Method, apparatus, and system for providing and using a trusted tag
First Claim
Patent Images
1. A method, comprising:
- receiving data from a phone, the received data including user-entered data and at least one of tag data of a tag and metadata, wherein the user-entered data comprises at least one of a user-entered alphanumeric string, a still image, a motion video, and an audio segment;
causing the user-entered data to be stored into a memory of the tag, wherein the user-entered data is stored in an unencrypted format;
based on the received data, generating a validation signature for the tag;
and causing the validation signature to be written into the memory of the tag;
wherein the validation signature is written to the memory of the tag such that the validation signature for the tag is later usable to validate the user-entered data and enables a predetermined action to be performed with the at least one of tag data and the metadata.
1 Assignment
0 Petitions
Accused Products
Abstract
A trusted authority, validation system and method are provided. The system and method may employ Near Field Communication (NFC) technologies to prepare and write signed validation signatures to tags as well as read and analyze validation signatures from tags. An NFC-enabled phone is also provided as a mechanism for facilitating the trusted authority and validation services described herein.
-
Citations
19 Claims
-
1. A method, comprising:
-
receiving data from a phone, the received data including user-entered data and at least one of tag data of a tag and metadata, wherein the user-entered data comprises at least one of a user-entered alphanumeric string, a still image, a motion video, and an audio segment; causing the user-entered data to be stored into a memory of the tag, wherein the user-entered data is stored in an unencrypted format; based on the received data, generating a validation signature for the tag; and causing the validation signature to be written into the memory of the tag; wherein the validation signature is written to the memory of the tag such that the validation signature for the tag is later usable to validate the user-entered data and enables a predetermined action to be performed with the at least one of tag data and the metadata. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
at a first time; receiving data from a phone, the received data including user-entered data that comprises at least one of a user-entered alphanumeric string, a still image, a motion video, and an audio segment, wherein the received data further includes at least one of;
(i) tag data and (ii) metadata;based on the received data, generating a validation signature for the tag; causing the user-entered data to be stored into a memory of the tag, wherein the user-entered data is stored the memory of the tag in an unencrypted format; causing the validation signature to be written into the memory of the tag; and at a second time, after the first time; receiving a new validation signature and new tag data from memory of a new tag; performing a validation analysis of the new tag by comparing the received new validation signature and the new tag data with known valid tag data and a corresponding validation signature; and providing results of the validation analysis to at least one interested party. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A communication system, comprising:
-
a tag having memory and an interface; a trusted authority configured to receive data from a phone that has read the tag, the received data including user-entered data and at least one of tag data and metadata, wherein the phone is configured to write the user-entered data to the memory of the tag in an unencrypted format, wherein the trusted authority is further configured to generate a validation signature for the tag based on the received data and then cause the validation signature to be written into the memory of the tag; further comprising a signature validation module configured to receive the validation signature from the tag and perform a validation analysis of the tag by comparing the received validation signature with one or more entries in a database of valid validation signatures. - View Dependent Claims (18, 19)
-
Specification