Impinj, Inc.
Proxy-based reader authentication by trusted authority
Last updated:
Abstract:
A Radio Frequency Identification (RFID) system including an RFID reader and a reader proxy authenticates itself to a verification authority. The proxy receives a proxy challenge from a verification authority and determines a proxy response based on the proxy challenge and a proxy key known to the proxy. The proxy response is then sent to the verification authority along with an identifier for the reader. The reader then authenticates an RFID tag by sending a tag response to the verification authority, which determines whether the reader is authentic based on the authenticity of the proxy response.
Status:
Grant
Type:
Utility
Filling date:
21 Dec 2018
Issue date:
14 Jul 2020