Master tags
First Claim
Patent Images
1. A method for creating a hierarchy of radio frequency identification (RFID) tags, comprising:
- associating a first RFID tag with an individual object, the first RFID tag storing identification information about the object with which it is associated;
and storing in a second RFID tag information about the first RFID tag;
wherein a reader receives and uses the information from the second RFID tag to retrieve data directly from the first RFID tag.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for creating a hierarchy of radio frequency identification (RFID) tags and the resultant system include associating each of a plurality of first RFID tags with an individual object of a plurality of objects, each first RFID tag storing identification information about the object with which it is associated. Identification information about each of the first RFID tags is stored in a second RFID tag that can physically accompany the first RFID tags during transportation.
-
Citations
73 Claims
-
1. A method for creating a hierarchy of radio frequency identification (RFID) tags, comprising:
-
associating a first RFID tag with an individual object, the first RFID tag storing identification information about the object with which it is associated; and storing in a second RFID tag information about the first RFID tag; wherein a reader receives and uses the information from the second RFID tag to retrieve data directly from the first RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for creating a hierarchy of radio frequency identification (RFID) tags, comprising:
-
associating a first RFID tag with an individual object, the first RFID tag storing identification information about the object with which it is associated; storing in a second RFID tag information about the first RFID tag; and physically transporting the second RFID tag with the first RFID tag from one geographic location to another location, wherein a reader receives and uses the information from the second RFID tag to retrieve data directly from the first RFID tag. - View Dependent Claims (11)
-
-
12. A method for creating a hierarchy of radio frequency identification (RFID) tags, comprising:
-
associating a first RFID tag with an individual object, the first RFID tag storing identification information about the object with which it is associated; and storing in a second RFID tag information about the first RFID tag including an access password for enabling communication with the first RFID tag; wherein the first tag is a different type of tag than the second tag, wherein a reader receives the access password from the second RFID tag and uses the password to retrieve data directly from the first RFID tag. - View Dependent Claims (13, 14)
-
-
15. A hierarchical system of radio frequency identification (RFID) tags, comprising:
-
a first RFID tag being associated with an object, the first RFID tag storing information about the object with which it is associated; and a second RFID tag storing information about the first RFID tag; a reader for receiving and using the information stored in the second RFID tag to retrieve data directly from the first RFID tag. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A hierarchical system of radio frequency identification (RFID) tags, comprising:
-
a first RFID tag being associated with an object, the first RFID tag storing information about the object with which it is associated; and a second RFID tag storing information about the first RFID tag including an access password for enabling communication directly with the first RFID tag;
wherein a reader receives the access password from the second RFID tag and uses the access password to retrieve data directly from the first tag;wherein the first tag is a different type than the second tag. - View Dependent Claims (26, 27)
-
-
28. A method for physical transportation of identification information, comprising:
-
associating at least one first radio frequency identification (RFID) tag with an individual object, each first RFID tag storing identification information about the object with which it is associated; storing in a second RFID tag identification information about each of the first RFID tags; and physically transporting the second RFID tag with the first RFID tags from one geographic location to another location; wherein a reader receives and uses the information about the first RFID tags from the second RFID tag to retrieve data directly from the first RFID tags. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A method for physical transportation of identification information, comprising:
-
associating each of a plurality of first radio frequency identification (RFID) tags with an individual object of a plurality of objects, each first RFID tag storing identification information about the object with which it is associated; storing in a second RFID tag identification information about each of the first RFID tags; physically transporting the second RFID tag with the first RFID tags from one geographic location to another location;
wherein the second RFID tag wherein a reader receives one of the access passwords from the second RFID tag and uses the password to retrieve data directly from one of the first RFID tags also stores access passwords for each of the first RFID tags, the access passwords being required for directly accessing information stored on the first RFID tags;changing the access passwords of the first RFID tags and storing the changed access passwords in the second RFID tag. - View Dependent Claims (46)
-
-
47. A radio frequency identification (RFID) system, comprising:
a first RFID tag protected by a physical locking mechanism, a RF shielding mechanism, and an access password a second RFID tag storing the access password for the first RFID tag, wherein a reader receives the access password from the second RFID tag and uses the access password to retrieve data directly from the first RFID tag. - View Dependent Claims (48)
-
49. A method for creating a hierarchy of interrelated radio frequency identification (RFID) tags, comprising:
-
associating each of a plurality of first RFID tags with an individual object of a plurality of objects, each first RFID tag storing identification information about the object with which it is associated, each of the first RFID tags having an access password associated therewith, the access passwords being required for accessing the identification information in the first RFID tags; and storing in a second RFID tag the passwords for each of the first RFID tags, wherein a second RFID tag access password must be provided for wherein a reader receives one of the passwords associated with one of the first RFID tags from the second RFID tag and uses the password to retrieve data directly from the associated first RFID tag accessing the access passwords of the first RFID tags stored on the second RFID tag; and changing the access passwords of the first RFID tags and storing the changed access passwords in the first RFID tans and the second RFID tag. - View Dependent Claims (50, 51, 52, 53)
-
-
54. A radio frequency identification (RFID) tag system, comprising:
-
a plurality of first RFID tags each associated with an individual object of a plurality of objects, each first RFID tag storing identification information about the object with which it is associated, each of the first RFID tags having an access password associated therewith, the access passwords being required for accessing the identification information in the first RFID tags, wherein the access passwords of the first RFID tags are changeable; and a second RFID tag storing the passwords for each of the first RFID tags, wherein a second RFID tag access password must be provided for wherein a reader receives one of the access passwords from the second RFID tag and uses the password to retrieve data directly from the first RFID tag associated with the one of the access passwords accessing the access passwords of the first RFID tags stored on the second RFID tag.
-
-
55. A radio frequency identification (RFID) tag system, comprising:
-
a plurality of first RFID tags each having an access password associated therewith and stored thereon, the access passwords being required for accessing identification information stored in the first RFID tags, wherein the access passwords of the first RFID tags are changeable; and a second RFID tag storing the passwords for each of the first RFID tags wherein a reader receives one of the access passwords form the second RFID tag and uses the password to retrieve data directly from the first RFID tag associated with the one of the access passwords. - View Dependent Claims (56)
-
-
57. A radio frequency identification (RFID) tag system, comprising:
-
a first RFID tag having an access password associated therewith and stored thereon, the access password being required for accessing identification information stored in the first RFID tag, wherein the access password of the first RFID tag is changeable; and a second RFID tag storing the password for the first RFID tag wherein a reader receives the access password from the second RFID tag and uses the password to retrieve data directly from the first tag. - View Dependent Claims (58, 59, 60)
-
-
61. A method for creating a hierarchy of radio frequency identification (RFID) tags, comprising:
-
associating each of a plurality of first RFID tags with an individual object of a plurality of objects, each first RFID tag storing identification information about the object with which it is associated; and storing in a second RFID tag information about each of the first RFID tags;
wherein the second RFID tag also stores access passwords for each of the first RFID tags, the access passwords being required for accessing information stored on the first RFID tags; and
wherein a reader receives one of the access passwords from the second RFID tag and uses the password to retrieve data directly from the first RFID tag associated with the one of the access passwords;changing the access passwords of the first RFID tags and storing the changed access passwords in the first RFID tags and the second RFID tag.
-
-
62. A hierarchical system of radio frequency identification (RFID) tags, comprising:
-
a plurality of first RFID tags, each of the first RFID tags being associated with an individual object of a plurality of objects, each first RFID tag storing information about the object with which it is associated; and a second RFID tag storing information about each of the first RFID tags; wherein the second RFID tag also stores access passwords for each of the first RFID tags, the access passwords being required for accessing information stored on the first RFID tags, wherein a reader receives one of the access passwords from the second RFID tag and uses the password to retrieve data directly from the first RFID tag associated with the one of the access passwords; wherein the access passwords of the first RFID tags are stored on the first RFID tags, wherein the access passwords stored on the first RFID tags are changeable on the first RFID tags.
-
-
63. A method for creating a hierarchy of radio frequency identification (RFID) tags, comprising:
-
associating each of a plurality of first RFID tags with an individual object of a plurality of objects, each first RFID tag storing identification information about the object with which it is associated; and storing in a second RFID tag information about each of the first RFID tags; wherein the second RFID tag also stores kill passwords for each of the first RFID tags, the kill passwords being required for disabling access to only some information stored on the first RFID tags wherein a reader receives one of the kill passwords from the second RFID tag and uses the password to communicate directly with the first RFID tag associated with the one of the kill passwords.
-
-
64. A hierarchical system of radio frequency identification (RFID) tags, comprising:
-
a plurality of first RFID tags, each of the first RFID tags being associated with an individual object of a plurality of objects, each first RFID tag storing information about the object with which it is associated; and a second RFID tag storing information about each of the first RFID tags; wherein the second RFID tag also stores kill passwords for each of the first RFID tags, the kill passwords being required for disabling access to only some information stored on the first RFID tags wherein a reader receives one of the kill passwords from the second RFID tag and uses the password to communicate directly with the first RFID tag associated with the one of the kill passwords.
-
-
65. A radio frequency identification (RFID) system, comprising:
-
a RFID tag; and a reader; wherein one password is used to encrypt a transmission of a second password there between wherein the reader receives the second password from the RFID tag and uses the second password to communicate directly with a second RFID tag associated with the second password. - View Dependent Claims (66, 67, 68)
-
-
69. A method for forming a group of tagged objects, comprising:
-
coupling first radio frequency identification (RFID) tags to a plurality of objects; programming each of the first RFID tags with a password and identification information; creating a physical assembly of the objects with the first tags coupled thereto; transferring information about the first tags to a second tag, wherein the information about the first tags includes access passwords and block passwords stored on the first tags, wherein the access passwords stored on the first tags are changeable, wherein the block passwords stored on the first tags are changeable, wherein each block password is for permitting access to data stored in a block of wherein a reader receives one of the passwords from the second RFID tag and uses the password to communicate with one of the first RFID tags memory on the tag storing the block password. - View Dependent Claims (70, 71)
-
- 72. An RFID device with memory, a password stored in said memory, other non-password information stored in said memory, wherein access to one part or all of said memory is conditioned on both the password and non-password information stored in another part of said memory.
Specification