Method and apparatus for optimized battery life and authentication in contactless technology
First Claim
1. A radio frequency (RF) device for authorizing user access to portions of a computer system composing:
- a power supply;
processing circuitry that accesses the power supply according to a location of the RF device;
an antenna tat transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system;
the processing circuitry being configured to operate at a first power level while the RF device is located outside a first range of the transponder, until the communication signals indicate that the location of the RF device is within the first range of the transponder, the processing circuitry being configured to begin operations at a second power level in response to detecting that the RF device has moved within the first range of the transponder; and
the processing circuitry being configured to operate at the second power level until the communication signals indicate that the location of the RE device has moved outside of a second range from the transponder, the second range greater than the first range.
5 Assignments
0 Petitions
Accused Products
Abstract
A radio frequency (RF) device for authorizing user access to portions of a computer system. The RF device includes a power supply, processing circuitry that accesses the power supply according to a location of the RF device, and an antenna that transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system. The processing circuitry is configured to operate at a first power level until the communication signals indicate that the location of the RF device is within a first range of the transponder. The processing circuitry is configured to begin operations at a second power level after the RF device is positioned within the first range of the transponder. The processing circuitry is also configured to operate at the second power level until the communication signals indicate that the location of the RF device has moved outside of a second range from the transponder.
28 Citations
26 Claims
-
1. A radio frequency (RF) device for authorizing user access to portions of a computer system composing:
-
a power supply; processing circuitry that accesses the power supply according to a location of the RF device; an antenna tat transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system; the processing circuitry being configured to operate at a first power level while the RF device is located outside a first range of the transponder, until the communication signals indicate that the location of the RF device is within the first range of the transponder, the processing circuitry being configured to begin operations at a second power level in response to detecting that the RF device has moved within the first range of the transponder; and the processing circuitry being configured to operate at the second power level until the communication signals indicate that the location of the RE device has moved outside of a second range from the transponder, the second range greater than the first range. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 25, 26)
-
-
12. A radio frequency (RF) device for authorizing user access to portions of a computer system comprising:
-
a power supply; processing circuitry that accesses the power supply according to a location of the RF device; an antenna that transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system; the processing circuitry being configured to operate at a first power level while the RF device is located outside a first range of the transponder, until authentication signals verify that the location of the RF device if within the first range of the transponder, the processing circuitry being configured to being operations at a second power level in response to the processing circuitry detecting that the RF device has moved within the first range of the transponder; and the processing circuitry being configured to operate at the second power level until the location of the RF device is detected to have moved outside of a second range from the transponder, the second range greater than the first range. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for an RF device to conserve power while controlling user access to a computer system having a transponder, the method comprising:
-
operating the RF device in a low power mode; placing the RF device within a first range of the transponder to initiate RF communications between the RF device and the computer system while the RF device remains in the low power mode; authenticating a valid identity for the RF device; identifying portions of the computer system that a user with the RF device is permitted to access; activating the identified portions of the computer system; and activating a high power state in the RF device in response to detecting that the RF device is within the first range of the transponder, the high power state to permit the RF device to maintain the activation of the identified portions of the computer system while the RF device remains within a second range of the transponder, the second range greater than the first range. - View Dependent Claims (21, 22, 23)
-
-
24. A method for an RF device to conserve power while controlling user access to a computer system having a transponder, the method comprising:
-
operating the RF device in a law power mode; placing the RF device within ten centimeters of the transponder to initiate RF communications between the RF device and the computer system while the RF device remains in the low power mode; authenticating a valid identity for the RF device; identifying portions of the computer system that a user with the RF device is permitted to access; activating the identified portions of the computer system; activating a high power state in the RF device that permits the RF device to maintain the activation of the identified portions of the computer system while the RF device remains within 10 meters of the transponder; and deactivating user access to the computer system when the RF device is moved outside of ten meters from the computer system.
-
Specification