Secure identification devices and methods for detecting and monitoring access thereof
First Claim
1. A game token having a counter system comprising:
- a housing;
a token identification element at least partially contained within the housing, the token identification element comprising;
at least one antenna configured to receive and transmit a signal;
a memory configured to store a plurality of different types of token data, including;
a read attempt value that represents a number of read attempts of the memory, a denomination value and one or more authorized reader signatures; and
a counter configured to modify the read attempt value and to maintain the read attempt value within the game token such that the read attempt value represents a number of read attempts of the memory each time the at least one of the plurality of different types of token data is read by an authorized reader; and
a processor or control logic configured to;
upon a read attempt of the memory by a reader, compare a signature of the reader against the one or more authorized reader signatures; and
generate an alert when the signature does not match any one of the one or more authorized reader signatures.
0 Assignments
0 Petitions
Accused Products
Abstract
A game token having a counter system including a denomination value, a housing, and a token identification element at least partially contained within the housing is disclosed. The token identification element includes an antenna configured to receive and transmit a signal, a memory configured to store a plurality of different types of token data, a counter configured to modify and maintain a read attempt value, and a processor or control logic. The processor or logic control configured to, upon a read attempt of the memory by a reader, compare a signature of the reader against the one or more authorized reader signatures, and generate an alert when the signature does not match any one of the one or more authorized reader signatures.
192 Citations
20 Claims
-
1. A game token having a counter system comprising:
-
a housing; a token identification element at least partially contained within the housing, the token identification element comprising; at least one antenna configured to receive and transmit a signal; a memory configured to store a plurality of different types of token data, including;
a read attempt value that represents a number of read attempts of the memory, a denomination value and one or more authorized reader signatures; anda counter configured to modify the read attempt value and to maintain the read attempt value within the game token such that the read attempt value represents a number of read attempts of the memory each time the at least one of the plurality of different types of token data is read by an authorized reader; and a processor or control logic configured to; upon a read attempt of the memory by a reader, compare a signature of the reader against the one or more authorized reader signatures; and generate an alert when the signature does not match any one of the one or more authorized reader signatures. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A token comprising:
-
a housing; an antenna configured to communicate data with a reader external of the housing; a memory having a read only portion and a writable portion, wherein the memory includes data relating to a listing of authorized reader devices; and a memory logic device configured to read the data stored on the memory and to write data to be stored on the writable portion; wherein upon a read attempt by a reader, the memory logic device is configured to update a first counter value stored in the memory and to compare an identity of the reader with the listing of authorized readers, wherein if the identity of the reader does not match an entry of the listing of authorized readers, the memory logic device is configured to increment a second counter value stored in the memory relating to a number of unauthorized access attempts. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A method in a RFID game token comprising an antenna, memory, and a memory logic device, the method comprising:
-
receiving a first communication from a first reader through the antenna, wherein the communication includes a first reader identifier; comparing, by the memory logic device, the first reader identifier to a listing of authorized readers stored in the memory; determining, by the memory logic device, that the first reader is not an authorized reader; and in response to determining that the first reader is not an authorized reader, incrementing a value of a first counter stored in the memory, wherein the first counter relates to a number of unauthorized access attempts. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification