System and Method for Secure Addition of Machine Readable Identification to an Off-line Database
First Claim
1. A first system for controlling operation of a second system, the first system comprising:
- a controller;
a reader, the controller able to read a first machine readable identification through said readera keypad, the controller able to accept a learn command through said keypad; and
a memory accessible by the controller, the controller able to add a first data representative of the first identification to the memory in response to the learn command being accepted through the keypad and the first identification being read by the reader;
wherein,operation of the second system is allowed by the controller in response to the first identification being read by the reader when the first data is in the memory.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that allows secure identification tokens (e.g., smart cards or RFID tags), often used for enabling such systems, to be securely added to a secure, local database of identification tokens authorized to operate the device, system or service. Such authorizations may be open-ended or have an expiration date. The addition of the identification token is achieved without requiring communication with a central controller by wired or wireless means, but is instead triggered by a message authorizing the addition of an identification token to the local database. The same invention can be used, in some embodiments, to allow magnetic stripe cards or biometric measurements to become authorized to operate or allow access to the system or device or service.
-
Citations
15 Claims
-
1. A first system for controlling operation of a second system, the first system comprising:
-
a controller; a reader, the controller able to read a first machine readable identification through said reader a keypad, the controller able to accept a learn command through said keypad; and a memory accessible by the controller, the controller able to add a first data representative of the first identification to the memory in response to the learn command being accepted through the keypad and the first identification being read by the reader;
wherein,operation of the second system is allowed by the controller in response to the first identification being read by the reader when the first data is in the memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 10, 11, 12, 13, 14)
-
-
15. A third system to generate the learn command for the first system of claim 9 comprising:
-
a) a processor having access to a communication channel, the processor having access to a second key for encryption corresponding to the first key, the processor having programming to perform the steps; 1) accept a request through the communication channel, the request comprising identifying information corresponding to the first key; 2) determining the second key corresponding to the identifying information; 3) generating the learn command using the second key; and 4) returning the learn command through the communication channel; wherein the steps
2),
3), and
4) are performed in response to the request.
-
Specification