Computer information access based on a transmitted identification signal
First Claim
1. A system comprising:
- a multipurpose authorized user identification device providing physical access to a premesis and access to a computer system on the premesis;
at least one processor coupled to the computer system;
a first Bluetooth device provided on the identification device providing a communication capability with a second Bluetooth device provided in the computer system including a non-line-of-sight proximity range actuated identification signal detection circuit for receiving a wireless identification signal from the identification device, the wireless identification signal containing identification information regarding one or more users of the device;
a memory having means for determining whether the user of the identification device as indicated by the wireless identification signal, has authorized access to computer information accessible by the computer system;
means for maintaining the computer system in a low power state except when the user identification device is in the proximity range; and
means for granting and maintaining access to computer information accessible by the computer system if it is determined that the user as indicated by the wireless identification signal is authorized access and remains in the proximity range, wherein the granting access to computer information accessible by the computer system further includes placing the computer system in a higher power state from the lower power state.
13 Assignments
0 Petitions
Accused Products
Abstract
A system for restricting access to computer information accessible by a computer system. A computer system having access to computer information includes a detection circuit for receiving a wireless identification signal from a transmitting circuit of an identification object such as an identification badge. The identification signal includes identification information regarding the assigned possessor of the security object. In one embodiment, the detection circuit determines whether the assigned possessor of the security object as indicated by the wireless identification signal has authorized access to computer information accessible by the computer system. A user is given access if the identification information contained in the identification signal indicates that the assigned possessor is an authorized user. The computer system is placed in a condition to deny access to computer information accessible by the computer system in response to the identification signal detection circuit not having received for a predetermined period of time, a wireless identification signal containing identification information from an assigned possessor having authorized access.
77 Citations
15 Claims
-
1. A system comprising:
-
a multipurpose authorized user identification device providing physical access to a premesis and access to a computer system on the premesis; at least one processor coupled to the computer system; a first Bluetooth device provided on the identification device providing a communication capability with a second Bluetooth device provided in the computer system including a non-line-of-sight proximity range actuated identification signal detection circuit for receiving a wireless identification signal from the identification device, the wireless identification signal containing identification information regarding one or more users of the device; a memory having means for determining whether the user of the identification device as indicated by the wireless identification signal, has authorized access to computer information accessible by the computer system; means for maintaining the computer system in a low power state except when the user identification device is in the proximity range; and means for granting and maintaining access to computer information accessible by the computer system if it is determined that the user as indicated by the wireless identification signal is authorized access and remains in the proximity range, wherein the granting access to computer information accessible by the computer system further includes placing the computer system in a higher power state from the lower power state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for controlling access to computer information comprising:
-
providing a multipurpose authorized user identification device for physical access to a premesis and access to a computer system on the premesis; providing a computer system; providing a first Bluetooth device provided on the identification device providing a communication capability with a second Bluetooth device provided in the computer system including determining whether the user as indicated by the wireless identification signal has authorized access to computer information accessible by the computer system; maintaining the computer system in a low power state except when the user identification device is in the proximity range; and granting and maintaining access to computer information accessible by the computer system if it is determined that the user as indicated by the wireless identification signal is authorized access and remains in the proximity range, wherein the granting access to computer information accessible by the computer system further includes placing the computer system in a higher power state from the lower power state.
-
Specification