Location-based access to RFID tag information
First Claim
1. A method for a Radio Frequency Identification (RFID) reader to restrict access to RFID tag information based on reader location, the method comprising:
- determining a location of the reader based on at least one of a global navigation system, an indoor positioning system, a beacon, an infrastructure tag, and location information from a coupled device;
determining the reader is in a first location;
receiving a first request for first tag information while the reader is in the first location;
determining that the reader is not authorized to engage tags in the first location;
refraining from responding to the first request with the first tag information;
determining the reader is in a second location different from the first location;
receiving a second request for second tag information while the reader is in the second location;
determining that the reader is authorized to engage tags in the second location;
retrieving the second tag information, wherein at least one of determining that the reader is not authorized to engage tags in the first location and is authorized to engage tags in the second location comprises;
determining restricted-location information; and
determining whether the reader is authorized to engage tags based on the restricted-location information; and
responding to the second request with the second tag information.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments are directed to restricting access to Radio Frequency Identification (RFID) tag information based on location. Access to RFID tag information may be restricted at the reader level, at the requester level, and at the network level. When reader-level restrictions exist, devices may be prevented from inventorying tags and retrieving information from tags. When requester-level restrictions exist, a requester or device may be prevented from receiving tag information from inventoried tags or a network. When network-level restrictions exist, a network may discard or otherwise restrict tag information received from devices.
-
Citations
11 Claims
-
1. A method for a Radio Frequency Identification (RFID) reader to restrict access to RFID tag information based on reader location, the method comprising:
-
determining a location of the reader based on at least one of a global navigation system, an indoor positioning system, a beacon, an infrastructure tag, and location information from a coupled device;
determining the reader is in a first location;receiving a first request for first tag information while the reader is in the first location; determining that the reader is not authorized to engage tags in the first location; refraining from responding to the first request with the first tag information; determining the reader is in a second location different from the first location; receiving a second request for second tag information while the reader is in the second location; determining that the reader is authorized to engage tags in the second location;
retrieving the second tag information, wherein at least one of determining that the reader is not authorized to engage tags in the first location and is authorized to engage tags in the second location comprises;determining restricted-location information; and determining whether the reader is authorized to engage tags based on the restricted-location information; and responding to the second request with the second tag information. - View Dependent Claims (2, 3, 4)
-
-
5. A method to restrict Radio Frequency Identification (RFID) tag information based on location, the method comprising:
-
receiving, from a reader system, first tag information; determining that the reader system is in a first location; determining that the reader system is not authorized to engage tags in the first location; in response to determining that the reader system is not authorized to engage tags in the first location, indicating that the first tag information is restricted; receiving, from the reader system, second tag information; determining that the reader system is in a second location different from the first location;
determining that the reader system is authorized to engage tags in the second location; andin response to determining that the reader system is authorized to engage tags in the second location, indicating that access to the second tag information is authorized, wherein determining that the reader system is in the first location or the second location is based on at least one of; receipt of a message sent by a location marker associated with one of the first location and the second location; restricted-location information; an identifier for the reader system; an identifier for a user of the reader system; a message from a tag; and a cryptographically secured message from the reader system. - View Dependent Claims (6, 7)
-
-
8. A Radio Frequency Identification (RFID) reader configured to restrict access to RFID tag information based on reader location, the reader comprising:
-
an interface module configured to receive requests for tag information; a transceiver module configured to transmit commands to and receive information from RFID tags; a location module configured to; determine a location of the reader based on at least one of a global navigation system, an indoor positioning system, a beacon, an infrastructure tag, and location information from a coupled device; and provide the determined location to the processor module; and a processor module configured to; receive, from the interface module, a first request for first tag information while the reader is in a first location; determine that the reader is not authorized to engage tags in the first location; refrain from responding to the first request with the first tag information; receive, from the interface module, a second request for second tag information while the reader is in a second location different from the first location;
determine that the reader is authorized to engage tags in the second location;
retrieve, via the transceiver module, the second tag information;respond to the second request with the second tag information, determine restricted-location information; and determine whether the reader is authorized to engage tags in the first and second locations based on the restricted-location information. - View Dependent Claims (9, 10, 11)
-
Specification