Method and apparatus for optimized batterry life and authentication in contactless technology
First Claim
1. A radio frequency (RF) device for authorizing user access to portions of a computer system comprising:
- a power supply;
processing circuitry that accesses the power supply according to a location of the RF device;
an antenna that transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system;
the processing circuitry configured to operate at a first power level until the communication signals indicate that the location of the RF device is within a first range of the transponder at which time the processing circuitry is configured to begin operations at a second power level; and
the processing circuitry being configured to operate at the second power level until the communication signals indicate that the location of the RF device has moved outside of a second range from the transponder.
5 Assignments
0 Petitions
Accused Products
Abstract
A radio frequency (RF) device for authorizing user access to portions of a computer system. The RF device includes a power supply, processing circuitry that accesses the power supply according to a location of the RF device, and an antenna that transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system. The processing circuitry is configured to operate at a first power level until the communication signals indicate that the location of the RF device is within a first range of the transponder. The processing circuitry is configured to begin operations at a second power level after the RF device is positioned within the first range of the transponder. The processing circuitry is also configured to operate at the second power level until the communication signals indicate that the location of the RF device has moved outside of a second range from the transponder.
24 Citations
20 Claims
-
1. A radio frequency (RF) device for authorizing user access to portions of a computer system comprising:
-
a power supply;
processing circuitry that accesses the power supply according to a location of the RF device;
an antenna that transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system;
the processing circuitry configured to operate at a first power level until the communication signals indicate that the location of the RF device is within a first range of the transponder at which time the processing circuitry is configured to begin operations at a second power level; and
the processing circuitry being configured to operate at the second power level until the communication signals indicate that the location of the RF device has moved outside of a second range from the transponder. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A radio frequency (RF) device for authorizing user access to portions of a computer system comprising:
-
a power supply;
processing circuitry that accesses the power supply according to a location of the RF device;
an antenna that transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system;
the processing circuitry being configured to operate at a first power level until authentication signals verify that the location of the RF device is within a first range of the transponder at which time the processing circuitry begins operations at a second power level; and
the processing circuitry being configured to operate at the second power level until the location of the RF device is detected to have moved outside of a second range from the transponder. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method for an RF device to conserve power while controlling user access to a computer system having a transponder, the method comprising:
-
operating the RF device in a low power mode;
placing the RF device within ten centimeters of the transponder to initiate RF communications between the RF device and the computer system while the RF device remains in the low power mode;
authenticating a valid identity for the RF device;
identifying portions of the computer system that a user with the RF device is permitted to access;
activating the identified portions of the computer system; and
activating a high power state in the RF device that permits the RF device to maintain the activation of the identified portions of the computer system while the RF device remains within 10 meters of the transponder. - View Dependent Claims (18, 19, 20)
-
Specification