Radio based proximity token with multiple antennas
First Claim
1. A method of detecting a signal between a token and an electronic device for authorizing a user to access the electronic device, said method comprising the steps of;
- emitting a signal (10, 10′
) containing data from at least one of a token (12) and an electronic device (14), detecting the same signal (10, 10′
) with each of a first plurality of antennas (18, 18′
) disposed within the other of the token (12) and the electronic device (14), measuring the strength of the same signal (10, 10′
) detected at each of the first plurality of antennas (18, 18′
) with a measurement device (20, 20′
), sensing the maximum signal strength detected by any of the first plurality of antennas (18, 18′
), and enabling the electronic device (14) to allow the user access in response to the maximum signal strength being above an operational threshold to overcome variances in signal strength in response to relative movement between the token (12) and the electronic device (14) to remain enabled so long as at least one antenna (18, 18′
) detects the same signal (10, 10′
) and measures the maximum signal strength above the operational threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of detecting a signal (10, 10′) between a token (12) and an electronic device (14) for authorizing a user (16) to access the electronic device (14). The method comprises the steps of emitting a signal (10, 10′) containing data, detecting the signal (10, 10′) with a plurality of antennas (18, 18′), and measuring the strength of the signal (10, 10′) detected at each of the antennas (18, 18′). If the maximum signal strength detected by any of the antennas (18, 18′) is above an operational threshold, the electronic device (14) will be enabled. If the signal (10, 10′) is above the operational threshold, the signal (10, 10′) is compared to a user code database for authorizing the user (16) to access the electronic device (14). The operational threshold may be lowered to account for any signal variances that may occur after the user (16) has been authorized to access or when accessing the electronic device (14).
-
Citations
18 Claims
-
1. A method of detecting a signal between a token and an electronic device for authorizing a user to access the electronic device, said method comprising the steps of;
-
emitting a signal (10, 10′
) containing data from at least one of a token (12) and an electronic device (14),detecting the same signal (10, 10′
) with each of a first plurality of antennas (18, 18′
) disposed within the other of the token (12) and the electronic device (14),measuring the strength of the same signal (10, 10′
) detected at each of the first plurality of antennas (18, 18′
) with a measurement device (20, 20′
),sensing the maximum signal strength detected by any of the first plurality of antennas (18, 18′
), andenabling the electronic device (14) to allow the user access in response to the maximum signal strength being above an operational threshold to overcome variances in signal strength in response to relative movement between the token (12) and the electronic device (14) to remain enabled so long as at least one antenna (18, 18′
) detects the same signal (10, 10′
) and measures the maximum signal strength above the operational threshold.- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of detecting a signal between a token and an electronic device for authorizing a user to access the electronic device, said method comprising the steps of;
-
emitting a signal (10, 10′
),detecting the signal (10, 10′
) with at least one antenna,measuring the strength of the signal (10, 10′
) detected by the antenna,comparing the strength of the signal (10, 10′
) to an operational threshold,enabling the electronic device (14) to allow the user access in response to the signal strength being above the operational threshold, changing the operational threshold in response to the user (16) manipulating the electronic device (14) such that variances in the signal strength allow the electronic device (14) to remain enabled so long as the user is using the electronic device (14), restoring the operational threshold to the prior value before changing when the user ceases using the electronic device (14). - View Dependent Claims (15, 16, 17, 18)
-
Specification