Systems and methods for RFID-based access management of electronic devices
First Claim
1. An access management system for preventing unauthorized persons from using an electronic device in a custodial facility, the system comprising:
- a first RFID tag configurable to have unique identification information that can be associated with a first wearer of the first RFID tag;
a second RFID tag configurable to have unique identification information that can be associated with a second wearer of the second RFID tag;
a reader configurable to be associated with the electronic device, the reader configurable to have a RFID coverage zone for detecting RFID tags within the RFID coverage zone; and
a device management system configurable to be connected to the reader and configurable to determine whether a wearer is authorized to use the electronic device based at least in part on an RFID tag'"'"'s detected unique identification information;
wherein the reader is configurable to detect when the first RFID tag is within the RFID coverage zone, the device management system permitting use of the electronic device if it determines the first wearer is authorized to use the electronic device;
wherein the device management system is configurable to perform a continuous check for the second RFID tag within the RFID coverage zone and to terminate use of the electronic device when the reader detects the presence of the second RFID tag within the RFID coverage zone.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may include a RFID tag having unique identification information associated with a wearer of the RFID tag. The RFID tag may be comprised in a non-removable item worn by the wearer, such as a bracelet. This system may also include an RFID reader associated with the electronic device and having an RFID coverage zone for detecting RFID tags within the coverage zone. A device management system may be connected to the reader and configured to determine whether a wearer in the coverage zone is authorized to use the electronic device based at least in part on detected RFID tag'"'"'s unique identification information. In such an embodiment, the device management system is configured to activate the electronic device if it determines the authorized wearer is detected in the coverage zone.
-
Citations
49 Claims
-
1. An access management system for preventing unauthorized persons from using an electronic device in a custodial facility, the system comprising:
-
a first RFID tag configurable to have unique identification information that can be associated with a first wearer of the first RFID tag; a second RFID tag configurable to have unique identification information that can be associated with a second wearer of the second RFID tag; a reader configurable to be associated with the electronic device, the reader configurable to have a RFID coverage zone for detecting RFID tags within the RFID coverage zone; and a device management system configurable to be connected to the reader and configurable to determine whether a wearer is authorized to use the electronic device based at least in part on an RFID tag'"'"'s detected unique identification information; wherein the reader is configurable to detect when the first RFID tag is within the RFID coverage zone, the device management system permitting use of the electronic device if it determines the first wearer is authorized to use the electronic device; wherein the device management system is configurable to perform a continuous check for the second RFID tag within the RFID coverage zone and to terminate use of the electronic device when the reader detects the presence of the second RFID tag within the RFID coverage zone. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method of preventing unauthorized persons from using an electronic device in a custodial facility, the method comprising:
-
providing a first RFID tag configurable to have unique identification information that can be associated with a first wearer of the first RFID tag; providing a second RFID tag configurable to have unique identification information that can be associated with a second wearer of the second RFID tag; creating an RFID coverage zone around the electronic communication device; detecting when the first RFID tag is within the RFID coverage zone; determining whether the wearer of the first RFID tag is authorized to use the electronic device based at least in part on the detected unique identification information; permitting use of the electronic device by the first wearer of the first RFID tag if it is determined that the first wearer of the first RFID tag is authorized to use the electronic device while the first RFID tag is in the RFID coverage zone; performing a continuous check for the second RFID tag within the RFID coverage zone; detecting when the second RFID tag is within the RFID coverage zone; and terminating use of the electronic device when the presence of the second RFID tag is detected within the RFID coverage zone. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
Specification