Parts authentication employing radio frequency identification
First Claim
Patent Images
1. An ion implantation system comprising:
- one or more components of the system;
one or more RFID tags individually associated with the one or more components, wherein the RFID tags include at least a part number and a serial number for the one or more components;
one or more tag readers that employ a wireless communication mechanism to communicate with the one or more RFID tags; and
a controller coupled to the tag readers that generates interrogatory signals, receives response signals from the one or more RFID tags, obtains authentication information from the received signals and selects a mode of operation for the system from a normal mode and a safe mode according to the obtained authentication information.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention facilitates operation of systems by managing and authenticating components, including parts and subsystems, present within a system. The present invention includes RFID tags individually associated with the components of the system. The RFID tags generally include at least a part number and a serial number for the components. One or more readers are present and communicate with the RFID tags via a wireless communication medium. A controller generates interrogatory signals, receives response signals from the RFID tags, and employs the received response signals to authenticate the components.
-
Citations
18 Claims
-
1. An ion implantation system comprising:
-
one or more components of the system; one or more RFID tags individually associated with the one or more components, wherein the RFID tags include at least a part number and a serial number for the one or more components; one or more tag readers that employ a wireless communication mechanism to communicate with the one or more RFID tags; and a controller coupled to the tag readers that generates interrogatory signals, receives response signals from the one or more RFID tags, obtains authentication information from the received signals and selects a mode of operation for the system from a normal mode and a safe mode according to the obtained authentication information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of selecting modes of operation comprising:
-
authenticating components within a system via RFID tags associated with the components; analyzing non-authenticated components for compliance with system operational parameters; analyzing non-authenticated and non-compliant components for operation of the system in a limited capacity; operating in a safe mode on the non-authenticated and non compliant components being operable in the limited capacity; and operating in a normal mode on the non-authenticated components being compliant. - View Dependent Claims (17, 18)
-
Specification