Method and system for RFID transaction integrity utilizing an EEPROM
First Claim
1. A method for purchasing goods or services utilizing an RFID apparatus, the RFID apparatus including an EEPROM, the EEPROM containing a first group of data blocks and a second group of data blocks, the purchase of goods being performed in connection with an RFID scanner comprising the steps of:
- storing transaction data in respective data blocks of one of the first group of data blocks or the second group of data blocks of the EEPROM;
placing an order for goods or services utilizing the RFID scanner;
reading a start block pointer value from a data block of the EEPROM,the pointer value corresponding to the address of a last written of the first group of datablocks or the second group of data blocks;
reading data from the last written group of data blocks;
modifying the transaction data in accordance with the purchase order to create modified data;
writing the modified data to one of the first group of data blocks or the second group of data blocks which is not the last written database;
determining whether the writing to one of the first group or the second group of data blocks is successful, and changing the pointer value to indicate the group of data blocks containing the modified data.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for purchasing goods in a cashless operation utilizing an RFID apparatus is provided. The RFID apparatus includes an EEPROM, the EEPROM being formatted to include a first group of data blocks and a second group of data blocks. Transaction data is stored in the first group of data blocks. When placing an order for goods or services, an RFID scanner scans the EEPROM. The RFID scanner reads a start block pointer value from a data block of the EEPROM. The pointer value corresponds to the address of the last written of the first group of data blocks or second group of data blocks. Data is then read from the last written group of data blocks. As the transaction is processed, the transaction data is modified in accordance with a purchase order to create modified data. The modified data is written to the second group of data blocks. Once it is determined that the writing to the second group of data blocks is successful, the pointer value stored in the EEPROM is changed to indicate the second group of data blocks.
-
Citations
18 Claims
-
1. A method for purchasing goods or services utilizing an RFID apparatus, the RFID apparatus including an EEPROM, the EEPROM containing a first group of data blocks and a second group of data blocks, the purchase of goods being performed in connection with an RFID scanner comprising the steps of:
-
storing transaction data in respective data blocks of one of the first group of data blocks or the second group of data blocks of the EEPROM; placing an order for goods or services utilizing the RFID scanner; reading a start block pointer value from a data block of the EEPROM, the pointer value corresponding to the address of a last written of the first group of data blocks or the second group of data blocks; reading data from the last written group of data blocks; modifying the transaction data in accordance with the purchase order to create modified data; writing the modified data to one of the first group of data blocks or the second group of data blocks which is not the last written database; determining whether the writing to one of the first group or the second group of data blocks is successful, and changing the pointer value to indicate the group of data blocks containing the modified data. - View Dependent Claims (2, 3, 4)
-
-
5. A method for maintaining purchase authorization information utilizing an RFID apparatus, comprising:
-
purchasing goods or services with the RFID apparatus, the RFID apparatus storing information associating a customer with an account, and a signature; purchasing goods or services by reading information from the RFID apparatus including the signature; and authorization for the purchase being granted upon receipt of the signature. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method for maintaining purchase authorization information utilizing an RFID apparatus, comprising:
-
storing a credit card number associated with the RFID wristband at a central hub; purchasing goods or services with the RFID apparatus, the RFID apparatus storing information associating a customer with an account, and CVV2 information; purchasing goods or services by reading information from the RFID apparatus including CVV2 information; authorization for the purchase being granted upon receipt of the CVV2 information; and transmitting the order along with the CVV2 information to the central hub, the central hub authorizing the order as a function of the receipt of the CVV2 information. - View Dependent Claims (11)
-
-
12. An RFID system for transacting purchases for goods and services, comprising:
-
a point-of-sale computer with standardized point-of-sale application software and RFID application programming interface software; a server coupled to the point-of-sale computer and configured to store data related to RFID tags and to transmit the data to the point-of-sale computer when queried by the RFID application programming interface software; an RFID reader coupled to the point-of-sale computer and configured to read RFID tags when queried by the RFID application programming interface software; the standardized point-of-sale application software querying the RFID application programming interface software for a payment and completing a transaction when the payment is received; and the RFID application programming interface software, in response to a query from the standardized point-of-sale application software, querying the RFID reader for RFID tag information and receiving the RFID tag information, querying the server for authorization to charge the payment to an account associated with the RFID tag information, and sending payment to the standardized point-of-sale application software. - View Dependent Claims (13, 14)
-
-
15. A method of preventing child abduction at a limited-access venue, comprising the steps of:
-
providing RFID tags to a responsible adult and each child for whom the adult is responsible; associating the adult'"'"'s RFID tag with the RFID tag of each child for whom the adult is responsible; and when a child attempts to depart the venue, scanning the departing child'"'"'s RFID tag and the RFID tag of a departing adult claiming responsibility for the departing child and only allowing the departing child to depart if the departing adult'"'"'s RFID tag is associated with the departing child'"'"'s RFID tag. - View Dependent Claims (16, 18)
-
-
17. A method of managing a spending account accessible by multiple RFID tags comprising:
-
providing RFID tags to a plurality of individuals, each RFID tag having a distinct identification; associating the provided RFID tags with a common account and associating each RFID tag with a distinct account; assigning to each RFID tag an allocation percentage; and allocating money placed in the common account to the distinct account associated with each RFID tag according to allocation percentage associated with each RFID tag.
-
Specification