Abstract:
A method of enabling a second RFID reader mobile phone (103) to act as an agent for a first RFID reader mobile phone (105) which sends a token to the second RFID reader mobile phone. The token includes information associated with the first RFID reader mobile phone. The token may also include a token expiration time, which causes the token to be disabled at the end of the token expiration time. The information associated with the first RFID reader mobile phone may include an RFID tag identifier associated with the first RFID reader mobile phone. In other embodiments, the information associated with the first RFID reader mobile phone may include authenticating information.
Abstract:
A method of enabling a second RFID reader mobile phone (103) to act as an agent for a first RFID reader mobile phone (105) which sends a token to the second RFID reader mobile phone. The token includes information associated with the first RFID reader mobile phone. The token may also include a token expiration time, which causes the token to be disabled at the end of the token expiration time. The information associated with the first RFID reader mobile phone may include an RFID tag identifier associated with the first RFID reader mobile phone. In other embodiments, the information associated with the first RFID reader mobile phone may include authenticating information.