摘要:
Various embodiments are described herein for a Key Management System (KMS) and associated methods for providing authentication and secure shared key distribution capabilities without revealing a device's secret key. The KMS allows one or more accessing applications or devices residing on a variety of systems and associated with a plurality of organizations to efficiently authenticate other applications or devices with which they are in communication and to securely establish a shared secret between authenticated applications or devices. Secret keys may be cached throughout the KMS system for off-line and efficient operations. The KMS system enables authentication of devices and secure communication between these devices which may have been created and secured under different domains without those domains having an a priori relationship.
摘要:
An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state.
摘要:
A system for routing data in an automatic identification system includes an event management system (EMS), a real-time in-memory data structure (RIED) coupled to the EMS, the RIED for storing event information gathered by the EMS and a task management system (TMS) for ensuring that the RIED is updated by one transaction at a time. With this particular arrangement, a system for managing a large number of real-time events is provided. In one embodiment, the control system can be provided in a distributed hierarchical arrangement. The EMS of each control system can include filters which limit the amount of information provided to the next level in the hierarchy. In this manner the hierarchical control system network acts as a high volume data collector and processor. In some embodiments a level of the hierarchy can be removed spatially and/or temporally from an adjacent level in the hierarchy. This approach results in an intelligent network and also lends itself to scalability. By including optional filters and queues in the EMS, the EMS can be configured as desired.
摘要:
In accordance with the present invention, a radio frequency identification (RFID) tag for use with an RFID system which includes one or more RFID tag readers, includes a tag communication device adapted to communicate with each of the one or more tag readers, a one-way hash function stored on the RFID tag, and a memory having stored therein a metaID. The tags may be locked and unlocked. The system includes a reader and a database. The system communicates with the tags via a forward channel and a backward channel. The present invention can singulate one tag from several responding tags and acquire the ID for the singulated tag.
摘要:
An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state.
摘要:
A system for routing data in an automatic identification system includes an event management system (EMS), a real-time in-memory data structure (RIED) coupled to the EMS, the RIED for storing event information gathered by the EMS and a task management system (TMS) for ensuring that the RIED is updated by one transaction at a time. With this particular arrangement, a system for managing a large number of real-time events is provided. In one embodiment, the control system can be provided in a distributed hierarchical arrangement. The EMS of each control system can include filters which limit the amount of information provided to the next level in the hierarchy. In this manner the hierarchical control system network acts as a high volume data collector and processor. In some embodiments a level of the hierarchy can be removed spatially and/or temporally from an adjacent level in the hierarchy. This approach results in an intelligent network and also lends itself to scalability. By including optional filters and queues in the EMS, the EMS can be configured as desired.
摘要:
An object name system (ONS) for locating one or more servers associated with an Electronic Product Code (EPC) is described. The system utilizes translation format strings to translate an EPC to an EPC domain prefix. The ONS server matches the EPC number to the address of a second server which has extensive information about the product. The second server recognizes the incoming EPC's as belonging to a particular object or service.
摘要:
A control system for routing data in an automatic identification system includes an event management system (EMS), a real-time in-memory data structure (RIED) and a task management system (TMS). The control system can be provided in a distributed hierarchical arrangement. The EMS of each control system can include filters which limit the amount of information provided to the next level in the hierarchy. In this manner the hierarchical control system network acts as a high volume data collector and processor. In some embodiments a level of the hierarchy can be removed spatially and/or temporally from an adjacent level in the hierarchy.
摘要:
An efficient implementation of a cryptographic processor that dynamically updates the encryption state is described. The cryptographic processor can be implemented with a minimal number of gates, yet still perform cryptographic operations quickly. The cryptographic processor has an interface, a memory, a pseudorandom permutation block and control logic. The interface receives input data blocks and returns cryptographically processed data blocks. The memory is used to store an encryption state of the cryptographic processor. The pseudorandom permutation block transforms a portion of the encryption state that is modified for each input data block by at least the input data block and a previously transformed data block. The control logic routes data in the cryptographic processor to return cryptographically processed data blocks at the interface and update dynamically the encryption state stored in memory using the transformed data blocks from the pseudorandom permutation block.
摘要:
A single antenna single reader (SASR) system and method for locating a tag. The reader connects to a single antenna that is in motion. The reader transmits an interrogation signal to the tag. The reader receives a response signal from the tag. The reader determines the range of the tag from the reader, the received signal strength (RSS) of the response signal at the reader from the tag, and the maximum correlation of the response signal at the reader from the tag. The reader determines the location of the tag using range of the tag from the reader, received signal strength and maximum correlation of the response signal.