System and method for providing time-limited access to people, objects and services
First Claim
1. An identification system for use with an identification medium to provide time-limit access to a resource, comprising:
- a transmitter module secured to the identification medium;
a receiver module in selective communication with the transmitter module;
the transmitter module including an encryptor and a time generator that generates a temporal sequence of values (TBn), wherein the encryptor encrypts the temporal sequence of values (TBn) with a private, non-public key Kn which is unique to the identification medium, to generate a code list composed of encrypted code elements (TBn)Kn;
wherein the transmitter module transmits one or more encrypted code elements (TBn)Kn to the receiver module;
an authenticator in communication with the receiver module that has access to a subset of the encrypted code elements of the code list; and
wherein the subset corresponds to a specific time window during which access to the resource is authorized, so that the authenticator is capable of authenticating the identification medium without resorting to the private key, and only during the specific time window corresponding to the subset of the encrypted code elements, by mapping the subset of the encrypted code elements (TBn)Kn, in order to enable time-limited access to the resource during the specific time window.
5 Assignments
0 Petitions
Accused Products
Abstract
A limited tracking system and associated method that enable the use of personal encoded identification media to limit access to tracking information. The tracking system provides concurrent time-limited access to a large number of people, objects, information, services, and other resources, and has particular applicability to credit cards, dining cards, telephone calling cards, health cards, driver'"'"'s licenses, video store cards, car access cards, building access cards, computer access cards, and like identification badges or cards. The tracking system includes a transmitter module incorporated in a badge, and a receiver module incorporated in a secure server. The transmitter module contains an encryptor and a watch crystal that keeps track of time, such that the encryptor encrypts the current time with the user'"'"'s private key, and periodically transmits the encrypted current time to the receiver module, as a code list. The server stores the private keys of all the users, and, in turn, encrypts the current times of all the badges with the corresponding private keys of the users, to generate an authentication table. An authenticator compares the received code list to the authentication table, seeking matches that are indicative of the validity of the transmitting badges.
-
Citations
20 Claims
-
1. An identification system for use with an identification medium to provide time-limit access to a resource, comprising:
-
a transmitter module secured to the identification medium; a receiver module in selective communication with the transmitter module; the transmitter module including an encryptor and a time generator that generates a temporal sequence of values (TBn), wherein the encryptor encrypts the temporal sequence of values (TBn) with a private, non-public key Kn which is unique to the identification medium, to generate a code list composed of encrypted code elements (TBn)Kn; wherein the transmitter module transmits one or more encrypted code elements (TBn)Kn to the receiver module; an authenticator in communication with the receiver module that has access to a subset of the encrypted code elements of the code list; and wherein the subset corresponds to a specific time window during which access to the resource is authorized, so that the authenticator is capable of authenticating the identification medium without resorting to the private key, and only during the specific time window corresponding to the subset of the encrypted code elements, by mapping the subset of the encrypted code elements (TBn)Kn, in order to enable time-limited access to the resource during the specific time window. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An identification system for use with an identification medium to provide time-limit access to a resource, comprising:
-
a transmitter module in communication with the identification medium; a receiver module in selective communication with the transmitter module, for transmitting challenge values to the transmitter module; the transmitter module including an encryptor and a time generator that generates a temporal sequence of values (TBn), wherein the encryptor encrypts the challenge values with a private key Kn which is unique to the identification medium, to generate a code list composed of the encrypted challenge values; wherein the transmitter module transmits at least a part of the code list to the receiver module; an authenticator in communication with the receiver module that has access to a subset of the encrypted challenge values; and wherein the subset corresponds to a specific time window during which access to the resource is authorized, so that the authenticator is capable of authenticating the identification medium without resorting to the private key, and only during the specific time window corresponding to the subset of the encrypted challenge values, by mapping the subset of the encrypted challenge values, in order to enable time-limited access to the resource during the specific time window.
-
-
20. An identification system for use with an identification medium to provide time-limit access to a resource, comprising:
-
a transmitter module in communication with the identification medium; a receiver module in selective communication with the transmitter module, wherein the transmitter module transmits a sequence of time varying values to the receiver module; a local processor in communication with the receiver module, includes an encryptor and a time generator that generates a temporal sequence of values (TBn), wherein the encryptor encrypts the time varying values with a private key Kn which is unique to the identification medium, to generate a code list composed of the encrypted time varying values; an authenticator in communication with the receiver module that has access to a subset of the encrypted time varying values; and wherein the subset corresponds to a specific time window during which access to the resource is authorized, so that the authenticator is capable of authenticating the identification medium without resorting to the private key, and only during the specific time window corresponding to the subset of the encrypted time varying values, by mapping the subset of the encrypted time varying values, in order to enable time-limited access to the resource during the specific time window.
-
Specification