TOKEN-BASED DYNAMIC AUTHORIZATION MANAGEMENT OF RFID SYSTEMS
First Claim
1. A method of enabling a second RFID reader mobile phone to act as an agent for a first RFID reader mobile phone, which comprises:
- creating a token, said token including information associated with said first RFID enabled mobile phone and a token expiration time.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of enabling a second RFID reader mobile phone to act as an agent for a first RFID reader mobile phone sends a token to the second RFID reader mobile phone. The token includes information associated with the first RFID reader mobile phone. The token may also include a token expiration time, which causes the token to be disabled at the end of the token expiration time. The information associated with the first RFID reader mobile phone may include an RFID tag identifier associated with the first RFID reader mobile phone. In other embodiments, the information associated with the first RFID reader mobile phone may include authenticating information.
81 Citations
33 Claims
-
1. A method of enabling a second RFID reader mobile phone to act as an agent for a first RFID reader mobile phone, which comprises:
creating a token, said token including information associated with said first RFID enabled mobile phone and a token expiration time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
18. A method of enabling a second RFID reader mobile phone to act as an agent for a first RFID reader mobile phone, which comprises:
sending to said second RFID reader mobile phone a token, said token including information associated with said first RFID enabled mobile phone. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
Specification