Optimization of a binary tree traversal with secure communications

Methods and systems for the negotiation of a population of RFID tags with improved security is provided. In one aspect, a binary traversal is performed to singulate tags without using information that directly identifies the tags in the tag population. A key is generated to identify each RFID tag of...

Full description

Saved in:
Bibliographic Details
Main Authors POWELL KEVIN J, SHANKS WAYNE E, BANDY WILLIAM R
Format Patent
LanguageEnglish
Published 15.07.2004
Edition7
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Methods and systems for the negotiation of a population of RFID tags with improved security is provided. In one aspect, a binary traversal is performed to singulate tags without using information that directly identifies the tags in the tag population. A key is generated to identify each RFID tag of the population of RFID tags. The generated key does not include bits identifying an item with which the particular RFID tag is associated. A binary tree algorithm is operated to identify one or more tags in the population of RFIDs tags using the generated keys. In another aspect, frequency hopping and/or spread spectrum techniques are used to provide improved security while negotiating tags. In another aspect, the reader causes the tags to scroll series of bits back to the reader for each bit sent to the tags to provide improved security.
Bibliography:Application Number: US20030693687