Position and authenticate Wi-Fi users to enhance Wi-Fi security control and management
First Claim
1. A method implemented by an information handling system that includes a processor and a memory accessible by the processor, the method comprising:
- receiving, from a radio frequency identification (RFID) tag included with a device, at least three different charge times, each of the charge times corresponding to a different RFID reader, and wherein each of the RFID readers is at a different geographic location;
approximating a distance between each of the RFID readers and the RFID tag based on the respective charge times;
calculating a geographic position of the RFID tag using trilateration based on the approximate distances to each of the three RFID readers at the different geographic locations; and
determining whether to allow the device wireless access to a computer network based on the geographic position of the RFID tag.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided that receives, from a radio frequency identification (RFID) tag included with a device, at least three different charge times. Each of the charge times corresponds to a different RFID reader that separately charges the RFID tag with each of the RFID readers being at a different geographic location. A distance between each of the RFID readers and the RFID tag is approximated based on the respective charge times and these approximate distances are used to identify a geographic position of the RFID tag using trilateration. The geographic position of the RFID tag is then used to determine whether to allow the device wireless access to a computer network.
10 Citations
7 Claims
-
1. A method implemented by an information handling system that includes a processor and a memory accessible by the processor, the method comprising:
-
receiving, from a radio frequency identification (RFID) tag included with a device, at least three different charge times, each of the charge times corresponding to a different RFID reader, and wherein each of the RFID readers is at a different geographic location; approximating a distance between each of the RFID readers and the RFID tag based on the respective charge times; calculating a geographic position of the RFID tag using trilateration based on the approximate distances to each of the three RFID readers at the different geographic locations; and determining whether to allow the device wireless access to a computer network based on the geographic position of the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification