×

System and method for verifying physical proximity to a network device

  • US 9,609,515 B2
  • Filed: 03/27/2013
  • Issued: 03/28/2017
  • Est. Priority Date: 03/27/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for verifying physical proximity to a network device, comprising:

  • establishing, using a computer device, electromagnetic communications with a tag that is fixed in, on, or proximal to the network device, wherein the tag is configured to be read and written to by the electromagnetic communications with the computing device, when the computing device is disposed in physical proximity to the tag;

    acquiring, from the tag via the electromagnetic communications, an encrypted tag identifier, wherein an unencrypted tag identifier contained within the encrypted tag identifier is not accessible to the computer device and wherein the unencrypted tag identifier uniquely identifies the network device;

    acquiring, from the tag via the electromagnetic communications, instructions for communicating with a server, wherein the server is configured to decrypt the encrypted tag identifier, to verify that the computer device is authorized to access the network device, and to authorize access to the network device based on the verification;

    establishing, by executing the instructions on the computer device, a communications session with the server;

    transmitting, to the server via the communications session, the encrypted tag identifier, wherein the server decrypts the encrypted tag identifier, verifies that the computer device is authorized to access the network device, and sends, based on the verification, authorization command to the network device allowing the computer device access to the network device;

    receiving, from the server via the communications session, an authorization confirmation that grants access to the network device, wherein the authorization confirmation includes a new encrypted tag identifier;

    rewriting, using the computing device, the tag so as to replace the encrypted tag identifier with a new encrypted tag identifier, wherein the sever utilizes the new encrypted tag identifier to grant future access to the network device; and

    performing one or more operations with the network device after receiving the authorization confirmation.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×