RFID loss-prevention based on transition risk

    公开(公告)号:US11748703B1

    公开(公告)日:2023-09-05

    申请号:US17592598

    申请日:2022-02-04

    申请人: Impinj, Inc.

    摘要: An RFID loss-prevention system (LPS) may monitor RFID-tagged items in a facility. An RFID reader transmits a first inventory command configured to cause tags in a first state to respond, receive a reply from a first tag, determine that the first tag has a low transition risk, and cause the first tag to switch to a second state. The reader may also receive a reply from a second tag, determine that the second tag has a high transition risk, and cause the second tag to remain in the first state. The reader may then transmit a second inventory command configured to cause tags in the first state to respond, receive a reply from the second tag in response to the second inventory command, determine that the second tag has inappropriately exited the facility, and issue an alert.

    Location-based access to RFID tag information

    公开(公告)号:US10733395B1

    公开(公告)日:2020-08-04

    申请号:US16270611

    申请日:2019-02-08

    申请人: Impinj, Inc.

    摘要: Embodiments are directed to restricting access to Radio Frequency Identification (RFID) tag information based on location. Access to RFID tag information may be restricted at the reader level, at the requester level, and at the network level. When reader-level restrictions exist, devices may be prevented from inventorying tags and retrieving information from tags. When requester-level restrictions exist, a requester or device may be prevented from receiving tag information from inventoried tags or a network. When network-level restrictions exist, a network may discard or otherwise restrict tag information received from devices.

    RFID loss-prevention based on transition risk

    公开(公告)号:US10521768B1

    公开(公告)日:2019-12-31

    申请号:US16455792

    申请日:2019-06-28

    申请人: Impinj, Inc.

    摘要: An RFID loss-prevention system (LPS) may monitor RFID-tagged items in a facility. An RFID reader transmits a first inventory command configured to cause tags in a first state to respond, receive a reply from a first tag, determine that the first tag has a low transition risk, and cause the first tag to switch to a second state. The reader may also receive a reply from a second tag, determine that the second tag has a high transition risk, and cause the second tag to remain in the first state. The reader may then transmit a second inventory command configured to cause tags in the first state to respond, receive a reply from the second tag in response to the second inventory command, determine that the second tag has inappropriately exited the facility, and issue an alert.

    RFID loss-prevention based on transition risk

    公开(公告)号:US10373115B1

    公开(公告)日:2019-08-06

    申请号:US15811554

    申请日:2017-11-13

    申请人: Impinj, Inc.

    摘要: An RFID loss-prevention system (LPS) may monitor RFID-tagged items in a facility. An RFID reader transmits a first inventory command configured to cause tags in a first state to respond, receive a reply from a first tag, determine that the first tag has a low transition risk, and cause the first tag to switch to a second state. The reader may also receive a reply from a second tag, determine that the second tag has a high transition risk, and cause the second tag to remain in the first state. The reader may then transmit a second inventory command configured to cause tags in the first state to respond, receive a reply from the second tag in response to the second inventory command, determine that the second tag has inappropriately exited the facility, and issue an alert.

    RFID tags with dynamic key replacement
    6.
    发明授权
    RFID tags with dynamic key replacement 有权
    具有动态钥匙更换的RFID标签

    公开(公告)号:US09565022B1

    公开(公告)日:2017-02-07

    申请号:US14318367

    申请日:2014-06-27

    申请人: Impinj, Inc.

    摘要: A cryptographically-enabled RFID tag stores a primary secret key and derives secondary keys from the primary key. A secondary key may be derived by combining the primary key with one or more other parameters using one or more algorithms. The tag uses a derived secondary key to encrypt or electronically sign a tag response sent to a verifying entity. The verifying entity does not know the derived secondary key, but knows the tag primary key and the parameters and algorithms used to derive the secondary key and can derive all of the potential secondary keys. The verifying entity can then attempt to authenticate the tag or tag response by trying potential secondary keys.

    摘要翻译: 启用加密功能的RFID标签存储主密钥,并从主键导出辅助密钥。 可以通过使用一个或多个算法将主键与一个或多个其他参数组合来导出次要键。 标签使用派生的次要密钥来加密或电子签名发送到验证实体的标签响应。 验证实体不知道派生的辅助密钥,而是知道标签主键以及用于导出辅助密钥的参数和算法,并且可以导出所有潜在的辅助密钥。 然后,验证实体可以尝试通过尝试潜在的次要密钥来验证标签或标签响应。

    RFID loss-prevention based on transition risk

    公开(公告)号:US11244282B1

    公开(公告)日:2022-02-08

    申请号:US17326520

    申请日:2021-05-21

    申请人: Impinj, Inc.

    摘要: An RFID loss-prevention system (LPS) may monitor RFID-tagged items in a facility. An RFID reader transmits a first inventory command configured to cause tags in a first state to respond, receive a reply from a first tag, determine that the first tag has a low transition risk, and cause the first tag to switch to a second state. The reader may also receive a reply from a second tag, determine that the second tag has a high transition risk, and cause the second tag to remain in the first state. The reader may then transmit a second inventory command configured to cause tags in the first state to respond, receive a reply from the second tag in response to the second inventory command, determine that the second tag has inappropriately exited the facility, and issue an alert.

    Portal monitoring with steered-beam RFID systems

    公开(公告)号:US10650346B1

    公开(公告)日:2020-05-12

    申请号:US16137555

    申请日:2018-09-21

    申请人: Impinj, Inc.

    IPC分类号: G06Q30/00 G06Q10/08 G06K7/10

    摘要: Portals and other chokepoints can be monitored with RFID reader systems. A portion of an RFID reader system capable of generating multiple beams can be mounted between two adjacent chokepoints such that some beams are associated with one chokepoint while other beams are associated with the other chokepoint. When replies from an item are received, the item can be associated with a chokepoint based on parameters or characteristics associated with the replies and/or the beam(s) on which the replies are received. If the detected item is moving, its movement direction through the chokepoint and/or its movement speed may also be determined.