Systems and Methods for RFID-Based Access Management of Electronic Devices
First Claim
1. An access management system for preventing unauthorized persons from influencing the use of a telephonic device in a custodial facility, the system comprising:
- a first RFID tag having first unique identification information associated with a first wearer of the RFID tag;
a second RFID tag having second unique identification information associated with a second wearer of the RFID tag;
a reader associated with the telephonic device and having an RFID coverage zone for detecting RFID tags within the coverage zone;
a call management system connected to the reader and configured to determine whether a wearer is authorized to use the telephonic device based at least in part on an RFID tag'"'"'s detected unique identification information;
wherein the reader is configured to initially detect when one of the first or second RFID tags is within the coverage zone, the call management system activating the telephonic device if it determines the wearer of the initially detected RFID tag is authorized to use the telephonic device while the initially detected RFID tag is in the coverage zone; and
wherein the reader is further configured to subsequently detect when the other of the first or second RFID tags is within the coverage zone while the initially detected RFID tag is within the coverage zone, the call management system deactivating the telephonic device if it determines the wearer of the subsequently detected RFID tag is not authorized to use the telephonic device while the initially detected RFID tag is in the coverage zone and authorized to use the telephonic device.
4 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may include a plurality of RFID tags each having unique identification information associated with a wearer of one of the RFID tags. This system may also include an RFID reader associated with the electronic device and having an RFID coverage zone for detecting RFID tags within the coverage zone. A device management system may be connected to the reader and configured to determine whether wearers in the coverage zone are authorized to use the electronic device based at least in part on detected RFID tags'"'"' unique identification information. In such an embodiment, the device management system is configured to activate the electronic device if it determines only authorized wearers are detected in the coverage zone, and to deactivate the electronic device if it determines an unauthorized wearer is detected in the coverage zone.
-
Citations
25 Claims
-
1. An access management system for preventing unauthorized persons from influencing the use of a telephonic device in a custodial facility, the system comprising:
-
a first RFID tag having first unique identification information associated with a first wearer of the RFID tag; a second RFID tag having second unique identification information associated with a second wearer of the RFID tag; a reader associated with the telephonic device and having an RFID coverage zone for detecting RFID tags within the coverage zone; a call management system connected to the reader and configured to determine whether a wearer is authorized to use the telephonic device based at least in part on an RFID tag'"'"'s detected unique identification information; wherein the reader is configured to initially detect when one of the first or second RFID tags is within the coverage zone, the call management system activating the telephonic device if it determines the wearer of the initially detected RFID tag is authorized to use the telephonic device while the initially detected RFID tag is in the coverage zone; and wherein the reader is further configured to subsequently detect when the other of the first or second RFID tags is within the coverage zone while the initially detected RFID tag is within the coverage zone, the call management system deactivating the telephonic device if it determines the wearer of the subsequently detected RFID tag is not authorized to use the telephonic device while the initially detected RFID tag is in the coverage zone and authorized to use the telephonic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of preventing unauthorized persons from influencing the use of a telephonic device in a custodial facility, the method comprising:
-
providing a first RFID tag having first unique identification information associated with a first wearer of the RFID tag; providing a second RFID tag having second unique identification information associated with a second wearer of the RFID tag; creating an RFID coverage zone around the telephonic device; initially detecting when one of the first or second RFID tags within the coverage zone; determining whether the wearer of the initially detected RFID tag is authorized to use the telephonic device based at least in part on the initially detected unique identification information; activating the telephonic device for use by the wearer of the initially detected RFID tag if is determined that the wearer of the initially detected RFID tag is authorized to use the telephonic device while the initially detected RFID tag is in the coverage zone; and subsequently detecting when the other of the first or second RFID tags is within the coverage zone while the initially detected RFID tag is in the coverage zone; determining whether the wearer of the subsequently detected RFID tag is authorized to use the telephonic device based at least in part on the subsequently detected unique identification information; and deactivating the telephonic device if it is determined that the wearer of the subsequently detected RFID tag is not authorized to use the telephonic device while the initially detected RFID tag is in the coverage zone and authorized to use the telephonic device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. An access management system for preventing unauthorized persons from using an electronic device within a facility, the system comprising:
-
a plurality of RFID tags each having unique identification information associated with a wearer of one of the RFID tags; a reader associated with the electronic device and having an RFID coverage zone for detecting RFID tags within the coverage zone; a device management system connected to the reader and configured to determine whether wearers in the coverage zone are authorized to use the electronic device based at least in part on detected RFID tags'"'"' unique identification information; wherein the device management system is configured to activate the electronic device while one or more authorized wearers are detected in the coverage zone, and to deactivate the electronic device if it determines an unauthorized wearer is detected in the coverage zone while an authorized wearer is detected in the coverage zone and authorized to use the telephonic device. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification