Position and authenticate Wi-Fi users to enhance Wi-Fi security control and management
First Claim
Patent Images
1. An information handling system comprising:
- one or more processors;
a memory coupled to at least one of the processors; and
a set of computer program instructions stored in the memory and executed by at least one of the processors in order to perform actions comprising;
receiving, from a radio frequency identification (RFID) tag included with a device, at least three different charge times, each of the charge times corresponding to a different RFID reader, and wherein each of the RFID readers is at a different geographic location;
approximating a distance between each of the RFID readers and the RFID tag based on the respective charge times;
calculating a geographic position of the RFID tag using trilateration based on the approximate distances to each of the three RFID readers at the different geographic locations; and
determining whether to allow the device wireless access to a computer network based on the geographic position of the RFID tag.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided that receives, from a radio frequency identification (RFID) tag included with a device, at least three different charge times. Each of the charge times corresponds to a different RFID reader that separately charges the RFID tag with each of the RFID readers being at a different geographic location. A distance between each of the RFID readers and the RFID tag is approximated based on the respective charge times and these approximate distances are used to identify a geographic position of the RFID tag using trilateration. The geographic position of the RFID tag is then used to determine whether to allow the device wireless access to a computer network.
14 Citations
13 Claims
-
1. An information handling system comprising:
-
one or more processors; a memory coupled to at least one of the processors; and a set of computer program instructions stored in the memory and executed by at least one of the processors in order to perform actions comprising; receiving, from a radio frequency identification (RFID) tag included with a device, at least three different charge times, each of the charge times corresponding to a different RFID reader, and wherein each of the RFID readers is at a different geographic location; approximating a distance between each of the RFID readers and the RFID tag based on the respective charge times; calculating a geographic position of the RFID tag using trilateration based on the approximate distances to each of the three RFID readers at the different geographic locations; and determining whether to allow the device wireless access to a computer network based on the geographic position of the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product stored in a computer readable storage medium, comprising computer program code that, when executed by an information handling system, performs actions comprising:
-
receiving, from a radio frequency identification (RFID) tag included with a device, at least three different charge times, each of the charge times corresponding to a different RFID reader, and wherein each of the RFID readers is at a different geographic location; approximating a distance between each of the RFID readers and the RFID tag based on the respective charge times; calculating a geographic position of the RFID tag using trilateration based on the approximate distances to each of the three RFID readers at the different geographic locations; and determining whether to allow the device wireless access to a computer network based on the geographic position of the RFID tag. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification