System and method of using RFID tag proximity to grant security access to a computer
First Claim
Patent Images
1. A system for granting security access to one or more software applications on a computer, comprising:
- an RFID reader configured to;
scan an RFID tag that is within a proximity range of the computer, andread identification data associated with the RFID tag;
a database storing security access information; and
a processor that;
compares the identification data associated with the RFID tag to the security access information stored in the database in response to the RFID tag being detected to be within the proximity range;
after determining that the identification data of the RFID tag matches the security access information, the processor;
determines which selected software applications that the user has the right to access by sending an inquiry to the database and receiving a response indicating which selected software applications that the user has the right to access;
grants access to only the selected software applications on the computer if the comparison of the identification data associated with the RFID tag and the security access information associated with the identification data is favorable; and
after the granting of access, determines if the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continues to grant access to the selected software applications, but if the RFID tag is determined to no longer be within the proximity range, denies access to the selected software applications; and
after determining that the identification data of the RFID tag does not match the security access information, the processor denies access to the selected software applications,wherein after the granting of access and if the RFID tag is not be within the proximity range, the processor;
determines that the RFID tag has not been within the proximity range by determining that a lag time between the RFID tag and the RFID reader is greater than a predetermined threshold, anddenies access to the selected software applications in response to determining that the lag time is greater than the predetermined threshold.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method of granting and removing a user'"'"'s security access to applications on a computer using proximity of authorized RFID tags is disclosed. A user having an authorized RFID tag that is located near the computer will be granted access to pre-authorized applications.
-
Citations
14 Claims
-
1. A system for granting security access to one or more software applications on a computer, comprising:
-
an RFID reader configured to; scan an RFID tag that is within a proximity range of the computer, and read identification data associated with the RFID tag; a database storing security access information; and a processor that; compares the identification data associated with the RFID tag to the security access information stored in the database in response to the RFID tag being detected to be within the proximity range; after determining that the identification data of the RFID tag matches the security access information, the processor; determines which selected software applications that the user has the right to access by sending an inquiry to the database and receiving a response indicating which selected software applications that the user has the right to access; grants access to only the selected software applications on the computer if the comparison of the identification data associated with the RFID tag and the security access information associated with the identification data is favorable; and after the granting of access, determines if the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continues to grant access to the selected software applications, but if the RFID tag is determined to no longer be within the proximity range, denies access to the selected software applications; and after determining that the identification data of the RFID tag does not match the security access information, the processor denies access to the selected software applications, wherein after the granting of access and if the RFID tag is not be within the proximity range, the processor; determines that the RFID tag has not been within the proximity range by determining that a lag time between the RFID tag and the RFID reader is greater than a predetermined threshold, and denies access to the selected software applications in response to determining that the lag time is greater than the predetermined threshold. - View Dependent Claims (2, 3, 4)
-
-
5. A method of granting security access to one or more software applications on a computer, comprising:
-
receiving a first identification data associated with a first RFID tag, wherein the first RFID tag is within a proximity range of an RFID reader or the computer; comparing the first identification data associated with a first RFID tag to security access information associated with the RFID tag stored in a database; after determining that the first identification data of the RFID tag matches the security access information, determining which pre-selected software applications that the user has the right to access; granting access to a first user to only the pre-selected applications on the computer that the user is determined to have access rights to; denying access to the pre-selected software in response to determining that the first identification data of the RFID tag does not match the security access information; reading a second identification data associated with the second RFID tag in response to a second RFID tag being within the proximity range of the computer; comparing the second identification data to security access information stored in the database; and removing the first user'"'"'s access to one or more selected applications on the computer if the second identification data is not found based on the comparison of the second identification data to the database, and otherwise continue permitting access to the first user; after the granting of access to the first user, determining if the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continuing to grant access to the first user to the selected applications, but if the RFID tag is determined to not be within the proximity range, denying access to the first user to the selected applications; after the granting of access and if the REID tag is not be within the proximity range, determining that the RFID tag has not been within the proximity range by determining that a lag time between the RFID tag and the REID reader is greater than a predetermined threshold; and denying access to the selected software applications in response to determining that the lags time is greater than the predetermined threshold. - View Dependent Claims (6, 7, 8)
-
-
9. A method of granting security access to one or more applications on a computer, comprising:
-
when a first RFID tag is within a proximity range of the RFID reader, receiving, from an RFID reader, first identification data associated with the first RFID tag; determining if there is security access information in a database that is associated with the first identification data of the RFID tag; after determining there is security access information in the database associated with the first identification data of the RFID tag, determining which selected software applications the user has the right to access based on security permissions defined by the security access information associated with the RFID tag in the database; granting access to only the selected applications or data on the computer that the user is allowed to access if there is security access information in the database associated with the first identification data of the RFID tag; denying access to the selected software applications if there is no security access information in the database associated with the first identification data of the RFID tag; after the granting of access, determining if the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continuing to grant access to the selected applications, but if the RFID tag is determined to no longer be within the proximity range, denying access to the selected applications; after the granting of access and if the RFID tag is not be within the proximity range, determining that the RFID tags has not been within the proximity range by determining that a lag time between the RFID tag and the REID reader is greater than a predetermined threshold, and denying access to the selected software applications in response to determining that the lag time is greater than the predetermined threshold. - View Dependent Claims (10, 11, 12, 13)
-
-
14. An RFID tag comprising:
-
antenna receive an inquiry from an RFID reader when the RFID tag is with a proximity range of the RFID reader; memory; and identification data associated with a user ID, the identification data stored in the memory; wherein upon receiving the inquiry from the RFID reader, a comparison is made as to whether the identification data associated with the RFID tag matches security access information in a database in response to the RFID tag being detected to have entered the proximity range, wherein access is granted to only the selected applications on the computer if the comparison of the identification data associated with the RFID tag and the security access information of a user associated with the identification data of the RFID tag is favorable based on the RFID tag entering the proximity area, wherein the access is limited to specified permissions indicated in the security access information, wherein access is denied to the selected applications if the comparison of the identification data associated with the RFID tag and the specific software permissions is not favorable and if the RFID tag is within the proximity range, and wherein, after the granting of access, a determination is made as to whether the RFID tag is still in the proximity range, and if the RFID tag is determined to still be within the proximity range, continuing to grant access to the selected applications, but if the RFID tag is determined to no longer be within the proximity range, a determination is made that the RFID tag has not been within the proximity range by determining that a lag time between the RFID tag and the RFID reader is greater than a predetermined threshold, and denying access to the selected applications.
-
Specification