SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS
First Claim
Patent Images
10. A toll system, comprising:
- a central data base configured to;
store toll accounts,receive identifiers related to toll accounts, andcompare the received identifiers to identifiers associated with the toll accounts to determine if a match exists;
an RFID reader comprising a radio and an antenna, the RFID reader configured to;
send a first communication to a RFID transponder that includes a memory the contents of which include an identifier,send a second communication to the RFID transponder that includes a security key for validation by the RFID transponder,receive at least the identifier included in the memory contents in response to the second communication and as a result of validation of the security key, andtransmit the identifier to the central database.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.
12 Citations
25 Claims
-
10. A toll system, comprising:
-
a central data base configured to; store toll accounts, receive identifiers related to toll accounts, and compare the received identifiers to identifiers associated with the toll accounts to determine if a match exists; an RFID reader comprising a radio and an antenna, the RFID reader configured to; send a first communication to a RFID transponder that includes a memory the contents of which include an identifier, send a second communication to the RFID transponder that includes a security key for validation by the RFID transponder, receive at least the identifier included in the memory contents in response to the second communication and as a result of validation of the security key, and transmit the identifier to the central database. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 8, 9, 11, 12, 13, 14, 15, 16, 17)
-
-
15-1. The system of claim 10, wherein the identifier is a toll identifier.
-
18. A method for granting access to memory contents of an RFID transponder, the memory contents including an identifier, comprising:
-
receiving a first communication from a RFID reader; receiving a second communication from the RFID reader that includes a security key; granting access to the memory contents based on the security key; and sending at least the identifier included in the memory contents in response to the second communication. - View Dependent Claims (19, 20, 21)
-
-
22. A RFID transponder, comprising;
-
a memory the contents of which includes an identifier; a radio front end and an antenna; and a processor coupled with the radio front end and the memory, the processor configured to; receive a first communication from a RFID reader via the radio front end and an antenna; receive a second communication from the RFID reader that includes a security key via the radio front end and an antenna; grant access to the memory contents based on the security key; and send at least the identifier included in the memory contents in response to the second communication. - View Dependent Claims (23, 24, 25)
-
Specification