System and method for providing secure identification solutions
DC CAFCFirst Claim
Patent Images
1. A method for granting access to memory contents of an RFID transponder, the memory contents including an identifier, comprising:
- sending a first communication to the RFID transponder;
sending a second communication to the RFID transponder that includes a security key for validation by the RFID transponder;
receiving at least the identifier included in the memory contents in response to the second communication and as a result of validation of the security key; and
comparing the identifier to an identifier stored in a database to determine if the two identifiers are related.
2 Assignments
Litigations
1 Petition
Accused Products
Abstract
The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.
27 Citations
26 Claims
-
1. A method for granting access to memory contents of an RFID transponder, the memory contents including an identifier, comprising:
-
sending a first communication to the RFID transponder; sending a second communication to the RFID transponder that includes a security key for validation by the RFID transponder; receiving at least the identifier included in the memory contents in response to the second communication and as a result of validation of the security key; and comparing the identifier to an identifier stored in a database to determine if the two identifiers are related. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A toll system, comprising:
-
a central data base configured to; store toll accounts, receive identifiers related to toll accounts, and compare the received identifiers to identifiers associated with the toll accounts to determine if a match exists; an RFID reader comprising a radio and an antenna, the RFID reader configured to; send a first communication to a RFID transponder that includes a memory the contents of which include an identifier, send a second communication to the RFID transponder that includes a security key for validation by the RFID transponder, receive at least the identifier included in the memory contents in response to the second communication and as a result of validation of the security key, and transmit the identifier to the central database. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for granting access to memory contents of an RFID transponder, the memory contents including an identifier, comprising:
-
receiving a first communication from a RFID reader; receiving a second communication from the RFID reader that includes a security key; granting access to the memory contents based on the security key; and sending at least the identifier included in the memory contents in response to the second communication. - View Dependent Claims (20, 21, 22)
-
-
23. A RFID transponder, comprising;
-
a memory the contents of which includes an identifier; a radio front end and an antenna; and a processor coupled with the radio front end and the memory, the processor configured to; receive a first communication from a RFID reader via the radio front end and an antenna; receive a second communication from the RFID reader that includes a security key via the radio front end and an antenna; grant access to the memory contents based on the security key; and send at least the identifier included in the memory contents in response to the second communication. - View Dependent Claims (24, 25, 26)
-
Specification