Gamma sterilizable RFID system that prevents unauthorized operation of associated disposable bioprocess components
First Claim
1. A method of authenticating a component to confirm the component is suitable for use, the method comprising:
- receiving a component having a radio-frequency identification (RFID) device attached thereto, the RFID device including memory having redundant authentication information therein, wherein the component and the RFID device have been sterilized using radiation, at least one region of the memory being corrupted by the radiation;
obtaining multiple readings of the memory, including data from the at least one region corrupted by the radiation, the multiple readings being obtained by an RFID reader that at least one of (a) uses different power levels to read the memory or (b) is located at different distances from the RFD device when the memory is read;
analyzing the multiple readings to determine the authentication information; and
authenticating the component using the authentication information to confirm that the component is suitable for use, wherein authenticating includes analyzing or processing the authentication information in a predetermined manner.
3 Assignments
0 Petitions
Accused Products
Abstract
This invention provides a system and apparatus that is able to authenticate and prevent illegal manufacturing and unauthorized operation of disposable bioprocess components. This invention utilizes a ferro-electric random access memory (FRAM) chip to store error-correctable information on a RFID tag attached to the disposable bioprocess components, where the error-correctable information is written into the memory chip, so that the information can remain in the chip when the RFID tag and disposable bioprocess component is gamma-sterilized. Also, this invention includes a method for authenticating the disposable bioprocess component that reduces liability in that a counterfeit poor quality disposable component is not used on the hardware so the user will not file an unjustified complaint.
26 Citations
26 Claims
-
1. A method of authenticating a component to confirm the component is suitable for use, the method comprising:
-
receiving a component having a radio-frequency identification (RFID) device attached thereto, the RFID device including memory having redundant authentication information therein, wherein the component and the RFID device have been sterilized using radiation, at least one region of the memory being corrupted by the radiation; obtaining multiple readings of the memory, including data from the at least one region corrupted by the radiation, the multiple readings being obtained by an RFID reader that at least one of (a) uses different power levels to read the memory or (b) is located at different distances from the RFD device when the memory is read; analyzing the multiple readings to determine the authentication information; and authenticating the component using the authentication information to confirm that the component is suitable for use, wherein authenticating includes analyzing or processing the authentication information in a predetermined manner. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of authenticating a component to confirm the component is suitable for use, the method comprising:
-
receiving a component havin a radio-frequency identification (RFID) device attached thereto, the RFID device including memory having redundant authentication information therein, wherein the bioprocess component and the RFID device have been sterilized to reduce bio-burden, at least one region of the memory being corrupted by the sterilization; obtaining multiple readings of the memory, including data from the at least one region corrupted by the sterilization, the multiple readings being obtained by an RFID reader that at least one of (a) uses different power levels to read the memory or (b) is located at different distances from the RFID device when the memory is read; analyzing the multiple readings to determine the authentication information; and authenticating the component using the authentication information to confirm that the component is suitable for use, wherein authenticating includes analyzing or processing the authentication information in a predetermined manner. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification