SYSTEM AND METHOD FOR PROVIDING CONTROLLED ACCESS
First Claim
1. A method for operating a signal receiver which authorizes controlled access, comprising:
- (a) providing an authentication token device having a predetermined usage limit stored therein;
(b) providing a reading device for reading the authentication token device, and for implementing the predetermined usage limit while deauthorizing the authentication token device for use with other reading devices, comprising a signal generator for communicating with a signal receiver through a wireless transmission;
(c) receiving the wireless transmission at the signal receiver, to permit access based on the received transmission; and
(d) upon exceeding the predetermined usage limit, deauthorizing further access.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for operating a signal receiver which authorizes controlled access, comprising providing an authentication token device having a predetermined usage limit stored therein, providing a reading device for reading the authentication token device, and for implementing the predetermined usage limit while deauthorizing the authentication token device for use with other reading devices, comprising a signal generator for communicating with a signal receiver through a wireless transmission, receiving the wireless transmission at the signal receiver, to permit access based on the received transmission, and upon exceeding the predetermined usage limit, deauthorizing further access.
68 Citations
25 Claims
-
1. A method for operating a signal receiver which authorizes controlled access, comprising:
-
(a) providing an authentication token device having a predetermined usage limit stored therein; (b) providing a reading device for reading the authentication token device, and for implementing the predetermined usage limit while deauthorizing the authentication token device for use with other reading devices, comprising a signal generator for communicating with a signal receiver through a wireless transmission; (c) receiving the wireless transmission at the signal receiver, to permit access based on the received transmission; and (d) upon exceeding the predetermined usage limit, deauthorizing further access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for providing controlled access to information and/or communication channels, comprising:
-
(a) providing a wireless remote control device adapted to selectively activate controlled access features; (b) providing a wireless receiver device adapted to respond to the wireless remote control device; (c) storing an identifier of the wireless remote control at the wireless receiver device; (d) transmitting a signal in dependence on the stored identifier of the wireless remote control from the wireless receiver device to the wireless remote control; (e) listening, at the wireless remote control, for the transmission of the signal in dependence on the stored identifier; (f) if, at the wireless remote control, the transmission of the signal in dependence on the stored identifier is not received within predetermined parameters, cancelling an ability of the wireless remote control device to selectively activate the controlled access features; and (g) implementing a usage limit, at the wireless remote control, for limiting an ability to selectively activate the controlled access features. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A remote control device for an electronic device for authorizes controlled access thereto, comprising:
-
(a) an authentication token component having a predetermined usage limit stored therein; (b) a reading device component adapted to read the authentication token component, and to implement the predetermined usage limit while deauthorizing the authentication token component for use with other reading devices; (c) a wireless signal generator adapted to communicate with a signal receiver through a wireless transmission; and (d) a processor adapted to, upon exceeding the predetermined usage limit, deauthorizing further access and modifying the authentication token component to limit reuse.
-
-
25. A controlled access system adapted to control access to information and/or communication channels, comprising:
-
(a) a wireless remote control device adapted to selectively activate controlled access features; (b) a wireless receiver device adapted to respond to the wireless remote control device; (c) a memory for storing an identifier of the wireless remote control at the wireless receiver device; (d) a transmitter for transmitting a signal in dependence on the stored identifier of the wireless remote control from the wireless receiver device to the wireless remote control; (e) a receiver, at the wireless remote control, adapted to receive the transmission of the signal in dependence on the stored identifier; and (f) a processor at the wireless remote control adapted to determine, if the transmission of the signal in dependence on the stored identifier is not received within predetermined parameters, and if so, cancelling an ability of the wireless remote control device to selectively activate the controlled access features, and to implement a usage limit, for limiting an ability to selectively activate the controlled access features.
-
Specification