RFID based network admission control
First Claim
Patent Images
1. A system for controlling access to a network, comprising:
- a wireless switch configured for radio frequency communication with a mobile unit associated with a radio frequency identification tag, the wireless switch adapted for;
determining if a radio frequency identification tag is located within a first area,enabling the mobile unit to access the network according to a first scheme if the mobile unit is located within the first area, wherein the first scheme is a graduated access scheme that provides limited access of the network to the mobile unit in order for the mobile unit to perform authentication, whereinif the mobile unit satisfactorily performs the authentication, enabling access to the network according to a second scheme allowing an access level to the network greater than the limited access, andif the mobile unit does not satisfactorily perform the authentication, terminating access to the network and enabling an alarm.
4 Assignments
0 Petitions
Accused Products
Abstract
A system for controlling access to a network includes a wireless switch configured for radio frequency communication with a mobile unit associated with a radio frequency identification tag. The wireless switch is adapted for determining if a radio frequency identification tag is located within a first area, and enabling the mobile unit to access the network according to a first scheme if the mobile unit is located within the first area.
-
Citations
16 Claims
-
1. A system for controlling access to a network, comprising:
a wireless switch configured for radio frequency communication with a mobile unit associated with a radio frequency identification tag, the wireless switch adapted for; determining if a radio frequency identification tag is located within a first area, enabling the mobile unit to access the network according to a first scheme if the mobile unit is located within the first area, wherein the first scheme is a graduated access scheme that provides limited access of the network to the mobile unit in order for the mobile unit to perform authentication, wherein if the mobile unit satisfactorily performs the authentication, enabling access to the network according to a second scheme allowing an access level to the network greater than the limited access, and if the mobile unit does not satisfactorily perform the authentication, terminating access to the network and enabling an alarm. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A method for controlling access to network services, the method comprising the steps of:
-
determining if a radio frequency identification tag is located within a first area; enabling a mobile unit affiliated with the tag to access the network services according to a first scheme if the mobile unit is located within the area, wherein the first scheme is a graduated access scheme that provides limited access of the network to the mobile unit in order for the mobile unit to perform an authentication step, performing an authentication of the mobile unit, wherein if the mobile unit satisfactorily performs the authentication step, enabling access to the network according to a second scheme allowing an access level to the network greater than the limited access, and if the mobile unit does not satisfactorily perform the authentication step, terminating access to the network and enabling an alarm. - View Dependent Claims (9, 10)
-
-
11. A system for controlling access to a network, comprising:
-
means for associating a radio frequency identification tag with a mobile unit; means for determining if the radio frequency identification tag is located within a first area; means for enabling access to the network according to a first scheme if the radio frequency identification tag is within the first area, wherein the first scheme is a graduated access scheme that provides limited access of the network to the mobile unit in order for the mobile unit to perform an authentication step, wherein if the mobile unit satisfactorily performs the authentication step, means enabling access to the network according to a second scheme allowing an access level to the network greater than the limited access, and if the mobile unit does not satisfactorily perform the authentication step, means for terminating access to the network and enabling an alarm. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification