Abstract:
In accordance with a first aspect of the present disclosure, a communication device for use in one or more challenge-response rounds is provided, comprising: a response generation unit configured to generate, in each challenge-response round, a response to a challenge received from an external communication device, wherein said response is generated by performing a cryptographic function on said challenge, and wherein the cryptographic function takes said challenge and a cryptographic key as inputs; a key selection unit configured to select said cryptographic key from a set of cryptographic keys by executing a predefined key selection algorithm that has been shared with the external communication device. Further aspects of the present disclosure relate to another communication device for use in one of more challenge-response rounds, corresponding methods of operating communication devices, and computer programs for carrying out said methods.
Abstract:
In one embodiment, a communication apparatus is provided. The apparatus includes a near field communication circuit designed to update at least one event field, associated with a number of occurrences of at least one event, which converted from a first data coding format to a second data coding format and provided in an external communication message that is communicated automatically or in response to receiving an access command. Also included in the instant specification are communication systems, and methods of communicating.
Abstract:
The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID systems. Furthermore, reader devices used for authentication of RFID transponders do not need to be on-line and do not need to be equipped with a Security Authentication Module (SAM). This simplifies authentication procedures and reduces costs. According to an exemplary embodiment of the invention a transponder-specific originality signature is stored by a transponder manufacturer on the transponder. The transponder-specific originality signature may, for example, be stored in the non-volatile memory (EEPROM) of the transponder during the fabrication of the transponder. This transponder-specific originality signature can be checked at any time in a convenient way, which provides an indication of originality of said transponder.
Abstract:
In one embodiment, a communication apparatus is provided. The apparatus includes a near field communication circuit designed to update at least one event field, associated with a number of occurrences of at least one event, which converted from a first data coding format to a second data coding format and provided in an external communication message that is communicated automatically or in response to receiving an access command. Also included in the instant specification are communication systems, and methods of communicating.
Abstract:
The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID systems. Furthermore, reader devices used for authentication of RFID transponders do not need to be on-line and do not need to be equipped with a Security Authentication Module (SAM). This simplifies authentication procedures and reduces costs. According to an exemplary embodiment of the invention a transponder-specific originality signature is stored by a transponder manufacturer on the transponder. The transponder-specific originality signature may, for example, be stored in the non-volatile memory (EEPROM) of the transponder during the fabrication of the transponder. This transponder-specific originality signature can be checked at any time in a convenient way, which provides an indication of originality of said transponder.