Locating an object based on charging/response time
First Claim
Patent Images
1. A method implemented by an information handling system that includes a memory and a processor, the method comprising:
- calibrating an RFID reader in a vehicle in response to detecting a malicious RFID reader within the vehicle, wherein the calibrating comprises adjusting a power level of the RFID reader;
in response to calibrating the RFID reader, sending a request signal from the RFID reader to an RFID tag, wherein the RFID reader begins transmitting the request signal at a first point in time;
receiving, at the RFID reader, a response signal from the RFID tag at a second point in time;
determining a tag charging time of the RFID tag based upon the first point in time and the second point in time;
computing, by the RFID reader, a distance from the RFID reader to the RFID tag based on the tag charging time of the RFID tag;
identifying a location of the object based upon the computed distance; and
generating a notification that includes the location of the object.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided in which an RFID reader receives a response signal from an RFID tag affixed to an object. The RFID reader determines a tag charging time of the RFID tag based upon a first point in time that the RFID reader sent a request signal to the RFID tag and a second point in time that the response signal was received by the RFID reader. In turn, the RFID reader identifies a location of the object based on the tag charging time and generates a notification that includes the location of the object.
-
Citations
15 Claims
-
1. A method implemented by an information handling system that includes a memory and a processor, the method comprising:
-
calibrating an RFID reader in a vehicle in response to detecting a malicious RFID reader within the vehicle, wherein the calibrating comprises adjusting a power level of the RFID reader; in response to calibrating the RFID reader, sending a request signal from the RFID reader to an RFID tag, wherein the RFID reader begins transmitting the request signal at a first point in time; receiving, at the RFID reader, a response signal from the RFID tag at a second point in time; determining a tag charging time of the RFID tag based upon the first point in time and the second point in time; computing, by the RFID reader, a distance from the RFID reader to the RFID tag based on the tag charging time of the RFID tag; identifying a location of the object based upon the computed distance; and generating a notification that includes the location of the object. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An information handling system comprising:
-
one or more processors; a memory coupled to at least one of the processors; and a set of computer program instructions stored in the memory and executed by at least one of the processors in order to perform actions of; calibrating the information handling system in a vehicle in response to detecting a malicious RFID reader within the vehicle, wherein the calibrating comprises adjusting a power level of the information handling system; in response to calibrating the information handling system, beginning transmission of a request signal to an RFID tag at a first point in time; receiving a response signal from the RFID tag at a second point in time; determining a tag charging time of the RFID tag based upon the first point in time and the second point in time; computing a distance from the information handling system to the RFID tag based on the tag charging time of the RFID tag; identifying a location of the object based upon the computed distance; and generating a notification that includes the location of the object. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer program product stored in a computer readable storage medium, comprising computer program code that, when executed by an information handling system, causes the information handling system to perform actions comprising:
-
calibrating the information handling system in a vehicle in response to detecting a malicious RFID reader within the vehicle, wherein the calibrating comprises adjusting a power level of the information handling system; in response to calibrating the information handling system, sending a request signal from the information handling system to an RFID tag, wherein the information handling system begins transmitting the request signal at a first point in time; receiving, at the information handling system, a response signal from the RFID tag at a second point in time; determining a tag charging time of the RFID tag based upon the first point in time and the second point in time; computing, by the information handling system, a distance from the information handling system to the RFID tag based on the tag charging time of the RFID tag; identifying a location of the object based upon the computed distance; and generating a notification that includes the location of the object. - View Dependent Claims (14, 15)
-
Specification