Method for transponder access control
First Claim
1. A method for access control to a transponder, in which a first identification is stored in the transponder and is transmitted to a reader unit upon a request by the reader unit, the method comprising the steps of:
- storing at least one second identification in the transponder;
storing an identification selection criterion in the transponder;
transmitting, during a request by the reader unit based on the identification selection criterion, either the first identification or the at least one second identification; and
releasing access to the transponder when the second identification is transmitted only when the reader unit transmits a first password, which is assigned to the second identification, to the transponder.
19 Assignments
0 Petitions
Accused Products
Abstract
A method for transponder access control is disclosed, in which a first identification is stored in the transponder, which is transmitted to a reader unit upon appropriate request by the unit. At least one second identification and an identification selection criterion are stored in the transponder, during a request by the reader unit depending on the identification selection criterion either the first identification or the at least second identification is transmitted and, when the second identification is transmitted, access to the transponder, particularly to the first identification, is released by the transponder when the reader unit transmits a password assigned to the second identification to the transponder.
76 Citations
17 Claims
-
1. A method for access control to a transponder, in which a first identification is stored in the transponder and is transmitted to a reader unit upon a request by the reader unit, the method comprising the steps of:
-
storing at least one second identification in the transponder;
storing an identification selection criterion in the transponder;
transmitting, during a request by the reader unit based on the identification selection criterion, either the first identification or the at least one second identification; and
releasing access to the transponder when the second identification is transmitted only when the reader unit transmits a first password, which is assigned to the second identification, to the transponder. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A transponder comprising:
-
a first memory area for storing a first identification, the first identification identifying a product associated with the transponder; and
a second memory area for storing a second identification, wherein after a request by a reader unit, access to the first identification is provided upon receipt of an encrypted password that is associated with the second identification, and wherein the association of the encrypted password with the second identification is determined by the transponder.
-
Specification