RFID Tag For Authentication And Identification
First Claim
Patent Images
1. An authentication system comprising:
- an identification tag having an encrypted authorization code;
a product having a corresponding encrypted code;
an interrogator located remote to said identification tag; and
a processor operatively connected to said interrogator and adapted under the control of software to include an authentication engine;
said authentication engine providing access to said product upon verification of said encrypted authorization code.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication system comprises an identification tag having an encrypted authorization code, a product having a corresponding encrypted code, an interrogator located remote to the identification tag, and a processor operatively connected to the interrogator and adapted under the control of software to include an authentication engine; the authentication engine providing access to the product upon verification of the encrypted authorization code.
-
Citations
29 Claims
-
1. An authentication system comprising:
-
an identification tag having an encrypted authorization code; a product having a corresponding encrypted code; an interrogator located remote to said identification tag; and a processor operatively connected to said interrogator and adapted under the control of software to include an authentication engine; said authentication engine providing access to said product upon verification of said encrypted authorization code. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for accessing a product, comprising the steps of:
-
(i) providing an access authentication system comprising, an identification tag having an encrypted authorization code; said product having a corresponding encrypted code; an interrogator located remote to said identification tag; and a processor operatively connected to said interrogator and adapted under the control of software to include an authentication engine; said authentication engine providing access to said product upon verification of said encrypted authorization code; (ii) sending a query signal from said interrogator to said identification tag; (iii) responding to said query signal by communicating said encrypted authorization code from said identification tag to said processor; (iv) authenticating said encrypted authorization code from said identification tag; and
,(v) providing access to said product. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for payment disbursement, comprising the steps of:
-
(i) providing an access authentication system comprising, an identification tag having an encrypted authorization code; a product having a corresponding encrypted code; an interrogator located remote to said identification tag; and a processor operatively connected to said interrogator and adapted under the control of software to include an authentication engine; said authentication engine providing access to said product upon verification of said encrypted authorization code; (ii) sending a query signal from said interrogator to said identification tag; (iii) responding to said query signal by communicating said encrypted authorization code from said identification tag; (iv) authenticating said encrypted authorization code from said identification tag; and
,(v) providing access to said product for payment disbursement. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A digital product authentication system comprising:
-
an identification tag having an encrypted authorization code; a digital product having a corresponding encrypted code; means for accessing said encrypted authorization code in said identification tag for authentication of a user of said digital product; wherein access is provided to said digital product upon authentication of the user. - View Dependent Claims (22, 23, 24)
-
-
25. A system for user authentication comprising:
-
an identification tag having a first encrypted authorization code; a product having a second encrypted code; means for reading said encrypted authorization code in said identification tag for authentication of a user of said digital product; and an authentication means wherein said second encrypted code is determined to correspond to said first encrypted code. - View Dependent Claims (26, 27, 28)
-
-
29. An authentication system comprising:
-
a radio frequency identification tag having an encrypted authorization code; a product having a corresponding encrypted code; an interrogator located remote to said radio frequency identification tag; and
,a processor operatively connected to said interrogator and adapted under the control of software to include an authentication engine; said authentication engine providing access to said product upon verification of said encrypted authorization code.
-
Specification