Object location based security using RFID
First Claim
1. A networking security system, the networking security system comprising:
- an RFID reader, the RFID transmitting a signal to an RFID tag, wherein the RFID reader transmits a plurality of transmitted signals to the RFID tag and receives a plurality of backscatter-modulated signals from the RFID tag, at least two of the plurality of transmitted signals having a different fundamental frequency, wherein the at least two of the plurality of transmitted signals having a different fundamental frequency have a randomly selected frequency difference;
a distance calculator, the distance calculator determining a distance to the RFID tag from the transmitted signal, wherein the distance calculator determines a phase for each of the plurality of backscatter-modulated signals from the RFID tag, and wherein the distance calculator determines the distance to the RFID tag by determining a rate of change of the phase in the plurality of backscatter-modulated signals with respect to rate of change in the fundamental frequency of the plurality of transmitted signals; and
an access controller, the access controller selectively permitting access from a mobile computing device to a wireless networking system based on the determined distance to the RFID tag.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for controlling access to a wireless networking system using RFID tags is provided. The security system and method uses RFID tags to determine the location of mobile computing device. The security system and method selectively allows access to the wireless networking system based on the determined location of the mobile computing device. For example, the security system and method will permit access to the wireless networking system if the mobile computing device is determined to be in an area of permitted access. Conversely, the security system and method will deny access to the wireless networking system if the mobile computing device is determined to be not within an area of permitted access. Thus, the system and method is able to effectively control access to the wireless networking system by only permitting access to mobile devices within designated areas.
31 Citations
27 Claims
-
1. A networking security system, the networking security system comprising:
-
an RFID reader, the RFID transmitting a signal to an RFID tag, wherein the RFID reader transmits a plurality of transmitted signals to the RFID tag and receives a plurality of backscatter-modulated signals from the RFID tag, at least two of the plurality of transmitted signals having a different fundamental frequency, wherein the at least two of the plurality of transmitted signals having a different fundamental frequency have a randomly selected frequency difference; a distance calculator, the distance calculator determining a distance to the RFID tag from the transmitted signal, wherein the distance calculator determines a phase for each of the plurality of backscatter-modulated signals from the RFID tag, and wherein the distance calculator determines the distance to the RFID tag by determining a rate of change of the phase in the plurality of backscatter-modulated signals with respect to rate of change in the fundamental frequency of the plurality of transmitted signals; and an access controller, the access controller selectively permitting access from a mobile computing device to a wireless networking system based on the determined distance to the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of controlling access to a wireless networking system, the method comprising the steps of:
-
determining a distance to an RFID tag, wherein the step of determining a distance to the RFID tag comprises the steps of; transmitting a plurality of transmitted signals from an RFID reader to the RFID tag, wherein at least two of the plurality of transmitted signals have a randomly selected fundamental frequency difference; receiving a plurality of backscatter-modulated signals from the RFID tag; determining a phase for each of the plurality of backscatter-modulated signals; and computing the distance to the RFID tag by determining a rate of change of the phase in the plurality of backscatter-modulated signals with respect to a rate of change in the fundamental frequency of the plurality of transmitted signals; and selectively permitting access from a mobile computing device to the wireless networking system based on the determined distance to the RFID tag. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A networking security system, the networking security system comprising:
-
an array of RFID readers distributed around an area, a plurality of the array of RFID readers transmitting at least three transmitted signals to an RFID tag coupled to a mobile computing device, each of the plurality of the array of RFID readers receiving at least three backscatter-modulated signals from the multi-mode RFID tag, wherein the at least three transmitted signals from each RFID reader have a fundamental frequency with a fundamental frequency difference; a distance calculator, the distance calculator determining a phase of the at least three backscatter-modulated signals received at each RFID reader, the distance calculator determining a distance from each RFID reader by performing a linear trend fit of the phase in the at least three backscatter-modulated signals and the fundamental frequency of the at least three transmitted signals to determine a rate of change of the phase with respect to a rate of change of the fundamental frequency; and an access controller, the access controller determining if the mobile computing device is in a permitted access area from the distance from each RFID reader, the accesses controller selectively permitting access from the mobile computing device to a wireless networking system based on whether the mobile computing device is in the permitted access area. - View Dependent Claims (22, 23)
-
-
24. A method of controlling access to a wireless networking system, the method comprising the steps of:
-
addressing an RFID tag coupled to a mobile computing device using an RFID reader, the addressing of the RFID tag putting the RFID tag into a responsive state; transmitting at least three transmitted signals from the RFID reader to the RFID tag, wherein at least two of the at least three transmitted signals have a different fundamental frequency; receiving at least three backscatter-modulated signals from the RFID tag; determining a phase for each of the at least three backscatter-modulated signals; computing a distance to the RFID tag by performing a linear trend fit of the phase in the at least three backscatter-modulated signals and the fundamental frequency of the at least three transmitted signals to determine a rate of change of the phase with respect to a rate of change of the fundamental frequency; determining if the RFID tag and mobile computing device is in a permitted access area based on the distance to the RFID tag; and selectively permitting access from the mobile computing device to the wireless networking system based on whether the RFID tag and mobile computing device are in the permitted access area. - View Dependent Claims (25, 26, 27)
-
Specification