Object location based security using RFID
First Claim
1. A networking security system, the networking security system comprising:
- an RFID reader, the RFID transmitting a signal to an RFID tag;
a distance calculator, the distance calculator determining a distance to the RFID tag from the transmitted signal; and
an access controller, the access controller selectively permitting access from a mobile computing device to a wireless networking system based on the determined distance to the RFID tag.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for controlling access to a wireless networking system using RFID tags is provided. The security system and method uses RFID tags to determine the location of mobile computing device. The security system and method selectively allows access to the wireless networking system based on the determined location of the mobile computing device. For example, the security system and method will permit access to the wireless networking system if the mobile computing device is determined to be in an area of permitted access. Conversely, the security system and method will deny access to the wireless networking system if the mobile computing device is determined to be not within an area of permitted access. Thus, the system and method is able to effectively control access to the wireless networking system by only permitting access to mobile devices within designated areas.
92 Citations
32 Claims
-
1. A networking security system, the networking security system comprising:
-
an RFID reader, the RFID transmitting a signal to an RFID tag;
a distance calculator, the distance calculator determining a distance to the RFID tag from the transmitted signal; and
an access controller, the access controller selectively permitting access from a mobile computing device to a wireless networking system based on the determined distance to the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of controlling access to a wireless networking system, the method comprising the steps of:
-
determining a distance to an RFID tag; and
selectively permitting access from a mobile computing device to the wireless networking system based on the determined distance to the RFID tag. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A networking security system, the networking security system comprising:
-
an array of RFID readers distributed around an area, a plurality of the array of RFID readers transmitting at least three transmitted signals to an RFID tag coupled to a mobile computing device, each of the plurality of the array of RFID readers receiving at least three backscatter-modulated signals from the multi-mode RFID tag, wherein the at least three transmitted signals from each RFID reader have a fundamental frequency with a fundamental frequency difference;
a distance calculator, the distance calculator determining a phase of the at least three backscatter-modulated signals received at each RFID reader, the distance calculator determining a distance from each RFID reader by performing a linear trend fit of the phase in the at least three backscatter-modulated signals and the fundamental frequency of the at least three transmitted signals to determine a rate of change of the phase with respect to a rate of change of the fundamental frequency; and
an access controller, the access controller determining if the mobile computing device is in a permitted access area from the distance from each RFID reader, the accesses controller selectively permitting access from the mobile computing device to a wireless networking system based on whether the mobile computing device is in the permitted access area. - View Dependent Claims (27, 28)
-
-
29. A method of controlling access to a wireless networking system, the method comprising the steps of:
-
addressing an RFID tag coupled to a mobile computing device using an RFID reader, the addressing of the RFID tag putting the RFID tag into a responsive state;
transmitting at least three transmitted signals from the RFID reader to the RFID tag, wherein at least two of the at least three transmitted signals have a different fundamental frequency;
receiving at least three backscatter-modulated signals from the RFID tag;
determining a phase for each of the at least three backscatter-modulated signals;
computing a distance to the RFID tag by performing a linear trend fit of the phase in the at least three backscatter-modulated signals and the fundamental frequency of the at least three transmitted signals to determine a rate of change of the phase with respect to a rate of change of the fundamental frequency;
determining if the RFID tag and mobile computing device is in a permitted access area based on the distance to the RFID tag; and
selectively permitting access from the mobile computing device to the wireless networking system based on whether the RFID tag and mobile computing device are in the permitted access area. - View Dependent Claims (30, 31, 32)
-
Specification