RFID rag and method of user verification
First Claim
1. A method of verifying a user for access to a secure system or location, the method comprising the steps of:
- (a) acquiring identification information from an identification tag worn by the user;
(b) validating the identification information;
(c) granting access to the user if the identification information is valid; and
(d) denying access to the user if the identification information is not valid.
1 Assignment
0 Petitions
Accused Products
Abstract
An identification tag (100) facilitates use of a secure computer system (300). The tag (100) is adapted to be worn on a user'"'"'s wrist and includes an identification and registration circuit (102) that includes an identification component (106), an affiliation component (110), and a light-emitting diode (112). The computer system includes an RF identification tag registration device (302) operable to acquire user physical information and communicate the physical information to a computer (202), wherein the computer verifies that a valid user is wearing the tag (100). The identification and registration device (302) ensures that the physical information communicated to the computer pertains to the user wearing the tag by comparing pulse signals acquired from the user'"'"'s hand and wrist as the device (302) is acquiring physical information. The computer (202) uses the identification information and the affiliation information to log the user into and out of the system (300), and to associate the identification information with a particular user.
41 Citations
12 Claims
-
1. A method of verifying a user for access to a secure system or location, the method comprising the steps of:
-
(a) acquiring identification information from an identification tag worn by the user;
(b) validating the identification information;
(c) granting access to the user if the identification information is valid; and
(d) denying access to the user if the identification information is not valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of verifying a user for access to a secured system or location, the method comprising the steps of:
-
(a) acquiring identification information by interrogating an RF identification tag that is embedded in a wrist tag;
(b) validating the identification information by matching the identification information with information stored in a memory of a computer;
(c) acquiring a user'"'"'s fingerprint information from a fingerprint scanner and pulse information from a finger pulse sensor and a wrist pulse sensor;
(d) if pulse information from the user'"'"'s wrist matches pulse information from the user'"'"'s finger, validating the user'"'"'s fingerprint information by matching the fingerprint information with fingerprint information stored in the memory;
(e) if the fingerprint information is valid, associating the identification information with the fingerprint information;
(f) acquiring affiliation information from the wrist tag, wherein the affiliation information is based on a capacitance and indicates whether the wrist tag is secured to the user;
(g) if the affiliation information indicates that the wrist tag is secured to the user, confirming the association;
(h) if the affiliation information indicates that the wrist tag is not secured to the user, abandoning the association;
(i) if the association is confirmed, granting computer access to the user; and
(j) if the association is abandoned, denying computer access to the user.
-
-
12. A method of isolating wireless communications between an RFID tag and a computer, the method comprising the steps of:
-
(a) transmitting an interrogation signal;
(b) detecting response signals transmitted by one or more RFID tags;
(c) determining if more than one response signal was detected;
(d) transmitting an interrogation signal at a lower power if more than one response signal was detected; and
(e) maintaining the power level of the interrogation signal if only one response signal was detected.
-
Specification