Mobile key using read/write RFID tag
First Claim
1. A method for securing access to a resource, comprising:
- providing an RFID interrogation field;
selecting at least one mobile key in the interrogation field, the mobile key comprising an RFID device connected to a memory, the memory holding an access code;
communicating with the RFID device of the mobile key to receive at least the access code; and
determining an authorization status of the mobile key based on the access code.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile key includes an RFID tag associated with a memory. The memory holds a secure access code. An authorization status for a person or item associated with the mobile key is determined by interrogating the mobile key using an RFID interrogation field. Security information, such as a secure identifier or access code, physical measurement data, or biometric data may be provided by the mobile key. The key may also comprise a wireless communication device, such as a cellular telephone. Security information, such as an access code, may be provided to the key using the wireless communication device or other communications network.
157 Citations
40 Claims
-
1. A method for securing access to a resource, comprising:
-
providing an RFID interrogation field;
selecting at least one mobile key in the interrogation field, the mobile key comprising an RFID device connected to a memory, the memory holding an access code;
communicating with the RFID device of the mobile key to receive at least the access code; and
determining an authorization status of the mobile key based on the access code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A mobile key apparatus, comprising:
-
a wireless communication device configured for communicating using a communication network;
a memory incorporated with the wireless communication device; and
an RFID device operably associated with the memory and incorporated with the wireless communication device. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. An apparatus for controlling access to a resource, comprising:
-
an RFID base station disposed to provide an RFID interrogation field;
access control hardware configured to control access to a resource depending on an authorization status of a user; and
a controller operably associated with the access control hardware and with the RFID base station, the controller operably associated with a memory holding program instructions for;
selecting at least one mobile key in the interrogation field, the mobile key comprising an RFID device and holding an access code;
communicating with the RFID device of the mobile key to receive at least the access code; and
determining an authorization status of the mobile key based on the access code. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification