WO2011010970A1 - Method for authentication of an rfid tag - Google Patents
Method for authentication of an rfid tag Download PDFInfo
- Publication number
- WO2011010970A1 WO2011010970A1 PCT/SI2010/000043 SI2010000043W WO2011010970A1 WO 2011010970 A1 WO2011010970 A1 WO 2011010970A1 SI 2010000043 W SI2010000043 W SI 2010000043W WO 2011010970 A1 WO2011010970 A1 WO 2011010970A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- interrogator
- user
- rfid tag
- recited
- professional
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
Definitions
- the invention relates to a method for authentication of an RPID tag, which comprises a private key of a product whereon the RFID tag is adhered and which communicates with a user interrogator that enables a potential end user of the tagged product to authenticate it, as well as a professional interrogator that enables a producer of this product to fully control said RFID tag.
- An RFID tag communicates with a selected RFID protocol in the low-frequency range (125 kHz), in the high-frequency range (13.56 MHz) or in the range of very high frequencies (UHF, about 900 MHz).
- said tag can also establish contact communication, namely with a standardized serial data communication protocol.
- a producer offers an end user a possibility to authenticate this product or to check its origin. Counterfeiting of products especially those of famous trade mark or geographical indication is an acute problem.
- a producer of a tagged product is fully authorized, i.e. has full control of such RFID tag, he can activate or deactivate it, access all data therein, load data therein and set parameters of its operation as well as using a cryptographic algorithm implemented therein.
- the producer of the tagged product needs a professional interrogator supporting said selected RFID protocol and being provided with a proprietary software.
- the proprietary software makes it possible to use commands specific for a given RFID tag.
- the commands may be password protected.
- a cryptographically protected RFID tag is disclosed in the patent application US 2006/0133606 Al . Yet the genuineness or origin of a product is professionally also checked in a distribution chain of said product, at a wholesaler and an inspection authority, for instance.
- a drawback of such method is that a potential end user of said product cannot authenticate the product or check its origin because he neither has said professional interrogator nor technical knowledge to operate it.
- a portable telephone is provided with a proprietary module and a proprietary service in a way that a user can make use of an NFC telephone as an NFC interrogator of the RFID tag.
- a Near Field Communication Forum has laid down four types of the NFC tags of said kind. It has determined a physical communication level based on some existing RFID protocol. Most commonly it is the protocol ISO 14443A. It has also determined a location of data within said tag, i.e. addresses of locations with data. However, it also determined an application code as an address, where a user will obtain an instruction how to interpret data from said tag.
- the application for a specified code is already present on a portable telephone; otherwise the user can acquire it by means of a mobile connection or from the Internet.
- the technical problem to be solved by the present invention is to propose a method for authentication of an RFID tag adhered to a tagged product through communication with said tag, wherein the RFID tag will be organized in a way that a possible end user of said tagged product will have access to RFID tag data by means of a widely available device, said data being important for said authentication. Moreover, whenever communication will be established the RFID tag will identify whether a producer of said tagged product or its end user communicates with it. Said technical problem is solved by the method of the invention for authentication of an RFID tag as characterized by the features of the characterizing portion of the first claim. Dependent claims, however, characterize the variants of its embodiment.
- the method of the invention enables a potential end user of a product provided with an RFID tag to acquire key data for authentication of said RFID tag and then to authenticate it by means of a widely available user interrogator, e.g. an NFC portable telephone, both without any specific technical knowledge.
- a widely available user interrogator e.g. an NFC portable telephone
- a producer of a product whereon an RFID tag is adhered is fully authorized to communicate with said RFID tag according to a method of the invention just as he used to communicate by means of a professional interrogator being preferably an RFID interrogator.
- the professional interrogator enables the producer of the tagged product to fully control the RFID tag.
- said producer can thus in a known way access all data contained in said tag, enter data into it and set parameters of its operation as well as using a cryptographic algorithm implemented therein.
- the producer of the tagged product a professional interrogator to determine such locations within the RFID tag that are accessible by the user interrogator as the location of a URL address of the application providing for the authentication of a digital signature, which has been generated by the cryptographic algorithm implemented in the RFID tag, and as the location of a URL address of the public key, which together with said private key has been generated by the cryptographic algorithm implemented in the RFID tag.
- the cryptographic algorithm implemented in the RFID tag generates a digital signature in response to a message from the user interrogator of the potential end user of the tagged product.
- the user interrogator reads the digital signature as well as the public key from the URL address.
- the potential end user of the tagged product uses the public key by means of his user interrogator in the application, which provides for the authentication of the digital signature, and checks in this way whether said digital signature has been generated with the private key corresponding to the public key.
- any potential end user of the tagged product having no specific technical knowledge, can access said data in the RFID tag, which are important for carrying out said authentication, by means of his user interrogator, preferably one as possessed by an ordinary user, nowadays e.g. an NFC portable telephone.
- the potential end user of the tagged product acquires software and the public key for carrying out said authentication from a telephone network administrator or by accessing the Internet.
- the potential end user of the tagged product uses a user interrogator, which nowadays is a portable telephone provided with an NFC module.
- the user interrogator may be a personal digital assistant as well.
- the NFC portable telephone as user interrogator operates at a frequency of 13.56 MHz.
- the method of the invention may also be carried out by means of a user interrogator operating in the UHF frequency range.
- the RFID tag is confronted with a coexistence of two ways of communication.
- a first - professional - way said RFID tag communicates with the professional interrogator of the producer of the tagged product on the one hand and, in a second - user - way, it communicates with the user interrogator of the potential end user of the tagged product on the other hand.
- the first way of communication is superordinate to the second way of communication and uses all operational capabilities of the applied RFID tag type.
- the producer of the tagged product determines how the RFID tag will operate in the second way of communication.
- the RFID tag introduces itself to the NFC portable telephone, being the user interrogator, as an NFC tag and hereafter it behaves in said way.
- the first way of communication renders a possibility of full control over the RFID tag and full access to all data
- the second way of communication does not render a possibility of control over said tag and only provides for an access to the URL address of the application providing for the authentication of a digital signature, which has been generated by the RFID tag, and to the URL address of the public key, which together with said private key has been generated by the cryptographic algorithm implemented in the RFID tag.
- the second way of communication is thus actually aimed at supplying selected and allowed data to a wide group of interested users of the tagged product in order to assist them in deciding about the purchase of this product.
- the RFID tag must detect the way of communication, into which it entered.
- communicating the RFID tag recognizes an interrogator as a user interrogator or a professional interrogator of the service provider by an RFID protocol used by said interrogator. This is the case when said protocols are different.
- the RFID tag recognizes an interrogator that established a contact communication with it as a professional interrogator.
- the contact connection i.e. a wire connection
- a former functionality of the RFID communication is now doubled or transferred to either of the previously mentioned contact communication protocols.
- the RFID tag recognizes an interrogator as a user interrogator or a professional interrogator by a command received from said interrogator after an initial connection has been established. Namely, said tag and interrogator first make use of an anticollision protocol so that the interrogator acquires a unique identification number from the tag. If several tags are present, the interrogator then only communicates with said tag.
- the RFID tag can also recognize an interrogator as a user interrogator or professional interrogator by a frequency, at which said interrogator signals.
Abstract
An RFID tag comprising a private key of a product whereon the RFID is adhered communicates with a user interrogator and a professional interrogator. The professional interrogator determines two locations within the tag, which are accessible by the user interrogator, as the location of a URL address of an application providing for the authentication of a digital signature, which has been generated by the cryptographic algorithm implemented in the tag, and as the location of a URL address of the public key, which together with said private key has been generated by the cryptographic algorithm implemented in the tag. The method of the invention enables a potential end user of said product to acquire key data for authentication of said tag and then to authenticate it by means of a widely available user interrogator, e.g. an NFC portable telephone, both without any specific technical knowledge.
Description
Method for authentication of an RPID tag
The invention relates to a method for authentication of an RPID tag, which comprises a private key of a product whereon the RFID tag is adhered and which communicates with a user interrogator that enables a potential end user of the tagged product to authenticate it, as well as a professional interrogator that enables a producer of this product to fully control said RFID tag.
On the one hand, an RFID tag has been already accepted in practice.
An RFID tag communicates with a selected RFID protocol in the low-frequency range (125 kHz), in the high-frequency range (13.56 MHz) or in the range of very high frequencies (UHF, about 900 MHz). However, said tag can also establish contact communication, namely with a standardized serial data communication protocol. With an RFID tag a producer offers an end user a possibility to authenticate this product or to check its origin. Counterfeiting of products especially those of famous trade mark or geographical indication is an acute problem.
A producer of a tagged product is fully authorized, i.e. has full control of such RFID tag, he can activate or deactivate it, access all data therein, load data therein and set
parameters of its operation as well as using a cryptographic algorithm implemented therein.
To this end the producer of the tagged product needs a professional interrogator supporting said selected RFID protocol and being provided with a proprietary software. The proprietary software makes it possible to use commands specific for a given RFID tag. The commands may be password protected.
Communication between the professional interrogator and the RFID tag must be safe. The messages must therefore be encrypted.
A cryptographically protected RFID tag is disclosed in the patent application US 2006/0133606 Al . Yet the genuineness or origin of a product is professionally also checked in a distribution chain of said product, at a wholesaler and an inspection authority, for instance.
A drawback of such method is that a potential end user of said product cannot authenticate the product or check its origin because he neither has said professional interrogator nor technical knowledge to operate it.
On the other hand the NFC technology is subject to rapid development. A portable telephone is provided with a proprietary module and a proprietary service in a way that a user can make use of an NFC telephone as an NFC interrogator of the RFID tag.
A Near Field Communication Forum has laid down four types of the NFC tags of said kind. It has determined a physical communication level based on some existing RFID protocol. Most commonly it is the protocol ISO 14443A. It has also determined a location of data within said tag, i.e. addresses of locations with data. However, it also determined an application code as an address, where a user will obtain an instruction how to interpret data from said tag.
The application for a specified code is already present on a portable telephone; otherwise the user can acquire it by means of a mobile connection or from the Internet.
All data contained in said locations within the RFID tag are therefore accessible to any user of a portable telephone provided with an NFC circuit and whose provider supports the specific application of said tag.
The technical problem to be solved by the present invention is to propose a method for authentication of an RFID tag adhered to a tagged product through communication with said tag, wherein the RFID tag will be organized in a way that a possible end user of said tagged product will have access to RFID tag data by means of a widely available device, said data being important for said authentication. Moreover, whenever communication will be established the RFID tag will identify whether a producer of said tagged product or its end user communicates with it. Said technical problem is solved by the method of the invention for authentication of an RFID tag as characterized by the features of the characterizing portion of the first claim. Dependent claims, however, characterize the variants of its embodiment.
The method of the invention enables a potential end user of a product provided with an RFID tag to acquire key data for authentication of said RFID tag and then to authenticate it by means of a widely available user interrogator, e.g. an NFC portable telephone, both without any specific technical knowledge.
The invention will now be explained in more detail by way of the description of an embodiment and its variants.
A producer of a product whereon an RFID tag is adhered is fully authorized to communicate with said RFID tag according to a method of the invention just as he used to communicate by means of a professional interrogator being preferably an RFID interrogator.
The professional interrogator enables the producer of the tagged product to fully control the RFID tag. By means of the professional interrogator said producer can thus in a known way access all data contained in said tag, enter data into it and set parameters of its operation as well as using a cryptographic algorithm implemented therein. By the invention, however, it is proposed that the producer of the tagged product a professional interrogator to determine such locations within the RFID tag that are accessible by the user interrogator as the location of a URL address of the application providing for the authentication of a digital signature, which has been generated by the cryptographic algorithm implemented in the RFID tag, and as the location of a URL address of the public key, which together with said private key has been generated by the cryptographic algorithm implemented in the RFID tag.
The cryptographic algorithm implemented in the RFID tag generates a digital signature in response to a message from the user interrogator of the potential end user of the tagged product. The user interrogator reads the digital signature as well as the public key from the URL address.
The potential end user of the tagged product then uses the public key by means of his user interrogator in the application, which provides for the authentication of the digital signature, and checks in this way whether said digital signature has been generated with the private key corresponding to the public key.
The previous organization pattern of the system has been changed by the method of the invention.
By the represented method of the invention it has been achieved that any potential end user of the tagged product, having no specific technical knowledge, can access said data in the RFID tag, which are important for carrying out said authentication, by means of his user interrogator, preferably one as possessed by an ordinary user, nowadays e.g. an NFC portable telephone.
The potential end user of the tagged product acquires software and the public key for carrying out said authentication from a telephone network administrator or by accessing the Internet.
The potential end user of the tagged product uses a user interrogator, which nowadays is a portable telephone provided with an NFC module.
The user interrogator may be a personal digital assistant as well.
The NFC portable telephone as user interrogator operates at a frequency of 13.56 MHz. The method of the invention may also be carried out by means of a user interrogator operating in the UHF frequency range.
According to the method of the invention the RFID tag is confronted with a coexistence of two ways of communication. In a first - professional - way, said RFID tag communicates with the professional interrogator of the producer of the tagged product on the one hand and, in a second - user - way, it communicates with the user interrogator of the potential end user of the tagged product on the other hand. The first way of communication is superordinate to the second way of communication and uses all operational capabilities of the applied RFID tag type. In the first way of communication, the producer of the tagged product determines how the RFID tag will operate in the second way of communication. In the second way of communication, the RFID tag introduces itself to the NFC portable telephone, being the user interrogator, as an NFC tag and hereafter it behaves in said way.
The first way of communication renders a possibility of full control over the RFID tag and full access to all data, whereas the second way of communication does not render a possibility of control over said tag and only provides for an access to the URL address of the application providing for the authentication of a digital signature, which has been generated by the RFID tag, and to the URL address of the
public key, which together with said private key has been generated by the cryptographic algorithm implemented in the RFID tag.
The second way of communication is thus actually aimed at supplying selected and allowed data to a wide group of interested users of the tagged product in order to assist them in deciding about the purchase of this product.
Thus the RFID tag must detect the way of communication, into which it entered. When communicating the RFID tag recognizes an interrogator as a user interrogator or a professional interrogator of the service provider by an RFID protocol used by said interrogator. This is the case when said protocols are different.
However, the RFID tag recognizes an interrogator that established a contact communication with it as a professional interrogator. The contact connection, i.e. a wire connection, uses the standardized serial communication protocol SPI or I2C. A former functionality of the RFID communication is now doubled or transferred to either of the previously mentioned contact communication protocols. The RFID tag recognizes an interrogator as a user interrogator or a professional interrogator by a command received from said interrogator after an initial connection has been established. Namely, said tag and interrogator first make use of an anticollision protocol so that the interrogator acquires a unique identification number from the tag. If several tags are present, the interrogator then only communicates with said tag.
The RFID tag can also recognize an interrogator as a user interrogator or professional interrogator by a frequency, at which said interrogator signals.
Claims
1. A method for authentication of an RPID tag,
which comprises a private key of a product whereon the RFID is adhered, a public key of the product being publicly accessible,
and which communicates with a user interrogator and
a professional interrogator,
which enables a producer of said product to fully control said RFID tag in a way that he can access all data therein and load data into it and
set parameters of its operation and
use a cryptographic algorithm implemented therein,
characterized in
that the professional interrogator determines two locations within the RFID tag, said locations being accessible by the user interrogator,
as the location of a URL address of an application providing for the authentication of a digital signature,
which has been generated by the cryptographic algorithm implemented in the RFID tag, and
as the location of a URL address of the public key,
which together with said private key has been generated by the cryptographic algorithm implemented in the RFID tag.
2. The method as recited in claim 1 , characterized in
that the RFID tag generates the digital signature in response to a message from the user interrogator
and that in the application providing for the authentication of the digital signature the user interrogator uses the public key to check whether said digital signature has been generated with the private key corresponding to the public key.
3. The method as recited in claim 2, characterized in
that the user interrogator is a portable telephone provided with an NFC module.
4. The method as recited in claim 2, characterized in
that the user interrogator is a personal digital assistant.
5. The method as recited in claim 3 or 4, characterized in
that the user interrogator operates at a frequency of 13.56 MHz.
6. The method as recited in claim 3 or 4, characterized in
that the user interrogator operates in the UHF frequency range.
7. The method as recited in claim 5 or 6, characterized in
that the RFID tag recognizes an interrogator as a user interrogator or professional interrogator by an RFID protocol used by said interrogator.
8. The method as recited in claim 5 or 6, characterized in
that the RFID tag recognizes an interrogator,
that established a contact communication with it,
as a professional interrogator.
9. The method as recited in claim 5 or 6, characterized in
that the RFID tag recognizes an interrogator as a user interrogator or a professional interrogator by a command used by said interrogator.
10. The method as recited in claim 5 or 6, characterized in
that the RFID tag recognizes an interrogator as a user interrogator or professional interrogator by a frequency, at which said interrogator signals.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SI200900204A SI23114A (en) | 2009-07-20 | 2009-07-20 | Procedure for the verification of the authenticity of a rfid label |
SIP-200900204 | 2009-07-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011010970A1 true WO2011010970A1 (en) | 2011-01-27 |
Family
ID=42761250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SI2010/000043 WO2011010970A1 (en) | 2009-07-20 | 2010-07-09 | Method for authentication of an rfid tag |
Country Status (2)
Country | Link |
---|---|
SI (1) | SI23114A (en) |
WO (1) | WO2011010970A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012163920A3 (en) * | 2011-05-31 | 2013-01-24 | Copy Stop Systems Aps | A system and a method for verifying a communication device |
FR2999307A1 (en) * | 2012-12-06 | 2014-06-13 | Archos | Method for distributing e.g. video application on touch interface of tablet computer, involves allowing mediator distribution object to interact with digital equipment to authorize loading of software application in equipment |
GB2516154A (en) * | 2013-05-03 | 2015-01-14 | Now 2 Now Ltd | Communication tag, system and method |
US9734365B2 (en) | 2012-09-10 | 2017-08-15 | Avery Dennison Retail Information Services, Llc | Method for preventing unauthorized diversion of NFC tags |
US9767329B2 (en) | 2012-11-19 | 2017-09-19 | Avery Dennison Retail Information Services, Llc | NFC tags with proximity detection |
US9858583B2 (en) | 2011-09-01 | 2018-01-02 | Avery Dennison Retail Information Services, Llc | Apparatus, system and method for tracking consumer product interest using mobile devices |
US9892398B2 (en) | 2011-11-02 | 2018-02-13 | Avery Dennison Retail Information Services, Llc | Distributed point of sale, electronic article surveillance, and product information system, apparatus and method |
CN108370501A (en) * | 2015-12-15 | 2018-08-03 | 索尼移动通讯有限公司 | Method and apparatus for searching RFID tag |
US10540527B2 (en) | 2012-10-18 | 2020-01-21 | Avery Dennison Retail Information Services Llc | Method, system and apparatus for NFC security |
US10977969B2 (en) | 2010-01-29 | 2021-04-13 | Avery Dennison Retail Information Services, Llc | RFID/NFC panel and/or array used in smart signage applications and method of using |
US10977965B2 (en) | 2010-01-29 | 2021-04-13 | Avery Dennison Retail Information Services, Llc | Smart sign box using electronic interactions |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
US11744962B2 (en) | 2018-03-26 | 2023-09-05 | Philip Morris Products S.A. | Inhaler with composite porous support element |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0784256A1 (en) * | 1995-12-22 | 1997-07-16 | Intel Corporation | Method and apparatus for public-key cryptography using a secure semiconductor device |
EP1205405A1 (en) * | 1999-12-28 | 2002-05-15 | Matsushita Electric Industrial Co., Ltd. | Information recording medium, noncontact ic tag, access device, access system, life cycle management system, input/output method, and access method |
US20060133606A1 (en) | 2004-12-09 | 2006-06-22 | Jorg Eberwein | Crypto-wireless-tag |
EP1710764A1 (en) * | 2005-04-07 | 2006-10-11 | Sap Ag | Authentication of products using identification tags |
US20070106897A1 (en) * | 2005-11-07 | 2007-05-10 | Michael Kulakowski | Secure RFID authentication system |
-
2009
- 2009-07-20 SI SI200900204A patent/SI23114A/en not_active IP Right Cessation
-
2010
- 2010-07-09 WO PCT/SI2010/000043 patent/WO2011010970A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0784256A1 (en) * | 1995-12-22 | 1997-07-16 | Intel Corporation | Method and apparatus for public-key cryptography using a secure semiconductor device |
EP1205405A1 (en) * | 1999-12-28 | 2002-05-15 | Matsushita Electric Industrial Co., Ltd. | Information recording medium, noncontact ic tag, access device, access system, life cycle management system, input/output method, and access method |
US20060133606A1 (en) | 2004-12-09 | 2006-06-22 | Jorg Eberwein | Crypto-wireless-tag |
EP1710764A1 (en) * | 2005-04-07 | 2006-10-11 | Sap Ag | Authentication of products using identification tags |
US20070106897A1 (en) * | 2005-11-07 | 2007-05-10 | Michael Kulakowski | Secure RFID authentication system |
Non-Patent Citations (1)
Title |
---|
BENOIT CALMELS ET AL: "Low-Cost Cryptography for Privacy in RFID Systems", 1 January 2006, SMART CARD RESEARCH AND ADVANCED APPLICATIONS LECTURE NOTES IN COMPUTER SCIENCE;;LNCS, SPRINGER, BERLIN, DE, PAGE(S) 237 - 251, ISBN: 978-3-540-33311-1, XP019029959 * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10977965B2 (en) | 2010-01-29 | 2021-04-13 | Avery Dennison Retail Information Services, Llc | Smart sign box using electronic interactions |
US10977969B2 (en) | 2010-01-29 | 2021-04-13 | Avery Dennison Retail Information Services, Llc | RFID/NFC panel and/or array used in smart signage applications and method of using |
WO2012163920A3 (en) * | 2011-05-31 | 2013-01-24 | Copy Stop Systems Aps | A system and a method for verifying a communication device |
US10607238B2 (en) | 2011-09-01 | 2020-03-31 | Avery Dennison Corporation | Apparatus, system and method for consumer tracking consumer product interest using mobile devices |
US9858583B2 (en) | 2011-09-01 | 2018-01-02 | Avery Dennison Retail Information Services, Llc | Apparatus, system and method for tracking consumer product interest using mobile devices |
US9892398B2 (en) | 2011-11-02 | 2018-02-13 | Avery Dennison Retail Information Services, Llc | Distributed point of sale, electronic article surveillance, and product information system, apparatus and method |
US10282572B2 (en) | 2012-09-10 | 2019-05-07 | Avery Dennison Retail Information Services, Llc | Method for preventing unauthorized diversion of NFC tags |
US9734365B2 (en) | 2012-09-10 | 2017-08-15 | Avery Dennison Retail Information Services, Llc | Method for preventing unauthorized diversion of NFC tags |
US10540527B2 (en) | 2012-10-18 | 2020-01-21 | Avery Dennison Retail Information Services Llc | Method, system and apparatus for NFC security |
US11126803B2 (en) | 2012-10-18 | 2021-09-21 | Avery Dennison Corporation | Method, system and apparatus for NFC security |
US10402598B2 (en) | 2012-11-19 | 2019-09-03 | Avery Dennison Retail Information Services, Llc | NFC tags with proximity detection |
US9767329B2 (en) | 2012-11-19 | 2017-09-19 | Avery Dennison Retail Information Services, Llc | NFC tags with proximity detection |
US10970496B2 (en) | 2012-11-19 | 2021-04-06 | Avery Dennison Retail Information Services, Llc | NFC tags with proximity detection |
FR2999307A1 (en) * | 2012-12-06 | 2014-06-13 | Archos | Method for distributing e.g. video application on touch interface of tablet computer, involves allowing mediator distribution object to interact with digital equipment to authorize loading of software application in equipment |
GB2516154A (en) * | 2013-05-03 | 2015-01-14 | Now 2 Now Ltd | Communication tag, system and method |
GB2516154B (en) * | 2013-05-03 | 2021-05-26 | Now 2 Now Ltd | Communication tag, system and method |
CN108370501A (en) * | 2015-12-15 | 2018-08-03 | 索尼移动通讯有限公司 | Method and apparatus for searching RFID tag |
CN108370501B (en) * | 2015-12-15 | 2021-06-04 | 索尼公司 | Method, device and system for searching RFID (radio frequency identification) tag |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
US11744962B2 (en) | 2018-03-26 | 2023-09-05 | Philip Morris Products S.A. | Inhaler with composite porous support element |
Also Published As
Publication number | Publication date |
---|---|
SI23114A (en) | 2011-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011010970A1 (en) | Method for authentication of an rfid tag | |
US11240222B2 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
US9860235B2 (en) | Method of establishing a trusted identity for an agent device | |
US20110296169A1 (en) | Facilitating secure communication between utility devices | |
KR102169947B1 (en) | Method of establishing a trusted identity for an agent device | |
EP2492836A1 (en) | Terminal management system and terminal management method | |
CN105144767A (en) | Apparatus, user terminal and method for checking message | |
RU2011151051A (en) | VERIFICATION OF PORTABLE CONSUMER DEVICES | |
KR20130082243A (en) | Method for authenticating using a qr code | |
CN108282453A (en) | Internet of things reading device, safe access method and control center equipment | |
CN1776720A (en) | System and method for realizing anticounter feit recognition utilizing radiofrequency technology | |
WO2003032219A1 (en) | Settlement authentication server system using ai authentication | |
CN107437997B (en) | Radio frequency communication device and method | |
CN106779711A (en) | Safe payment method and device based on eID | |
US20190349348A1 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
KR100601854B1 (en) | System for Providing of Exhibition Information Using RF-ID and Mobile Communication Terminal therefor | |
WO2010035137A2 (en) | Secure managed data collection and transmission | |
JP2015228570A (en) | Authentication system and portable communication terminal | |
CN101365247A (en) | Digital copyright file transmitting method, terminal, digital copyright management server and system | |
CN104662940A (en) | Secure deployment of terminals in a wireless network | |
JP2008061200A (en) | Method and system for preventing illegal use of mobile communication terminal device | |
KR101742105B1 (en) | Phone number security certification apparatus using qr code and system thereof and metrhod thereof | |
JP2007323568A (en) | Electronic apparatus, authentication device, its program, computer-readable recording medium, authentication system, and authentication method | |
CN102236862A (en) | System and method for identifying authenticity of general commodities | |
TWI463414B (en) | Radio-frequency identification reader |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10747707 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10747707 Country of ref document: EP Kind code of ref document: A1 |