System and apparatus for encrypted data collection using RFID cards
First Claim
Patent Images
1. A method comprising:
- receiving, at a smart card from a first terminal, a first signal including instructions to enable a processor and a memory of the smart card to store a set of data on the memory of the smart card, wherein;
the first signal includes the set of data; and
the set of data includes a count number;
receiving, at the smart card from the first terminal, a second signal including instructions to enable the processor and the memory of the smart card to update the set of data, wherein the updating includes incrementing the count number by one unit; and
transmitting, from the smart card to a second terminal, a third signal, wherein the third signal includes all the sets of data stored on the memory of the smart card.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure smart card is described. The smart card can include a processor, a memory and a transceiver. The smart card can communicate with various terminals and store a digital signature and other information on the card. Another terminal can validate the information stored on the smart card using the digital signature. In certain embodiments, the terminal can also validate the information by using a blockchain. The advanced design of the smart card obviates the need for a network connection.
18 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a smart card from a first terminal, a first signal including instructions to enable a processor and a memory of the smart card to store a set of data on the memory of the smart card, wherein; the first signal includes the set of data; and the set of data includes a count number; receiving, at the smart card from the first terminal, a second signal including instructions to enable the processor and the memory of the smart card to update the set of data, wherein the updating includes incrementing the count number by one unit; and transmitting, from the smart card to a second terminal, a third signal, wherein the third signal includes all the sets of data stored on the memory of the smart card.
-
-
2. A method comprising:
-
transmitting, from a terminal to a smart card, a first signal including instructions to enable a processor and a memory of the smart card to store a set of data on the memory of the smart card, wherein; the first signal includes the set of data; and the set of data includes a count number; transmitting, from the terminal to the smart card, a second signal including instructions to enable the processor and the memory of the smart card to update the set of data, wherein the updating includes incrementing the count number by one unit; and receiving, at the terminal from the smart card, a third signal, wherein the third signal includes all the sets of data stored on the memory of the smart card. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving, at a host computer from a first terminal, a first set of data including a first count number, wherein; the first terminal stored the first set of data on a memory of a smart card; the terminal forwarded the first set of data to the host computer in response to scanning the smart card at the first terminal; and the first count number indicates how many times the first terminal stored data on the smart card; storing the first set of data in a blockchain; receiving, at the host computer from a second terminal, a second set of data including a second count number, wherein the second terminal forwarded the second set of data to the host computer in response to scanning the smart card at the second terminal; comparing the second set of data with the first set of data stored in the blockchain; determining authenticity of the second set of data if the second set of data matches the first set of data stored in the blockchain; and in response to establishing the authenticity of the second set of data, transmitting a first signal to the second terminal indicating that the second set of data is authentic, and in response to failing to establish the authenticity of the second set of data, transmitting a second signal to the second terminal indicating that the second set of data is not authentic. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification