System and method for secure addition of machine readable identification to an off-line database
First Claim
1. A first system for controlling operation of a second system, the first system comprising:
- a controller;
a reader, the controller able to read a first identification presented by a user through said reader, the first identification read as a first data representative of the first identification;
a keypad, the controller able to accept a learn command from the user through said keypad, the learn command having been provided to the user, of the learn command comprising a second data representative of a duration;
and,a memory accessible by the controller;
wherein,if the first identification is presented to the reader, the controller allows operation of the second system if the first data is in the memory, otherwise the controller does not allow operation of the second system; and
,if the learn command is accepted and validated by the controller and the first identification is presented to the reader, the controller adds the first data to the memory to expire after the duration has elapsed, otherwise the first data is not added to the memory.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that allows secure identification tokens (e.g., smart cards or RFID tags), often used for enabling such systems, to be securely added to a secure, local database of identification tokens authorized to operate the device, system or service. Such authorizations may be open-ended or have an expiration date. The addition of the identification token is achieved without requiring communication with a central controller by wired or wireless means, but is instead triggered by a message authorizing the addition of an identification token to the local database. The same invention can be used, in some embodiments, to allow magnetic stripe cards or biometric measurements to become authorized to operate or allow access to the system or device or service.
12 Citations
16 Claims
-
1. A first system for controlling operation of a second system, the first system comprising:
-
a controller; a reader, the controller able to read a first identification presented by a user through said reader, the first identification read as a first data representative of the first identification; a keypad, the controller able to accept a learn command from the user through said keypad, the learn command having been provided to the user, of the learn command comprising a second data representative of a duration; and, a memory accessible by the controller;
wherein,if the first identification is presented to the reader, the controller allows operation of the second system if the first data is in the memory, otherwise the controller does not allow operation of the second system; and
,if the learn command is accepted and validated by the controller and the first identification is presented to the reader, the controller adds the first data to the memory to expire after the duration has elapsed, otherwise the first data is not added to the memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A first system for controlling operation of a second system, the first system comprising:
-
a controller; a reader, the controller able to read a first identification presented by a user through said reader, the first identification read as a first data representative of the first identification; a keypad, the controller able to accept a learn command from the user through said keypad, the learn command having been provided to the user, the learn command comprising a second data representative of a duration; and
,a memory accessible by the controller;
wherein,if the first identification is presented to the reader, the controller allows operation of the second system if the first data is in the memory and not expired, otherwise the controller does not allow operation of the second system; and
,if the learn command is accepted and validated by the controller and the first identification is presented to the reader, the controller adds the first data to the memory to expire after the duration has elapsed, otherwise the first data is not added to the memory.
-
-
16. A first system for controlling operation of a second system, the first system comprising:
-
a controller; a reader, the controller able to read a first identification presented by a user through said reader, the first identification having an indicia, the first identification read as a first data representative of at least a portion of the indicia; a keypad, the controller able to accept a learn command from the user through said keypad, the learn command having been provided to the user, the learn command comprising a second data representative of a duration and at least the portion of the indicia; and
,a memory accessible by the controller;
wherein,if the first identification is presented to the reader, the controller allows operation of the second system if at least a portion of the first data is in the memory, otherwise the controller does not allow operation of the second system; and
,if the learn command is accepted and validated by the controller and the first identification is presented to the reader, the controller adds a portion of the first data to the memory to expire after the duration has elapsed, otherwise the first data is not added to the memory.
-
Specification