Information management and security system
First Claim
1. An information management and security system comprising:
- a transponder having an identification code, said transponder including a charge storage element for storing energy received from an interrogation signal, said transponder subsequently using the stored energy to power the transmission of said identification code;
an transceiver to send said interrogation signal to said transponder and to receive said identification code from said transponder;
a first terminal device connected to and activated by said transceiver;
a host network element in communication with said transceiver, said host network element having authorized identification codes stored in memory, whereby said host network element compares the identification of said transponder with the authorized identification codes stored in memory; and
a second terminal device connected to said host network element for communicating with said first terminal device after said host network element has verified the authorized identification of said transponder.
1 Assignment
0 Petitions
Accused Products
Abstract
A closed loop, (networked) information management and security system which provides a secure, end-to-end fully automated solution for controlling access, transmission, manipulation, and auditability of high value information comprising an RFID transponder badge 302 and an RF reader transceiver 315 which is associated with a host peripheral or a network. The RF reader transceiver 315 automatically identifies and verifies authorization of the RFID transponder badge holder via a "handshake" prior to allowing access to the host peripheral. The energy generated by the transmission of the interrogation signal from the RF reader means 315 provides a power source which is accumulated and then used to activate a transponder 304 response from the RFID transponder badge 302. The RF reader/transceiver 315 writes the access transaction on either the RFID transponder badge 302 and/or the host peripheral database or the network controller. Alternatively, the RF reader means 315 may be associated via network server with a LAN, WAN, or MAN. Optionally, an RFID badge 302a may be powered by an independent power source such as a flatpak battery 314.
1437 Citations
42 Claims
-
1. An information management and security system comprising:
-
a transponder having an identification code, said transponder including a charge storage element for storing energy received from an interrogation signal, said transponder subsequently using the stored energy to power the transmission of said identification code; an transceiver to send said interrogation signal to said transponder and to receive said identification code from said transponder; a first terminal device connected to and activated by said transceiver; a host network element in communication with said transceiver, said host network element having authorized identification codes stored in memory, whereby said host network element compares the identification of said transponder with the authorized identification codes stored in memory; and a second terminal device connected to said host network element for communicating with said first terminal device after said host network element has verified the authorized identification of said transponder. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. An information management and security system comprising:
-
a first security badge including a transponder, a mass memory and an input/output circuit; a first transceiver to wirelessly send and receive signals to and from said first transponder, said first transceiver to continuously transmit a broadcast signal until receiving a response from said first security badge and then, upon receipt of said response, said transceiver to receive a first authorization code from said first security badge and to store a record of the receipt of the authorization code; a first terminal device connected to and activated by said first transceiver; a second security badge including a transponder, a mass memory and an input/output device; a second transceiver to send and receive signals to and from said second RFID transponder, said second transceiver to continuously transmit a broadcast signal until receiving a response from said second security badge and then, upon receipt of said response, said second transceiver to receive a second authorization code from said second security badge and to store a record of the receipt of the authorization code; a second terminal device connected to and activated by said transceiver; and a host network element in communication with said first transceiver and said second transceiver, said host network element to receive the first authorization code from the first transceiver and the second authorization code from the second transceiver and compare the first and second authorization codes with at least one host authorization code, said host network element to send a first verification code to the first transceiver upon verification of the first authorization code and to send a second verification code to the second transceiver upon verification of the second authorization code.
-
-
28. A method of securing access to a terminal device, said method comprising the steps of:
-
providing an authorized user with a security badge which includes a personal computer card, a read/write transponder, a mass memory and a input/output data circuit, said transponder electronically storing an identification code; and associating a transceiver with said terminal device, said transceiver being operable to communicate with said terminal device; wherein said authorized user gains access to said terminal device by; (a) bringing said security badge within a selected distance of said transceiver, said security badge located so that it is not physically visible so that said transponder is not within line-of-sight with said transceiver; (b) transmitting an interrogation signal from said transceiver; (c) receiving said interrogation signal at said security badge and storing said interrogation signal within a charge storage device within said security badge; (d) transmitting said identification code from said security badge to said transceiver wherein the transmitting is powered by energy derived from said charge storage device; (e) receiving said identification code at said transceiver; and (f) verifying said identification code;
wherein steps (b)-(f) are performed without said transponder being physically visible. - View Dependent Claims (29, 30)
-
-
31. A method of securely communicating information between two locations comprising:
-
requesting an information transfer from a first location to a second location; interrogating a radio frequency identification (RFID) transponder at said second location from a radio frequency (RF) transceiver at said second location; transmitting an identification code from said RFID transponder at said second location to said RF transceiver at the said second location; transmitting said identification code from said second location to a third location, said third location remote from said first and second locations; comparing the authorization of said identification code with authorized identification codes stored in memory at said third location; communicating an authorization signal from said third location; and transmitting the requested information in packets to said second location after the authorization is verified, each of the packets of information including a header, the information to be transferred and a footer wherein the header includes an identification number for a user at the first location, an identification number for a receiver at the second location, a date/time stamp and a location stamp.
-
-
32. A method of securely communicating information between two locations comprising:
-
requesting an information transfer from a first location to a second location; interrogating a radio frequency identification ("RFID") transponder at said first location from a radio frequency ("RF") transceiver at said first location; transmitting an identification code from said RFID transponder at said first location to said RF transceiver at said first location; transmitting said identification code from said first location to a third location, said third location remote from said first and second locations; comparing the authorization of said identification code with authorized identification codes stored in a memory at said third location; communicating an authorization signal from said third location; and transmitting the requested information in packets to said second location after the authorization is verified, each of the packets of information including a header, the information to be transferred and a footer wherein the header includes an identification number for a user at the first location, an identification number for a receiver at the second location, a date/time stamp and a location stamp. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification