Proximity validation system and method
First Claim
1. A method for providing secure access to a workstation, comprising:
- broadcasting an interrogation signal within a predetermined operation area;
if an RFID tag is within the predetermined operation area, transmitting a response signal from the RFID tag to a transceiver;
forwarding the response signal to a remote server;
comparing user credential data of the response signal to user credential data stored in a database accessed by the remote server;
if the credential data of the response signal matches the stored user credential data, sending a log-on command from the remote server to a workstation located within the predetermined operation area to enable access to the workstation.
1 Assignment
0 Petitions
Accused Products
Abstract
A gate keeping system for a user accessible resource is provided. The system has a server, a transceiver and an RFID tag. The server is communicably connected to the resource for sending commands allowing and terminating user access to the resource. The receiver is communicably connected to the server. and capable of sending an RF interrogation signal. The RFID tag is capable of sending an RF signal in response to the receiving the interrogation signal. The RFID tag has a program that embodies user unique credentials capable of providing user access to the resource. The user unique credentials represent a user associated with the tag.
-
Citations
16 Claims
-
1. A method for providing secure access to a workstation, comprising:
-
broadcasting an interrogation signal within a predetermined operation area;
if an RFID tag is within the predetermined operation area, transmitting a response signal from the RFID tag to a transceiver;
forwarding the response signal to a remote server;
comparing user credential data of the response signal to user credential data stored in a database accessed by the remote server;
if the credential data of the response signal matches the stored user credential data, sending a log-on command from the remote server to a workstation located within the predetermined operation area to enable access to the workstation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for securing access to a workstation, comprising:
-
a transceiver for broadcasting an interrogation signal within a predetermined operation area;
an RFID tag for transmitting a response signal to the transceiver if the RFID tag is within the predetermined operation area; and
a remote server for receiving the response signal from the transceiver, the remote server comparing user credential data of the response signal to user credential data stored in a database, wherein the remote server sends a log-on command to the workstation located within the predetermined operation area to enable access to the workstation if the credential data of the response signal matches the stored user credential data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification