Reusable electronic tag for secure data accumulation
First Claim
1. A method of determining access rights of a user of a reusable mobile electronic tag, the electronic tag containing a plurality of memory locations capable of storing information, wherein at least a subset of said plurality of memory locations are able to store user-supplied information, said subset of memory locations operable in a first operational mode or in a second operational mode, and wherein for said subset of memory locations user access can be of two forms, a first access form and a second access form, wherein the reusable mobile electronic tag determines the first or second access form of the user, comprising the steps of:
- storing an identification password in said electronic tag;
allowing the user to present a password to the electronic tag;
comparing within the electronic tag the password presented by the user to the identification password stored in the electronic tag;
ifthe password presented by the user matches the identification password, thengranting the user with said second access form, otherwisegranting the user with said first access form; and
allowing the user to access the subset of memory locations within the electronic tag to an extent enabled by said first or second access form granted to said user, so that when the memory locations are in the first operational mode the user is granted said first access form and when the memory locations are in the second operational mode the user is granted said second access form, wherein when the user is granted with said first access form, the user is allowed to cause only the memory locations in the first operational mode to store information supplied by the user and to cause said memory locations to change from the first operational mode to the second operational mode after said storing.
1 Assignment
0 Petitions
Accused Products
Abstract
A reusable electronic tag having a plurality of memory locations to allow a user to write information onto the tag. After a memory location is written, it becomes write-protected, preventing the written content from being altered or deleted by an unauthorized user. By granting a user access right to certain memory locations, it is possible to restrict the user'"'"'s ability to access the memory location depending on the granted access type and the level of restriction set for the memory location. A user with a valid password is allowed to read and write a memory location. Such a user may be allowed to clear the memory locations so that the tag can be reused.
-
Citations
14 Claims
-
1. A method of determining access rights of a user of a reusable mobile electronic tag, the electronic tag containing a plurality of memory locations capable of storing information, wherein at least a subset of said plurality of memory locations are able to store user-supplied information, said subset of memory locations operable in a first operational mode or in a second operational mode, and wherein for said subset of memory locations user access can be of two forms, a first access form and a second access form, wherein the reusable mobile electronic tag determines the first or second access form of the user, comprising the steps of:
-
storing an identification password in said electronic tag; allowing the user to present a password to the electronic tag; comparing within the electronic tag the password presented by the user to the identification password stored in the electronic tag; if the password presented by the user matches the identification password, then granting the user with said second access form, otherwise granting the user with said first access form; and allowing the user to access the subset of memory locations within the electronic tag to an extent enabled by said first or second access form granted to said user, so that when the memory locations are in the first operational mode the user is granted said first access form and when the memory locations are in the second operational mode the user is granted said second access form, wherein when the user is granted with said first access form, the user is allowed to cause only the memory locations in the first operational mode to store information supplied by the user and to cause said memory locations to change from the first operational mode to the second operational mode after said storing. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of determining access rights of a user of a reusable mobile electronic tag, the electronic tag containing a plurality of memory locations capable of storing information, wherein at least a subset of said plurality of memory locations are able to store user-supplied information, said subset of memory locations operable in a first operational mode or in a second operational mode, and wherein for said subset of memory locations user access can be of two forms, a first access form and a second access form, wherein the reusable mobile electronic tag determines the first or second access form of the user, comprising the steps of:
-
storing an identification password in said electronic tag; allowing the user to present a password to the electronic tag; comparing within the electronic tag the password presented by the user to the identification password stored in the electronic tag; if the password presented by the user matches the identification password, then granting the user with said second access form, otherwise granting the user with said first access form; and allowing the user to access the subset of memory locations within the electronic tag to an extent enabled by said first or second access form granted to said user, so that when the memory locations are in the first operational mode, the user is granted said first access form and when the memory locations are in the second operational mode the user is granted said second access form, wherein when the user is granted with said second access form, the user is allowed to delete stored information in at least some of said subset of memory locations in the second operational mode and to cause said memory locations to change from the second operational mode to the first operational mode after said deletion. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification