WO2009066324A2 - Power saving security system based on programmable range - Google Patents

Power saving security system based on programmable range Download PDF

Info

Publication number
WO2009066324A2
WO2009066324A2 PCT/IN2008/000693 IN2008000693W WO2009066324A2 WO 2009066324 A2 WO2009066324 A2 WO 2009066324A2 IN 2008000693 W IN2008000693 W IN 2008000693W WO 2009066324 A2 WO2009066324 A2 WO 2009066324A2
Authority
WO
WIPO (PCT)
Prior art keywords
rfid
slave unit
detector
wss
equipment
Prior art date
Application number
PCT/IN2008/000693
Other languages
French (fr)
Other versions
WO2009066324A3 (en
Inventor
Chandrakant Bathe Dattatraya
Narkar Sunay
Kumar Ram Rakhyani Anil
Raju Anuradha
Original Assignee
Serial Innovations India Private Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Serial Innovations India Private Limited filed Critical Serial Innovations India Private Limited
Publication of WO2009066324A2 publication Critical patent/WO2009066324A2/en
Publication of WO2009066324A3 publication Critical patent/WO2009066324A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Definitions

  • ⁇ HTLE POWER SAVING SECURITY SYSTEM BASED ON PROGRAMMABLE RANGE
  • the present invention relates generally to a system for controlling power consumption of a device. More specifically it relates to a system for enabling a device to save power based on the proximity of an authentic user and securing the device against unauthentic access.
  • Electrical and electronic devices and systems such as computers, computer monitors, fans, air-conditioners, lighting equipment, televisions, motors, machines and the like are used only when a user is present in the proximity of such devices.
  • the devices may remain switched ON even when the user has stopped using them or when the user has temporarily gone away from the device. Since such devices are used extensively and are high on power consumption, it is imperative that they be switched OFF while the user is away. For example, 17" CRT and the LCD monitors consume power in the range of 35 and 60 watts. Leaving the computer or the computer monitor turned ON during periods of inactivity can, therefore, be a source of considerable power wastage.
  • the problem is approached by advising each user to turn OFF the computer monitor when not using it.
  • the major disadvantage of this approach is that it requires user intervention in the form of the user pressing the power button on the monitor's operating panel. It is unreasonable to expect the user to remember to turn OFF the monitor every time he/she steps away from the computer. Further, in the user's absence, the monitor can be turned ON by anyone. This approach, therefore, requires user intervention to turn the monitor ON and further does not prevent access by unauthentic users.
  • Another approach to conserve power is to make use of power-saving schemes present in many modern computers.
  • One such scheme allows the user to set a predetermined time after which the monitor will automatically be turned OFF while not in use. Although such an approach does not require user intervention to turn the monitor OFF, it still suffers from many shortcomings.
  • the monitor shuts down only after the predetermined time which might be much longer than the time the user left the PC unattended.
  • the monitor can be turned ON by anyone in the user's absence; and third, turning the monitor ON requires user intervention, for example, in the form of a key being pressed or a mouse being moved.
  • Such power-saving schemes further allow the user to set the time after which the computer system will automatically go into standby or hibernation mode while not in use. Since the user can set a password requirement for logging into a system returning from standby, the monitor can be secured against unauthentic users.
  • the major shortcoming of this approach is that user intervention is still required to turn the computer on. Moreover, the user is required to wait while the system transitions to its active state.
  • U.S. Patent number 5396443 titled “Information processing apparatus including arrangements for activation to and deactivation from a power-saving state” discloses an apparatus which may be used to automatically switch OFF a device such as a computer monitor based on the presence of a user in the proximity of the device.
  • the apparatus determines that the user has left the proximity of the device, it switches OFF the device.
  • the apparatus switches the device on.
  • the apparatus does not have the capability of authenticating users. As a consequence, it may switch the device ON even when an unauthentic user comes close to the device.
  • a system and a method used to control the power options of a device have been disclosed.
  • the system controls the power options of the device based on the -proximity of an authentic user to the device and secures the device against unauthentic access in the absence of authentic users.
  • the usage of the device requires at least one authentic user in the proximity of the device.
  • the device undergoes extended periods of inactivity while no authentic user is present in the proximity of the device.
  • the system of the invention hereinafter referred to as the Watt saver sensor (WSS) system switches ON the device only when an authentic user is near the device and switches OFF the device when no authentic user is near the device.
  • the WSS system is capable of distinguishing authentic users from unauthentic users such that the device is turned ON only when an authentic user comes near the device.
  • the WSS system can be based on any wireless technology including, Radio frequency Identification (RFID) technology, Ultra wide band RF, Bluetooth, infrared, WiFi, ultrasound, GPS, GPRS, wireless ethernet or a combination thereof.
  • the WSS system comprises a power options controller, a sensory detector associated with the device, and a plurality of slave units associated with the users of the device.
  • the sensory detector is capable of detecting the slave units based on the distance of the slave units from the sensory detector.
  • the sensory detector incorporates a slave unit authenticator capable of authenticating slave units as they enter the proximity of the device.
  • the sensory detector informs the power options controller when a first authentic slave unit enters the proximity of the device. Accordingly, the power options controller switches the device ON.
  • the sensory detector also informs the power options controller when the last authentic slave unit leaves the proximity of the device. Accordingly, the power options controller switches the device OFF.
  • the WSS system provides for. the association of new slave units in addition to the existing slave units.
  • the sensory detector is hereinafter referred to as the RFID detector and the slave units are hereinafter referred to as RFID slave units.
  • the RFID link between the RFID detector and the RFID slave units may be implemented to be: (a) full duplex active, (b) simplex and (c) full duplex passive.
  • the WSS system prescribes different protocols for each of these cases.
  • WSS-Full Duplex Active (WSS-FDA) protocol prescribes the various modes the WSS system can be in, the conditions for transitioning from one mode to another, and the procedures for associating new slave units with an existing WSS system.
  • FIG. 1 is a schematic diagram showing the associations between the WSS system, the user, and the device;
  • FIG. 2 is the block diagram of an exemplary embodiment of the WSS system
  • FIG. 3 is a flow diagram illustrating the transitions from Wake Up mode to other modes prescribed under the WSS-FDA protocol for the RFID detector;
  • FIG. 4 is a flow diagram illustrating the transitions between the three modes prescribed under the WSS-FDA protocol for the RFID slave units
  • FIG. 5 is a flow diagram illustrating the details of the Wake Up mode for the RFID detector under the WSS-FDA protocol
  • FIG. 6 is a flow diagram illustrating the details of the Wake Up mode for RFID slave units under the WSS-FDA protocol
  • FIG. 7 is a flow diagram illustrating the details of the Within Range mode for the
  • FIG. 8 is a flow diagram illustrating the details of the Within Range mode for RFID slave units under the WSS-FDA protocol
  • FIG. 9 is a flow diagram illustrating the details of the Out Of Range mode for the
  • FIG. 10 is a flow diagram illustrating the details of the Out Of Range mode for RFID slave units under the WSS-FDA protocol
  • FIG. 11 is a flow diagram illustrating the details of the Association Phase for the
  • FIG. 12 is a flow diagram illustrating the details of the Association Phase for RFID slave units under the WSS-FDA protocol
  • FIG. 13 is a flow diagram illustrating the transitions between the two modes prescribed under the WSS-SA protocol for the RFID detector on turning the PC on;
  • FIG. 14 is a flow diagram illustrating the transitions between the two states prescribed under the WSS-SA protocol for the RFID detector
  • FIG. 15 is a flow diagram illustrating the details of the Within Range mode for the
  • ⁇ G. 16 is a flow diagram illustrating the details of the Out Of range mode for the
  • FIG. 17 is a diagram illustrating the details of the PRESENT packet prescribed under the WSS-SA protocol.
  • FIG. 18 is a flow diagram illustrating the details of the Association Phase for RFID detector under the WSS-SA protocol
  • FIG. 19 is a flow diagram illustrating the transitions from Wake Up mode to other modes prescribed under the WSS-FDP protocol for the RFID detector;
  • FIG. 20 is a flow diagram illustrating the transitions between the two states prescribed under the WSS-FDP protocol for RFID slave units
  • FIG. 21 is a flow diagram illustrating the details of the Wake Up mode for the RFID detector under the WSS-FDP protocol
  • FIG. 22 is a flow diagram illustrating the details of the Within Range mode for the
  • FIG. 23 is a flow diagram illustrating the details of the Out Of Range mode for the
  • FIG. 24 is a flow diagram illustrating the details of the Association Phase for the
  • FIG. 1 is a schematic diagram showing the associations between a device 102, a WSS system 104, and a user 106 according to an embodiment of the invention.
  • a device 102 consumes power and WSS system 104 is used to manage the power consumption of device 102 as well as for security of device 102 such that only a user 106 authenticated to use device 102 is given access to device 102.
  • the usage of device 102 requires the presence of a user 106 in device 102's proximity.
  • Device 102 typically undergoes extended periods of inactivity while user 106 is away from device 102's proximity.
  • device 102 may be a computer, a computer server, a computer monitor, a television, a fan, an air conditioner, lighting equipment or the like.
  • WSS system 104 switches device 102 OFF when user 106 leaves the proximity of device 102. Likewise, WSS system 104 switches device 102 ON when user 106 returns to the proximity of device 102. Furthermore, WSS system 104 responds to the arrival and departure of user 106 only if user 106 is authenticated to use device 102. Moreover WSS system 104 can be designed to authenticate a plurality of users 106 to use device 102. WSS system 104 has been described in detail in conjunction with FIG. 2.
  • FIG. 2 is a block diagram illustrating WSS system 104 in accordance with an embodiment of the invention.
  • WSS system 104 comprises of components associated with device 102 and components associated with user 106.
  • the communication between the two sets of components is based on Radio Frequency Identification (RFID) technology.
  • RFID Radio Frequency Identification
  • the communication between the two sets of components is not limited to only RFID technology and can also be based on other wireless technologies like Bluetooth, infrared, WiFi, ultrasound, GPS, GPRS, wireless Ethernet or a combination thereof.
  • the components associated with device 102 include a power options controller 202, an RFID detector 204, and a slave unit authenticator 208.
  • the components associated with device 102 are located inside or around device 102.
  • RFID detector 204 may be connected to the computer system using a USB port, a power line, fire-wire, PCI connector, RS232 cable, RS485 port, RS422 port, PCI express connector, PCMCI, camera link, optic fiber, SPI link, I2C link, CAN connector, parallel port, serial port, VGA port, LVDS, HEART devices, 4-2OmA, Ethernet (10baseT, 100baseT, 10GbaseT), SCSI, EISA, GPIB, ISA, Audio port, SATA. ATA or any other wired digital or analog communication.
  • the components associated with user 106 include at least one RFID slave unit 206.
  • each RFID slave unit 206 is associated with one user 106.
  • RFID slave unit 206 may be in the form bf a name-tag, a wrist-band, and the like which the user may wear, carry, etc.
  • RFID slave unit 206 may be powered by a battery, solar power, mechanical energy, electromagnetic induction, capacitive energy, gravitational energy, thermal energy or a combination thereof.
  • a region of pre-specified radius, centering on device 102 is defined as the proximity of device 102.
  • Full duplex active RFID link and simplex RFID link can provide a programmable range of radius 0-200 meters based on the frequency used and the programmed output power.
  • the pre-specified radius is programmed in the range of 0 to 10 meters.
  • Any RFID slave unit 206 within the region of pre-specified radius centering on device 102 is hereinafter referred as being within the proximity of device 102.
  • any RFID slave unit 206 leaving the region is hereinafter referred to as departing from the proximity of device 102.
  • any RFID slave unit 206 entering the region is hereinafter referred to as entering the proximity of device 102.
  • RFID detector 204 receives a radio frequency (RF) packet from RFID slave unit 206 only if RFID slave unit 206 is within the proximity of device 102. Based on the reception of the RF packet from RFID slave unit 206, RFID detector can determine if RFID slave unit 206 has entered the proximity of device 102 or has departed from it.
  • RF radio frequency
  • power options controller 202 is a software component and manages the power options of device 102.
  • power options controller 202 is a software installed in a computer.
  • Power options controller 202 can be integrated either with device 102 or with RFID detector 204.
  • RFID detector 204 alerts power options controller 202 about the approach and departure of RFID slave unit 206 in the proximity of device 102.
  • power options controller 202 selects an appropriate power option for device 102.
  • power options controller 202 may switch OFF device 102 based on RFID slave unit 206 departing from the proximity of device 102.
  • power options controller 202 is a hardware component and is placed between device 102 and the power supply to device 102.
  • power options controller 202 is a hardware component like a relay, semi-conductor switch etc. placed between an air- conditioner and the power supply to device 102.
  • power options controller 202 is integrated within RFID detector 204 as Ha firmware module and sends commands to device 102 like a computer to switch ON or OFF.
  • WSS system 104 responds to the approach and departure of authentic RFID slave unit 206 only.
  • Slave unit authenticator 208 authenticates RFID slave unit 206 present within the proximity of device 102.
  • slave unit authenticator 208 is incorporated within power options controller 202.
  • slave unit authenticator 208 is incorporated within RFID detector 204.
  • Slave unit authenticator 208 authenticates RFID slave units 206 based on unique identifications assigned to RFID detector 204 and each of the plurality of RFID slave units 206.
  • the unique identification assigned to RFID detector 206 is hereinafter referred to as Master ID MID.
  • the unique identification assigned to RFID slave unit 206 is hereinafter referred to as Slave ID (SID).
  • RFID detector 204 and RFID slave unit 206 exchange RDID and SID information.
  • RFlD detector 204 may accept only the packets from RFID slave unit 206 which have the MID of RFID detector 204 as destination address and a known SID as source address.
  • WSS system 104 may be used to switch ON device 102 as soon as user 106, authenticated to use device 102 enters the office wherein device 102 lies.
  • RFID detector 204 is located at the entrance of the office in order to detect the arrival of user 106.
  • RFID detector 204 can also detect the departure of user 106 and based on the departure of user 106, switch OFF device 102.
  • RFID detector 204 sends an alert to power options controller 202. through a network to switch device 102 ON or OFF based on the arrival or departure of user 106.
  • a plurality of power options controllers 202 can receive alerts from RFID detector 204 through the network to control the power options of a plurality of devices 202.
  • RFID detector 204 sends the alert to appropriate power option controller 202 controlling the power options of device 102, based on the arrival or departure of user 106 authenticated to use device 102.
  • WSS system 104 may be used to switch OFF device 102 upon detecting an unauthenticated user 106 in the proximity of device 102.
  • WSS system 104 may be designed to operate in the general case where a plurality of RFID slave units 206 are associated with device 102.
  • RFID detector 204 can receive RF packets from a plurality of RFlD slave units 206 simultaneously. As such, RFID detector 204 determines when a first of the plurality of RFID slave units 206 authenticated by slave unit authenticator 208 enters the proximity of device 102, and alerts power options controller 202 to select an appropriate power option, for example, to switch ON device 102.
  • RFID detector 204 determines when a last of the plurality of RFID slave units 206 authenticated by slave unit authenticator 208 leaves the proximity of device 102, and alerts power options controller 202 to select an appropriate power option, for example, to switch OFF device 102.
  • Device 102 may include, but is not limited to computes, computer monitors, televisions, fans, air conditioners, and the like.
  • PC personal computer
  • WSS system 104 may be deployed to automatically switch PC ON or OFF based on the presence of user 106 in the proximity of PC.
  • WSS system 104 may be used to automatically switch the monitor of PC ON or OFF based on the presence of user 106 in the proximity of PC.
  • WSS system 104 is deployed to manage the power consumption of the monitor of PC is considered hereinafter.
  • power options controller 102 may conveniently be implemented as a software application.
  • Power options controller 102 is hereinafter referred to as WSS application software and can be installed on PC or integrated with RFID detector 204.
  • FIG. 3 is a flow diagram illustrating the transitions of RFID detector 204 from Wake Up mode to other modes prescribed under the Watt Saver Sensor - Full Duplex Active (WSS-FDA) protocol according to an embodiment of the invention.
  • WSS system 104 may be implemented using Full Duplex Active RFID technology wherein RFID detector 204 and RFID slave unit 206 communicate as per the WSS- FDA protocol. Under the WSS-FDA protocol, both RFID detector 204 and RFID slave unit 206 can transmit and receive radio frequency (RF) packets. Consequently, under this protocol, RFID detector 204 and RFID slave unit 206 can be in one of ⁇ hree states: transmit, receive, and idle.
  • RF radio frequency
  • the WSS-FDA protocol prescribes three modes of operation for WSS system 104: the Wake Up (WU) mode, the Within Range (WIR) mode, and the Out Of Range (OOR) mode. These modes cover all possible operating conditions of WSS system 104 under the WSS-FDA protocol. FIG. 3-10 illustrate the details of these modes while FIG. 11-12 describe the method prescribed for associating new slave units under the WSS-FDA protocol.
  • PC is switched on.
  • switching ON PC automatically boots up WSS application software.
  • the WSS application software needs to be manually turned ON.
  • the monitor of PC is, by default, ON immediately after PC is switched ON.
  • RFlD detector 204 is switched ON.
  • RFID detector 204 enters the WU mode at step 306.
  • RFID detector 204 enquires for RFID slave unit 206 as per the WSS-FDA protocol.
  • RFID detector determines if any RFID slave unit 206 authenticated by slave unit authenticator 208 is present in the proximity of PC.
  • RFID detector 204 proceeds to step 312. At step 312, RFID detector enters the OOR mode. At step 314, RFID detector 204, while remaining in the OOR mode, sends an alert to WSS application software to switch the monitor of PC OFF. If it is determined at step 310 that at least one RFID slave unit 206 authenticated by slave unit authenticator 208 is present in the proximity of PC, RFlD detector 204 proceeds to step 316. At step 316, RFlD detector enters the WIR mode.
  • FIG. 4 is a flow diagram illustrating the transitions of RFID slave unit 206 between the modes prescribed under WSS-FDA protocol according to an embodiment of the invention.
  • RFID slave unit 206 is switched ON. When switched ON, RFID slave unit 206 enters the WU mode at step 404. At step 406, while remaining in the WU mode, RFID slave unit 206 starts enquiring for packets from RFID detector 204. At step 408, RFlD slave unit 206 determines if a valid packet is received from RFID detector 204. If it is determined as step 408 that no valid packet is received from RFID detector 204, RFID slave unit 206 proceeds to step 410. At step 410, RFlD slave unit 206 enters the OOR mode. After step 410, while remaining in the OOR mode, RFID slave unit 206 returns to step 406 and enquires for packets from RFID detector 204.
  • step 408 If it is determined as step 408 that a valid packet is received from RFID detector 204, RFID slave unit 206 proceeds to step 412. At step 412, RFID slave unit 206 enters the WIR mode. After step 412, while remaining in the WIR mode, RFID slave unit 206 returns to step 406 and enquires for packets from RFID detector 204.
  • FIG. 5 is a flow diagram illustrating the WU mode for RFID detector 204 under the WSS-FDA protocol according to an embodiment of the invention. Immediately after PC is switched ON, WSS application software causes RFID detector 204 to enter the WU mode.
  • RFID detector 204 enters the WU mode.
  • RFID detector 204 enters the transmit state.
  • RFID detector 204 transmits a wake-up enquiry (WU_ENQ) packet of a pre-specified time period (MT1).
  • RFID detector 204 transmits a wake-up enquiry (WU_ENQ) packet of a pre-specified time period (MT1).
  • RFlD detector 204 enters the receive state in which it waits for another pre- specified time period (MT2) period for a wake-up response (WU-RESP) packet from RFID slave unit 206.
  • RFID detector 204 determines if a WU_RESP packet is received within the MT2 time period.
  • RFID detector 204 If it is determined at step 510 that a WU-RESP packet is received within the MT2 time period, RFID detector 204 proceeds to step 512. At step 512, RFID detector 204 checks the received WU_RESP packet for validity. In case the WU_RESP packet is found to be invalid, RFID detector 204 proceeds to step 514. At step 514, RFID detector 204 increments the wake-up positive-response (WU_POS_RESP) counter by one. The WU_POS_RESP counter indicates the number of successful responses received by RFlD detector 204 while in the WU mode, i.e. the number of WU_ENQ packets transmitted that resulted in a valid WU-RESP packet being received.
  • WU_POS_RESP wake-up positive-response
  • RFID detector 204 determines if the WU_POS_RESP counter exceeds the WU_POS_RESP limit.
  • the WU_POS_RESP limit is the minimum number of successful responses required by RFID detector 204 to transition from the WU mode to the WIR mode. If it is determined at step 516 that the WU_POS_RESP counter is greater than or equal to the WU_POS_RESP limit, RFID detector 204 proceeds to step 518. At step 518, RFID detector 204 enters the WIR mode. If it is determined at step 516 that the WU_POS_RESP counter is less than the WU_POS_RESP limit, RFID detector 204 returns to step 504 and prepares to transmit further WUJ ⁇ NQ packets.
  • RFID detector 206 proceeds to step 520.
  • RFID detector 206 also proceeds to step 520 if it is determined at step 512 that the received WU_RESP packet is invalid.
  • RFID detector 204 increments the wake-up negative- response (WU_NEG_RESP) counter by one.
  • the WU_NEG_RESP counter indicates the number of unsuccessful responses required by RFID detector 204 in the WU mode, i.e. the number of WUJ ⁇ NQ packets transmitted that did not result in a valid WU_RESP packet being received.
  • RFID detector 204 determines if the WU_NEG_RESP counter exceeds the WU_NEG_RESP limit.
  • the WU_NEG_RESP limit is the minimum number of unsuccessful responses required for RFID detector to transition from the WU mode to the OOR mode. If it is determined at step 522 that the WU_NEG_RESP counter is greater than or equal to the WU_N EGJRESP limit, then at step 524, RFID detector 204 enters the OOR mode. In case the WU_NEG_RESP counter is less than the WU_NEG_RESP limit, RFID detector returns to step 504 and prepares to transmit further WUJ ⁇ NQ packets.
  • FIG. 6 is a flow diagram illustrating the WU mode for RFID slave unit 206 under the WSS-FDA protocol according to an embodiment of the invention. Immediately after RFID slave unit 206 is switched ON for the first time, it enters the WU mode. According to an embodiment of the invention, RFID slave unit 206 may not enter the WU mode again during its life cycle. Once in the WU mode, RFID slave unit 206 can transition to either the WIR mode or the OOR mode.
  • RFID slave unit 206 is switched ON. At step 604, RFID slave unit 206 enters the WU mode. At step 606, RFID slave unit 206 enters the receive state and waits for a pre-specified time period (ST1) period for a WU_ENQ packet from RFID detector 204. At step 608, RFID slave unit 206 determines if a WU_ENQ packet is received within the ST1 time period.
  • ST1 pre-specified time period
  • RFID slave unit 206 proceeds to step 610.
  • RFID slave unit 206 checks the received WU_ENQ packet for validity. If it is determined at step 610 that the received WU_ENQ packet is valid, RFID slave unit 206 proceeds to step HS12.
  • RFID slave unit 206 enters the transmit state.
  • RFID slave unit 206 transmits a WU_RESP packet of a pre-specified time period (ST2).
  • RFID slave unit 206 determines if the change of mode recommended by the WU_ENQ packet is valid. If at step 616, it is determined that the change of mode is valid, RFID slave unit 206 proceeds to step 618. At step 618, RFID slave unit 206 enters the WIR mode.
  • RFID slave unit 206 returns to step 606 to wait for further WU_ENQ packets. If at step 610, it is determined that the received WU_ENQ packet is invalid, RFlD slave unit 206 returns to step 606 to wait for further WU_ENQ packets. If at step 608, it is determined that no WU_ENQ packet is received within the ST1 time period, RFID slave unit 206 returns to step 606 to wait for WU_ENQ packets.
  • FIG. 7 is a flow diagram illustrating the WIR mode for RFID detector 204 prescribed under the WSS-FDP protocol according to an embodiment of the invention.
  • RFID detector 204 enters the WIR mode on having ascertained the presence of at least one authenticated RFID slave unit 206 within the proximity of device 102.
  • RFID detector 204 enters the WIR mode.
  • RFID detector informs WSS application software to switch ON the monitor of PC. If the monitor of PC is already riot on, the WSS application software switches on the monitor of PC.
  • RFID detector 204 enters the transmit state.
  • RFID detector 204 transmits a within-range enquiry (WIR_ENQ) packet of a pre- specified time period (MT3).
  • RFID detector 204 enters the receive state in which it waits for another pre-specified time period (MT4) for a within-range response (WIR_RESP) packet from RFID slave unit 206.
  • RFID detector 204 determines if a WIR_RESP packet is received within the MT4 time period.
  • RFID detector 204 proceeds to step 714.
  • RFID detector 204 increments the within-range negative-response (WIR_NEG_RESP) counter by one.
  • the WIR_NEG_RESP counter indicates the number of unsuccessful enquiries made by RFID detector 204 while in the WIR mode, i.e. the number of WIR-ENQ packets transmitted that did not result in a valid WIR_RESP packet being received.
  • RFID detector 204 determines if the WIR_NEG_RESP counter exceeds the limit.
  • the WIR_NEG_RESP limit is the minimum number of unsuccessful enquiries required for RFID detector to transition from the WIR mode to the OOR mode. If at step 716, it is determined that the WIR_NEG_RESP counter is greater than or equal to the WIR_NEG_RESP limit, RFlD detector 204 proceeds to step 718. At step 718, RFID detector enters the OOR mode.
  • RFID detector 204 proceeds to step 720.
  • step 720 RFID detector 204 enters the idle state.
  • RFID detector 204 waits in the idle state for a pre-specified time period (MT5). After step 722, RFID detector 204 returns to step 706 to transmit further WIR_ENQ packets.
  • MT5 pre-specified time period
  • RFID detector 204 determines whether a WIR_RESP packet is received within the MT4 time period. If at step 712, it is determined that a WIR_RESP packet is received within the MT4 time period, RFID detector 204 proceeds to step 724. At step 724, RFID detector 204 checks the received WIR_RESP packet for validity. If at step 724, it is determined that the received WIR_RESP packet is valid, RFID detector 204 proceeds to step 720 and enters the idle state. If at step 724, it is determined that the received WIR_RESP packet is invalid, RFID detector 204 proceeds to step 714 and increments the WIR_NEG_RESP counter.
  • FIG. 8 is a flow diagram illustrating the WIR mode for RFID slave unit 206 under the WSS-FDA protocol according to an embodiment of the invention.
  • RFID slave unit 206 enters the WIR mode.
  • RFID slave unit 206 enters the receive state and waits for a pre-specified time period (ST3) for a WIR_ENQ packet from RFID detector 204.
  • ST3 pre-specified time period
  • RFID slave unit 206 determines if a WIR-ENQ packet is received within the ST3 time period. If at step 806, it is determined that a WIR_ENQ packet is received within the ST3 time period, RFID slave unit 206 proceeds to step 808.
  • RFID slave unit 206 checks the received WIR_ENQ packet for validity.
  • RFID slave unit 206 proceeds to step 810.
  • RFID slave unit 206 increments the WIR_NEG_ENQ counter by one.
  • the WIR_NEG_ENQ counter indicates the number of cycles during which the RFID slave unit 206 has waited unsuccessfully, i.e. the number ' of cycles for which no valid WIR_ENQ packets were received.
  • RFID slave unit 206 determines if the within-range negative-response (WIR_NEG_ENQ) counter exceeds the WIR_NEG_ENQ limit.
  • the WIR_NEG_ENQ limit is the minimum number of unsuccessful waiting cycles required for RFID slave unit 206 to transition from the HviR mode to the OOR mode. If at step 812, it is determined that the ⁇ WIR_NEG_ENQ counter is greater than or equal to the WIR_NEG_ENQ limit, RFID slave unit 206 enters the OOR mode.
  • RFID slave unit 206 proceeds to step 816. At step 816, RFID slave unit 206 enters the idle state. At step 818, RFID slave unit 206 waits in the idle state for a pre-specified time period (ST5). After step 818, RFID slave unit 206 returns to step 804 to wait for WIR_ENQ packets.
  • RFID slave unit proceeds to step 820.
  • RFID slave unit 206 enters the transmit state.
  • RFID slave unit 206 transmits a WIR_RESP packet of a
  • RFID slave unit proceeds to step 816 and enters the idle state.
  • RFID slave unit 206 proceeds to step 810 where it increments the WIR_NEG_ENQ counter.
  • FIG. 9 is a flow diagram illustrating the OOR mode for RFID detector 204 under the WSS-FDA protocol according to an embodiment of the invention.
  • RFID detector 204 enters the OOR mode on having ascertained that no authenticated RFID slave unit is present within the proximity of device 102.
  • RFID detector 204 enters the OOR mode.
  • RFID detector informs WSS application software to switch OFF the monitor of PC.
  • RFID detector 204 enters the transmit state.
  • RFID detector 204 transmits an out-of-range enquiry (OOR_ENQ) packet of a pre-specified time period (MT6).
  • RFID detector 204 enters the receive state in which it waits for another pre-specified time period (MT7) for an out-of-range response (OOR_RESP) packet from RFID slave unit 206.
  • RFID detector 204 determines if an OOR_RESP packet is received within the MT7 time period.
  • RFID detector 204 proceeds to step 914.
  • RFID detector 204 checks the received OOR_RESP packet for validity. If at step 914, the received OOR_RESP packet is found to be. valid, RFID detector 204 proceeds to step 916.
  • RFID detector 204 increments the out-of-range positive-response (OOR_POS_RESP) counter by one.
  • the OOR_POS_RESP counter indicates the dumber of successful enquiries made by RFID detector 204 while in the OOR mode, i.e. the number of OOR_ENQ packets transmitted that resulted in a valid OOR_RESP packet being received.
  • RFlD detector 204 determines if the OOR_POS_RESP counter exceeds the OOR_POS_RESP limit.
  • the OOR_POS_RESP limit is the minimum number of successful enquiries required for RFID detector to transition from the OOR mode to the WIR mode. If at step 918, it is determined that the OOR_POS_RESP counter is greater than or equal to the OOR_POS_RESP limit, RFlD detector 204 proceeds to step 920. At step 920, RFID detector 204 enters the WIR mode.
  • RFID detector 204 proceeds to step 922. At step 922, RFID detector enters the idle state. At step 924, RFID detector 204 waits in the idle state for a pre-specified time period (MT8). After step 924, RFID detector 204 returns to step 906 and prepares to transmit further OOR_ENQ packets.
  • MT8 pre-specified time period
  • RFID detector 204 proceeds to step 922 and enters the idle state.
  • RFID detector 204 proceeds to step 922 and enters the idle state.
  • FIG. 10 is a flow diagram illustrating the OOR mode for RFID slave unit 206 under the WSS-FDA protocol according to an embodiment of the invention.
  • RFID slave unit 206 enters the OOR mode.
  • RFID slave unit 206 enters the receive state and waits for a pre-specified time period (ST6) for an OOR_ENQ packet from RFID detector 204.
  • RFID slave unit 206 determines if an OOR_ENQ packet is received within the ST6 time period. If at step 1006, it is determined that an OOR_ENQ packet is received within the ST6 time period, RFID slave unit 206 proceeds to step 1008.
  • RFID slave unit checks the received OOR_ENQ packet for validity. If at step 1008, it is determined that the received OOR_ENQ packet is valid, RFID slave unit 206 proceeds to step 1010. At step 1010, RFID slave unit 206 enters the transmit state.
  • RFID slave unit 206 transmits an OOR_RESP packet of a pre- specified time period (ST7).
  • RFID slave unit 206 increments the OOR_POS_ENQ counter by one.
  • the OOR_POS_RESP counter indicates the number of cycles during which the RFID slave unit 206 has waited successfully, i.e. -m-ie number of cycles for which a valid OORJ ⁇ NQ packet was received.
  • RFID slave unit 206 determines if the OOR_POS_ENQ counter exceeds the OOR_POS_ENQ limit.
  • the OOR_POS_ENQ limit is the minimum number of successful waiting cycles required for RFID slave unit 206 to transition from the OOR mode to the WIR mode.
  • RFID slave unit 206 determines if the change of mode recommended by the OOR_ENQ packet is valid. If at step 1018, the change of mode is found to be valid, RFID slave unit 206 proceeds to step 1020. At step 1020, RFID slave unit 206 enters the WIR mode.
  • RFID slave unit 206 proceeds to step 1022.
  • RFID slave unit 206 enters the idle state.
  • RFID slave unit 206 waits in the idle state for a pre-specified time period (ST8). After step 1024, RFID slave unit 206 returns to step 1004 to wait for further OOR_ENQ packets.
  • RFID slave unit 206 proceeds to step 1022 and enters the idle state.
  • RFID slave unit 206 proceeds to step 1022 and enters the idle state.
  • FIG. 11 is a flow diagram illustrating the Association Phase for RFID detector 204 under the WSS-FDA protocol according to an embodiment of the invention.
  • a new RFID slave units 206 may be associated with RFID detector 204 by invoking the Association Phase functionality of WSS system 104.
  • RFID slave unit 206 is placed within the proximity of RFID detector 206 by user 106.
  • User 106 calls the Association Phase functionality of WSS application software.
  • WSS application software responds by requesting user 106 to enter the product identification information for new RFID slave unit 206. Subsequently, WSS application software places RFID detector 204 in Association Phase. Further, WSS application software extracts the SID of new RFID slave unit 206 from its product identification information, and sends the SID to RFID detector 204.
  • RFID detector 204 enters the Association Phase.
  • RFID detector 204 enters the transmit state.
  • RFID detector 204 transmits the association request (ASSOCIATION-REQUEST) packet for a pre- ' specified time period (MAT1).
  • RFID detector 204 enters the receive state in which it waits for another pre-specified time period (MAT2) for an association-request reply (ASSOCIATION_REQUEST_REPLY) packet.
  • RFID detector 204 determines if an ASSOClATION_REQUEST_REPLY packet is received within the MAT2 time period.
  • RFID detector 204 determines if the received ASSOClATION_REQUEST_REPLY packet is valid. If at step 1112, it is determined that the received ASSOCIATION_REQUEST_REPLY packet is valid, RFID detector 204 proceeds to step 1 114. At step 11 14, RFID detector 204 informs the WSS application software of the successful association of new RFID slave unit 206 and saves the SID of RFID slave unit 206 extracted from the received ASSOCIATIOM_REQUESTJREPLY packet as an authentic SID code.
  • RFID detector 204 waits for the instruction from WSS application software to exit the Association Phase. On receiving the instruction from WSS application software to exit the Association phase, at step 1118, user 106 is informed about the successful association. At step 1820 RFID detector 204 exits the Association Phase.
  • RFID detector 204 proceeds to step 1120.
  • RFID detector 204 increments the association negative- response (ASSOCIATION_NEG_RESP) counter by one.
  • the ASSOCIATION_NEG_RESP counter indicates the number of unsuccessful association cycles, i.e. the number of cycles during which no valid ASSOCIATI ON_REQUEST_REPLY packet was received.
  • RFID detector 204 determines if the ASSOCIATION_NEG_RESP counter has exceeded the slave-association (SLAVE_ASSOCIATION) limit.
  • the SLAVE_ASSOCIATION limit is the maximum number of unsuccessful association cycles allowed during the Association Phase.
  • RFID detector 204 proceeds to step 1124.
  • RFID detector 204 informs WSS application software of the failure in associating RFID slave unit 206.
  • RFID detector 204 proceeds to • ⁇ tep 1116 and waits for the instruction from WSS application software to exit the Association Phase.
  • user 106 is informed about the unsuccessful association.
  • RFID detector 204 exits the Association Phase.
  • RFID detector 204 proceeds to step 1104 and prepares to transmit further ASSOCIAT ⁇ ON_REQUEST packets.
  • step 1110 If at step 1110, it is determined that no ASSOCIATION_REQUEST_REPLY packet is received within the MAT2 time period, RFlD detector proceeds to step 1120.
  • FIG. 12 is a flow diagram illustrating the response from RFID slave unit 206 during the Association Phase under the WSS-FDA protocol according to an embodiment of the invention.
  • RFID slave unit 206 enters receive state.
  • RFID slave unit 206 determines if the packet received is an ASSOCIATION_REQUEST packet. If at step 1204, it is determined that the ASSOCIATION_REQUEST packet is received, RFID slave unit 206 proceeds to step 1206.
  • RFiD slave unit 206 checks the received ASSOCIATION_REQUEST packet for validity. If at step 1206, it is determined that the received ASSOCIATION_REQUEST packet is valid, RFID slave unit 206 proceeds to step 1208.
  • RFID slave unit 206 enters the transmit state.
  • RFID slave unit 206 transmits the ASSOCIATION_REQU ESTJREPLY packet for a pre-specified time period (SAT1) and stores the MID of RFID detector 204 extracted from the ASSOCIATION_REQUEST packet.
  • SAT1 pre-specified time period
  • RFID slave unit 206 If at step 1206, it is determined that the received ASSOCIATION_REQUEST packet is invalid, RFID slave unit 206 returns to step 1202 and enters the receive state.
  • RFID slave unit 206 If at step 1208, it is determined that no ASSOCIATION_REQUEST packet is received, RFID slave unit 206 returns to step 1202 and enters the receive state.
  • Fig 13 is a flow diagram describing the transitions of RFID detector 204 between the modes prescribed under the Watt Saver Sensor - Simplex Active (WSS-SA) protocol on turning PC on in accordance with an embodiment of the invention.
  • the WSS system 104 may be implemented using Simplex Active RFID wherein RFID detector 204 and RFID slave unit 206 communicate as per the WSS-SA protocol.
  • RFID detector 204 can only receive RF packets, whereas RFID slave unit 206 can only transmit RF packets. Consequently, under WSS-SA protocol, RFID detector 204 can be in one of the two states: receive and idle. Likewise, RFID slave unit 206 can be in either of two states: transmit and idle.
  • the WSS-SA protocol prescribes two modes of operation for RFID detector 204 of WSS system 104: the Within Range (WIR) mode . and the Out Of Range (OOR) mode.
  • the WR mode and OOR mode cover all possible operating conditions of WSS system 104 under the WSS-SA protocol.
  • FIG. 13-17 illustrate the details of the modes while FIG. 18 describes -the method prescribed for associating new RFID slave units 206 under the WSS-SA protocol.
  • RFID slave unit 206 requires less power as compared to that under WSS-FDA protocol.
  • WSS-SA protocol has reduced enquiry and response times for RFID detector 204 and RFID slave unit 206.
  • PC is switched ON.
  • switching ON PC automatically boots up WSS application software.
  • the WSS application software needs to be manually turned ON.
  • the monitor of PC is, by default, ON immediately after PC is switched ON.
  • RFID detector 204 is switched ON. When switched ON, RFID detector 204 enters the WIR mode at step 1306.
  • RFID detector 204 enquires for RFID slave units 206 as per the WSS-SA protocol.
  • a determination is made if any RFID slave unit 206 is within the proximity of PC. Any RFID slave unit 206 within the proximity of PC is further authenticated by slave unit authenticator 208.
  • RFlD detector 204 enters the OOR mode.
  • RFID detector 204 while remaining in the OOR mode, sends an alert to WSS application software to switch OFF the monitor of PC.
  • Fig 14 is a flow diagram describing the transitions of RFID slave unit 206 between two states under the WSS-SA protocol in accordance with an embodiment of the invention.
  • RFID slave unit 206 is switched ON. .
  • RFID slave unit 206 cannot be switched OFF once it is switched ON.
  • RFID slave unit 206 enters Transmit (TX) state.
  • TX State RFID slave unit 206 transmits a PRESENT packet of a pre specified (ST1) time period at step 1406.
  • the PRESENT packet is received by RFID detector 204 in accordance with the WSS-SA protocol.
  • the PRESENT packet is an information packet which informs about the presence of a RFID slave unit 206 within the proximity of PC.
  • the WSS-SA PRESENT packet format has been described in detail in conjunction with FIG. 17.
  • RFID slave unit 206 enters idle (IDL) state. On entering IDL state, RFID slave unit 206 waits in IDL state for another pre- specified time period (ST2) at step 1410. RFID slave unit 206 on waiting in IDL state for ST2 time period again enters the TX state at step 1404.
  • FIG. 15 is a flow diagram illustrating the WIR mode for RFID detector 204 prescribed under the WSS-SA protocol according to an embodiment of the invention.
  • RFID detector 204 enters the WIR mode on having ascertained the presence of at least one RFID slave unit 206 authenticated by slave unit authenticator 208 within the proximity of device 102.
  • RFID detector 204 On being switched ON, RFID detector 204 enters WIR mode at step 1502. On entering the WIR mode, RFID detector 204 alert ' s the WSS application software to switch ON the monitor of PC at step 1504. At step 1506, RFID detector 204 enters Receive (RX) state. On entering the RX state, RFID detector 204 waits in RX state for a pre-specified (MT1) time period. At step 1508 a determination is made by RFID detector 204 if a PRESENT packet from at least one RFID slave unit 206 authenticated by the slave unit authenticator 208 is received.
  • RX Receive
  • RFID detector 204 If it is determined that RFID detector 204 has received a PRESENT packet then at step 1510 a validation check is made by RFID detector 204 for validating the received PRESENT packet. If the PRESENT packet is determined to be valid then RFID detector 204 then at step 1512, it enters the IDL state. On entering the IDL state, RFID detector 204 waits in IDL state for a pre-specified (MT2) time period at step 1514. On waiting in IDL state for MT2 time period, again step 1506 is executed > ⁇ /here RFID detector 204 again enters RX state to receive further PRESENT packets.
  • MT2 pre-specified
  • a counter for RFID slave unit 206 not present is incremented by one count.
  • the WIR_SLAVE_NOT_PRESENT counter indicates that RFID slave unit 206 authenticated by slave unit authenticate 208 is not present within the proximity of PC. If the count of the WIR_SLAVE_NOT_PRESENT counter exceeds a limit, it may be interpreted as no authentic RFID slave unit 206 is present within the ⁇ proximity of PC and as such the monitor of PC needs to be switched OFF.
  • RFID detector 204 enters OOR mode at step 1520. If it is determined that WIR_SLAVE_NOT_PRESENT counter has not exceeded WIR_SLAVE_NOT_PRESENT limit, then RFID detector again enters the RX state at step 1506 to attempt to receive PRESENT packets.
  • FIG. 16 is a flow diagram illustrating the OOR mode for RFID detector 204 prescribed under the WSS-SA protocol according to an embodiment of the invention.
  • RFID detector 204 enters OOR mode at step 1602 if a plurality of PRESENT packets from a RFID slave unit 206 authenticated by slave unit authenticator 208 are not received implying that RFID slave unit 206 is not within the proximity of PC and as such is out of range.
  • RFID detector 204 alerts the WSS application software to turn OFF the monitor of PC at step 1604.
  • RFID detector 204 enters Receive (RX) state. On entering RX state, RFID detector 204 waits in RX state for a pre-specified (MT3) time period.
  • MT3 pre-specified
  • step 1608 If it is determined at step 1608 that a PRESENT packet has been received then at step 1614 a determination is made by RFID detector 204 for the validity of the received PRESENT packet.
  • step 1614 If it is determined at step 1614 that RFID detector 204 has not received a valid PRESENT packet, it again enters the IDL state at step 1610 and proceeds to step 1612.
  • RFID detector 204 increments a counter (OOR_SLAVE_PRESENT) for RFID slave unit 206 being out of range by one count.
  • OOR_SLAVE_PRESENT counter has exceeded the limit for out of range mode for RFID slave unit 206 (OOR_SLAVE_PRESENT limit).
  • step 1618 If it is determined at step 1618 that OOR_SLAVE_PRESENT counter has exceeded the OOR_SLAVE_PRESENT limit, then at step 1620 RFID detector 204 enters WIR mode.
  • RFID detector 204 again enters IDL state at step 1610.
  • Fig. 17 is a schematic describing the WSS-SA PRESENT packet format prescribed under the WSS-SA protocol in accordance with an embodiment of the invention.
  • the PRESENT packet comprises a sequence of fifteen bytes of information.
  • the PRESENT packet comprises of a Preamble 1702, a Sync Word 1704, a Payload 1706 and a CRC-16 1708.
  • Preamble 1702 comprises of four bytes of information which is a pattern of sequence of ones (1) and zeros (0) in digital format.
  • Preamble 1702 fills the first four bytes i.e. byte 1 to byte 4 of the PRESENT packet format.
  • Sync Word 1704 fills the next four bytes i.e.
  • Byte number 9 has the command data and the coding for this ⁇ ) ⁇ yte is as given in Table -1 below.
  • Byte 14 and byte 15 comprises the 16 bit Cyclic Redundancy Check data.
  • FIG. 18 is a flow diagram illustrating the Association Phase for RFID slave unit 206 under the WSS-SA protocol according to an embodiment of the invention.
  • RFID detector 204 enters the Association Phase.
  • RFID detector 204 enters the Receive (RX) state. On entering RX state, RFID detector 204 waits for a PRESENT packet from a new RFID slave unit 206.
  • RX Receive
  • RFID detector 204 waits for a PRESENT packet from a new RFID slave unit 206.
  • a determination is made if RFID detector 204 has received a PRESENT packet within a certain time period. If it is determined at step 1806 that no PRESENT packet has been received within the certain time period, RFID detector 204 again enters RX state at step 1804.
  • RFID detector 204 proceeds to step 1808.
  • step 1808 the validity of the received PRESENT is checked. If it is determined that the received PRESENT packet is not valid, RFID detector 204 again enters RX state at step 1804. If at step 1808, it is determined that the received PRESENT packet is valid, then at step 1810 RFID detector 204 extracts an SID code from the PRESENT packet and sends it to the WSS application software.
  • An SID code is a pre- configured identification code associated with any RFID slave unit 206 which is identifiable under the prescribed WSS-SA protocol by RFID detector 204.
  • RFID detector 204 After alerting the WSS application software, RFID detector 204 waits for a valid response from the WSS application software at step 1812. At step 1814 a determination is made by RFID detector 204 if the SID code has been accepted by WSS application software. If the SID code is accepted, WSS application software saves the SID code S ⁇ s an authentic SID code. If it is determined at step 1814 that the SID code has been accepted by WSS application software, then RFID detector 204 identifies the new RFID slave unit 206 as an authentic RFID slave unit 206 at step 1816. The association phase of new RFID slave unit 206 by RFID detector 204 is completed at step 1816. After step 1816 RFID detector 204 proceeds to step 1818. At step 1818, user 106 is informed about the successful association. At step 1820, RFID detector 204 exits from Association phase.
  • the new RFID slave unit 206 is not identified to be authentic and at step 1818, user 106 is informed about the unsuccessful association.
  • RFID detector 204 exits from Association phase.
  • FIG. 19 is a flow diagram illustrating the transitions between the three modes prescribed under the WSS-FDP protocol for the RFID detector 204, according to an embodiment of the invention.
  • WSS system 104 may be implemented using Full Duplex Passive RFID wherein RFID detector 204 and RFID slave unit 206 communicate as per the WSS-FDP protocol. Under the WSS-FDP protocol, both RFlD detector 204 and RFID slave unit 206 can transmit and receive RF packets. According to an embodiment of the invention, RFID slave unit 206 used in accordance with the WSS-FDP protocol does not use battery power but uses energy from the received RF packets to transmit other RF packets. Consequently, under WSS-SA protocol, RFID detector 204 can be in one of the three states: transmit, receive and idle. Likewise, RFID slave unit 206 can be in either of two states: transmit and idle.
  • the WSS-FDP protocol prescribes three modes of operation for WSS system 104: the Wake Up (WU) mode, the Within Range (WIR) mode, and the Out Of Range (OOR) mode.
  • the modes cover all possible operating conditions of WSS system 104 under the WSS-FDP protocol.
  • FIG. 19-23 illustrate the details of the modes while FIG. 24 describe the method prescribed for associating new slave units under the WSS-FDP protocol.
  • PC is switched ON.
  • switching ON PC automatically boots up WSS application software.
  • the WSS application software needs to be manually turned ON.
  • the monitor of PC is, by default, ON immediately after PC is switched ON.
  • RFID detector 204 is switched ON. On being switched ON, RFID detector 204 enters the WU mode at step 1906.
  • RFID detector 204 enquires for RFID slave units 206 as per the WSS-FDP protocol.
  • a determination is made if at least one RFID slave unit 206 authenticated by slave unit authenticator is within the proximity of PC.
  • RFID detector 204 proceeds to step 1912. At step 1912 RFID detector 204 enters WIR mode.
  • RFID detector 204 proceeds to step 1916.
  • RFID detector 204 enters the OOR mode. On entering the OOR mode, RFID detector 204 sends an alert to WSS application software to switch OFF the monitor of PC.
  • the monitor of PC is switched OFF.
  • FIG. 20 is a flow diagram illustrating the transition of RFID slave unit 206 between the two states prescribed under the WSS-FDP protocol according to an embodiment of the invention.
  • RFID slave unit 206 enters idle (IDL) state.
  • IDDL idle
  • RFID slave unit 206 it is determined if a packet is received from RFID detector 204. If it is determined that a valid packet has not been received, RFID slave unit 206 remains in IDL state and again returns to step 2004. According to an embodiment of the invention, RFID slave unit 206 keeps returning to step 2004 asynchronously on not receiving a valid packet from RFID detector 204. According to another embodiment of the invention, RFID slave unit 206 waits for a pre-specified (SP1) time period before returning to step 2004 on not receiving a valid packet from RFID detector 204.
  • SP1 pre-specified
  • RFID slave unit 206 If it is determined that a valid packet from RFID detector 204 has been received, then at step 2006, RFID slave unit 206 enters transmit (TX) state. RFID slave unit 206 uses the RF energy from the received packet to read the SID from RFID slave unit 206's memo.ry. At step 2008, RFID slave unit 206 reads the SID and transmits the SID to RFID detector 206. After the SID has been transmitted, RFID slave unit 206 again enters IDL state at step 2002.
  • TX transmit
  • FIG. 21 is a flow diagram illustrating the WU mode for RFID detector 204 under the WSS-FDP protocol according to an embodiment of the invention.
  • WSS application software causes RFID detector 204 to enter the WU mode.
  • RFID detector 204 On entering the WU mode RFID detector 204 enters the Transmit (TX) state at step 2104.
  • TX Transmit
  • RFID detector 204 transmits a wake up enquiry (WU_ENQ) packet of a pre-specified (MT1) time period.
  • RFID detector 204 enters the Receive (RX) state at step 2108.
  • RFID detector 204 waits for a pre-specified (MT2) time period at step 2108.
  • RFID Slave unit 206 on receiving an RF signal from RFID detector 204, uses the stored RF energy of the RF signal to send its encrypted Slave Identification number (SID) over RF link.
  • SID Slave Identification number
  • the encrypted SID packet is an information packet used as an identification data to identify each of RFID detector 204 and RFID slave unit 206 during communication between them over RF link.
  • MT2 pre- specified
  • step 2110 If it is determined at step 2110 that a SID packet has been received by RFID detector 204, then at step 2112 a validation check is performed to check the validity of received SID packet.
  • RFID detector 204 increments a counter (WU_POS_RESPONSE) for positive response from RFID slave unit 206 under wake up mode by one count.
  • WU_POS_RESPONSE a counter for positive response from RFID slave unit 206 under WU mode
  • RFID detector 204 enters the WIR mode. If it is determined at step 2116 that WU_POS_RESPONSE counter has not exceeded the WU_POS_RESPONSE limit, then RFID detector 204 again enters TX state at step 2104.
  • a counter for negative response from RFID slave unit 206 under Wake-up mode is incremented by one count.
  • a determination is made if WU_NEG_RESPONSE counter has exceeded a limit for negative response from RFID slave unit 206 under WU mode (WU_NEG_RESPONSE limit). If it is tletermined that WU_NEG_RESPONSE counter has not exceeded WU_NEG_RESPONSE limit, then RFID detector 204 enters TX state at step 2104. If it is determined at step 2122 that WU_NEG_RESPONSE counter has exceeded WU_NEG_RESPONSE limit, then RFID detector 204 proceeds to step 2124. At step 2124 RFID detector 204 enters OOR mode.
  • FIG. 22 is a flow diagram illustrating the WIR mode for RFID detector 204 prescribed under the WSS-FDP protocol according to an embodiment of the invention.
  • RFID detector 204 enters the WIR mode at step 2202 on having ascertained the presence of at least one RFID slave unit 206 within the proximity of device 102. On entering the WIR mode, RFID detector 204 alerts the WSS application software to switch ON the monitor of PC at step 2204. If the monitor of PC is not already ON, the WSS application software switches ON the monitor of PC. RFID detector 204 enters the Transmit (TX) state at step 2206. At step 2208, RFID detector 204 transmits an enquiry packet for detecting RFID slave unit 206 in WIR mode (WIR_ENQUIRY) packet of a pre-specified (MT3) time period. After step 2208, RFID detector 204 enters the Receive (RX) state at step 2210.
  • WIR_ENQUIRY WIR mode
  • MT3 pre-specified
  • RFID detector 204 On entering RX state RFID detector 204 waits in RX state for another pre-specified (MT4) time period at step 2210. At step 2212 a determination is made if an SID packet has been received from a pre- associated RFID slave unit 206 within the MT4 time period.
  • MT4 pre-specified
  • RFID detector 204 proceeds to step 2214.
  • a validation check is performed by RFID detector 204 to check the validity of received SID packet.
  • RFID detector 204 at step 2216 enters the idle (IDL) state. On entering the IDL state, RFID detector 204 waits for another pre-specified (MT5) time period in the IDL state at step 2218. After step 2218, RFID detector 204 again enters TX state at step 2206.
  • IDDL idle
  • MT5 pre-specified time period in the IDL state
  • RFID detector 204 increments a counter for negative response from RFID slave unit 206 in WIR mode (WIR_NEG_RESPONSE) by one count.
  • FIG. 23 is a flow diagram illustrating the details of the OOR mode for RFID detector 204 under the WSSrFDP protocol according to an embodiment of the invention.
  • RFID detector 204 enters the OOR mode on having ascertained that no RFID slave unit 206 authenticated by slave unit authenticator 208 is present within the proximity of device 102.
  • RFID detector 204 alerts the WSS application software to switch OFF the monitor of PC at step 2304.
  • RFID detector 204 enters the Transmit (TX) state at step 2306.
  • RFID detector 204 transmits an enquiry packet for detecting RFID slaveunit 206 under OOR mode (OOR_ENQUIRY) of another pre-specified (MT6) time period.
  • RFID detector 204 enters the Receive (RX) state at step 2310.
  • RFID detector 204 On entering the RX state RFID detector 204 waits in RX state for another pre- specified (MT7) time period at step 2310. At step 2312, a determination is made if RFID detector 204 has received a valid SID packet from a RFID slave unit 206 authenticated by slave unit authenticator 208 within the MT7 time period.
  • MT7 pre- specified
  • RFID detector 204 proceeds to step 2314.
  • RFID detector 204 increments a counter for positive response from RFID slave unit 206 in OOR mode (OOR_POS_RESPONSE) by one.
  • OOR_POS_RESPONSE limit the limit for positive response from RFID slave unit 206 in OOR mode
  • RFID detector 204 proceeds to step 2318.
  • RFID detector 204 goes in WIR mode.
  • RFID detector 204 If it is determined at step 2312 that no valid SID packet has been received, or if it is determined at step 2316 that OOR_POS_RESPONSE counter has not exceeded the OOR_POS_RESPONSE limit then RFID detector 204 at step 2320 RFID detector 204 enters the Idle (IDL) state. On entering IDL state RFID detector 204 ⁇ w/aits in IDL state for another pre-specified (MT8) time period at step 2322 and again enters transmit state at step 2306.
  • IDL Idle
  • FIG. 24 is a flow diagram illustrating the Association Phase for RFID slave unit 206 under the WSS-FDP protocol according to an embodiment o.f the invention.
  • RFID detector 204 enters the Association Phase.
  • RFID detector 204 enters the Transmit (TX) state.
  • RFID detector 204 transmits an ASSOCIATION_REQUEST packet for a pre specified (MAT1) time period.
  • An ASSOCIATION_REQUEST packet is an information data packet sent by RFID detector 204 for initiating the association process with a new valid RFID slave unit 206.
  • RFID detector 204 enters the Receive (RX) state and waits for a certain time for an SID packet.
  • RX Receive
  • RFID detector 204 proceeds to step 2416.
  • RFID detector 204 increments a counter for. detecting the number of times the SID packet has been received (N UM_C YCLES) by one count.
  • NUM_CYCLES counter has exceeded a counter for detecting the association of RFID slave unit 206 (SLAVE_ASSOCIATION). If it is determined that NUM_CYCLES counter has not exceeded SLAVE_ASSOCIATION, then RFID detector 204 again enters the TX state at step 2404.
  • RFID detector 204 proceeds to step 2420 where it informs WSS Application Software of unsuccessful association.
  • RFID detector 204 waits for the instruction from WSS application software to exit the Association Phase.
  • user 106 is informed about the unsuccessful association.
  • RFID detector 204 exits the Association Phase.
  • RFID detector 204 If it is determined at step 2410 that an SID packet has been received within the certain time period, then RFID detector 204 performs a validation check to check the validity of the received SID packet at step 2412. If it is determined at step 2412 that the received SID packet is not valid, then RFID detector 204 again proceeds to step 2416 where it increments NUM_CYCLES counter by one.
  • RFID detector 204 informs the WSS Application Software of a successful association ( ⁇ t step 2414. After step 2414 RFID detector 204 waits for the instruction from WSS application software to exit the Association Phase. On receiving the instruction from WSS application software to exit the Association phase, at step 2424, user 106 is informed about the successful association. At step 2426 RFID detector 204 exits the Association Phase.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Power Sources (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method and system for managing power consumption of devices that undergo extended periods of inactivity while the user is away from such a device. The system is also capable of identifying an authentic user and responds to the arrival and departure of only authentic users. The system, by incorporating means for the authentication of users as they enter the proximity of the device, secures the device against access by unauthentic users. The system comprises of a sensor, at least one sensing device and a power options controller.

Description

^HTLE: POWER SAVING SECURITY SYSTEM BASED ON PROGRAMMABLE RANGE
FIELD OF THE INVENTION
The present invention relates generally to a system for controlling power consumption of a device. More specifically it relates to a system for enabling a device to save power based on the proximity of an authentic user and securing the device against unauthentic access.
BACKGROUND
Electrical and electronic devices and systems such as computers, computer monitors, fans, air-conditioners, lighting equipment, televisions, motors, machines and the like are used only when a user is present in the proximity of such devices. The devices may remain switched ON even when the user has stopped using them or when the user has temporarily gone away from the device. Since such devices are used extensively and are high on power consumption, it is imperative that they be switched OFF while the user is away. For example, 17" CRT and the LCD monitors consume power in the range of 35 and 60 watts. Leaving the computer or the computer monitor turned ON during periods of inactivity can, therefore, be a source of considerable power wastage.
Conventionally, the problem is approached by advising each user to turn OFF the computer monitor when not using it. The major disadvantage of this approach is that it requires user intervention in the form of the user pressing the power button on the monitor's operating panel. It is unreasonable to expect the user to remember to turn OFF the monitor every time he/she steps away from the computer. Further, in the user's absence, the monitor can be turned ON by anyone. This approach, therefore, requires user intervention to turn the monitor ON and further does not prevent access by unauthentic users.
Another approach to conserve power is to make use of power-saving schemes present in many modern computers. One such scheme allows the user to set a predetermined time after which the monitor will automatically be turned OFF while not in use. Although such an approach does not require user intervention to turn the monitor OFF, it still suffers from many shortcomings. First, the monitor shuts down only after the predetermined time which might be much longer than the time the user left the PC unattended. Second, the monitor can be turned ON by anyone in the user's absence; and third, turning the monitor ON requires user intervention, for example, in the form of a key being pressed or a mouse being moved.
Such power-saving schemes further allow the user to set the time after which the computer system will automatically go into standby or hibernation mode while not in use. Since the user can set a password requirement for logging into a system returning from standby, the monitor can be secured against unauthentic users. The major shortcoming of this approach, however, is that user intervention is still required to turn the computer on. Moreover, the user is required to wait while the system transitions to its active state.
U.S. Patent number 5396443, titled "Information processing apparatus including arrangements for activation to and deactivation from a power-saving state" discloses an apparatus which may be used to automatically switch OFF a device such as a computer monitor based on the presence of a user in the proximity of the device. When the apparatus determines that the user has left the proximity of the device, it switches OFF the device. Similarly, on determining that the user has returned to the proximity of the device, the apparatus switches the device on. However, the apparatus does not have the capability of authenticating users. As a consequence, it may switch the device ON even when an unauthentic user comes close to the device.
The existing solutions for optimizing power consumption of devices such as computer monitors, fans, air conditioners, and the like suffer from limitations. Some solutions require user intervention to switch the device ON and OFF, while others do not provide the desirable level of security for the device in the user's absence. There is a need, therefore, for a system that overcomes all of the above mentioned limitations by fully automating the process of controlling power consumption and securing the device against unauthentic access in the absence of authentic users.
SUMMARY OF THE INVENTION
A system and a method used to control the power options of a device have been disclosed. The system controls the power options of the device based on the -proximity of an authentic user to the device and secures the device against unauthentic access in the absence of authentic users.
The usage of the device requires at least one authentic user in the proximity of the device. The device undergoes extended periods of inactivity while no authentic user is present in the proximity of the device. According to an embodiment of the invention, the system of the invention hereinafter referred to as the Watt saver sensor (WSS) system switches ON the device only when an authentic user is near the device and switches OFF the device when no authentic user is near the device. The WSS system is capable of distinguishing authentic users from unauthentic users such that the device is turned ON only when an authentic user comes near the device.
The WSS system can be based on any wireless technology including, Radio frequency Identification (RFID) technology, Ultra wide band RF, Bluetooth, infrared, WiFi, ultrasound, GPS, GPRS, wireless ethernet or a combination thereof. The WSS system comprises a power options controller, a sensory detector associated with the device, and a plurality of slave units associated with the users of the device. The sensory detector is capable of detecting the slave units based on the distance of the slave units from the sensory detector. The sensory detector incorporates a slave unit authenticator capable of authenticating slave units as they enter the proximity of the device. According to an embodiment of the invention, the sensory detector informs the power options controller when a first authentic slave unit enters the proximity of the device. Accordingly, the power options controller switches the device ON. The sensory detector also informs the power options controller when the last authentic slave unit leaves the proximity of the device. Accordingly, the power options controller switches the device OFF. Further, the WSS system provides for. the association of new slave units in addition to the existing slave units.
For the purpose of explanation, the case where the WSS system is based on RFID technology has been described in detail in the detailed description of the drawings. The sensory detector is hereinafter referred to as the RFID detector and the slave units are hereinafter referred to as RFID slave units.
The RFID link between the RFID detector and the RFID slave units may be implemented to be: (a) full duplex active, (b) simplex and (c) full duplex passive. The WSS system prescribes different protocols for each of these cases. For example, the WSS system-Full Duplex Active (WSS-FDA) protocol prescribes the various modes the WSS system can be in, the conditions for transitioning from one mode to another, and the procedures for associating new slave units with an existing WSS system.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic diagram showing the associations between the WSS system, the user, and the device;
FIG. 2 is the block diagram of an exemplary embodiment of the WSS system;
FIG. 3 is a flow diagram illustrating the transitions from Wake Up mode to other modes prescribed under the WSS-FDA protocol for the RFID detector;
FIG. 4 is a flow diagram illustrating the transitions between the three modes prescribed under the WSS-FDA protocol for the RFID slave units;
FIG. 5 is a flow diagram illustrating the details of the Wake Up mode for the RFID detector under the WSS-FDA protocol;
FIG. 6 is a flow diagram illustrating the details of the Wake Up mode for RFID slave units under the WSS-FDA protocol;
FIG. 7 is a flow diagram illustrating the details of the Within Range mode for the
RFID detector under the WSS-FDA protocol;
FIG. 8 is a flow diagram illustrating the details of the Within Range mode for RFID slave units under the WSS-FDA protocol;
FIG. 9 is a flow diagram illustrating the details of the Out Of Range mode for the
RFID detector under the WSS-FDA protocol;
FIG. 10 is a flow diagram illustrating the details of the Out Of Range mode for RFID slave units under the WSS-FDA protocol;
FIG. 11 is a flow diagram illustrating the details of the Association Phase for the
RFID detector under the WSS-FDA protocol;
FIG. 12 is a flow diagram illustrating the details of the Association Phase for RFID slave units under the WSS-FDA protocol;
FIG. 13 is a flow diagram illustrating the transitions between the two modes prescribed under the WSS-SA protocol for the RFID detector on turning the PC on;
FIG. 14 is a flow diagram illustrating the transitions between the two states prescribed under the WSS-SA protocol for the RFID detector;
FIG. 15 is a flow diagram illustrating the details of the Within Range mode for the
RFID detector under the WSS-SA protocol; ¥\G. 16 is a flow diagram illustrating the details of the Out Of range mode for the
RFID detector under the WSS-SA protocol;
FIG. 17 is a diagram illustrating the details of the PRESENT packet prescribed under the WSS-SA protocol;
FIG. 18 is a flow diagram illustrating the details of the Association Phase for RFID detector under the WSS-SA protocol;
FIG. 19 is a flow diagram illustrating the transitions from Wake Up mode to other modes prescribed under the WSS-FDP protocol for the RFID detector;
FIG. 20 is a flow diagram illustrating the transitions between the two states prescribed under the WSS-FDP protocol for RFID slave units;
FIG. 21 is a flow diagram illustrating the details of the Wake Up mode for the RFID detector under the WSS-FDP protocol;
FIG. 22 is a flow diagram illustrating the details of the Within Range mode for the
RFID detector under the WSS-FDP protocol;
FIG. 23 is a flow diagram illustrating the details of the Out Of Range mode for the
RFID detector under the WSS-FDP protocol; and
FIG. 24 is a flow diagram illustrating the details of the Association Phase for the
RFID detector under the WSS-FDP protocol.
DETAILED DESCRIPTION
The detailed description set forth below in connection with the appended drawings is intended as a description of exemplary embodiments and is not intended to represent the only forms in which the exemplary embodiments may be constructed and/or utilized. The description sets forth the functions and the sequence of steps for constructing and operating the exemplary embodiments in connection with the illustrated embodiments. However, it is to be understood that the same or equivalent functions and sequences may be accomplished by different embodiments that are also intended to be encompassed within the spirit and scope of the invention.
FIG. 1 is a schematic diagram showing the associations between a device 102, a WSS system 104, and a user 106 according to an embodiment of the invention. A device 102 consumes power and WSS system 104 is used to manage the power consumption of device 102 as well as for security of device 102 such that only a user 106 authenticated to use device 102 is given access to device 102. The usage of device 102 requires the presence of a user 106 in device 102's proximity. Device 102 typically undergoes extended periods of inactivity while user 106 is away from device 102's proximity. For example, device 102 may be a computer, a computer server, a computer monitor, a television, a fan, an air conditioner, lighting equipment or the like. According to an embodiment of the invention, WSS system 104 switches device 102 OFF when user 106 leaves the proximity of device 102. Likewise, WSS system 104 switches device 102 ON when user 106 returns to the proximity of device 102. Furthermore, WSS system 104 responds to the arrival and departure of user 106 only if user 106 is authenticated to use device 102. Moreover WSS system 104 can be designed to authenticate a plurality of users 106 to use device 102. WSS system 104 has been described in detail in conjunction with FIG. 2.
FIG. 2 is a block diagram illustrating WSS system 104 in accordance with an embodiment of the invention.
WSS system 104 comprises of components associated with device 102 and components associated with user 106. According to an embodiment of the invention, the communication between the two sets of components is based on Radio Frequency Identification (RFID) technology. However the communication between the two sets of components is not limited to only RFID technology and can also be based on other wireless technologies like Bluetooth, infrared, WiFi, ultrasound, GPS, GPRS, wireless Ethernet or a combination thereof.
The components associated with device 102 include a power options controller 202, an RFID detector 204, and a slave unit authenticator 208. According to an embodiment of the invention, the components associated with device 102 are located inside or around device 102. For example, if device 102 is a computer system, RFID detector 204 may be connected to the computer system using a USB port, a power line, fire-wire, PCI connector, RS232 cable, RS485 port, RS422 port, PCI express connector, PCMCI, camera link, optic fiber, SPI link, I2C link, CAN connector, parallel port, serial port, VGA port, LVDS, HEART devices, 4-2OmA, Ethernet (10baseT, 100baseT, 10GbaseT), SCSI, EISA, GPIB, ISA, Audio port, SATA. ATA or any other wired digital or analog communication.
The components associated with user 106 include at least one RFID slave unit 206. According to an embodiment of the invention, each RFID slave unit 206 is associated with one user 106. For example, RFID slave unit 206 may be in the form bf a name-tag, a wrist-band, and the like which the user may wear, carry, etc. Further, RFID slave unit 206 may be powered by a battery, solar power, mechanical energy, electromagnetic induction, capacitive energy, gravitational energy, thermal energy or a combination thereof.
A region of pre-specified radius, centering on device 102 is defined as the proximity of device 102. Full duplex active RFID link and simplex RFID link can provide a programmable range of radius 0-200 meters based on the frequency used and the programmed output power. According to an embodiment of the invention, the pre-specified radius is programmed in the range of 0 to 10 meters. Any RFID slave unit 206 within the region of pre-specified radius centering on device 102 is hereinafter referred as being within the proximity of device 102. Further, any RFID slave unit 206 leaving the region is hereinafter referred to as departing from the proximity of device 102. Similarly, any RFID slave unit 206 entering the region is hereinafter referred to as entering the proximity of device 102.
According to an embodiment of the invention, RFID detector 204 receives a radio frequency (RF) packet from RFID slave unit 206 only if RFID slave unit 206 is within the proximity of device 102. Based on the reception of the RF packet from RFID slave unit 206, RFID detector can determine if RFID slave unit 206 has entered the proximity of device 102 or has departed from it.
According to an embodiment of the invention, power options controller 202 is a software component and manages the power options of device 102. For example, power options controller 202 is a software installed in a computer. Power options controller 202 can be integrated either with device 102 or with RFID detector 204. RFID detector 204 alerts power options controller 202 about the approach and departure of RFID slave unit 206 in the proximity of device 102. Based on the alerts received from RFID detector 204, power options controller 202 selects an appropriate power option for device 102. For example, power options controller 202 may switch OFF device 102 based on RFID slave unit 206 departing from the proximity of device 102. According to another embodiment of the invention, power options controller 202 is a hardware component and is placed between device 102 and the power supply to device 102. For example, power options controller 202 is a hardware component like a relay, semi-conductor switch etc. placed between an air- conditioner and the power supply to device 102. According to another embodiment of the invention, power options controller 202 is integrated within RFID detector 204 as Ha firmware module and sends commands to device 102 like a computer to switch ON or OFF.
According to an embodiment of the invention, WSS system 104 responds to the approach and departure of authentic RFID slave unit 206 only. Slave unit authenticator 208 authenticates RFID slave unit 206 present within the proximity of device 102. According to an embodiment of the invention, slave unit authenticator 208 is incorporated within power options controller 202. In an alternate embodiment, slave unit authenticator 208 is incorporated within RFID detector 204. Slave unit authenticator 208 authenticates RFID slave units 206 based on unique identifications assigned to RFID detector 204 and each of the plurality of RFID slave units 206. The unique identification assigned to RFID detector 206 is hereinafter referred to as Master ID MID. The unique identification assigned to RFID slave unit 206 is hereinafter referred to as Slave ID (SID). During the Association Phase described in detail in conjunction with FIG. 11 and FIG. 12, RFID detector 204 and RFID slave unit 206 exchange RDID and SID information. As an example of this scheme of authentication, RFlD detector 204 may accept only the packets from RFID slave unit 206 which have the MID of RFID detector 204 as destination address and a known SID as source address.
According to another embodiment of the invention, WSS system 104 may be used to switch ON device 102 as soon as user 106, authenticated to use device 102 enters the office wherein device 102 lies. As such, RFID detector 204 is located at the entrance of the office in order to detect the arrival of user 106. Similarly, RFID detector 204 can also detect the departure of user 106 and based on the departure of user 106, switch OFF device 102. RFID detector 204 sends an alert to power options controller 202. through a network to switch device 102 ON or OFF based on the arrival or departure of user 106. According to an embodiment of the invention, a plurality of power options controllers 202 can receive alerts from RFID detector 204 through the network to control the power options of a plurality of devices 202. RFID detector 204 sends the alert to appropriate power option controller 202 controlling the power options of device 102, based on the arrival or departure of user 106 authenticated to use device 102.
According to another embodiment of the invention, WSS system 104 may be used to switch OFF device 102 upon detecting an unauthenticated user 106 in the proximity of device 102. According to an embodiment of the invention, WSS system 104 may be designed to operate in the general case where a plurality of RFID slave units 206 are associated with device 102. RFID detector 204 can receive RF packets from a plurality of RFlD slave units 206 simultaneously. As such, RFID detector 204 determines when a first of the plurality of RFID slave units 206 authenticated by slave unit authenticator 208 enters the proximity of device 102, and alerts power options controller 202 to select an appropriate power option, for example, to switch ON device 102. Similarly, RFID detector 204 determines when a last of the plurality of RFID slave units 206 authenticated by slave unit authenticator 208 leaves the proximity of device 102, and alerts power options controller 202 to select an appropriate power option, for example, to switch OFF device 102.
Device 102 may include, but is not limited to computes, computer monitors, televisions, fans, air conditioners, and the like. For the purpose of explanation, the case where device 102 is a personal computer (PC) is considered hereinafter. Device 102 is hereinafter referred to as PC. According to an embodiment of the invention, WSS system 104 may be deployed to automatically switch PC ON or OFF based on the presence of user 106 in the proximity of PC. According to another embodiment of the invention, WSS system 104 may be used to automatically switch the monitor of PC ON or OFF based on the presence of user 106 in the proximity of PC. For the purpose of explanation, the latter case wherein WSS system 104 is deployed to manage the power consumption of the monitor of PC is considered hereinafter.
Further, in the embodiments described below, power options controller 102 may conveniently be implemented as a software application. Power options controller 102 is hereinafter referred to as WSS application software and can be installed on PC or integrated with RFID detector 204.
FIG. 3 is a flow diagram illustrating the transitions of RFID detector 204 from Wake Up mode to other modes prescribed under the Watt Saver Sensor - Full Duplex Active (WSS-FDA) protocol according to an embodiment of the invention. WSS system 104 may be implemented using Full Duplex Active RFID technology wherein RFID detector 204 and RFID slave unit 206 communicate as per the WSS- FDA protocol. Under the WSS-FDA protocol, both RFID detector 204 and RFID slave unit 206 can transmit and receive radio frequency (RF) packets. Consequently, under this protocol, RFID detector 204 and RFID slave unit 206 can be in one of <έhree states: transmit, receive, and idle. Further, the WSS-FDA protocol prescribes three modes of operation for WSS system 104: the Wake Up (WU) mode, the Within Range (WIR) mode, and the Out Of Range (OOR) mode. These modes cover all possible operating conditions of WSS system 104 under the WSS-FDA protocol. FIG. 3-10 illustrate the details of these modes while FIG. 11-12 describe the method prescribed for associating new slave units under the WSS-FDA protocol.
At step 302, PC is switched on. According to an embodiment of the invention, switching ON PC automatically boots up WSS application software. According to another embodiment of the invention, the WSS application software needs to be manually turned ON. Further, the monitor of PC is, by default, ON immediately after PC is switched ON. At step 304, RFlD detector 204 is switched ON. When switched ON, RFID detector 204 enters the WU mode at step 306. At step 308, RFID detector 204 enquires for RFID slave unit 206 as per the WSS-FDA protocol. At step 310, RFID detector determines if any RFID slave unit 206 authenticated by slave unit authenticator 208 is present in the proximity of PC.
If it is determined at step 310 that no RFID slave unit 206 authenticated by slave unit authenticator 208 is present in the proximity of PC, RFID detector 204 proceeds to step 312. At step 312, RFID detector enters the OOR mode. At step 314, RFID detector 204, while remaining in the OOR mode, sends an alert to WSS application software to switch the monitor of PC OFF. If it is determined at step 310 that at least one RFID slave unit 206 authenticated by slave unit authenticator 208 is present in the proximity of PC, RFlD detector 204 proceeds to step 316. At step 316, RFlD detector enters the WIR mode.
FIG. 4 is a flow diagram illustrating the transitions of RFID slave unit 206 between the modes prescribed under WSS-FDA protocol according to an embodiment of the invention.
At step 402, RFID slave unit 206 is switched ON. When switched ON, RFID slave unit 206 enters the WU mode at step 404. At step 406, while remaining in the WU mode, RFID slave unit 206 starts enquiring for packets from RFID detector 204. At step 408, RFlD slave unit 206 determines if a valid packet is received from RFID detector 204. If it is determined as step 408 that no valid packet is received from RFID detector 204, RFID slave unit 206 proceeds to step 410. At step 410, RFlD slave unit 206 enters the OOR mode. After step 410, while remaining in the OOR mode, RFID slave unit 206 returns to step 406 and enquires for packets from RFID detector 204.
If it is determined as step 408 that a valid packet is received from RFID detector 204, RFID slave unit 206 proceeds to step 412. At step 412, RFID slave unit 206 enters the WIR mode. After step 412, while remaining in the WIR mode, RFID slave unit 206 returns to step 406 and enquires for packets from RFID detector 204.
FIG. 5 is a flow diagram illustrating the WU mode for RFID detector 204 under the WSS-FDA protocol according to an embodiment of the invention. Immediately after PC is switched ON, WSS application software causes RFID detector 204 to enter the WU mode.
At step 502, RFID detector 204 enters the WU mode. At step 504, RFID detector 204 enters the transmit state. At step 506, RFID detector 204 transmits a wake-up enquiry (WU_ENQ) packet of a pre-specified time period (MT1). At step 508, RFlD detector 204 enters the receive state in which it waits for another pre- specified time period (MT2) period for a wake-up response (WU-RESP) packet from RFID slave unit 206. At step 510, RFID detector 204 determines if a WU_RESP packet is received within the MT2 time period.
If it is determined at step 510 that a WU-RESP packet is received within the MT2 time period, RFID detector 204 proceeds to step 512. At step 512, RFID detector 204 checks the received WU_RESP packet for validity. In case the WU_RESP packet is found to be invalid, RFID detector 204 proceeds to step 514. At step 514, RFID detector 204 increments the wake-up positive-response (WU_POS_RESP) counter by one. The WU_POS_RESP counter indicates the number of successful responses received by RFlD detector 204 while in the WU mode, i.e. the number of WU_ENQ packets transmitted that resulted in a valid WU-RESP packet being received.
At step 516, RFID detector 204 determines if the WU_POS_RESP counter exceeds the WU_POS_RESP limit. The WU_POS_RESP limit is the minimum number of successful responses required by RFID detector 204 to transition from the WU mode to the WIR mode. If it is determined at step 516 that the WU_POS_RESP counter is greater than or equal to the WU_POS_RESP limit, RFID detector 204 proceeds to step 518. At step 518, RFID detector 204 enters the WIR mode. If it is determined at step 516 that the WU_POS_RESP counter is less than the WU_POS_RESP limit, RFID detector 204 returns to step 504 and prepares to transmit further WUJΞNQ packets.
If it is determined at step 510 that a WU_RESP packet is not received within the MT2 time period, RFID detector 206 proceeds to step 520. RFID detector 206 also proceeds to step 520 if it is determined at step 512 that the received WU_RESP packet is invalid. At step 520, RFID detector 204 increments the wake-up negative- response (WU_NEG_RESP) counter by one. The WU_NEG_RESP counter indicates the number of unsuccessful responses required by RFID detector 204 in the WU mode, i.e. the number of WUJΞNQ packets transmitted that did not result in a valid WU_RESP packet being received. At step 522, RFID detector 204 determines if the WU_NEG_RESP counter exceeds the WU_NEG_RESP limit. The WU_NEG_RESP limit is the minimum number of unsuccessful responses required for RFID detector to transition from the WU mode to the OOR mode. If it is determined at step 522 that the WU_NEG_RESP counter is greater than or equal to the WU_N EGJRESP limit, then at step 524, RFID detector 204 enters the OOR mode. In case the WU_NEG_RESP counter is less than the WU_NEG_RESP limit, RFID detector returns to step 504 and prepares to transmit further WUJΞNQ packets.
FIG. 6 is a flow diagram illustrating the WU mode for RFID slave unit 206 under the WSS-FDA protocol according to an embodiment of the invention. Immediately after RFID slave unit 206 is switched ON for the first time, it enters the WU mode. According to an embodiment of the invention, RFID slave unit 206 may not enter the WU mode again during its life cycle. Once in the WU mode, RFID slave unit 206 can transition to either the WIR mode or the OOR mode.
At step 602, RFID slave unit 206 is switched ON. At step 604, RFID slave unit 206 enters the WU mode. At step 606, RFID slave unit 206 enters the receive state and waits for a pre-specified time period (ST1) period for a WU_ENQ packet from RFID detector 204. At step 608, RFID slave unit 206 determines if a WU_ENQ packet is received within the ST1 time period.
If it is determined at step 608 that a WU_ENQ packet is received within the ST1 time period, RFID slave unit 206 proceeds to step 610. At step 610, RFID slave unit 206 checks the received WU_ENQ packet for validity. If it is determined at step 610 that the received WU_ENQ packet is valid, RFID slave unit 206 proceeds to step HS12. At step 612, RFID slave unit 206 enters the transmit state. At step 614, RFID slave unit 206 transmits a WU_RESP packet of a pre-specified time period (ST2). At step 616, RFID slave unit 206 determines if the change of mode recommended by the WU_ENQ packet is valid. If at step 616, it is determined that the change of mode is valid, RFID slave unit 206 proceeds to step 618. At step 618, RFID slave unit 206 enters the WIR mode.
If at step 616, it is determined that the change of mode recommended by the WUJΞNQ packet is invalid, RFID slave unit 206 returns to step 606 to wait for further WU_ENQ packets. If at step 610, it is determined that the received WU_ENQ packet is invalid, RFlD slave unit 206 returns to step 606 to wait for further WU_ENQ packets. If at step 608, it is determined that no WU_ENQ packet is received within the ST1 time period, RFID slave unit 206 returns to step 606 to wait for WU_ENQ packets.
FIG. 7 is a flow diagram illustrating the WIR mode for RFID detector 204 prescribed under the WSS-FDP protocol according to an embodiment of the invention. RFID detector 204 enters the WIR mode on having ascertained the presence of at least one authenticated RFID slave unit 206 within the proximity of device 102.
At step 702, RFID detector 204 enters the WIR mode. At step 704, RFID detector informs WSS application software to switch ON the monitor of PC. If the monitor of PC is already riot on, the WSS application software switches on the monitor of PC. At step 706, RFID detector 204 enters the transmit state. At step 708, RFID detector 204 transmits a within-range enquiry (WIR_ENQ) packet of a pre- specified time period (MT3). At step 710, RFID detector 204 enters the receive state in which it waits for another pre-specified time period (MT4) for a within-range response (WIR_RESP) packet from RFID slave unit 206. At step 712, RFID detector 204 determines if a WIR_RESP packet is received within the MT4 time period. If at step 712, it is determined that no WIR_RESP packet is received within the MT4 time period, RFID detector 204 proceeds to step 714. At step 714, RFID detector 204 increments the within-range negative-response (WIR_NEG_RESP) counter by one. The WIR_NEG_RESP counter indicates the number of unsuccessful enquiries made by RFID detector 204 while in the WIR mode, i.e. the number of WIR-ENQ packets transmitted that did not result in a valid WIR_RESP packet being received. At step 716, RFID detector 204 determines if the WIR_NEG_RESP counter exceeds the
Figure imgf000015_0001
limit. The WIR_NEG_RESP limit is the minimum number of unsuccessful enquiries required for RFID detector to transition from the WIR mode to the OOR mode. If at step 716, it is determined that the WIR_NEG_RESP counter is greater than or equal to the WIR_NEG_RESP limit, RFlD detector 204 proceeds to step 718. At step 718, RFID detector enters the OOR mode.
If at step 716, it is determined that the WIR__NEG_RESP counter is less than the WIR_NEG_RESP limit, RFID detector 204 proceeds to step 720. At step 720, RFID detector 204 enters the idle state. At step 722, RFID detector 204 waits in the idle state for a pre-specified time period (MT5). After step 722, RFID detector 204 returns to step 706 to transmit further WIR_ENQ packets.
If at step 712, it is determined that a WIR_RESP packet is received within the MT4 time period, RFID detector 204 proceeds to step 724. At step 724, RFID detector 204 checks the received WIR_RESP packet for validity. If at step 724, it is determined that the received WIR_RESP packet is valid, RFID detector 204 proceeds to step 720 and enters the idle state. If at step 724, it is determined that the received WIR_RESP packet is invalid, RFID detector 204 proceeds to step 714 and increments the WIR_NEG_RESP counter.
FIG. 8 is a flow diagram illustrating the WIR mode for RFID slave unit 206 under the WSS-FDA protocol according to an embodiment of the invention. At step 802, RFID slave unit 206 enters the WIR mode. At step 804, RFID slave unit 206 enters the receive state and waits for a pre-specified time period (ST3) for a WIR_ENQ packet from RFID detector 204. At step 806, RFID slave unit 206 determines if a WIR-ENQ packet is received within the ST3 time period. If at step 806, it is determined that a WIR_ENQ packet is received within the ST3 time period, RFID slave unit 206 proceeds to step 808. At step 808, RFID slave unit 206 checks the received WIR_ENQ packet for validity. If at step 808, the received WIR_ENQ packet is found to be invalid, RFID slave unit 206 proceeds to step 810. At step 810, RFID slave unit 206 increments the WIR_NEG_ENQ counter by one. The WIR_NEG_ENQ counter indicates the number of cycles during which the RFID slave unit 206 has waited unsuccessfully, i.e. the number' of cycles for which no valid WIR_ENQ packets were received. At step 812, RFID slave unit 206 determines if the within-range negative-response (WIR_NEG_ENQ) counter exceeds the WIR_NEG_ENQ limit. The WIR_NEG_ENQ limit is the minimum number of unsuccessful waiting cycles required for RFID slave unit 206 to transition from the HviR mode to the OOR mode. If at step 812, it is determined that the WIR_NEG_ENQ counter is greater than or equal to the WIR_NEG_ENQ limit, RFID slave unit 206 enters the OOR mode.
If at step 812, it is determined that the WIR_NEG_ENQ counter is less than the WIR_NEG_ENQ limit, RFID slave unit 206 proceeds to step 816. At step 816, RFID slave unit 206 enters the idle state. At step 818, RFID slave unit 206 waits in the idle state for a pre-specified time period (ST5). After step 818, RFID slave unit 206 returns to step 804 to wait for WIR_ENQ packets.
If at step 808, it is determined that the received WIR-ENQ packet is valid,
RFID slave unit proceeds to step 820. At step 820, RFID slave unit 206 enters the transmit state. At step 822, RFID slave unit 206 transmits a WIR_RESP packet of a
• pre-specified time period (ST4). After step 822, RFID slave unit proceeds to step 816 and enters the idle state.
If at step 806, it is determined that no WIR_ENQ packet is received within the ST3 time period, RFID slave unit 206 proceeds to step 810 where it increments the WIR_NEG_ENQ counter.
FIG. 9 is a flow diagram illustrating the OOR mode for RFID detector 204 under the WSS-FDA protocol according to an embodiment of the invention. RFID detector 204 enters the OOR mode on having ascertained that no authenticated RFID slave unit is present within the proximity of device 102.
At step 902, RFID detector 204 enters the OOR mode. At step 904, RFID detector informs WSS application software to switch OFF the monitor of PC. At step 906, RFID detector 204 enters the transmit state. At step 908, RFID detector 204 transmits an out-of-range enquiry (OOR_ENQ) packet of a pre-specified time period (MT6). At step 910, RFID detector 204 enters the receive state in which it waits for another pre-specified time period (MT7) for an out-of-range response (OOR_RESP) packet from RFID slave unit 206. At step 912, RFID detector 204 determines if an OOR_RESP packet is received within the MT7 time period. If at step 912, it is determined that an OOR_RESP packet is received within the MT7 time period, RFID detector 204 proceeds to step 914. At step 914, RFID detector 204 checks the received OOR_RESP packet for validity. If at step 914, the received OOR_RESP packet is found to be. valid, RFID detector 204 proceeds to step 916. At step 916, RFID detector 204 increments the out-of-range positive-response (OOR_POS_RESP) counter by one. The OOR_POS_RESP counter indicates the dumber of successful enquiries made by RFID detector 204 while in the OOR mode, i.e. the number of OOR_ENQ packets transmitted that resulted in a valid OOR_RESP packet being received. At step 918, RFlD detector 204 determines if the OOR_POS_RESP counter exceeds the OOR_POS_RESP limit. The OOR_POS_RESP limit is the minimum number of successful enquiries required for RFID detector to transition from the OOR mode to the WIR mode. If at step 918, it is determined that the OOR_POS_RESP counter is greater than or equal to the OOR_POS_RESP limit, RFlD detector 204 proceeds to step 920. At step 920, RFID detector 204 enters the WIR mode.
If at step 918, it is determined that the OOR_POS_RESP counter less than the OOR_POS_RESP limit, RFID detector 204 proceeds to step 922. At step 922, RFID detector enters the idle state. At step 924, RFID detector 204 waits in the idle state for a pre-specified time period (MT8). After step 924, RFID detector 204 returns to step 906 and prepares to transmit further OOR_ENQ packets.
If at step 914, it is determined that the received OOR_RESP packet is invalid, RFID detector 204 proceeds to step 922 and enters the idle state.
If at step 912, it is determined that no OOR_RESP packet is received within the MT7 time period, RFID detector 204 proceeds to step 922 and enters the idle state.
FIG. 10 is a flow diagram illustrating the OOR mode for RFID slave unit 206 under the WSS-FDA protocol according to an embodiment of the invention.
At step 1002, RFID slave unit 206 enters the OOR mode. At step 1004, RFID slave unit 206 enters the receive state and waits for a pre-specified time period (ST6) for an OOR_ENQ packet from RFID detector 204. At step 1006, RFID slave unit 206 determines if an OOR_ENQ packet is received within the ST6 time period. If at step 1006, it is determined that an OOR_ENQ packet is received within the ST6 time period, RFID slave unit 206 proceeds to step 1008. At step 1008, RFID slave unit checks the received OOR_ENQ packet for validity. If at step 1008, it is determined that the received OOR_ENQ packet is valid, RFID slave unit 206 proceeds to step 1010. At step 1010, RFID slave unit 206 enters the transmit state. At step 1012, RFID slave unit 206 transmits an OOR_RESP packet of a pre- specified time period (ST7). At step 1014, RFID slave unit 206 increments the OOR_POS_ENQ counter by one. The OOR_POS_RESP counter indicates the number of cycles during which the RFID slave unit 206 has waited successfully, i.e. -m-ie number of cycles for which a valid OORJΞNQ packet was received. At step 1016, RFID slave unit 206 determines if the OOR_POS_ENQ counter exceeds the OOR_POS_ENQ limit. The OOR_POS_ENQ limit is the minimum number of successful waiting cycles required for RFID slave unit 206 to transition from the OOR mode to the WIR mode. At step 1018, RFID slave unit 206 determines if the change of mode recommended by the OOR_ENQ packet is valid. If at step 1018, the change of mode is found to be valid, RFID slave unit 206 proceeds to step 1020. At step 1020, RFID slave unit 206 enters the WIR mode.
If at step 1018, the change of mode is found to be invalid, RFID slave unit 206 proceeds to step 1022. At step 1022, RFID slave unit 206 enters the idle state. At step 1024, RFID slave unit 206 waits in the idle state for a pre-specified time period (ST8). After step 1024, RFID slave unit 206 returns to step 1004 to wait for further OOR_ENQ packets.
If at step 1008, it is determined that the received OOR_ENQ packet is invalid, RFID slave unit 206 proceeds to step 1022 and enters the idle state.
If at step 1006, it is determined that no OOR_ENQ packet is received within the ST6 time period, RFID slave unit 206 proceeds to step 1022 and enters the idle state.
FIG. 11 is a flow diagram illustrating the Association Phase for RFID detector 204 under the WSS-FDA protocol according to an embodiment of the invention. A new RFID slave units 206 may be associated with RFID detector 204 by invoking the Association Phase functionality of WSS system 104. For the association to be formed, RFID slave unit 206 is placed within the proximity of RFID detector 206 by user 106. User 106 calls the Association Phase functionality of WSS application software. According to an embodiment of the invention, only an authentic user 106, for example, a system administrator is capable of calling the Association Phase functionality of WSS application software. WSS application software responds by requesting user 106 to enter the product identification information for new RFID slave unit 206. Subsequently, WSS application software places RFID detector 204 in Association Phase. Further, WSS application software extracts the SID of new RFID slave unit 206 from its product identification information, and sends the SID to RFID detector 204.
At step 1102, RFID detector 204 enters the Association Phase. At step 1 104, RFID detector 204 enters the transmit state. At step 1 106, RFID detector 204 transmits the association request (ASSOCIATION-REQUEST) packet for a pre- ' specified time period (MAT1). At step 1108, RFID detector 204 enters the receive state in which it waits for another pre-specified time period (MAT2) for an association-request reply (ASSOCIATION_REQUEST_REPLY) packet. At step 1110, RFID detector 204 determines if an ASSOClATION_REQUEST_REPLY packet is received within the MAT2 time period. If at step 1110, it is determined that an ASSOCIATION_REQUEST_REPLY packet is received within the MAT2 time period, RFID detector 204 proceeds to step 1112. At step 1112, RFID detector 204 determines if the received ASSOClATION_REQUEST_REPLY packet is valid. If at step 1112, it is determined that the received ASSOCIATION_REQUEST_REPLY packet is valid, RFID detector 204 proceeds to step 1 114. At step 11 14, RFID detector 204 informs the WSS application software of the successful association of new RFID slave unit 206 and saves the SID of RFID slave unit 206 extracted from the received ASSOCIATIOM_REQUESTJREPLY packet as an authentic SID code. At step 1116, RFID detector 204 waits for the instruction from WSS application software to exit the Association Phase. On receiving the instruction from WSS application software to exit the Association phase, at step 1118, user 106 is informed about the successful association. At step 1820 RFID detector 204 exits the Association Phase.
If at step 11 12, it is determined that the received ASSOCIATION_REQUEST_REPLY packet is invalid, RFID detector 204 proceeds to step 1120. At step 1120, RFID detector 204 increments the association negative- response (ASSOCIATION_NEG_RESP) counter by one. The ASSOCIATION_NEG_RESP counter indicates the number of unsuccessful association cycles, i.e. the number of cycles during which no valid ASSOCIATI ON_REQUEST_REPLY packet was received. At step 1122, RFID detector 204 determines if the ASSOCIATION_NEG_RESP counter has exceeded the slave-association (SLAVE_ASSOCIATION) limit. The SLAVE_ASSOCIATION limit is the maximum number of unsuccessful association cycles allowed during the Association Phase. If at step 1122, it is determined that the ASSOCIATION_NEG_RESP counter is greater than or equal to the SLAVE_ASSOCIATION limit, RFID detector 204 proceeds to step 1124. At step 1124, RFID detector 204 informs WSS application software of the failure in associating RFID slave unit 206. After step 1124, RFID detector 204 proceeds to •^tep 1116 and waits for the instruction from WSS application software to exit the Association Phase. On receiving the instruction from WSS application software to exit the Association phase, at step 1118, user 106 is informed about the unsuccessful association. At step 1820 RFID detector 204 exits the Association Phase.
If at step 1122, it is determined that the ASSOCIATION_NEG_RESP counter is less than the SLAVE_ASSOCIATION limit, RFID detector 204 proceeds to step 1104 and prepares to transmit further ASSOCIATΪON_REQUEST packets.
If at step 1110, it is determined that no ASSOCIATION_REQUEST_REPLY packet is received within the MAT2 time period, RFlD detector proceeds to step 1120.
FIG. 12 is a flow diagram illustrating the response from RFID slave unit 206 during the Association Phase under the WSS-FDA protocol according to an embodiment of the invention.
At step 1202, RFID slave unit 206 enters receive state. At step 1204, RFID slave unit 206 determines if the packet received is an ASSOCIATION_REQUEST packet. If at step 1204, it is determined that the ASSOCIATION_REQUEST packet is received, RFID slave unit 206 proceeds to step 1206. At step 1206, RFiD slave unit 206 checks the received ASSOCIATION_REQUEST packet for validity. If at step 1206, it is determined that the received ASSOCIATION_REQUEST packet is valid, RFID slave unit 206 proceeds to step 1208. At step 1208, RFID slave unit 206 enters the transmit state. At step 1210, RFID slave unit 206 transmits the ASSOCIATION_REQU ESTJREPLY packet for a pre-specified time period (SAT1) and stores the MID of RFID detector 204 extracted from the ASSOCIATION_REQUEST packet.
If at step 1206, it is determined that the received ASSOCIATION_REQUEST packet is invalid, RFID slave unit 206 returns to step 1202 and enters the receive state.
If at step 1208, it is determined that no ASSOCIATION_REQUEST packet is received, RFID slave unit 206 returns to step 1202 and enters the receive state.
Fig 13 is a flow diagram describing the transitions of RFID detector 204 between the modes prescribed under the Watt Saver Sensor - Simplex Active (WSS-SA) protocol on turning PC on in accordance with an embodiment of the invention. According to another embodiment of the invention, the WSS system 104 may be implemented using Simplex Active RFID wherein RFID detector 204 and RFID slave unit 206 communicate as per the WSS-SA protocol. Under the WSS-SA protocol, RFID detector 204 can only receive RF packets, whereas RFID slave unit 206 can only transmit RF packets. Consequently, under WSS-SA protocol, RFID detector 204 can be in one of the two states: receive and idle. Likewise, RFID slave unit 206 can be in either of two states: transmit and idle. Further, the WSS-SA protocol prescribes two modes of operation for RFID detector 204 of WSS system 104: the Within Range (WIR) mode . and the Out Of Range (OOR) mode. The WR mode and OOR mode cover all possible operating conditions of WSS system 104 under the WSS-SA protocol. FIG. 13-17 illustrate the details of the modes while FIG. 18 describes -the method prescribed for associating new RFID slave units 206 under the WSS-SA protocol. Under the WSS-SA protocol, RFID slave unit 206 requires less power as compared to that under WSS-FDA protocol. WSS-SA protocol has reduced enquiry and response times for RFID detector 204 and RFID slave unit 206.
At step 1302, PC is switched ON. According to an embodiment of the invention, switching ON PC automatically boots up WSS application software. According to another embodiment of the invention, the WSS application software needs to be manually turned ON. Further, the monitor of PC is, by default, ON immediately after PC is switched ON At step 1304, RFID detector 204 is switched ON. When switched ON, RFID detector 204 enters the WIR mode at step 1306. At step 1308, RFID detector 204 enquires for RFID slave units 206 as per the WSS-SA protocol. At step 1310, a determination is made if any RFID slave unit 206 is within the proximity of PC. Any RFID slave unit 206 within the proximity of PC is further authenticated by slave unit authenticator 208. If it is determined at step 1310 that no RFID slave unit 206 authenticated by slave unit authenticator 208 is within the proximity of PC, then at step 1314, RFlD detector 204 enters the OOR mode. RFID detector 204, while remaining in the OOR mode, sends an alert to WSS application software to switch OFF the monitor of PC.
If it is determined at step 1310 that at least one RFID slave unit 206 authenticated by slave unit authenticator 208 is present within the proximity of PC, then RFID detector 204 remains in WIR mode. Fig 14 is a flow diagram describing the transitions of RFID slave unit 206 between two states under the WSS-SA protocol in accordance with an embodiment of the invention.
At step 1402, RFID slave unit 206 is switched ON. .According to an embodiment of the invention, RFID slave unit 206 cannot be switched OFF once it is switched ON. At step 1404, RFID slave unit 206 enters Transmit (TX) state. In TX State, RFID slave unit 206 transmits a PRESENT packet of a pre specified (ST1) time period at step 1406. The PRESENT packet is received by RFID detector 204 in accordance with the WSS-SA protocol. The PRESENT packet is an information packet which informs about the presence of a RFID slave unit 206 within the proximity of PC. The WSS-SA PRESENT packet format has been described in detail in conjunction with FIG. 17. At step 1408, RFID slave unit 206 enters idle (IDL) state. On entering IDL state, RFID slave unit 206 waits in IDL state for another pre- specified time period (ST2) at step 1410. RFID slave unit 206 on waiting in IDL state for ST2 time period again enters the TX state at step 1404.
FIG. 15 is a flow diagram illustrating the WIR mode for RFID detector 204 prescribed under the WSS-SA protocol according to an embodiment of the invention. RFID detector 204 enters the WIR mode on having ascertained the presence of at least one RFID slave unit 206 authenticated by slave unit authenticator 208 within the proximity of device 102.
On being switched ON, RFID detector 204 enters WIR mode at step 1502. On entering the WIR mode, RFID detector 204 alert's the WSS application software to switch ON the monitor of PC at step 1504. At step 1506, RFID detector 204 enters Receive (RX) state. On entering the RX state, RFID detector 204 waits in RX state for a pre-specified (MT1) time period. At step 1508 a determination is made by RFID detector 204 if a PRESENT packet from at least one RFID slave unit 206 authenticated by the slave unit authenticator 208 is received.
If it is determined that RFID detector 204 has received a PRESENT packet then at step 1510 a validation check is made by RFID detector 204 for validating the received PRESENT packet. If the PRESENT packet is determined to be valid then RFID detector 204 then at step 1512, it enters the IDL state. On entering the IDL state, RFID detector 204 waits in IDL state for a pre-specified (MT2) time period at step 1514. On waiting in IDL state for MT2 time period, again step 1506 is executed >δι/here RFID detector 204 again enters RX state to receive further PRESENT packets.
If at step 1510, it is determined that RFID detector 204 received an invalid PRESENT packet, or at step 1508 it is determined that RFID detector 204 has not received a PRESENT packet, then at step 1516, a counter (WIR_SLAVE_NOT_PRESENT) for RFID slave unit 206 not present is incremented by one count. The WIR_SLAVE_NOT_PRESENT counter indicates that RFID slave unit 206 authenticated by slave unit authenticate 208 is not present within the proximity of PC. If the count of the WIR_SLAVE_NOT_PRESENT counter exceeds a limit, it may be interpreted as no authentic RFID slave unit 206 is present within the ■ proximity of PC and as such the monitor of PC needs to be switched OFF. At step 1518 a determination is made if WIR_SLAVE_NOT_PRESENT counter has exceeded the limit for RFID slave unit 206 being not present within range (WIR_SLAVE_NOT_PRESENT limit). If it is determined that WIR_SLAVE_NOT_PRESENT counter has exceeded
WIR_SLAVE_NOT_PRESENT limit, then RFID detector 204 enters OOR mode at step 1520. If it is determined that WIR_SLAVE_NOT_PRESENT counter has not exceeded WIR_SLAVE_NOT_PRESENT limit, then RFID detector again enters the RX state at step 1506 to attempt to receive PRESENT packets.
FIG. 16 is a flow diagram illustrating the OOR mode for RFID detector 204 prescribed under the WSS-SA protocol according to an embodiment of the invention.
RFID detector 204 enters OOR mode at step 1602 if a plurality of PRESENT packets from a RFID slave unit 206 authenticated by slave unit authenticator 208 are not received implying that RFID slave unit 206 is not within the proximity of PC and as such is out of range. On entering OOR mode, RFID detector 204 alerts the WSS application software to turn OFF the monitor of PC at step 1604. At step 1606, RFID detector 204 enters Receive (RX) state. On entering RX state, RFID detector 204 waits in RX state for a pre-specified (MT3) time period. At step 1608 a determination is made by RFID detector 204 if any PRESENT packet has been received from a RFID slave unit 206 authenticated by slave unit authenticator 208.
If it is determined at step 1608 that a PRESENT packet has not been received, then RFID detector 204 proceeds to step 1610. At step 1610, RFID detector 204 enters the idle (IDL) state. On entering IDL state, RFID detector 204 waits in IDL state for another pre-specified time period (MT4) at step 1612. After "i^Step 1612, RFID detector 204 again enters RX state at step 1606 in order to be able to receive any PRESENT packet.
If it is determined at step 1608 that a PRESENT packet has been received then at step 1614 a determination is made by RFID detector 204 for the validity of the received PRESENT packet.
If it is determined at step 1614 that RFID detector 204 has not received a valid PRESENT packet, it again enters the IDL state at step 1610 and proceeds to step 1612.
If it is determined at step 1614 that RFID detector 204 has received a valid PRESENT packet, then at step 1616 RFID detector 204 increments a counter (OOR_SLAVE_PRESENT) for RFID slave unit 206 being out of range by one count. At step 1618, a determination is made if OOR_SLAVE_PRESENT counter has exceeded the limit for out of range mode for RFID slave unit 206 (OOR_SLAVE_PRESENT limit).
If it is determined at step 1618 that OOR_SLAVE_PRESENT counter has exceeded the OOR_SLAVE_PRESENT limit, then at step 1620 RFID detector 204 enters WIR mode.
If it is determined at step 1618 that OOR_SLAVE_PRESENT counter has not exceeded the OOR_SLAVE_PRESENT limit, then RFID detector 204 again enters IDL state at step 1610.
Fig. 17 is a schematic describing the WSS-SA PRESENT packet format prescribed under the WSS-SA protocol in accordance with an embodiment of the invention.
According to an embodiment of the invention, the PRESENT packet comprises a sequence of fifteen bytes of information. However the invention is not limited to the PRESENT packet comprising of exactly fifteen bytes and may comprise of any number of bytes. The PRESENT packet comprises of a Preamble 1702, a Sync Word 1704, a Payload 1706 and a CRC-16 1708. Preamble 1702 comprises of four bytes of information which is a pattern of sequence of ones (1) and zeros (0) in digital format. Preamble 1702 fills the first four bytes i.e. byte 1 to byte 4 of the PRESENT packet format. Sync Word 1704 fills the next four bytes i.e. byte 5 to byte 8 of PRESENT packet and provides the byte synchronization information of an incoming packet. Payload 1706 fills the next five bytes i.e. byte 9 to byte 13 of the PRESENT packet. Byte number 9 has the command data and the coding for this <)φyte is as given in Table -1 below. Byte 14 and byte 15 comprises the 16 bit Cyclic Redundancy Check data.
Figure imgf000025_0001
Figure imgf000026_0001
Table 1 Coding for Byte 9
FIG. 18 is a flow diagram illustrating the Association Phase for RFID slave unit 206 under the WSS-SA protocol according to an embodiment of the invention.
At step 1802, RFID detector 204 enters the Association Phase. At step 1804, RFID detector 204 enters the Receive (RX) state. On entering RX state, RFID detector 204 waits for a PRESENT packet from a new RFID slave unit 206. At step 1806 a determination is made if RFID detector 204 has received a PRESENT packet within a certain time period. If it is determined at step 1806 that no PRESENT packet has been received within the certain time period, RFID detector 204 again enters RX state at step 1804.
If at step 1806, it is determined that a PRESENT packet has been received within the certain time period, then RFID detector 204 proceeds to step 1808. At step 1808 the validity of the received PRESENT is checked. If it is determined that the received PRESENT packet is not valid, RFID detector 204 again enters RX state at step 1804. If at step 1808, it is determined that the received PRESENT packet is valid, then at step 1810 RFID detector 204 extracts an SID code from the PRESENT packet and sends it to the WSS application software. An SID code is a pre- configured identification code associated with any RFID slave unit 206 which is identifiable under the prescribed WSS-SA protocol by RFID detector 204. After alerting the WSS application software, RFID detector 204 waits for a valid response from the WSS application software at step 1812. At step 1814 a determination is made by RFID detector 204 if the SID code has been accepted by WSS application software. If the SID code is accepted, WSS application software saves the SID code S^s an authentic SID code. If it is determined at step 1814 that the SID code has been accepted by WSS application software, then RFID detector 204 identifies the new RFID slave unit 206 as an authentic RFID slave unit 206 at step 1816. The association phase of new RFID slave unit 206 by RFID detector 204 is completed at step 1816. After step 1816 RFID detector 204 proceeds to step 1818. At step 1818, user 106 is informed about the successful association. At step 1820, RFID detector 204 exits from Association phase.
If it is determined at step 1814 that the extracted SID code has not been accepted by WSS application Software, the new RFID slave unit 206 is not identified to be authentic and at step 1818, user 106 is informed about the unsuccessful association. At step 1820, RFID detector 204 exits from Association phase.
FIG. 19 is a flow diagram illustrating the transitions between the three modes prescribed under the WSS-FDP protocol for the RFID detector 204, according to an embodiment of the invention.
WSS system 104 may be implemented using Full Duplex Passive RFID wherein RFID detector 204 and RFID slave unit 206 communicate as per the WSS-FDP protocol. Under the WSS-FDP protocol, both RFlD detector 204 and RFID slave unit 206 can transmit and receive RF packets. According to an embodiment of the invention, RFID slave unit 206 used in accordance with the WSS-FDP protocol does not use battery power but uses energy from the received RF packets to transmit other RF packets. Consequently, under WSS-SA protocol, RFID detector 204 can be in one of the three states: transmit, receive and idle. Likewise, RFID slave unit 206 can be in either of two states: transmit and idle. Further, the WSS-FDP protocol prescribes three modes of operation for WSS system 104: the Wake Up (WU) mode, the Within Range (WIR) mode, and the Out Of Range (OOR) mode. The modes cover all possible operating conditions of WSS system 104 under the WSS-FDP protocol. FIG. 19-23 illustrate the details of the modes while FIG. 24 describe the method prescribed for associating new slave units under the WSS-FDP protocol.-
At step 1902, PC is switched ON. According to an embodiment of the invention, switching ON PC automatically boots up WSS application software. According to another embodiment of the invention, the WSS application software needs to be manually turned ON. Further, the monitor of PC is, by default, ON immediately after PC is switched ON. At step 1904 RFID detector 204 is switched ON. On being switched ON, RFID detector 204 enters the WU mode at step 1906. At step 1908, >|RFID detector 204 enquires for RFID slave units 206 as per the WSS-FDP protocol. At step 1910, a determination is made if at least one RFID slave unit 206 authenticated by slave unit authenticator is within the proximity of PC.
If it is determined at step 1910 that at least one RFID slave unit 206 authenticated by slave unit authenticator has been detected in the proximity of PC, then RFID detector 204 proceeds to step 1912. At step 1912 RFID detector 204 enters WIR mode.
If it is determined at step 1910 that no RFID slave units 206 authenticated by slave unit authenticator is within the proximity of PC, then RFID detector 204 proceeds to step 1916. At step 1916 RFID detector 204 enters the OOR mode. On entering the OOR mode, RFID detector 204 sends an alert to WSS application software to switch OFF the monitor of PC. At step 1918 the monitor of PC is switched OFF.
FIG. 20 is a flow diagram illustrating the transition of RFID slave unit 206 between the two states prescribed under the WSS-FDP protocol according to an embodiment of the invention.
At step 2002, RFID slave unit 206 enters idle (IDL) state. At step 2004, it is determined if a packet is received from RFID detector 204. If it is determined that a valid packet has not been received, RFID slave unit 206 remains in IDL state and again returns to step 2004. According to an embodiment of the invention, RFID slave unit 206 keeps returning to step 2004 asynchronously on not receiving a valid packet from RFID detector 204. According to another embodiment of the invention, RFID slave unit 206 waits for a pre-specified (SP1) time period before returning to step 2004 on not receiving a valid packet from RFID detector 204.
If it is determined that a valid packet from RFID detector 204 has been received, then at step 2006, RFID slave unit 206 enters transmit (TX) state. RFID slave unit 206 uses the RF energy from the received packet to read the SID from RFID slave unit 206's memo.ry. At step 2008, RFID slave unit 206 reads the SID and transmits the SID to RFID detector 206. After the SID has been transmitted, RFID slave unit 206 again enters IDL state at step 2002.
FIG. 21 is a flow diagram illustrating the WU mode for RFID detector 204 under the WSS-FDP protocol according to an embodiment of the invention. Immediately after PC is switched ON, WSS application software causes RFID detector 204 to enter the WU mode. On entering the WU mode RFID detector 204 enters the Transmit (TX) state at step 2104. At step 2106, RFID detector 204 transmits a wake up enquiry (WU_ENQ) packet of a pre-specified (MT1) time period. After step 2106, RFID detector 204 enters the Receive (RX) state at step 2108. On entering RX state RFID detector 204 waits for a pre-specified (MT2) time period at step 2108.
RFID Slave unit 206 on receiving an RF signal from RFID detector 204, uses the stored RF energy of the RF signal to send its encrypted Slave Identification number (SID) over RF link. The encrypted SID packet is an information packet used as an identification data to identify each of RFID detector 204 and RFID slave unit 206 during communication between them over RF link.
At step 2110, a determination is made if a SID packet has been received from RFID slave unit 206 authenticated by slave unit authenticator 208 within a pre- specified (MT2) time period.
If it is determined at step 2110 that a SID packet has been received by RFID detector 204, then at step 2112 a validation check is performed to check the validity of received SID packet.
If it is determined at step 2112 that the received SID packet is valid, then at step 2114 RFID detector 204 increments a counter (WU_POS_RESPONSE) for positive response from RFID slave unit 206 under wake up mode by one count. At step 2116, a determination is made if WU_POS_RESPONSE counter has exceeded a limit for positive response from RFID slave unit 206 under WU mode (WU_POS_RESPONSE limit). If it is determined at step 2116 that WU_POS_RESPONSE counter has exceeded the WU_POS_RESPONSE limit, then at step 2118 RFID detector 204 enters the WIR mode. If it is determined at step 2116 that WU_POS_RESPONSE counter has not exceeded the WU_POS_RESPONSE limit, then RFID detector 204 again enters TX state at step 2104.
If it is determined at step 2112 that the received SID packet is not valid or if it is determined at step 2110 that no SID packet has been received, then at step 2120 a counter (WU_NEG_RESPONSE) for negative response from RFID slave unit 206 under Wake-up mode is incremented by one count. At step 2122 a determination is made if WU_NEG_RESPONSE counter has exceeded a limit for negative response from RFID slave unit 206 under WU mode (WU_NEG_RESPONSE limit). If it is tletermined that WU_NEG_RESPONSE counter has not exceeded WU_NEG_RESPONSE limit, then RFID detector 204 enters TX state at step 2104. If it is determined at step 2122 that WU_NEG_RESPONSE counter has exceeded WU_NEG_RESPONSE limit, then RFID detector 204 proceeds to step 2124. At step 2124 RFID detector 204 enters OOR mode.
FIG. 22 is a flow diagram illustrating the WIR mode for RFID detector 204 prescribed under the WSS-FDP protocol according to an embodiment of the invention.
RFID detector 204 enters the WIR mode at step 2202 on having ascertained the presence of at least one RFID slave unit 206 within the proximity of device 102. On entering the WIR mode, RFID detector 204 alerts the WSS application software to switch ON the monitor of PC at step 2204. If the monitor of PC is not already ON, the WSS application software switches ON the monitor of PC. RFID detector 204 enters the Transmit (TX) state at step 2206. At step 2208, RFID detector 204 transmits an enquiry packet for detecting RFID slave unit 206 in WIR mode (WIR_ENQUIRY) packet of a pre-specified (MT3) time period. After step 2208, RFID detector 204 enters the Receive (RX) state at step 2210. On entering RX state RFID detector 204 waits in RX state for another pre-specified (MT4) time period at step 2210. At step 2212 a determination is made if an SID packet has been received from a pre- associated RFID slave unit 206 within the MT4 time period.
If it is determined at step 2212 that an SID packet has been received, then RFID detector 204 proceeds to step 2214. At step 2214, a validation check is performed by RFID detector 204 to check the validity of received SID packet.
If it is determined at step 2214 that the received SID packet is valid, then RFID detector 204 at step 2216 enters the idle (IDL) state. On entering the IDL state, RFID detector 204 waits for another pre-specified (MT5) time period in the IDL state at step 2218. After step 2218, RFID detector 204 again enters TX state at step 2206.
If it is determined at step 2212 that an SID packet has not been received, or if it is determined at step 2214 that the received SID packet is not valid then at step 2220, RFID detector 204 increments a counter for negative response from RFID slave unit 206 in WIR mode (WIR_NEG_RESPONSE) by one count.
At step 2222 a determination is made if the WIR_NEG_RESPONSE counter has exceeded the limit for negative response from RFID slave unit 206 in WIR mode (WIR_NEG_RESPONSE limit). If it is determined at step 2222 that WIR_NEG_RESPONSE counter has not exceeded the WIR_NEG_RESPONSE limit, then RFID detector 204 proceeds to step 2218 where it again enters the IDL state. If it is determined at step 2222 that WIR_NEG_RESPONSE counter has exceeded the WIR_NEG_RESPONSE limit, then RFID detector 204 proceeds to step 2224 where it enters the OOR mode.
FIG. 23 is a flow diagram illustrating the details of the OOR mode for RFID detector 204 under the WSSrFDP protocol according to an embodiment of the invention.
At step 2302, RFID detector 204 enters the OOR mode on having ascertained that no RFID slave unit 206 authenticated by slave unit authenticator 208 is present within the proximity of device 102. On entering the OOR mode, RFID detector 204 alerts the WSS application software to switch OFF the monitor of PC at step 2304. After step 2302, RFID detector 204 enters the Transmit (TX) state at step 2306. At step 2308, RFID detector 204 transmits an enquiry packet for detecting RFID slaveunit 206 under OOR mode (OOR_ENQUIRY) of another pre-specified (MT6) time period. After step 2308, RFID detector 204 enters the Receive (RX) state at step 2310. On entering the RX state RFID detector 204 waits in RX state for another pre- specified (MT7) time period at step 2310. At step 2312, a determination is made if RFID detector 204 has received a valid SID packet from a RFID slave unit 206 authenticated by slave unit authenticator 208 within the MT7 time period.
If it is determined at step 2312 that a valid SID packet has been received, then RFID detector 204 proceeds to step 2314. At step 2314 RFID detector 204 increments a counter for positive response from RFID slave unit 206 in OOR mode (OOR_POS_RESPONSE) by one. After step 2314, a determination is made if OOR_POS_RESPONSE counter has exceeded the limit for positive response from RFID slave unit 206 in OOR mode (OOR_POS_RESPONSE limit) at step 2316. If it is determined at step 2316 that OOR_POS_RESPONSE counter has exceeded the OOR_POS_RESPONSE limit, then RFID detector 204 proceeds to step 2318. Atstep 2318 RFID detector 204 goes in WIR mode.
If it is determined at step 2312 that no valid SID packet has been received, or if it is determined at step 2316 that OOR_POS_RESPONSE counter has not exceeded the OOR_POS_RESPONSE limit then RFID detector 204 at step 2320 RFID detector 204 enters the Idle (IDL) state. On entering IDL state RFID detector 204 <w/aits in IDL state for another pre-specified (MT8) time period at step 2322 and again enters transmit state at step 2306.
FIG. 24 is a flow diagram illustrating the Association Phase for RFID slave unit 206 under the WSS-FDP protocol according to an embodiment o.f the invention.
At step 2402 RFID detector 204 enters the Association Phase. At step 2404, RFID detector 204 enters the Transmit (TX) state. At step 2406, RFID detector 204 transmits an ASSOCIATION_REQUEST packet for a pre specified (MAT1) time period. An ASSOCIATION_REQUEST packet is an information data packet sent by RFID detector 204 for initiating the association process with a new valid RFID slave unit 206. At step 2408, RFID detector 204 enters the Receive (RX) state and waits for a certain time for an SID packet. At step 2410, a determination is made if RFID detector 204 has received an SID packet within the certain time period.
If it is determined at step 2410 that no SID packet has been received within the certain time period, then RFID detector 204 proceeds to step 2416. At step 2416 RFID detector 204 increments a counter for. detecting the number of times the SID packet has been received (N UM_C YCLES) by one count. At step 2418, a determination is made if NUM_CYCLES counter has exceeded a counter for detecting the association of RFID slave unit 206 (SLAVE_ASSOCIATION). If it is determined that NUM_CYCLES counter has not exceeded SLAVE_ASSOCIATION, then RFID detector 204 again enters the TX state at step 2404. If it is determined that NUM_CYCLES counter has exceeded SLAVE_ASSOCI ATION, then RFID detector 204 proceeds to step 2420 where it informs WSS Application Software of unsuccessful association. At step 2422, RFID detector 204 waits for the instruction from WSS application software to exit the Association Phase. On receiving the instruction from WSS application software to exit the Association phase, at step 2424, user 106 is informed about the unsuccessful association. At step 2426 RFID detector 204 exits the Association Phase.
If it is determined at step 2410 that an SID packet has been received within the certain time period, then RFID detector 204 performs a validation check to check the validity of the received SID packet at step 2412. If it is determined at step 2412 that the received SID packet is not valid, then RFID detector 204 again proceeds to step 2416 where it increments NUM_CYCLES counter by one.
If it is determined at step 2412 that the received SID packet is valid, then RFID detector 204 informs the WSS Application Software of a successful association (έt step 2414. After step 2414 RFID detector 204 waits for the instruction from WSS application software to exit the Association Phase. On receiving the instruction from WSS application software to exit the Association phase, at step 2424, user 106 is informed about the successful association. At step 2426 RFID detector 204 exits the Association Phase.
While example embodiments of the invention have been illustrated and described, it will be clear that the invention is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions and equivalents will be apparent to those skilled in the art without departing from the spirit and scope of the invention as described in the claims.

Claims

SLAIMS:
1. A system for controlling the power consumption of an equipment based on the proximity of a user from the equipment, the system comprising: a) at least one RFID slave unit, b) an RFID detector, the RFID detector being capable of detecting the RFID slave unit based on the proximity of the RFID slave unit to the equipment; and c) a power options controlling device, the power option controlling device controlling the power option of the equipment based on the detection of the RFID slave unit, the power options controlling device further comprising a slave unit authenticator, the slave unit authenticator being capable of authenticating the RFID slave unit
2. The system of claim 1 wherein the RFID slave unit and the RFID detector are based on full duplex active RFID technology.
3. The system of claim 1 wherein the RFID slave unit and the RFID detector are based on Simplex Active RFID technology.
4. The system of claim 1 wherein the RFID slave unit and the RFID detector are based on Full Duplex Passive RFID technology.
5. The system of claim 1 wherein the RFID slave unit is powered by a battery
6. The system of claim 1 wherein the power option controlling device controls the power option of the equipment based on the detection of the RFID slave unit, the RFID slave unit having being authenticated by the slave unit authenticator.
7. The system of claim 1 wherein the power option controlling device switches on the equipment based on the RFID detector detecting a first of the at least one RFID slave unit approaching the proximity of the equipment.
8. The system of claim 1 wherein the power option controlling device switches off the equipment based on the RFID detector detecting a last of the at least one RFID slave unit departing from the proximity of the equipment.
9. The system of claim 1 wherein the power option controlling device switches off the equipment based on the RFID detector detecting at least one unauthenticated RFID slave unit in the proximity of the equipment.
10. The system of claim 1, wherein the slave unit authenticate is capable of associating new RFID slave units to the system.
11. A method for controlling the power consumption of equipment based on the proximity of a user, the method comprising the steps of: a) detecting at least one RFID slave unit based on the proximity of the at least one RFID slave unit to the equipment; b) authenticating the at least one RFID slave unit; and c) controlling the power option of the equipment based on the detection of the at least one RFID slave unit.
12. The method of claim 11, wherein the step of controlling the power option of the equipment further comprises switching ON the equipment based on detecting a first of the at least one RFID slave unit approaching the proximity of the equipment.
13. The method of claim 11, wherein the step of controlling the power option of the equipment further comprises switching OFF the equipment based on detecting a last of the at least one RFID slave unit departing from the proximity of the equipment.
14. The method of claim 11 , wherein the step of controlling the power option of the equipment further comprises switching OFF the equipment based on detecting at least one
15. An apparatus for managing power consumption based on the proximity of a user from the apparatus, the apparatus comprising: a) a computer system; b) at least one slave unit, the at least one slave unit being associated with the user of the computer system; Q a sensory detector, the sensory detector being capable of detecting the at least one slave unit based on the proximity of the sensing unit to the equipment by wirelessly communicating with the at least one slave unit; d) a power options controlling device, the power options controlling device controlling the power option of the computer system based on the detection of the at least one slave unit; e) a slave unit authenticator, the slave unit authenticator being capable of authenticating the slave unit.
16. The system for controlling power consumption of an equipment as recited in claim 1 wherein the sensory detector communicates with the slave unit based on a wireless technology selected from the group consisting of Bluetooth, Ultra wide band RF, infrared, WiFi, ultrasound, GPS, GPRS and Wireless Ethernet.
PCT/IN2008/000693 2007-11-19 2008-10-20 Power saving security system based on programmable range WO2009066324A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN2679/CHE/2007 2007-11-19
IN2679CH2007 2007-11-19

Publications (2)

Publication Number Publication Date
WO2009066324A2 true WO2009066324A2 (en) 2009-05-28
WO2009066324A3 WO2009066324A3 (en) 2009-12-30

Family

ID=40667946

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2008/000693 WO2009066324A2 (en) 2007-11-19 2008-10-20 Power saving security system based on programmable range

Country Status (1)

Country Link
WO (1) WO2009066324A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973355A (en) * 2014-05-06 2014-08-06 国家电网公司 Positioning signal repeater
CN104798410A (en) * 2012-12-20 2015-07-22 英特尔公司 Tap-to-wake and tap-to-login near field communication (NFC) device
US10552614B2 (en) 2014-01-31 2020-02-04 Hewlett-Packard Development Company, L.P. Authentication system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6418536B1 (en) * 1998-04-07 2002-07-09 Samsung Electronics, Co., Ltd. Power saving of a portable computer using human sensing device
US20050049760A1 (en) * 2003-08-29 2005-03-03 Ibm Corporation Power management
US6965294B1 (en) * 2002-02-28 2005-11-15 Kimball International, Inc. Workspace security system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6418536B1 (en) * 1998-04-07 2002-07-09 Samsung Electronics, Co., Ltd. Power saving of a portable computer using human sensing device
US6965294B1 (en) * 2002-02-28 2005-11-15 Kimball International, Inc. Workspace security system
US20050049760A1 (en) * 2003-08-29 2005-03-03 Ibm Corporation Power management

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104798410A (en) * 2012-12-20 2015-07-22 英特尔公司 Tap-to-wake and tap-to-login near field communication (NFC) device
EP2936887A4 (en) * 2012-12-20 2016-07-20 Intel Corp Tap-to-wake and tap-to-login near field communication (nfc) device
US9560522B2 (en) 2012-12-20 2017-01-31 Intel Corporation Tap-to-wake and tap-to-login near field communication (NFC) device
EP3285524A1 (en) * 2012-12-20 2018-02-21 INTEL Corporation Tap-to-wake and tap-to-login near field comnmunication (nfc) device
CN107741780A (en) * 2012-12-20 2018-02-27 英特尔公司 Click on near-field communication (NFC) equipment for waking up and clicking on and log in
US10616763B2 (en) 2012-12-20 2020-04-07 Intel Corporation Apparatus, system and method of waking up a computing device based on detected presence of an NFC device
CN107741780B (en) * 2012-12-20 2021-01-29 英特尔公司 Near Field Communication (NFC) device for click wake-on and click-to-login
US10552614B2 (en) 2014-01-31 2020-02-04 Hewlett-Packard Development Company, L.P. Authentication system and method
CN103973355A (en) * 2014-05-06 2014-08-06 国家电网公司 Positioning signal repeater

Also Published As

Publication number Publication date
WO2009066324A3 (en) 2009-12-30

Similar Documents

Publication Publication Date Title
US10158968B2 (en) Communication method and system
US20180007041A1 (en) Event driven second factor credential authentication
US8967476B2 (en) Synchronization techniques in multi-technology/multi-frequency RFID reader arrays
WO2016196554A1 (en) Internet of things (iot) automotive device, system, and method
US20130272714A1 (en) State Control System and State Control Method
US10699500B2 (en) Intelligent lock
EP2833330B1 (en) Communication method and system
CN103714676A (en) Automatic switch control system and method for device
US20210304535A1 (en) Device and method for access control
JP2011087016A (en) Location management system
CN102957540A (en) System and method for detecting presence of one or more user identification device
WO2009066324A2 (en) Power saving security system based on programmable range
JP5348688B2 (en) Entrance / exit management system, management server, and authentication device control method
US7149556B2 (en) Method and apparatus for optimized battery life and authentication in contactless technology
EP3666044B1 (en) Methods and apparatus for detecting connection or disconnection of an auxiliary load to a driver
JP2003281477A (en) Electronic appliance, electronic card, and method for card identification
CN101540668B (en) Data processing equipment
US10467830B2 (en) Electronic credential reader
CN214670717U (en) Device for realizing payment function of Internet of things and Internet of things equipment
EP2766815B1 (en) Establish client-host connection
US20090261163A1 (en) Electronic device and information transmission method thereof
CN115985021A (en) Awakening method of double-chip POS machine
JPWO2022249443A5 (en)
JP2015021271A (en) Electric equipment control system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08852194

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 13/09/10)

122 Ep: pct application non-entry in european phase

Ref document number: 08852194

Country of ref document: EP

Kind code of ref document: A2