Location-based access to RFID tag information
First Claim
1. A method to restrict access to Radio Frequency Identification (RFID) tag information based on reader system location, the method comprising:
- determining the reader system is in a first location;
receiving a first request for first tag information while the reader system is in the first location;
determining that the reader system is not authorized to engage tags in the first location;
refraining from responding to the first request with the first tag information;
determining the reader system is in a second location different from the first location;
receiving a second request for second tag information while the reader system is in the second location;
determining that the reader system is authorized to engage tags in the second location;
retrieving the second tag information; and
responding to the second request with the second tag information, wherein at least one of determining that the reader system is not authorized to engage tags in the first location and is authorized to engage tags in the second location comprises;
determining restricted-location information; and
determining whether the reader system is authorized to engage tags based on the restricted-location information.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments are directed to restricting access to Radio Frequency Identification (RFID) tag information based on location. Access to RFID tag information may be restricted at the reader level, at the requester level, and at the network level. When reader-level restrictions exist, devices may be prevented from inventorying tags and retrieving information from tags. When requester-level restrictions exist, a requester or device may be prevented from receiving tag information from inventoried tags or a network. When network-level restrictions exist, a network may discard or otherwise restrict tag information received from devices.
-
Citations
20 Claims
-
1. A method to restrict access to Radio Frequency Identification (RFID) tag information based on reader system location, the method comprising:
-
determining the reader system is in a first location; receiving a first request for first tag information while the reader system is in the first location; determining that the reader system is not authorized to engage tags in the first location; refraining from responding to the first request with the first tag information; determining the reader system is in a second location different from the first location; receiving a second request for second tag information while the reader system is in the second location; determining that the reader system is authorized to engage tags in the second location; retrieving the second tag information; and responding to the second request with the second tag information, wherein at least one of determining that the reader system is not authorized to engage tags in the first location and is authorized to engage tags in the second location comprises; determining restricted-location information; and determining whether the reader system is authorized to engage tags based on the restricted-location information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method to restrict Radio Frequency Identification (RFID) tag information, the method comprising:
-
receiving, from a reader system, a first request for information about a first tag; determining that the reader system is in a first location; determining that the reader system is not authorized to engage the first tag in the first location; in response to determining that the reader system is not authorized to engage the first tag in the first location, indicating that the information about the first tag is restricted; receiving, from the reader system, a second request for information about a second tag; determining that the reader system is authorized to engage the second tag in the first location; and in response to determining that the reader system is authorized to engage the second tag in the first location, indicating that access to the information about the second tag is authorized, wherein determining that the reader system is authorized or not is based on at least one of; receipt of a message sent by a location marker associated with the first location; restricted-location information; an identifier for the reader system; an identifier for a user of the reader system; a message from a tag; and a cryptographically secured message from the reader system. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for a network to restrict access to Radio Frequency Identification (RFID) tag information based on reader system location, the method comprising:
-
receiving, at the network from a reader system, a request for tag information; determining a location of the reader system; determining restricted-location information; determining, based on the location and the restricted-location information, whether the reader system is authorized for the tag information; and if the reader system is authorized for the tag information, responding to the request with the tag information, else refraining from responding to the request with the tag information. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification