counterfeiting verification method of label, UHF handheld terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060080819A1 (en) * 2004-09-14 2006-04-20 Mcallister Clarke W Systems and methods for deployment and recycling of RFID tags, wireless sensors, and the containers attached thereto
US20070204329A1 (en) * 2005-03-16 2007-08-30 Dt Labs, Llc System, Method and Apparatus for Electronically Protecting Data Associated with RFID Tags
US20100001848A1 (en) * 2007-06-22 2010-01-07 Mcallister Clarke Secure Modular Applicators to Commission Wireless Sensors

Family Cites Families (90)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5280159A (en) 1989-03-09 1994-01-18 Norand Corporation Magnetic radio frequency tag reader for use with a hand-held terminal
NL1001770C2 (en) 1995-11-29 1997-05-30 Nedap Nv Deactivatable article monitoring label with data carrier function.
US5850187A (en) 1996-03-27 1998-12-15 Amtech Corporation Integrated electronic tag reader and wireless communication link
US6078251A (en) 1996-03-27 2000-06-20 Intermec Ip Corporation Integrated multi-meter and wireless communication link
US5874902A (en) 1996-07-29 1999-02-23 International Business Machines Corporation Radio frequency identification transponder with electronic circuit enabling/disabling capability
US6802659B2 (en) 1996-08-07 2004-10-12 Mats Cremon Arrangement for automatic setting of programmable devices and materials therefor
US6227643B1 (en) 1997-05-20 2001-05-08 Encad, Inc. Intelligent printer components and printing system
US6025780A (en) 1997-07-25 2000-02-15 Checkpoint Systems, Inc. RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system
US6724895B1 (en) 1998-06-18 2004-04-20 Supersensor (Proprietary) Limited Electronic identification system and method with source authenticity verification
US6005476A (en) 1998-07-24 1999-12-21 Valiulis; Carl Electronic identification, control, and security system for consumer electronics and the like
US6332098B2 (en) 1998-08-07 2001-12-18 Fedex Corporation Methods for shipping freight
ES2333897T3 (en) 1998-08-14 2010-03-02 3M Innovative Properties Company METHOD TO INTERROGATE A CONTAINER CARRYING AN RFID LABEL.
US6494562B1 (en) 1998-09-03 2002-12-17 Hewlett-Packard Company Method and apparatus for identifying a sales channel
US6312106B1 (en) 1999-04-20 2001-11-06 Hewlett-Packard Company Method and apparatus for transferring information between a replaceable consumable and a printing device
US6488352B1 (en) 1998-09-03 2002-12-03 Hewlett-Packard Company Method and apparatus for checking compatibility of a replaceable printing component
FR2784936B1 (en) 1998-10-23 2001-04-13 Canon Kk METHOD AND DEVICE FOR MANAGING THE RESOURCES OF A PRINTING PRODUCT AVAILABLE IN A PRINTER
US7344325B2 (en) 1999-01-25 2008-03-18 Fargo Electronics, Inc. Identification card printer having ribbon cartridge with cleaner roller
US6932527B2 (en) 1999-01-25 2005-08-23 Fargo Electronics, Inc. Card cartridge
US6694884B2 (en) 1999-01-25 2004-02-24 Fargo Electronics, Inc. Method and apparatus for communicating between printer and card supply
US6832866B2 (en) 1999-01-25 2004-12-21 Fargo Electronics, Inc. Printer or laminator supply
US7018117B2 (en) 1999-01-25 2006-03-28 Fargo Electronics, Inc. Identification card printer ribbon cartridge
US6645327B2 (en) 1999-04-21 2003-11-11 Intermec Ip Corp. RF tag application system
US6415978B1 (en) 1999-05-03 2002-07-09 Psc Scanning, Inc. Multiple technology data reader for bar code labels and RFID tags
CA2318023A1 (en) 1999-09-16 2001-03-16 Xerox Corporation Context sensitive web-based supply ordering
US6677852B1 (en) 1999-09-22 2004-01-13 Intermec Ip Corp. System and method for automatically controlling or configuring a device, such as an RFID reader
UA59498C2 (en) 1999-12-07 2003-09-15 Інфінеон Текнолоджіс Аг Goods label, a method for producing the label, and a method for contactless identification of goods
DE60039989D1 (en) 1999-12-28 2008-10-02 Matsushita Electric Ind Co Ltd INFORMATION RECORDING MEDIUM AND ACCESSORY EQUIPMENT
JP2001215862A (en) 2000-01-28 2001-08-10 Canon Inc Image forming apparatus and cartridge attachable to and detachable from this image forming apparatus
AU5157600A (en) 2000-02-04 2001-08-14 3M Innovative Properties Company Method of authenticating a tag
CA2402674A1 (en) 2000-03-15 2001-09-20 International Paper Tamper evident radio frequency identification system and package
CA2404011A1 (en) 2000-03-24 2001-10-04 Richard F. Rudolph Rfid tag for authentication and identification
US6379058B1 (en) 2000-03-30 2002-04-30 Zih Corp. System for RF communication between a host and a portable printer
US6409401B1 (en) 2000-03-30 2002-06-25 Zih Corp. Portable printer with RFID encoder
US6527356B1 (en) 2000-06-02 2003-03-04 Eastman Kodak Company Printer capable of forming an image on a receiver substrate according to type of receiver substrate and a method of assembling the printer
US6986057B1 (en) 2000-08-07 2006-01-10 Dallas Semiconductor Corporation Security device and method
JP4690532B2 (en) 2000-09-26 2011-06-01 株式会社日立製作所 Image forming apparatus
JP4641356B2 (en) 2001-03-09 2011-03-02 キヤノン株式会社 Image forming apparatus
US6995652B2 (en) 2001-04-11 2006-02-07 Battelle Memorial Institute K1-53 System and method for controlling remote devices
US6933848B1 (en) 2001-05-31 2005-08-23 Alien Technology Corporation System and method for disabling data on radio frequency identification tags
US6687634B2 (en) 2001-06-08 2004-02-03 Hewlett-Packard Development Company, L.P. Quality monitoring and maintenance for products employing end user serviceable components
US6532346B2 (en) 2001-08-02 2003-03-11 Hewlett-Packard Company Systems and methods for printing shipping labels for recycling printing device replaceable components
US7137000B2 (en) 2001-08-24 2006-11-14 Zih Corp. Method and apparatus for article authentication
US20030061947A1 (en) 2001-10-01 2003-04-03 Hohberger Clive P. Method and apparatus for associating on demand certain selected media and value-adding elements
US6963351B2 (en) 2001-12-21 2005-11-08 Datacard Corporation Radio frequency identification tags on consumable items used in printers and related equipment
JP2003263078A (en) 2002-03-11 2003-09-19 Kyocera Mita Corp Image forming apparatus and units for use in the same
JP3778110B2 (en) 2002-03-19 2006-05-24 富士ゼロックス株式会社 Wireless communication system, image forming apparatus, and cartridge part
US6820039B2 (en) 2002-04-19 2004-11-16 Hewlett-Packard Development Company, L.P. Facilitating device upkeep
US6735399B2 (en) 2002-05-17 2004-05-11 Xerox Corporation Post-launch process optimization of replaceable sub-assembly utilization through customer replaceable unit memory programming
JP4090798B2 (en) 2002-06-21 2008-05-28 大日本印刷株式会社 Thermal transfer image receiving sheet roll
US7069251B1 (en) 2002-07-08 2006-06-27 Accelitec, Inc. RFID transponder dispenser and authorizer
US20040074964A1 (en) 2002-10-22 2004-04-22 Ingrid Falkenrich-Wesche Multi-modal items tracking heritage
US20040088230A1 (en) 2002-11-06 2004-05-06 Elliott Timothy J. Method to detect fraudulent return of merchandise
US7620815B2 (en) 2003-02-21 2009-11-17 Fargo Electronics, Inc. Credential production using a secured consumable supply
US6848616B2 (en) 2003-03-11 2005-02-01 Zih Corp., A Delaware Corporation With Its Principal Office In Hamilton, Bermuda System and method for selective communication with RFID transponders
US7532104B2 (en) 2003-05-06 2009-05-12 Rsa Security, Inc. Low-complexity cryptographic techniques for use with radio frequency identification devices
WO2005008578A2 (en) 2003-07-07 2005-01-27 Avery Dennison Corporation Rfid device with changeable characteristics
US7073712B2 (en) 2003-08-06 2006-07-11 Clintrak Clinical Labeling Services, Llc RFID encoding/verifying apparatus
FR2858866B1 (en) 2003-08-14 2005-12-02 Datacard Inc ADAPTER ELEMENT FOR PROGRAMMABLE ELECTRONIC SUPPORTS AND USE IN A UNIVERSAL PERSONALIZATION MACHINE
US20050058292A1 (en) 2003-09-11 2005-03-17 Impinj, Inc., A Delaware Corporation Secure two-way RFID communications
US20050058483A1 (en) 2003-09-12 2005-03-17 Chapman Theodore A. RFID tag and printer system
FR2862409B1 (en) 2003-11-17 2006-04-14 Datacard Inc ADAPTER ELEMENT FOR PROGRAMMABLE ELECTRONIC SUPPORTS
US7225167B2 (en) 2003-11-21 2007-05-29 International Business Machines Corporation Merchandise-integral transaction receipt and auditable product ownership trail
US7034689B2 (en) 2004-01-28 2006-04-25 Bertrand Teplitxky Secure product packaging system
JP4458904B2 (en) 2004-04-02 2010-04-28 東芝テック株式会社 Issuing device
US7114655B2 (en) 2004-04-15 2006-10-03 Printronix EPC data manager
US7098794B2 (en) 2004-04-30 2006-08-29 Kimberly-Clark Worldwide, Inc. Deactivating a data tag for user privacy or tamper-evident packaging
US7055750B2 (en) 2004-05-07 2006-06-06 Battelle Memorial Institute K1-53 Device and method for encoding data in multiple media
FR2871603B1 (en) 2004-06-11 2006-09-29 K Sa As SECURE RADIOFREQUENCY IDENTIFICATION DEVICE FOR AN IDENTITY OR IDENTIFIER BOOKLET
US7439858B2 (en) 2004-06-22 2008-10-21 Paxar Americas, Inc. RFID printer and antennas
US7187294B2 (en) 2004-07-22 2007-03-06 Lexmark International, Inc. Apparatus and methods of detecting print media orientation
US7375631B2 (en) 2004-07-26 2008-05-20 Lenovo (Singapore) Pte. Ltd. Enabling and disabling a wireless RFID portable transponder
US7253734B2 (en) 2004-09-22 2007-08-07 International Business Machines Corporation System and method for altering or disabling RFID tags
US7277016B2 (en) 2004-09-22 2007-10-02 International Business Machines Corporation System and method for disabling RFID tags
US7646300B2 (en) 2004-10-27 2010-01-12 Intelleflex Corporation Master tags
US7223030B2 (en) 2005-02-01 2007-05-29 Lexmark International, Inc. Systems and methods for determining physical location of RFID tags on embedded print media
US7205897B2 (en) 2005-03-01 2007-04-17 Sap Aktiengesellschaft Product flow based auto-ID infrastructure
JP4734988B2 (en) 2005-03-28 2011-07-27 株式会社日立製作所 RFID
FR2888973B1 (en) 2005-07-22 2007-10-26 K Sa As OPTICAL READING AND RADIOFREQUENCY ENCODING DEVICE ADAPTABLE TO PRINTER OUTPUT OF IDENTIFICATION LABELS
US8099187B2 (en) 2005-08-18 2012-01-17 Hid Global Corporation Securely processing and tracking consumable supplies and consumable material
US7551087B2 (en) * 2005-08-19 2009-06-23 Adasa, Inc. Handheld and cartridge-fed applicator for commissioning wireless sensors
KR100702971B1 (en) 2005-09-02 2007-04-06 삼성전자주식회사 Method and system for encrypting Radio-Frequency-Identification Tag using Broadcast Encryption Type
US8967476B2 (en) 2005-09-09 2015-03-03 Assa Abloy Ab Synchronization techniques in multi-technology/multi-frequency RFID reader arrays
US7633376B2 (en) 2005-12-12 2009-12-15 Impinj, Inc. Reporting on authentication of RFID tags for indicating legitimacy of their associated items
US8378786B2 (en) 2006-02-03 2013-02-19 Emc Corporation Security provision in standards-compliant RFID systems
US20080001724A1 (en) 2006-06-28 2008-01-03 Symbol Technologies, Inc. Using read lock capability for secure RFID authentication
DE102007003514B3 (en) 2007-01-19 2008-05-29 Atmel Germany Gmbh Falsification safety providing method for product e.g. garment, involves assigning marking to identifier in set or deleted condition, and permitting read access on identifier by reader after authentication during set condition of marking
US20080181398A1 (en) 2007-01-26 2008-07-31 Ravikanth Pappu Methods and apparatus for enhancing privacy of objects associated with radio-frequency identification tags
DE102007016467B3 (en) 2007-03-27 2008-03-27 Atmel Germany Gmbh Radio frequency identification system transponder, has storage area assigned to access-password that is reassigned to characteristic bit, where length and/or structure of access-password is adjustable by characteristic bit
US8870478B2 (en) 2007-05-30 2014-10-28 Zih Corp. Media processing system and associated spindle
US20090315686A1 (en) 2007-10-16 2009-12-24 Rcd Technology, Inc. Rfid tag using encrypted value

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060080819A1 (en) * 2004-09-14 2006-04-20 Mcallister Clarke W Systems and methods for deployment and recycling of RFID tags, wireless sensors, and the containers attached thereto
US20070204329A1 (en) * 2005-03-16 2007-08-30 Dt Labs, Llc System, Method and Apparatus for Electronically Protecting Data Associated with RFID Tags
US20100001848A1 (en) * 2007-06-22 2010-01-07 Mcallister Clarke Secure Modular Applicators to Commission Wireless Sensors

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Also Published As

Publication number Publication date
US8917159B2 (en) 2014-12-23
US20100289627A1 (en) 2010-11-18

Similar Documents

Publication Publication Date Title
US8917159B2 (en) Fully secure item-level tagging
CN101111853B (en) Device, method and system of control of data exchange
Karygiannis et al. Guidelines for securing radio frequency identification (RFID) systems
Weis Security and privacy in radio-frequency identification devices
Liu et al. PAP: A privacy and authentication protocol for passive RFID tags
Xiao et al. RFID technology, security vulnerabilities, and countermeasures
Shih et al. RFID tags: privacy and security aspects
Rong et al. RFID security
Spruit et al. RFID security and privacy: threats and countermeasures
Finkenzeller Known attacks on RFID systems, possible countermeasures and upcoming standardisation activities
CN103793742A (en) Technology of electronic tag safety authentication and information encryption of traffic electronic license plate
Johansson An Introduction to RFID–Information Security and Privacy Concerns
Korkmaz et al. Standards, security & privacy issues about radio frequency identification (RFID)
Avoine RFID Security.
Padmos Application and Security of RFID Technology
Karygiannis et al. SP 800-98. Guidelines for Securing Radio Frequency Identification (RFID) Systems
المهدي عبدالسلام عجال et al. Networked Radio Frequency identification Systems Security and Privacy Issues
Parmar et al. Evaluating and improving the security of RFID tags in shipping containers
Samuel RFID security in door locks
Morshed Effective protocols for privacy and security in RFID systems applications
Filimon Anti-counterfeiting-prevention of counterfeit products with RFID
CN203520430U (en) Electronic tag security authentication and information encryption technology for traffic electronic license plates
Li et al. RFID product authentication in EPCglobal network
Vartak Protecting the privacy of RFID tags
Toyoda et al. Illegal interrogation detectable EPC distribution scheme in RFID-enabled supply chains

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11809992

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11809992

Country of ref document: EP

Kind code of ref document: A1