Patents Assigned to SkyeTek, Inc.
  • Patent number: 7859411
    Abstract: A system for predicting a trajectory of an item tagged with an RFID tag. The system includes a network of communicatively coupled RFID readers, each having tag cache memory, and a search engine communicatively coupled with the tag caches in each of the readers. When a tag is within operating range of one of the readers, the tag is interrogated for its data and path information comprising timestamps of reader-tag interactions and related event data, and updated path information is stored in the tag cache memory. The search engine performs a search the tag cache memory in one of one of the readers to locate information corresponding to search criteria including characteristics of the tagged item sought.
    Type: Grant
    Filed: March 25, 2008
    Date of Patent: December 28, 2010
    Assignee: SkyeTek, Inc.
    Inventor: Sayan Chakraborty
  • Patent number: 7659819
    Abstract: A framework structure for controlling an RFID device including a platform comprising an RFID radio. The structure comprises a layered framework including a first layer, with at least one functional module comprising a device driver, communicatively coupled with the platform; and a second layer, with at least one functional module comprising an API, communicatively coupled with the first layer and with an application for controlling the RFID device.
    Type: Grant
    Filed: March 23, 2006
    Date of Patent: February 9, 2010
    Assignee: SkyeTek, Inc.
    Inventor: Sean T. Loving
  • Publication number: 20090201133
    Abstract: A method for determining validity of an RFID tag. The method includes probing the tag using a series of tag commands to trigger a corresponding series of tag responses, comparing the tag responses to tag reference data stored in a database, and repeating the probing and comparing operations to determine whether or not the tag is valid.
    Type: Application
    Filed: December 3, 2008
    Publication date: August 13, 2009
    Applicant: SKYETEK, INC.
    Inventor: Logan Bruns
  • Publication number: 20090196373
    Abstract: A system for increasing the sensitivity of a receiver in an RFID tag reader. The system includes a directional coupler which receives the signal transmitted by the reader and which receives a backscatter signal from the RFID tag. The output of the directional coupler includes a transmit reference signal and a combined signal comprising the received signal and a transmit leakage signal. A first feedback loop generates an amplitude-compensated reference signal including a transmit signal component having the same amplitude as the transmit leakage signal. A second feedback loop adjusts the phase angle of the amplitude-compensated reference signal to a phase angle 180 degrees out-of-phase with the combined signal, to generate a canceling signal which effectively cancels out the transmit leakage signal component of the combined signal thereby improving the signal-to-noise ratio thereof.
    Type: Application
    Filed: February 2, 2009
    Publication date: August 6, 2009
    Applicant: SKYETEK, INC.
    Inventor: Lee SNOOK
  • Patent number: 7570164
    Abstract: A method for implementing a virtual tag in an RFID tag reading system. In one embodiment, data is read from the memory of an RFID tag and stored in tag cache memory. Commands intended for the tag are queued in the tag cache, and the commands queued in the tag cache are executed in response to occurrence of an event. A result is provided as if the command had been applied to the tag at the time of an initial request to send commands to the tag.
    Type: Grant
    Filed: December 30, 2005
    Date of Patent: August 4, 2009
    Assignee: SkyeTek, Inc.
    Inventors: Sayan Chakraborty, Brian McKinney
  • Publication number: 20080297326
    Abstract: A method for provisioning security for an RFID tag. Initially, a random new tag ID is generated, and a new master key is generated based on an existing master key. Encrypted user data to be placed on the tag is generated utilizing the new tag ID as an IV and the new master key as input to an encryption algorithm. The new tag ID and the encrypted user data are then written to the tag.
    Type: Application
    Filed: March 25, 2008
    Publication date: December 4, 2008
    Applicant: SKYETEK, INC.
    Inventors: Sayan Chakraborty, Vikram Shah, Logan Bruns
  • Publication number: 20080291041
    Abstract: A system for predicting a trajectory of an item tagged with an RFID tag. The system includes a network of communicatively coupled RFID readers, each having tag cache memory, and a search engine communicatively coupled with the tag caches in each of the readers. When a tag is within operating range of one of the readers, the tag is interrogated for its data and path information comprising timestamps of reader-tag interactions and related event data, and updated path information is stored in the tag cache memory. The search engine performs a search the tag cache memory in one of one of the readers to locate information corresponding to search criteria including characteristics of the tagged item sought.
    Type: Application
    Filed: March 25, 2008
    Publication date: November 27, 2008
    Applicant: SKYETEK, INC.
    Inventor: Sayan Chakraborty
  • Publication number: 20080290995
    Abstract: A method for optimizing communication between an RFID reader and an RFID tag. Initially, an RFID tag is detected, and the tag type is passively determined. An optimization goal is then selected. An optimal parameter set for communicating with the tag, based on the tag type and the optimization goal is then determined. The reader is then reconfigured using the optimal parameter set to communicate with the tag.
    Type: Application
    Filed: March 26, 2008
    Publication date: November 27, 2008
    Applicant: SkyeTek, Inc.
    Inventors: Logan Bruns, Sayan Chakraborty
  • Publication number: 20080290994
    Abstract: A method for creating an enhanced RFID tag. A longer range RFID tag and a relatively shorter range credential are proximately co-located in the same container. The longer range RFID tag is cryptographically bound to the shorter range credential by storing, on the longer range tag, signed data which includes indicia of the shorter range tag. The longer range RFID tag requires authorization via an authentication server to grant access to data stored in the enhanced RFID tag.
    Type: Application
    Filed: March 25, 2008
    Publication date: November 27, 2008
    Applicant: SKYETEK, INC.
    Inventors: Logan Bruns, Sayan Chakraborty
  • Patent number: 7456746
    Abstract: A phase shifting diode detector system for an RFID reader. Quarter-wave delay circuitry is coupled between a forward transmitted signal of the RFID reader applied at a first end of the delay circuitry, and a reflected signal returning from an RFID tag applied at a second end of the delay circuitry. The system includes a pair of diode detector bridges, each comprising a series-coupled diode pair configured such that diode polarities in each bridge are reversed relative to the output thereof, to produce opposite rectified signal output polarities. An input to each of the bridges is capacitively coupled, from the junction between each said diode pair, to a respective opposite end of the delay circuitry.
    Type: Grant
    Filed: August 31, 2006
    Date of Patent: November 25, 2008
    Assignee: SkyeTek, Inc.
    Inventors: Sean T. Loving, Sayan Chakraborty, Tim Enwall, Christopher Chan, Lee Snook, Rohit Majhi
  • Publication number: 20080042830
    Abstract: A method for implementing a virtual sensor in an RFID tag reading system, including an RFID reader and at least one RFID tag having tag memory in which sensor data is stored. Initially, sensor data is read from the tag memory. The sensor data is then stored in sensor cache memory in the reader. Sensor data is accordingly read and stored at a predetermined interval. The sensor data in sensor cache memory is periodically updated, via predictive modeling software stored in and executed by the reader, to determine a present or future estimated value for the sensor data from observed changes in the data.
    Type: Application
    Filed: June 21, 2007
    Publication date: February 21, 2008
    Applicant: SKYETEK, INC.
    Inventors: Sayan Chakraborty, Brian McKinney
  • Publication number: 20080022160
    Abstract: A method for detecting and isolating malware stored in an RFID tag. Data stored on the tag is read and scanned to detect malware in the data. if any suspected malware is detected, then the data is stored in a quarantine file in reader memory. The data isolated in the quarantine file may be flagged with a corrupted-tag indicator to indicate the presence of suspected said malware, or a corrupted-tag indicator may be stored in the quarantine file in lieu of the data read from the tag.
    Type: Application
    Filed: June 21, 2007
    Publication date: January 24, 2008
    Applicant: SKYETEK, INC.
    Inventor: Sayan Chakraborty
  • Publication number: 20080001752
    Abstract: A method for generating and using a consumable RFID tag in a system including a plurality of RFID tag readers communicatively coupled in a network in which the tag includes rewritable tag memory. Data is stored in the tag memory, including a sequence number, a UID, and an ownership ID. The data is signed with a key to generate signed content. Each time the tag is read by one of the readers in the network, the signature and sequence number in the tag memory are validated by comparing signed content stored in the tag with signature data stored in said one of the readers; a new sequence number is stored in the tag memory; contents of the tag memory, including the new sequence number and the ownership ID, are signed with a key to generate new signed content; and the new signed content is written to the tag memory.
    Type: Application
    Filed: June 21, 2007
    Publication date: January 3, 2008
    Applicant: SKYETEK, INC.
    Inventors: Logan Bruns, Sayan Chakraborty
  • Publication number: 20070206786
    Abstract: A process for handling secret data. In an RFID tag, a cryptography key protecting the secret data is written while with a first holder, a threshold cryptography share is stored, or an arbitrary value is obtained for an identity-based encryption (IBE) algorithm. The cryptography key can then be read and used by a second holder to access the secret data, the threshold cryptography shares can be read and aggregated with other shares to access the secret data, or the arbitrary value can be used as the basis for a public key to protect the secret data and with a corresponding private key to access the secret data.
    Type: Application
    Filed: January 18, 2006
    Publication date: September 6, 2007
    Applicant: Skyetek, Inc.
    Inventor: Sayan Chakraborty
  • Publication number: 20070206797
    Abstract: A Radio Frequency Identification (RFID) security system having a client, that includes a computerized system, at least one RFID tag, and a RFID reader. The computerized system and RFID reader employ a first security protocol and the RFID reader and RFID tags employ a second security protocol for communications. The security protocols permit encryption and/or authentication, and use either the same key exchange algorithms, the same encryption algorithms, and/or related keys to provide seamless communications within the RFID security system.
    Type: Application
    Filed: March 1, 2006
    Publication date: September 6, 2007
    Applicant: SKYETEK, INC.
    Inventors: Christopher Chan, Vikram Shah, Sayan Chakraborty