Rule-based operation and service provider authentication for a keyed system
First Claim
1. A network system for providing a level of operation privileges to a user, the system comprising:
- a first computational device comprising a plurality of identification tags and associated rule sets, wherein each identification tag and rule set pair establishes a level of operation privileges to the user; and
a second computational device adapted to program an access device with at least one of the identification tags upon authorization from the first computational device.
1 Assignment
0 Petitions
Accused Products
Abstract
A keyed authentication system and method employing rule based operation and service provider authentication techniques are described herein to provide for governing access and/or operation privileges for use environments such as vehicles, buildings, homes, computers, equipment, and intelligence. Broadly speaking, the system employs the use of an access device, including an identification tag, which may be validated by an authentication device to grant specific access and/or operation privileges to the controlled use environment. The identification tag encoded on the access device may be aligned with a set of rules that establish the level of access and/or operation for each unique identification tag. An application service provider may maintain the plurality of identification tags and associated rule sets and authorize trusted encoding devices to program the desired identification tags and associated rule sets into the plurality of access and authentication devices within the system.
119 Citations
62 Claims
-
1. A network system for providing a level of operation privileges to a user, the system comprising:
-
a first computational device comprising a plurality of identification tags and associated rule sets, wherein each identification tag and rule set pair establishes a level of operation privileges to the user; and
a second computational device adapted to program an access device with at least one of the identification tags upon authorization from the first computational device. - View Dependent Claims (2, 3, 4, 5, 6)
-
- 7. A network system for providing a level of operation privileges to a user, the system comprising an encoding device adapted to program an access device with at least one identification tag upon authorization by a central authority connected to the network system.
-
13. A communication network for providing a level of operation privileges to a user, the system comprising a central authority arranged in the network and comprising a plurality of identification tags and associated rule sets, wherein each identification tag and rule set pair establishes a level of operation privileges for the user.
-
19. A network system for providing a level of operation privileges to a user, the system comprising:
-
an access device adapted to store a programmed identification tag, wherein the identification tag is programmed upon authorization by a central authority connected to the network system; and
an authentication device adapted to store a plurality of programmed identification tags and associated rule sets, wherein the plurality of identification tags and associated rule sets are programmed upon authorization by the central authority.
-
-
25. A network system for providing a level of operation privileges to the user of a vehicle, the system comprising:
-
an access device adapted to store a programmed identification tag, wherein the access device is programmed upon authorization from a central authority connected to the network system; and
a vehicle comprising an authentication device adapted to store a plurality of programmed identification tags and associated rule sets, wherein the authentication device is programmed upon authorization from the central authority.
-
-
40. A method for providing a plurality of operation privileges to a user, the method comprising:
-
establishing a plurality of identification tags and associated rule sets, wherein each identification tag and rule set pair corresponds to a level of operation privileges that may be provided to the user; and
programming an access device with an encoding device operably linked via a network to a central authority which administers the plurality of identification tags associated rule sets, wherein said programming occurs upon authorization from the central authority, and wherein the access device is programmed with at least one of the plurality of identification tags. - View Dependent Claims (41, 42, 43, 44, 45, 46, 48, 49)
-
-
47. A method for authenticating an access device used for obtaining a level of operation privileges, the method comprising:
-
establishing a communications link between an encoding device and a central authority connected via a network, wherein the central authority maintains and administers a plurality of identification tags and associated rule sets, and wherein each identification tag and rule set pair establishes a level of operation privileges for a user;
receiving a request from the encoding device for authenticating an access device, wherein the access device is associated with a level of operation privileges provided to the user; and
determining authorization of the authentication request.
-
-
50. A method for authenticating an access device used in obtaining a level of operation privileges, the method comprising:
-
establishing a communications link between an encoding device and a central authority connected via a network, wherein the central authority maintains and administers a plurality of identification tags and associated rule sets, and wherein each identification tag and rule set pair establishes a level of operation privileges for a user;
receiving a request from the encoding device for authenticating a slave access device, wherein the slave access device is associated with a level of operation privileges provided to the user; and
determining authorization of the authentication request. - View Dependent Claims (51)
-
-
52. A computer-readable medium comprising:
-
first program instructions executable on a first computational device for authenticating an encoding device by a central authority coupled to the encoding device by a network; and
second program instructions executable on the first computational device for authorizing a request sent via the network from the encoding device for programming an access device with an identification tag, said access device useable for accessing a controlled environment. - View Dependent Claims (53, 54, 55, 56, 57, 59, 60, 61, 62)
-
-
58. A computer-readable medium comprising:
-
first program instructions executable on a first computational device for authenticating an encoding device by a central authority coupled to the encoding device by a network; and
second program instructions executable on the first computational device for authorizing a request sent via the network authenticating a first access device, wherein the first access device comprises a programmed identification tag associated with a level of operational privileges for a user.
-
Specification