METHOD FOR TUNING AN OSCILLATING RECEIVER CIRCUIT OF A TRANSPONDER BUILT INTO A RFID SYSTEM
The method of cryptological authentification in a scanning identification system comprising a base station, which supplies energy via the alternating field to a transponder connected to the object to be identified, includes the following method steps. For essentially the entire communication between...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English French German |
Published |
30.06.1999
|
Edition | 6 |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The method of cryptological authentification in a scanning identification system comprising a base station, which supplies energy via the alternating field to a transponder connected to the object to be identified, includes the following method steps. For essentially the entire communication between the base station and the transponder, the base station generates an inquiry signal. Upon receiving the inquiry signal transmitted by the base station, the transponder responds with an identification number stored in its memory. The base station then encodes a first bit sequence it has generated by using a key bit sequence that is allocated to the identification number of the transponder, and transmits the second bit sequence obtained in this manner to the transponder. When the second bit sequence is received, the transponder generates a checking bit sequence from the second bit sequence, and, following the complete reception of the second bit sequence, transmits this checking bit sequence to the base station. The checking bit sequence serves to verify the correct reception of the second bit sequence. For cryptographic authentification, the transponder encodes the first bit sequence reconstructed from the second bit sequence using the key bit sequence allocated to the transponder, and transmits the third bit sequence obtained in this manner to the base station. While the transponder is still encoding the second bit sequence to form the third bit sequence, the base station uses the checking bit sequence to verify whether an error has occurred in the transmission of the second bit sequence, and may abort the ongoing encoding in the transponder. This can abort the ongoing authentification, because a valid result cannot be anticipated. Thus, time is gained at the start of a new running of the authentification method. |
---|---|
AbstractList | The method of cryptological authentification in a scanning identification system comprising a base station, which supplies energy via the alternating field to a transponder connected to the object to be identified, includes the following method steps. For essentially the entire communication between the base station and the transponder, the base station generates an inquiry signal. Upon receiving the inquiry signal transmitted by the base station, the transponder responds with an identification number stored in its memory. The base station then encodes a first bit sequence it has generated by using a key bit sequence that is allocated to the identification number of the transponder, and transmits the second bit sequence obtained in this manner to the transponder. When the second bit sequence is received, the transponder generates a checking bit sequence from the second bit sequence, and, following the complete reception of the second bit sequence, transmits this checking bit sequence to the base station. The checking bit sequence serves to verify the correct reception of the second bit sequence. For cryptographic authentification, the transponder encodes the first bit sequence reconstructed from the second bit sequence using the key bit sequence allocated to the transponder, and transmits the third bit sequence obtained in this manner to the base station. While the transponder is still encoding the second bit sequence to form the third bit sequence, the base station uses the checking bit sequence to verify whether an error has occurred in the transmission of the second bit sequence, and may abort the ongoing encoding in the transponder. This can abort the ongoing authentification, because a valid result cannot be anticipated. Thus, time is gained at the start of a new running of the authentification method. |
Author | HIRSCH, KONRAD BRUHNKE, MICHAEL SCHUELGEN, ANDREAS MELCHIOR, MARC |
Author_xml | – fullname: HIRSCH, KONRAD – fullname: MELCHIOR, MARC – fullname: SCHUELGEN, ANDREAS – fullname: BRUHNKE, MICHAEL |
BookMark | eNqNiksKwjAUALPQhb87vAsIVsmiy5i82AdtUpJXQVyUInElbaHeHyt4AFfDMLMWi37o00rcK-TCG7A-ADeO3AWUAx81laXirwbUSFcMoCnohhi8BQUclIu1d2YO54ZKBnLs5xAsGYi3yFhtxfLZvaa0-3EjwCLrYp_GoU3T2D1Sn94t1of8KKXMVHb6Y_kASZ0zNg |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
DocumentTitleAlternate | VERFAHREN ZUM ABGLEICH EINES EMPFANGSSCHWINGKREISES EINES TRANSPONDERS IN EINEM RFID SYSTEM TECHNIQUE DE REGLAGE D'UN CIRCUIT RECEPTEUR OSCILLANT D'UN TRANSPONDEUR INTEGRE A UN SYTEME D'IDENTIFICATION A BALAYAGE (RFID) |
Edition | 6 |
ExternalDocumentID | EP0925551A1 |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_EP0925551A13 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 14:37:05 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English French German |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_EP0925551A13 |
Notes | Application Number: EP19970942920 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=19990630&DB=EPODOC&CC=EP&NR=0925551A1 |
ParticipantIDs | epo_espacenet_EP0925551A1 |
PublicationCentury | 1900 |
PublicationDate | 19990630 |
PublicationDateYYYYMMDD | 1999-06-30 |
PublicationDate_xml | – month: 06 year: 1999 text: 19990630 day: 30 |
PublicationDecade | 1990 |
PublicationYear | 1999 |
RelatedCompanies | TEMIC TELEFUNKEN MICROELECTRONIC GMBH |
RelatedCompanies_xml | – name: TEMIC TELEFUNKEN MICROELECTRONIC GMBH |
Score | 2.4988475 |
Snippet | The method of cryptological authentification in a scanning identification system comprising a base station, which supplies energy via the alternating field to... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | ACCESSORIES THEREFOR ANALOGOUS ARRANGEMENTS USING OTHER WAVES CALCULATING CHECKING-DEVICES COIN-FREED OR LIKE APPARATUS COMPUTING COUNTING DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY FIXED CONSTRUCTIONS HANDCUFFS HANDLING RECORD CARRIERS INFORMATION STORAGE KEYS LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION ORRERADIATION OF RADIO WAVES LOCKS MEASURING PHYSICS PRESENTATION OF DATA RADIO DIRECTION-FINDING RADIO NAVIGATION RECOGNITION OF DATA RECORD CARRIERS SAFES STATIC STORES TESTING TRANSMISSION TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION WINDOW OR DOOR FITTINGS |
Title | METHOD FOR TUNING AN OSCILLATING RECEIVER CIRCUIT OF A TRANSPONDER BUILT INTO A RFID SYSTEM |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=19990630&DB=EPODOC&locale=&CC=EP&NR=0925551A1 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDLYm3jcYIMZLOaDeKrYu7dbDhLo0ZUX0oTabhjhMXZtKu2wTK-Lv41bd4AI3x5asxJITf4ntADzoSY77oknVHtURoORZpvZlTlWq5f0809K5VmUTer4xGtOXqT5twGJbC1P1Cf2qmiOiR6Xo70W1X69_LrHsKrdy8zhfIGv15IiBrWR1uZhZtpBS7OGAh4EdMIUxpBQ_GrRNjJ31joVAaR-pXukMfDIsi1LWv08U5xQOQlS2LM6gkckmHLPtx2tNOPLq9-4mHFYJmukGmbUTbs7h3eNiFNgE8RsRiN_8Z2L5JIgZAnNLlMOIM-5OeESYG7GxK0jgEIuIyPLjMCirCshw7L4K4voiQEHkuDaJ32LBvQsgDhdspOJ8ZzvbzHi4W1n3EvaWq6W8AiJTDMQMauRm1qWm7CVS00yaGHlKpZ50zBa0_lRz_Y_sBk7qtgVqt30Le8XHp7zDQ7mY31fm_AY454kC |
link.rule.ids | 230,309,783,888,25576,76876 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8JAEJ4QfOBNUSM-92B6a4SyLfRATNlubZU-0i4E44GUPhIuQATj33faVPSit92dZLI7yTy-3ZlZgHs1ztEu6lTuURUBSp6mcj_LqUyVvJ-nSjJXymxC19PsMX2eqtMaLL5rYco-oZ9lc0TUqAT1fVva6_XPJZZZ5lZuHuYLXFo9WmJgSmlVLqYXLaQkczjggW_6TGIMR5IXDto6xs5qx0CgtIcRdq9QBj4ZFkUp698exTqG_QCZLbcnUEuzJjTY98drTTh0q_fuJhyUCZrJBhcrJdycwpvLhe2bBPEbEYjfvCdieMSPGAJzQxTTkDPuTHhImBOysSOIbxGDiNDwosAvqgrIcOyMBHE84SMhtByTRK-R4O4ZEIsLZsu439lONjMe7E7WPYf6crXMLoBkCQZiGtVyPe1SPevFmaLoNNbyhGZq3NFb0PqTzeU_tDto2MIdzUaO93IFR1ULA7nbvob69v0ju0EHvZ3flqL9AtGyi_U |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=METHOD+FOR+TUNING+AN+OSCILLATING+RECEIVER+CIRCUIT+OF+A+TRANSPONDER+BUILT+INTO+A+RFID+SYSTEM&rft.inventor=HIRSCH%2C+KONRAD&rft.inventor=MELCHIOR%2C+MARC&rft.inventor=SCHUELGEN%2C+ANDREAS&rft.inventor=BRUHNKE%2C+MICHAEL&rft.date=1999-06-30&rft.externalDBID=A1&rft.externalDocID=EP0925551A1 |