Patents by Inventor Scott A. Cooper
Scott A. Cooper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240305431Abstract: Protocol-specified RFID tag inventorying can be modified to streamline information exchange. For example, RFID tags may be able to respond to certain RFID reader commands with additional or other information instead of only a pseudorandom number or a certain tag identifier, or may not even respond at all. Such other information may include all or portions of other tag identifiers, or information associated with tag identifiers, such as error-checking codes or protocol control bits. Tags may also choose data stored in tag memory with location of the data known only to the tag, compare to a mask received in an inventorying command and decide to participate or not in an inventory round based on a comparison result.Type: ApplicationFiled: January 20, 2022Publication date: September 12, 2024Applicant: Impinj, Inc.Inventors: Megan Marie BREWSTER, Scott A. COOPER, Christopher J. DIORIO, John D. HYDE, Rene Dominic MARTINEZ, Matthew ROBSHAW
-
Publication number: 20240185004Abstract: RFID tag reply phase measurements can be used to estimate tag location and motion. The phase measurements can be used to directly calculate tag location/motion or to generate correlation probabilities with candidate tags having different location motion characteristics. An RFID reader system can take multiple phase measurements for a tag, at different carrier frequencies, within a single inventory round, to ensure that the tag remains within range of the reader system.Type: ApplicationFiled: June 10, 2022Publication date: June 6, 2024Applicant: Impinj, Inc.Inventors: Austin OURSLAND, Rene Dominic MARTINEZ, Vincent C. MORETTI, Pavel NIKITIN, Omer ONEN, Joe TARANTINO, Michael H. THOMAS, Yossi TEXERMAN, Scott A. COOPER, Christopher J. DIORIO
-
Patent number: 10916114Abstract: Methods and systems are described for authorizing an item with an RFID tag to leave a facility. In one embodiment, a mobile device receives or determines an exit code (EC) to write into the tag in response to providing authorizing information. The EC may be based on information stored in the tag such as the tag's item identifier or other tag information (collectively an item identifier or II), a ticket value, other information such as the OC, a mobile identity or location, or any other suitable information. Upon verification of the EC, the tagged item is allowed to leave the facility. In another embodiment, the mobile device stores an item identifier (II) associated with the tag and provides authorizing information. Upon verifying the authorizing information and confirming that the stored II corresponds to the tagged item's II, the tagged item is allowed to leave the facility.Type: GrantFiled: March 23, 2020Date of Patent: February 9, 2021Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw, Tan Mau Wu
-
Patent number: 10733395Abstract: Embodiments are directed to restricting access to Radio Frequency Identification (RFID) tag information based on location. Access to RFID tag information may be restricted at the reader level, at the requester level, and at the network level. When reader-level restrictions exist, devices may be prevented from inventorying tags and retrieving information from tags. When requester-level restrictions exist, a requester or device may be prevented from receiving tag information from inventoried tags or a network. When network-level restrictions exist, a network may discard or otherwise restrict tag information received from devices.Type: GrantFiled: February 8, 2019Date of Patent: August 4, 2020Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper, Kurt E. Sundstrom, Todd E. Humes, Alberto Pesavento
-
Patent number: 10713453Abstract: A Radio Frequency Identification (RFID) system including an RFID reader and a reader proxy authenticates itself to a verification authority. The proxy receives a proxy challenge from a verification authority and determines a proxy response based on the proxy challenge and a proxy key known to the proxy. The proxy response is then sent to the verification authority along with an identifier for the reader. The reader then authenticates an RFID tag by sending a tag response to the verification authority, which determines whether the reader is authentic based on the authenticity of the proxy response.Type: GrantFiled: December 21, 2018Date of Patent: July 14, 2020Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw
-
Patent number: 10664670Abstract: A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a tag identifier from the tag; challenging the tag with a tag challenge; receiving a tag response based at least on the tag challenge and the tag key but not including the tag key; sending a second message including at least the tag identifier and the tag response to a verification authority; and receiving a reply from the verification authority. The reader and the verification authority may mutually authenticate each other before, during, or after the tag authentication process. The verification authority may notify a designated party if a response is incorrect.Type: GrantFiled: November 29, 2018Date of Patent: May 26, 2020Assignee: Inpinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw
-
Patent number: 10600298Abstract: Methods and systems are described for authorizing an item with an RFID tag to leave a facility. In one embodiment, a mobile device receives or determines an exit code (EC) to write into the tag in response to providing authorizing information. The EC may be based on information stored in the tag such as the tag's item identifier or other tag information (collectively an item identifier or II), a ticket value, other information such as the OC, a mobile identity or location, or any other suitable information. Upon verification of the EC, the tagged item is allowed to leave the facility. In another embodiment, the mobile device stores an item identifier (II) associated with the tag and provides authorizing information. Upon verifying the authorizing information and confirming that the stored II corresponds to the tagged item's II, the tagged item is allowed to leave the facility.Type: GrantFiled: January 18, 2019Date of Patent: March 24, 2020Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw, Tan Mau Wu
-
Patent number: 10204245Abstract: Embodiments are directed to restricting access to Radio Frequency Identification (RFID) tag information based on location. Access to RFID tag information may be restricted at the reader level, at the requester level, and at the network level. When reader-level restrictions exist, devices may be prevented from inventorying tags and retrieving information from tags. When requester-level restrictions exist, a requester or device may be prevented from receiving tag information from inventoried tags or a network. When network-level restrictions exist, a network may discard or otherwise restrict tag information received from devices.Type: GrantFiled: April 5, 2018Date of Patent: February 12, 2019Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper, Kurt E. Sundstrom, Todd E. Humes, Alberto Pesavento
-
Patent number: 10186127Abstract: Methods and systems are described for authorizing an item with an RFID tag to leave a facility. In one embodiment, a mobile device receives or determines an exit code (EC) to write into the tag in response to providing authorizing information. The EC may be based on information stored in the tag such as the tag's item identifier or other tag information (collectively an item identifier or II), a ticket value, other information such as the OC, a mobile identity or location, or any other suitable information. Upon verification of the EC, the tagged item is allowed to leave the facility. In another embodiment, the mobile device stores an item identifier (II) associated with the tag and provides authorizing information. Upon verifying the authorizing information and confirming that the stored II corresponds to the tagged item's II, the tagged item is allowed to leave the facility.Type: GrantFiled: May 19, 2017Date of Patent: January 22, 2019Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw, Tan Mau Wu
-
Patent number: 10169625Abstract: A Radio Frequency Identification (RFID) system including an RFID reader and a reader proxy authenticates itself to a verification authority. The proxy receives a proxy challenge from a verification authority and determines a proxy response based on the proxy challenge and a proxy key known to the proxy. The proxy response is then sent to the verification authority along with an identifier for the reader. The reader then authenticates an RFID tag by sending a tag response to the verification authority, which determines whether the reader is authentic based on the authenticity of the proxy response.Type: GrantFiled: May 24, 2017Date of Patent: January 1, 2019Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw
-
Patent number: 10146969Abstract: A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a tag identifier from the tag; challenging the tag with a tag challenge; receiving a tag response based at least on the tag challenge and the tag key but not including the tag key; sending a second message including at least the tag identifier and the tag response to a verification authority; and receiving a reply from the verification authority. The reader and the verification authority may mutually authenticate each other before, during, or after the tag authentication process. The verification authority may notify a designated party if a response is incorrect.Type: GrantFiled: August 22, 2017Date of Patent: December 4, 2018Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw
-
Patent number: 9959435Abstract: Embodiments are directed to restricting access to Radio Frequency Identification (RFID) tag information based on location. Access to RFID tag information may be restricted at the reader level, at the requester level, and at the network level. When reader-level restrictions exist, devices may be prevented from inventorying tags and retrieving information from tags. When requester-level restrictions exist, a requester or device may be prevented from receiving tag information from inventoried tags or a network. When network-level restrictions exist, a network may discard or otherwise restrict tag information received from devices.Type: GrantFiled: November 23, 2016Date of Patent: May 1, 2018Assignee: IMPINJ, INC.Inventors: Christopher J. Diorio, Scott A. Cooper, Kurt E. Sundstrom, Todd E. Humes, Alberto Pesavento
-
Patent number: 9940490Abstract: An authentication method includes RFID tags authenticating RFID readers. A tag sends a tag identifier and a reader challenge to a reader in response to one or more commands from the reader. The reader then either derives a response to the reader challenge itself or has a verification authority derive the response. The response may be derived from parameter(s) in the reader challenge, and may be derived using a cryptographic key. The reader then sends the response to the tag along with another command. The tag verifies the response before executing instruction(s) included in the command.Type: GrantFiled: December 13, 2013Date of Patent: April 10, 2018Assignee: IMPINJ, INC.Inventors: Matthew Robshaw, Harley Heinrich, Yael Maguire, Theron Stanford, Christopher J. Diorio, Scott A. Cooper
-
Patent number: 9928390Abstract: A Radio Frequency Identification (RFID) reader may be configured to endorse an RFID tag. The reader receives an identifier from the tag and challenges the tag with a challenge. After receiving a response from the tag, the reader sends a first message including at least the identifier, challenge, and response to an authenticating entity and sends a second message including at least the identifier to a certifying entity. The reader then receives a first reply from the authenticating entity and a second reply from the certifying entity. The second reply may include a certificate associated with the tag, or may identify some property of the tag or an item associated with the tag. In some embodiments, the reader may serve as the authenticating and/or certifying entity.Type: GrantFiled: June 23, 2016Date of Patent: March 27, 2018Assignee: IMPINJ, INCInventors: Christopher J. Diorio, Larry Arnstein, Scott A. Cooper
-
Patent number: 9767333Abstract: A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a tag identifier from the tag; challenging the tag with a tag challenge; receiving a tag response based at least on the tag challenge and the tag key but not including the tag key; sending a second message including at least the tag identifier and the tag response to a verification authority; and receiving a reply from the verification authority. The reader and the verification authority may mutually authenticate each other before, during, or after the tag authentication process. The verification authority may notify a designated party if a response is incorrect.Type: GrantFiled: October 13, 2016Date of Patent: September 19, 2017Assignee: IMPINJ, INC.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw
-
Patent number: 9690949Abstract: A Radio Frequency Identification (RFID) system including an RFID reader and a reader proxy authenticates itself to a verification authority. The proxy receives a proxy challenge from a verification authority and determines a proxy response based on the proxy challenge and a proxy key known to the proxy. The proxy response is then sent to the verification authority along with an identifier for the reader. The reader then authenticates an RFID tag by sending a tag response to the verification authority, which determines whether the reader is authentic based on the authenticity of the proxy response.Type: GrantFiled: July 28, 2014Date of Patent: June 27, 2017Assignee: IMPINJ, INC.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw
-
Patent number: 9691243Abstract: Methods and systems are described for authorizing an item with an RFID tag to leave a facility. In one embodiment, a mobile device receives or determines an exit code (EC) to write into the tag in response to providing authorizing information. The EC may be based on information stored in the tag such as the tag's item identifier or other tag information (collectively an item identifier or II), a ticket value, other information such as the OC, a mobile identity or location, or any other suitable information. Upon verification of the EC, the tagged item is allowed to leave the facility. In another embodiment, the mobile device stores an item identifier (II) associated with the tag and provides authorizing information. Upon verifying the authorizing information and confirming that the stored II corresponds to the tagged item's II, the tagged item is allowed to leave the facility.Type: GrantFiled: October 9, 2015Date of Patent: June 27, 2017Assignee: IMPINJ, INC.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw, Tan Mau Wu
-
Patent number: 9501675Abstract: A Radio Frequency Identification (RFID) reader containing a reader key authenticates an RFID tag containing a tag key by receiving a tag identifier from the tag; challenging the tag with a tag challenge; receiving a tag response based at least on the tag challenge and the tag key but not including the tag key; sending a second message including at least the tag identifier and the tag response to a verification authority; and receiving a reply from the verification authority. The reader and the verification authority may mutually authenticate each other before, during, or after the tag authentication process. The verification authority may notify a designated party if a response is incorrect.Type: GrantFiled: November 20, 2015Date of Patent: November 22, 2016Assignee: IMPINJ INC.Inventors: Christopher J. Diorio, Scott A. Cooper, Matthew Robshaw
-
Patent number: 9405945Abstract: A Radio Frequency Identification (RFID) reader may be configured to endorse an RFID tag. The reader receives an identifier from the tag and challenges the tag with a challenge. After receiving a response from the tag, the reader sends a first message including at least the identifier, challenge, and response to an authenticating entity and sends a second message including at least the identifier to a certifying entity. The reader then receives a first reply from the authenticating entity and a second reply from the certifying entity. The second reply may include a certificate associated with the tag, or may identify some property of the tag or an item associated with the tag. In some embodiments, the reader may serve as the authenticating and/or certifying entity.Type: GrantFiled: April 2, 2015Date of Patent: August 2, 2016Assignee: IMPINJ, INC.Inventors: Christopher J. Diorio, Larry Arnstein, Scott A. Cooper
-
Patent number: 9305195Abstract: RFID readers transmit a Quiet Technology (QT) command to RFID tags causing at least one of the tags to transition between a private profile and a public profile. When a tag is inventoried in the private profile, it replies to the reader with contents from its private memory. When a tag is inventoried in the public profile, it replies to the reader with contents from its public memory, where the contents of the public memory may be a subset and/or modified version of the private memory contents, or entirely different altogether. The tag's profile can be switched again by another QT command from the reader, or following a loss of power at the tag. An access password and/or a short-range mechanism may be employed to allow only authorized readers to transition tag profiles or interrogate the private memory contents of tags in the public profile.Type: GrantFiled: March 27, 2015Date of Patent: April 5, 2016Assignee: IMPINJ, INC.Inventors: Christopher J. Diorio, Theron Stanford, Scott A. Cooper, Harley K. Heinrich, Chad A. Lindhorst, Kambiz Rahimi