Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Badge II - RF badge communication

IP.com Disclosure Number: IPCOM000019993D
Original Publication Date: 2003-Oct-16
Included in the Prior Art Database: 2003-Oct-16
Document File: 1 page(s) / 4K

Publishing Venue

IBM

Abstract

Improved RF badge communication as protection against mobile badge readers

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 69% of the total text.

Page 1 of 1

Badge II - RF badge communication

  Normally a RF-Badge exchanges security data with a badge reader. With a portable badge reader and a smart communication program, someone could try to bring the badge to respond with the secret identification code.

    To protect a badge from such attacks, following is suggested: The badge first sends the standard badge-ID. The system generates, especially for that badge, a unique question-code and a unique answer code. The question code is sent to the badge and includes a partial answer code. The badge then generates with the question code, the same algorithm and the same data, an answer code.

    If the given partial answer code does not match the related pieces in the generated answer code, the badge will know that the communication is not with the right system.

    Otherwise the secret identification code is enciphered with the full answer code and is sent to the system.

    In the case, that the communication is not with the right system, a counter can be increased and the badge will either not respond, respond with the received data, or respond just with random data. The value of that counter could always be transferred to the system and could influence reactions by the badge and/or the system.

    The badge can hold an array of unique given data, which is used by an algorithm to build the answer code. A copy of that data is hold for every badge in the system. The array could be seen as a virtual 3D array and the algorithm could additionally sa...