SYSTEM AND METHOD OF USING RFID TAG PROXIMITY TO GRANT SECURITY ACCESS TO A COMPUTER
First Claim
Patent Images
1. A system for granting security access to one or more software applications on a computer, comprising:
- an RFID reader configured to;
scan an RFID tag that is within a proximity range of the computer, andread identification data associated with the RFID tag;
a database storing security access information; and
a processor that;
compares the identification data associated with the RFID tag to the security access information stored in the database in response to the RFID tag being detected to be within the proximity range;
grants access to only selected software applications on the computer if the comparison of the identification data associated with the RFID tag and the security access information associated with the identification data is favorable;
denies access to predetermined software applications if the comparison of the identification data associated with the RFID tag and the security access information associated with the identification data is not favorable;
after the granting of access, determining if the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continuing to grant access to the selected software applications, but if the RFID tag is determined to no longer be within the proximity range, denying access to the selected software applications.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method of granting and removing a user'"'"'s security access to applications on a computer using proximity of authorized RFID tags is disclosed. A user having an authorized RFID tag that is located near the computer will be granted access to pre-authorized applications.
-
Citations
14 Claims
-
1. A system for granting security access to one or more software applications on a computer, comprising:
-
an RFID reader configured to; scan an RFID tag that is within a proximity range of the computer, and read identification data associated with the RFID tag; a database storing security access information; and a processor that; compares the identification data associated with the RFID tag to the security access information stored in the database in response to the RFID tag being detected to be within the proximity range; grants access to only selected software applications on the computer if the comparison of the identification data associated with the RFID tag and the security access information associated with the identification data is favorable; denies access to predetermined software applications if the comparison of the identification data associated with the RFID tag and the security access information associated with the identification data is not favorable; after the granting of access, determining if the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continuing to grant access to the selected software applications, but if the RFID tag is determined to no longer be within the proximity range, denying access to the selected software applications. - View Dependent Claims (2, 3, 4)
-
-
5. A method of granting security access to one or more software applications on a computer, comprising:
-
receiving a first identification data associated with a first RFID tag, wherein the first RFID tag is within a proximity range of an RFID reader or the computer; comparing the first identification data associated with a first RFID tag to security access information associated with the RFID tag stored in a database; granting access to a first user to only pre-selected applications on the computer if the first identification data is found based on the comparison of the first identification data to the security access information stored in the database and associated with the RFID tag; denying access to predetermined software applications if the first identification data is not found based on the comparison of the first identification data to the security access information stored in the database; reading a second identification data associated with the second RFID tag in response to a second RFID tag being within the proximity range of the computer; comparing the second identification data to security access information stored in the database; and removing the first user'"'"'s access to one or more selected applications on the computer if the second identification data is not found based on the comparison of the second identification data to the database, and otherwise continue permitting access to the first user, after the granting of access to the first user, determining if the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continuing to grant access to the first user to the selected applications, but if the RFID tag is determined to not be within the proximity range, denying access to the first user to the selected applications. - View Dependent Claims (6, 7, 8)
-
-
9. A method of granting security access to one or more applications on a computer, comprising:
-
when a first RFID tag is within a proximity range of the RFID reader, receiving, from an RFID reader, first identification data associated with the first RFID tag; determining if there is security access information in a database that is associated with the first identification data of the RFID tag; granting access to only selected applications or data on the computer based on security permissions associated defined by the security access information associated with the RFID tag in the database; denying access to predetermined software applications based on the security permissions associated defined by the security access information associated with the RFID tag in the database; and after the granting of access, determining if the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continuing to grant access to the selected applications, but if the RFID tag is determined to no longer be within the proximity range, denying access to the selected applications. - View Dependent Claims (10, 11, 12, 13)
-
-
14. An RFID tag comprising:
-
antenna receive an inquiry from an RFID reader when the RFID tag is with a proximity range of the RFID reader; memory; and identification data associated with a user ID, the identification data stored in the memory; wherein upon receiving the inquiry from the RFID reader, a determination is made as to whether the identification data of the RFID tag matched in security access information in a database, wherein access or denied is granted to only selected applications or data on the computer based on security permissions associated defined by the security access information associated with the RFID tag in the database, and wherein, after the granting of access, a determination is made as to whether the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continuing to grant access to the selected applications, but if the RFID tag is determined to no longer be within the proximity range, denying access to the selected applications.
-
Specification