RADIO FREQUENCY IDENTIFIERS FOR PROVIDING USER ACCESS TO COMPUTING RESOURCES
First Claim
1. A system for controlling access to computing resources including:
- an authentication device operatively associated with a computing device, the authentication device being configured to transmit an interrogation signal to a predetermined area;
a computing device having at least one software application resides thereon; and
a wireless license device configured to transmit license information to the authentication device in response to the interrogation signal and to allow the software application to run while the wireless license device is within the predetermined area and to prevent the software application from running when the wireless license device is not within the predetermined area.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for controlling access to computing resources including an authentication device operatively associated with a computing device, the authentication device being configured to transmit an interrogation signal to a predetermined area. A computing device has at least one software application resides thereon. A wireless license device is configured to transmit license information to the authentication device in response to the interrogation signal and to allow the software application to run while the wireless license device is within the predetermined area and to prevent the software application from running when the wireless license device is not within the predetermined area.
31 Citations
22 Claims
-
1. A system for controlling access to computing resources including:
-
an authentication device operatively associated with a computing device, the authentication device being configured to transmit an interrogation signal to a predetermined area; a computing device having at least one software application resides thereon; and a wireless license device configured to transmit license information to the authentication device in response to the interrogation signal and to allow the software application to run while the wireless license device is within the predetermined area and to prevent the software application from running when the wireless license device is not within the predetermined area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. In a computing environment, a method of controlling access to computing resources, comprising:
-
sending an interrogation signal to at least one selected area; receiving license information in an authentication device from a wireless license device while the wireless license device is within the selected area; and determining whether the license information licenses a software application to run on a computing device; allowing the software application to run while the authentication device receives license information that licenses the operation of the software application on the computing device; and disallowing operation of the software application if the authentication device does not receive license information that licenses the operation of the software application on the computing device. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer readable medium having instructions thereon, the instructions including:
-
a license management module configured to receive license information from a wireless license device while the wireless license device is located within a selected area, to access license information associated with a computing resource, compare the license information from the wireless license device to the license information associated with the computing resources to determine whether the license information is valid; and a monitoring module configured to allow access to the computing resource if the license management module is receiving the license information from the wireless license device and the license information from the license device is valid. - View Dependent Claims (19, 20, 21, 22)
-
Specification