Apparatus and method for ownership verification
First Claim
1. A method for identifying an item, comprising:
- attaching a radio frequency identification device to the item;
obtaining encryption information;
generating an encrypted code from the encryption information by a programmer;
inserting the encrypted code into the radio frequency identification device by the programmer whereas the encrypted code may be one of a plurality of encrypted codes;
attempting to access the radio frequency identification device by a security reader by transmission of another encrypted code to the radio frequency identification device; and
responding with a correct access signal by the radio frequency identification device in response to receipt of the other encrypted code if the other encrypted code is same as the inserted encrypted code.
24 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus identifying an item by attaching a radio frequency identification device to the item; obtaining encryption information; generating an encrypted code from the encryption information by a programmer; inserting the encrypted code into the radio frequency identification device by the programmer whereas the encrypted code may be one of a plurality of encrypted codes; attempting to access the radio frequency identification device by a security reader by transmission of another encrypted code to the radio frequency identification device; and responding with a correct access signal by the radio frequency identification device in response to receipt of the other encrypted code if the other encrypted code is same as the inserted encrypted code.
-
Citations
32 Claims
-
1. A method for identifying an item, comprising:
-
attaching a radio frequency identification device to the item;
obtaining encryption information;
generating an encrypted code from the encryption information by a programmer;
inserting the encrypted code into the radio frequency identification device by the programmer whereas the encrypted code may be one of a plurality of encrypted codes;
attempting to access the radio frequency identification device by a security reader by transmission of another encrypted code to the radio frequency identification device; and
responding with a correct access signal by the radio frequency identification device in response to receipt of the other encrypted code if the other encrypted code is same as the inserted encrypted code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A processor-readable medium for identifying an item, comprising processor-executable instructions configured for:
-
attaching a radio frequency identification device to the item;
obtaining encryption information;
generating an encrypted code from the encryption information by a programmer;
inserting the encrypted code into the radio frequency identification device by the programmer whereas the encrypted code may be one of a plurality of encrypted codes;
attempting to access the radio frequency identification device by a security reader by transmission of another encrypted code to the radio frequency identification device; and
responding with a correct access signal by the radio frequency identification device in response to receipt of the other encrypted code if the other encrypted code is same as the inserted encrypted code. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification