Identification system and method
First Claim
1. An identification method, comprising:
- a radio frequency identification (RFID) reader scanning a user to read N Radio Frequency Identification (RFID) tags respectively embedded in N objects being carried by the user, each tag of the N tags comprising a tag identifier of said each tag, said N being at least 2;
comparing the N tags read by the RFID reader with M tags in a registered record of data, said registered record comprising a reference to the user, each tag of the M tags comprising a tag identifier, said M exceeding N; and
permitting access by the user to a resource if said comparing has determined that the tag identifiers in the M tags comprise the tag identifiers in the N tags read by the RFID reader, wherein prior to said scanning the method further comprises randomly selecting the N tags from the M tags.
1 Assignment
0 Petitions
Accused Products
Abstract
An identification method and system. A user is scanned by a Radio Frequency Identification (RFID) reader to read N RFID tags respectively embedded in N objects carried by the user. Each tag of the N tags includes a tag identifier. N may be at least 1 or at least 2. The N tags read by the RFID reader are compared with M tags in a registered record of data. The registered record comprises a reference to the user. Each tag of the M tags includes a tag identifier. M is at least N. The user is permitted access to a resource if the comparing has determined that the tag identifiers in the M tags include the tag identifiers in the N tags read by the RFID reader. The resource may be a computer resource. Alternatively, the resource may be a resource other than a computer resource.
23 Citations
20 Claims
-
1. An identification method, comprising:
-
a radio frequency identification (RFID) reader scanning a user to read N Radio Frequency Identification (RFID) tags respectively embedded in N objects being carried by the user, each tag of the N tags comprising a tag identifier of said each tag, said N being at least 2; comparing the N tags read by the RFID reader with M tags in a registered record of data, said registered record comprising a reference to the user, each tag of the M tags comprising a tag identifier, said M exceeding N; and permitting access by the user to a resource if said comparing has determined that the tag identifiers in the M tags comprise the tag identifiers in the N tags read by the RFID reader, wherein prior to said scanning the method further comprises randomly selecting the N tags from the M tags. - View Dependent Claims (2, 3, 4)
-
-
5. An identification method, comprising:
-
a radio frequency identification (RFID) reader scanning a user to read N Radio Frequency Identification (RFID) tags respectively embedded in N objects being carried by the user, each tag of the N tags comprising a tag identifier of said each tag, said N being at least 2; comparing the N tags read by the RFID reader with M tags in a registered record of data, said registered record comprising a reference to the user, each tag of the M tags comprising a tag identifier, said M being at least N; and permitting access by the user to a resource if said comparing has determined that the tag identifiers in the M tags comprise the tag identifiers in the N tags read by the RFID reader, wherein the method further comprises providing a checksum mechanism for combining identification information in the N tag identifiers. - View Dependent Claims (6, 7, 8, 9)
-
-
10. An identification method, comprising:
-
a radio frequency identification (RFID) reader scanning a user to read N Radio Frequency Identification (RFID) tags respectively embedded in N objects being carried by the user, each tag of the N tags comprising a tag identifier of said each tag, said N being at least 2; comparing the N tags read by the RFID reader with M tags in a registered record of data, said registered record comprising a reference to the user, each tag of the M tags comprising a tag identifier, said M being at least N; and permitting access by the user to a resource if said comparing has determined that the tag identifiers in the M tags comprise the tag identifiers in the N tags read by the RFID reader, wherein prior to said scanning the method further comprises generating a digital certificate having data therein, and wherein the data in the digital certificate comprises a name of the user and the identifiers in the M tags. - View Dependent Claims (11)
-
-
12. An identification system, comprising:
-
a computer; and a radio frequency identification (RFID) reader coupled to the computer; said RFID reader configured to scan a user to read N RFID tags respectively embedded in N objects being carried by the user; said tag of the N tags comprising a tag identifier of said each tag; said N being at least 2; said computer configured to perform a comparison of the N tags read by the RFID reader with M tags in a registered record of data; said registered record comprising a reference to the user; each tag of the M tags comprising a tag identifier; said M exceeding N; said computer configured to permit access by the user to a resource if said comparison has determined that the tag identifiers in the M tags comprise the tag identifiers in the N tags; said computer configured to randomly select the N tags from the M tags prior to said scan of the user. - View Dependent Claims (13, 14, 15)
-
-
16. An identification system, comprising:
-
a computer; and a radio frequency identification (RFID) reader coupled to the computer; said RFID reader configured to scan a user to read N RFID tags respectively embedded in N objects being carried by the user; said tag of the N tags comprising a tag identifier of said each tag; said N being at least 2; said computer configured to perform a comparison of the N tags read by the RFID reader with M tags in a registered record of data; said registered record comprising a reference to the user; each tag of the M tags comprising a tag identifier; said M being at least N; said computer configured to permit access by the user to a resource if said comparison has determined that the tag identifiers in the M tags comprise the tag identifiers in the N tags; said computer configured to provide a checksum mechanism for combining identification information in the N tag identifiers. - View Dependent Claims (17, 18)
-
-
19. An identification system, comprising:
-
a computer; and a radio frequency identification (RFID) reader coupled to the computer; said RFID reader configured to scan a user to read N RFID tags respectively embedded in N objects being carried by the user; said tag of the N tags comprising a tag identifier of said each tag; said N being at least 2; said computer configured to perform a comparison of the N tags read by the RFID reader with M tags in a registered record of data; said registered record comprising a reference to the user; each tag of the M tags comprising a tag identifier; said M being at least N; said computer configured to permit access by the user to a resource if said comparison has determined that the tag identifiers in the M tags comprise the tag identifiers in the N tags; said computer configured to generate a digital certificate having data therein prior to said scan of the user, wherein the data in the digital certificate comprises a name of the user and the identifiers in the M tags. - View Dependent Claims (20)
-
Specification