Systems and methods for RFID-based access management of electronic devices
First Claim
1. An access management system for preventing unauthorized persons from using an electronic device in a custodial facility, the system comprising:
- a RFID tag configurable to have unique identification information that can be associated with a wearer of the RFID tag;
a reader configurable to be associated with the electronic device, the reader configurable to have a predetermined RFID coverage zone for detecting RFID tags within the coverage zone, wherein the predetermined RFID coverage zone is a zone of RFID coverage with a predetermined size; and
a device management system configurable to be connected to the reader and configurable to determine whether the wearer is authorized to use the electronic device based at least in part on an RFID tag'"'"'s detected unique identification information;
wherein the reader is configured to detect when the RFID tag is within the coverage zone, the device management system permitting use of the electronic device if it determines the wearer is authorized to use the electronic device.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may include a RFID tag having unique identification information associated with a wearer of the RFID tag. The RFID tag may be comprised in a non-removable item worn by the wearer, such as a bracelet. This system may also include an RFID reader associated with the electronic device and having an RFID coverage zone for detecting RFID tags within the coverage zone. A device management system may be connected to the reader and configured to determine whether a wearer in the coverage zone is authorized to use the electronic device based at least in part on detected RFID tag'"'"'s unique identification information. In such an embodiment, the device management system is configured to activate the electronic device if it determines the authorized wearer is detected in the coverage zone.
-
Citations
20 Claims
-
1. An access management system for preventing unauthorized persons from using an electronic device in a custodial facility, the system comprising:
-
a RFID tag configurable to have unique identification information that can be associated with a wearer of the RFID tag; a reader configurable to be associated with the electronic device, the reader configurable to have a predetermined RFID coverage zone for detecting RFID tags within the coverage zone, wherein the predetermined RFID coverage zone is a zone of RFID coverage with a predetermined size; and a device management system configurable to be connected to the reader and configurable to determine whether the wearer is authorized to use the electronic device based at least in part on an RFID tag'"'"'s detected unique identification information; wherein the reader is configured to detect when the RFID tag is within the coverage zone, the device management system permitting use of the electronic device if it determines the wearer is authorized to use the electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of preventing unauthorized persons from using an electronic device in a custodial facility, the method comprising:
-
providing a RFID tag configurable to have unique identification information that can be associated with a wearer of the RFID tag; creating an RFID coverage zone around the electronic communication device as a zone of RFID coverage with a predetermined size; detecting when the RFID tag is within the RFID coverage zone; determining whether the wearer of the RFID tag is authorized to use the electronic device based at least in part on the detected unique identification information; and permitting use of the electronic device by the wearer of the RFID tag if it is determined that the wearer of the RFID tag is authorized to use the electronic device while the detected RFID tag is in the RFID coverage zone. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification