System and method for providing secure identification solutions
DC CAFCFirst Claim
Patent Images
1. A RFID reader, comprising:
- a radio and an antenna;
a processor coupled with the radio, the processor configured to;
send a first communication to a RFID transponder via the radio and the antenna that includes a memory the contents of which includes an identifier,send a second communication to the RFID transponder via the radio and the antenna that includes a security key for validation by the RFID transponder,receive at least the identifier included in the memory contents via the radio and the antenna in response to the second communication and as a result of validation of the security key, andtransmit the identifier to a central database;
wherein the processor is further configured to send a third communication to the RFID transponder via the radio and the antenna that includes a second security key for validation by the RFID transponder and receive via the radio and the antenna further memory contents in response to the third communication and as a result of validation of the second security key.
2 Assignments
Litigations
1 Petition
Accused Products
Abstract
The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.
-
Citations
19 Claims
-
1. A RFID reader, comprising:
-
a radio and an antenna; a processor coupled with the radio, the processor configured to; send a first communication to a RFID transponder via the radio and the antenna that includes a memory the contents of which includes an identifier, send a second communication to the RFID transponder via the radio and the antenna that includes a security key for validation by the RFID transponder, receive at least the identifier included in the memory contents via the radio and the antenna in response to the second communication and as a result of validation of the security key, and transmit the identifier to a central database; wherein the processor is further configured to send a third communication to the RFID transponder via the radio and the antenna that includes a second security key for validation by the RFID transponder and receive via the radio and the antenna further memory contents in response to the third communication and as a result of validation of the second security key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A toll system, comprising:
-
a central data base configured to; store toll accounts, receive identifiers related to toll accounts, and compare the received identifiers to identifiers associated with the toll accounts to determine if a match exists; an RFID reader comprising a radio and an antenna, the RFID reader configured to; send a first communication to a RFID transponder that includes a memory the contents of which includes an identifier, send a second communication to the RFID transponder that includes a security key for validation by the RFID transponder, receive at least the identifier included in the memory contents in response to the second communication and as a result of validation of the security key, and transmit the identifier to the central database; and a RFID transponder, comprising; a memory the contents of which includes an identifier, a radio front end and an antenna, and a processor coupled with the radio front end and the memory, the processor configured to; receive a first communication from a RFID reader via the radio front end and an antenna, receive a second communication from the RFID reader that includes a security key radio front end and an antenna, grant access to the memory contents based on the security key, and send at least the identifier included in the memory contents in response to the second communication; wherein the RFID reader is further configured to send a third communication to the RFID transponder that includes a second security key for validation by the RFID transponder and receive further memory contents in response to the third communication and as a result of validation of the second security key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A toll system, comprising:
-
a central data base configured to; store toll accounts, receive identifiers related to toll accounts, and compare the received identifiers to identifiers associated with the toll accounts to determine if a match exists; an RFID reader comprising a radio and an antenna, the RFID reader configured to; send a first communication to a RFID transponder that includes a memory the contents of which includes an identifier, send a second communication to the RFID transponder that includes a security key for validation by the RFID transponder, receive at least the identifier included in the memory contents in response to the second communication and as a result of validation of the security key, and transmit the identifier to the central database; and a RFID transponder, comprising; a memory the contents of which includes an identifier, a radio front end and an antenna, and a processor coupled with the radio front end and the memory, the processor configured to; receive a first communication from a RFID reader via the radio front end and an antenna, receive a second communication from the RFID reader that includes a security key radio front end and an antenna, grant access to the memory contents based on the security key, and send at least the identifier included in the memory contents in response to the second communication; wherein the processor is further configured to receive a third communication from the RFID transponder via the radio front end and an antenna that includes a second security key, grant access to the memory based on the second security key, and send further memory contents in response to the third communication. - View Dependent Claims (19)
-
Specification