In a protocol for preserving the privacy of communications between a RFID reader and a RFID tag, two distinct actions are taken. First, the reader and the tag must be mutually authenticated as being authorized participants in the communications. After that process is successfully completed, the authenticity of each authorized participant must be validated prior to each subsequent communication between reader and tag.

 
Web www.patentalert.com

< Sending service data to an RFID tag while an attached computer system is powered off

> RFID reader/writer device

~ 00475