Electronic tag with source certification capability
First Claim
1. Apparatus for tracking a controlled item, said apparatus comprising:
- a tag operatively associated with said item, said tag comprisinga tag microprocessor,a non-volatile memory operatively connected to said microprocessor, said non-volatile memory containing, as separate records therein, an access attempt number record, a valid password, a secret identification record, and a lock record set at an initialization time,means for receiving electrical power from an external source, andfirst communication means for communicating with a local interrogation station;
said local interrogation station comprisingmeans for supplying electrical power to said tag,second communication means operatively associated with said first communication means, anda computer controlling said second communication means, said computer transmitting a test password to said tag by said second means;
said tag microprocessor acting under program control to read said lock record and, if said lock record is set, to increment said access attempt record on receiving said test password and to transmit said secret identification record to said interrogation station only if said test password matches said valid password and said access attempt number is less than a predetermined value, said tag microprocessor storing a record only once in any portion of said memory, other than that portion used for said access attempt record, if said lock record is set.
0 Assignments
0 Petitions
Accused Products
Abstract
An inventory control system uses an electronic tag that keeps an unalterable log of each step in the handling of a controlled item, which may be a flight safety critical aircraft replacement part. The tag is electrically powered via an inductive coupling to a computer with which it communicates, and comprises a non-volatile computer memory element configured so that data may be written into unused portions of it, but so that no existing data can be overwritten or erased. Each tag contains an unalterable secret identification record that is only accessible to a user who has a valid password. As a countermeasure against sophisticated theft attempts involving communicating with the "smart tag" to defeat the security system by learning the password and thereafter altering identification records, etc., the tag permits only a limited number of attempts to read out the secret identification number.
212 Citations
20 Claims
-
1. Apparatus for tracking a controlled item, said apparatus comprising:
-
a tag operatively associated with said item, said tag comprising a tag microprocessor, a non-volatile memory operatively connected to said microprocessor, said non-volatile memory containing, as separate records therein, an access attempt number record, a valid password, a secret identification record, and a lock record set at an initialization time, means for receiving electrical power from an external source, and first communication means for communicating with a local interrogation station; said local interrogation station comprising means for supplying electrical power to said tag, second communication means operatively associated with said first communication means, and a computer controlling said second communication means, said computer transmitting a test password to said tag by said second means; said tag microprocessor acting under program control to read said lock record and, if said lock record is set, to increment said access attempt record on receiving said test password and to transmit said secret identification record to said interrogation station only if said test password matches said valid password and said access attempt number is less than a predetermined value, said tag microprocessor storing a record only once in any portion of said memory, other than that portion used for said access attempt record, if said lock record is set. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An inventory tracking system comprising:
-
a plurality of interrogation stations, each said interrogation station comprising a computer controlling an interrogator, said interrogator comprising power supply and interface means, each said computer further comprising an interrogation station memory containing as a record therein a unique interrogation station identification record; a plurality of tags, each said tag associated with a protected item, each said tag comprising means for receiving power from said interrogator power supply, tag communication means transmitting data to and receiving data from said interrogator interface means, and a tag microprocessor operating under program control to receive from a said computer at an initialization time, an initial record comprising a lock record, said microprocessor thereafter operating to receive a trace record comprising said interrogation station identification record, to write said interrogation station identification record into a non-volatile tag memory if said record can be written into a previously unused portion of said memory, said microprocessor otherwise not writing said record into said memory. - View Dependent Claims (7, 8, 9, 10)
-
-
11. Inventory tracking apparatus comprising
a tag associated with a protected item, said tag comprising a tag microprocessor operating under program control, said tag further comprising a non-volatile memory operatively associated with said tag microprocessor, said non-volatile memory containing as separate records therein a settable lock record, a valid password, a secret identification record, an overt identification record, and an access attempt number record, said non-volatile memory further capable of storing a predetermined number of trace records, said tag further comprising communication means communicating with a interrogation station acting under operator control to communicate to said tag microprocessor ones of: - a said trace record, each said trace record containing an interrogator identification record;
a data upload request; and
a test password;wherein said tag microprocessor, reads said lock record, and if said lock record is set; communicates said overt identification record to said interrogation station on receipt of said upload request;
writes a said trace record into said non-volatile memory only if no more than one fewer than said predetermined number of said trace records have been previously stored therein; andincrements said access attempt number on the receipt of said test password request and thereafter communicates said secret identification record to said interrogation station only if said test password matches said valid password and said access attempt number is less than a predetermined maximum value. - View Dependent Claims (12, 13)
- a said trace record, each said trace record containing an interrogator identification record;
-
14. A method of tracking a protected article through a multi-transaction distribution process terminated by delivery of said article to an end user thereof, said method comprising the steps of:
-
a) attaching to said article a tag comprising a one-time actuable binary electric element, the state of said element irreversibly altered by the removal of said tag from said article; b) transmitting, from one of a plurality of interrogation stations to a microprocessor within said tag and storing, as separate records in a non-volatile memory operatively connected to said microprocessor, said memory having a predetermined capacity, a valid password, a secret identification record, an overt identification record, an access attempt number and a lock byte; c) storing in said non-volatile memory, at a said transaction in said distribution process, a trace record comprising a tamper bit representative of said status of said binary element; d) repeating step c) at a plurality of subsequent said transactions until either; i) said capacity of said non-volatile memory is exceeded, or ii) said article is delivered to said end user. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A system for validating the identity of a protected article passing through a plurality of handling transactions, the system comprising
a tag operatively associated with the protected article, the tag comprising a tag microprocessor having non-volatile computer memory operatively associated therewith, the nonvolatile memory having stored therein a first covert identification record, a first overt identification record, an access attempt number, and a valid password, a local computer at a first location comprising means communicating a test password to the tag microprocessor, the tag microprocessor thereupon reading the access attempt number and, if the value thereof is less than a predetermined value, incrementing the access attempt number and communicating both the first covert identification record and the first overt identification record to the local computer if the test password matches the valid password, means at the first location communicating the first covert identification record and the first overt identification record to a second location remote from the first location, and a concordance table at the second location, the concordance table comprising a plurality of valid covert identification records, each uniquely associated with a valid overt identification record, wherein the identity of the protected article is deemed valid only if one of the plurality of valid covert identification records in the concordance table and the valid overt identification record uniquely associated therewith respectively match the first covert identification record and the first overt identification record.
Specification