Mobile key using read/write RFID tag
First Claim
Patent Images
1. A method for securing access to a resource, comprising:
- providing an RFID interrogation field comprising a selection condition;
detecting a plurality of mobile keys in the interrogation field, each one of the plurality of mobile keys comprising an RFID device connected to a memory, the memory holding an access code and a selection flag that matches the selection condition;
selecting a first mobile key from the plurality of mobile keys, the first mobile key comprising a first RFID device connected to a first memory, the first memory holding a first access code;
communicating with the first RFID device of the first mobile key to receive the first access code; and
determining an authorization status of the first mobile key based on the first access code.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile key includes an RFID tag associated with a memory. The memory holds a secure access code. An authorization status for a person or item associated with the mobile key is determined by interrogating the mobile key using an RFID interrogation field. Security information, such as a secure identifier or access code, physical measurement data, or biometric data may be provided by the mobile key. The key may also comprise a wireless communication device, such as a cellular telephone. Security information, such as an access code, may be provided to the key using the wireless communication device or other communications network.
67 Citations
44 Claims
-
1. A method for securing access to a resource, comprising:
-
providing an RFID interrogation field comprising a selection condition; detecting a plurality of mobile keys in the interrogation field, each one of the plurality of mobile keys comprising an RFID device connected to a memory, the memory holding an access code and a selection flag that matches the selection condition; selecting a first mobile key from the plurality of mobile keys, the first mobile key comprising a first RFID device connected to a first memory, the first memory holding a first access code; communicating with the first RFID device of the first mobile key to receive the first access code; and determining an authorization status of the first mobile key based on the first access code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. An apparatus for controlling access to a resource, comprising:
-
an RFID base station disposed to provide an RFID interrogation field; access control hardware configured to control access to a resource depending on an authorization status of a user; and a controller operably associated with the access control hardware and with the RFID base station, the controller operably associated with a memory holding program instructions for; providing an RFID interrogation field comprising a selection condition; detecting a plurality of mobile keys in the interrogation field, each one of the plurality of mobile keys comprising an RFID device and holding an access code and a selection flag that matches the selection condition; selecting a first mobile key from the plurality of mobile keys, the first mobile key comprising a first RFID device and holding a first access code; communicating with the first RFID device of the first mobile key to receive the first access code; and determining an authorization status of the first mobile key based on the first access code. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A method for securing access to a resource, comprising:
-
providing an RFID interrogation field comprising a selection condition; detecting a plurality of mobile keys in the interrogation field, each one of the plurality of mobile keys comprising an RFID device connected to a memory, the memory holding an access code and a selection flap that matches the selection condition; selecting a first mobile key from the plurality of mobile keys, the first mobile key comprising a first RFID device connected to a first memory, the first memory holding a first access code, comprising receiving identification information from a first portion of the plurality of mobile keys, wherein (1) each one of the first portion of the plurality of mobile keys includes a counter that is set to zero and (2) each one of a second portion of the plurality of mobile keys includes a counter that is set to an integer that is greater than zero; and transmitting a fail command if identification information is received from more than one of the plurality of mobile keys, the fail command being used by (1) each one of the first portion of the plurality of mobile keys to set their counter to a random number and (2) each one of the second portion of the plurality of mobile keys to increment their counter, wherein the random number is selected from a number consisting of zero and one; communicating with the first RFID device of the first mobile key to receive the first access code; and determining an authorization status of the first mobile key based on the first access code.
-
Specification