Standby activation

ABSTRACT

Systems and methods are provided for providing a standby activation of a device. A method for providing standby activation of a device can include coupling a tag to a computing device. Furthermore, a method for providing standby activation of a device can include activating the tag utilizing a tag reader, wherein activating the tag provides access to the computing device.

TECHNICAL FIELD

The present disclosure relates to providing standby activation.

BACKGROUND

Radio-frequency identification (RFID) systems can use a number ofreaders and a number of tags to communicate utilizing variouscommunication protocols. RFID tags can come in a large variety,including passive tags, active tags, and hybrid tags. Each of thevarious types of tags can use different power sources. For example,active tags can use a continuous power source such as a battery andrespond to a low level initiation signal from a reader within aparticular range and reply with a high frequency signal. The active tagscan interact with readers of very long distances. The hybrid tags canuse radio frequency energy to initiate interaction with a reader. Thehybrid tags can use internal battery to interact with a reader. Apassive tag can be entirely dependent on high level radio frequencyenergy from a particular reader to provide power for the passive tag'soperation. The passive tag can be limited to operation when the passivetag is in contact and/or near contact with a reader. For example, thepassive tag can be placed within an excitation field of the particularreader and the radio energy provided by the particular reader can beutilized by the passive tag to provide power to the passive tag andcommunicate with the particular reader.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example system for providing standby activation inaccordance with one or more embodiments of the present disclosure.

FIG. 2 illustrates a flow diagram of a method for providing standbyactivation of a device in accordance with one or more embodiments of thepresent disclosure.

FIG. 3 illustrates a block diagram of an example of a computing devicein accordance with one or more embodiments of the present disclosure.

DETAILED DESCRIPTION

Devices, methods, and systems for providing standby activation aredescribed herein. For example, one or more embodiments can includecoupling a tag to a computing device. Furthermore, one or moreembodiments can include activating the tag utilizing a tag reader,wherein activating the tag provides access to the computing device.

RFID systems can be utilized to perform a number of functions (e.g.,identification, security, etc.). RFID systems can operate utilizing atag and a tag reader (e.g., reader, etc.) combination. The tag and thereader can communicate utilizing a number of different wirelesscommunication techniques. For example, the tag and the reader canutilize short range radio frequencies to communicate various data (e.g.,encryption keys, identification data, security data, etc.).

The tag and reader can also utilize a number of RFID protocols. Each ofthe number of protocols can utilize a number of unique features. Forexample, the number of RFID protocols can utilize a number of variousmodulation methods to transfer data. The number of RFID protocolfeatures can also include a particular order of communication betweenthe tag and the reader (e.g., validation, handshake, etc.).

The particular order of communication can depend on a type of tag (e.g.,active, passive, battery assisted passive, etc.) and reader that isbeing utilized. For example, if the type of tag is a passive tag, thereader can provide an excitation field (e.g., radio frequency energy,etc.) and when the passive tag (e.g., tag capable of receiving radioenergy, etc.) is placed within the excitation field the passive tag canutilize the provided energy to initiate communications whereby thereader and the tag may exchange data.

The passive tag may not be connected to a separate electrical powersource and can utilize the excitation field to perform various steps ofthe protocol. The passive tag may not be able to initiate and/or respondto communication of the reader when it is not within the excitationfield. For example, the passive tag can be entirely dependent on theradio frequency energy within the excitation field for power (e.g.,electrical energy, etc.).

The tag, as described herein, can be embedded into a device (e.g.,computing device, etc.). The embedded tag can be utilized to activateand/or deactivate a number of control lines within the computing device.For example, the embedded tag can be coupled to the number of controllines (e.g., power lines, configuration controls, etc.) to enable and/orinhibit the flow of electrical current.

Utilizing the RFID system to activate the computing device can provide astandby activation of the computing device. The standby activation ofthe computing device can enable secure access to the computing devicewithout the need to provide continuous power to the computing deviceand/or to a security system of the computing device.

In the following detailed description, reference is made to theaccompanying drawings that form a part hereof. The drawings show by wayof illustration how one or more embodiments of the disclosure may bepracticed. References herein are made to RFID readers and RFID tags inthe sense of how these devices are commonly used. In this particularinvention, the RFID reader can be used in a capacity as a control deviceand the RFID tag can be used in a capacity as a controlled device.

These embodiments are described in sufficient detail to enable those ofordinary skill in the art to practice one or more embodiments of thisdisclosure. It is to be understood that other embodiments may beutilized and that process, electrical, and/or structural changes may bemade without departing from the scope of the present disclosure.

As will be appreciated, elements shown in the various embodiments hereincan be added, exchanged, combined, and/or eliminated so as to provide anumber of additional embodiments of the present disclosure. Theproportion and the relative scale of the elements provided in thefigures are intended to illustrate the embodiments of the presentdisclosure, and should not be taken in a limiting sense.

As used herein, “a” or “a number of” something can refer to one or moresuch things. For example, “a number of control lines” can refer to oneor more control lines.

FIG. 1 illustrates an example system 100 for providing standbyactivation in accordance with one or more embodiments of the presentdisclosure. The system 100 can include a reader 102 and an embeddedsystem 104.

The reader 102 can be an RFID reader as described herein. The reader caninclude a user interface 106. The user interface 106 can be utilized toinput a number of selections into the reader 102. For example, the userinterface 106 can be utilized to input identification information toaccess a number of functions of the reader 102. The user interface 106can be utilized to input data into the reader 102 and/or forcommunicating data (e.g., transferring data, etc.) to the embeddedsystem 104.

The user interface 106 can be communicatively connected to a signalprocessor 108. The signal processor 108 can produce a number ofcommunication signals (e.g., radio frequency fields of 125 kHz and/or13.56 MHz, etc.) utilizing an exciter 110 to communicate with a tag 116within the embedded system 104. The signal processor 108 can alsoreceive a number of communication signals (e.g., radio frequencies,various modulation types, etc.) utilizing a receiver 112.

The signal processor 108 can also produce an excitation field utilizingthe exciter 110. The excitation field can include an area surroundingthe reader 102 where a tag (e.g., tag 116, etc.) can utilize radiofrequency energy from the reader 102. For example, the tag 116 canrequire electrical energy for initiating and/or receiving communicationfrom the reader 102. The excitation field can provide the electricalenergy to enable the tag 116 to initiate and/or receive communicationwith the reader 102.

The signal processor 108 can transmit the communication signals using anexcitation field generated by exciter 110 utilizing an antenna 114. Theantenna 114 can be a single antenna and/or multiple antennas to transmitand/or receive the communication signals and to produce the excitationfield. The antenna 114 can include a short range antenna (near field),long range antenna (far field) and/or a combination of a short rangeantenna and a long range antenna.

The excitation field can be an area surrounding the reader 102 where aradio frequency energy transfer can occur between the reader 102 and thetag 116 within the embedded system 104. A coil within the tag 116 canabsorb and/or store energy from the radio frequency energy transfer whenwithin the excitation field.

The embedded system 104 can include the tag 116 communicatively coupled118 to an embedded device 120. The tag 116 can include a coil that canreceive energy from the radio frequency energy transfer when the tag 116is within the excitation field of the reader 102.

The tag 116 can convert the radio frequency energy to provide electricalenergy to a number of components within the tag 116. For example, thetag 116 can utilize a rectifier to convert the resonant energy to directcurrent (e.g., unidirectional flow of electric charge, etc.). Theelectrical energy can power an integrated circuit (e.g., applicationspecific integrated circuits, etc.). The integrated circuit can beutilized to communicate with the reader 102 (e.g., validation process,etc.) and/or perform a number of functions as described herein.

The embedded device 120 can include a computing device (e.g., computingdevice 330, etc.) as described herein. The embedded device can beutilized to control a device, transfer data, and/or perform a number offunctions (e.g., security system, irrigation systems, heatingventilation and air conditioning (HVAC) systems, etc.). For example theembedded device can be a computing device that controls a number ofsecurity settings for a building. In this example, the embeddedcomputing device can function to change passwords to the alarm system,change the time when security lights turn on, etc.

The tag 116 can be communicatively coupled to a number of control lines118 for the embedded device 120. The number of control lines 118 caninclude power lines and/or communication lines of the embedded device120. Being communicatively coupled to the number of control lines 118for the embedded device 120 can enable the tag 116 to enable and/ordisable a particular functionality of the number of control lines 118 aswell as modify the behavior of device 120 by transferring information todevice 120. Device 120 can also transfer data to device 116 via controllines 118 to indicate the status or other properties of device 120.

The number of control lines 118, as described herein, can include anumber of power lines of the embedded device 120. For example, thenumber of power lines can provide electrical power to operate theembedded device 120. The tag 116 can enable and/or disable the number ofpower lines of the embedded device 120 (e.g., turning the embeddeddevice 120 on and/or turning the embedded device 120 off, etc.). Forexample, the number of power lines can be connected to a power supply(e.g., battery, electrical grid, etc.) and the tag 116 can enable and/ordisable the connection to the power supply.

The number of power lines of the embedded device 120 can also utilizethe excitation field of the reader 102 to provide power to the embeddeddevice 120. For example, the number of power lines can absorb and/orstore electrical energy from the excitation field. In the same example,the tag 116 can enable and/or disable the power lines of the embeddeddevice 120 to control the flow of electrical power to the embeddeddevice.

The number of control lines 118, as described herein, can also include anumber of communication lines (e.g., Ethernet, electronic bus, etc.).The number of communication lines can be utilized as a communicationpath (e.g., communication path 336, etc.) to transfer data to and/orfrom the embedded device 120. The tag 116 can enable and/or disable anumber of capabilities and/or the number of communication lines for theembedded device 120. Disabling the number of capabilities and/or thenumber of communication lines can alter the behavior of the embeddeddevice 120. For example, if the embedded device 120 were an accesscontrol device for a building, the tag 116 can send messages viacommunications lines 118 that can disable the access device when the tag116 is within the excitation field of the reader 102. In the sameexample, the tag 116 can send a message to the embedded device 120 viacommunication lines 118 that enabled the access control device for thebuilding.

The communication of the reader 102 and/or different computing devicewith the embedded device can include a variety of communication (e.g.,information and/or data, etc.). For example, the communication caninclude the reader 102 and/or different computing device transferringdata (e.g., updates, setting changes, instructions, modules, etc.) tothe embedded device 120. The different computing device can be a remotecomputing device (e.g., in a remote location outside the excitationfield of the reader 102, etc.). The remote computing device cancommunicate with the embedded device 120 using the control lines 118 ofthe embedded device 120 when the control lines 118 are enabled by thetag 116. For example, the reader 102 can be placed in close proximity(e.g., within the excitation field, etc.) to the tag 116 and the tag 116can enable the control lines 118 of the embedded device 120 and theremote computing device can be allowed to communicate with the embeddeddevice 120.

The communication between the reader 102 and/or a different computingdevice can include encryption of the communication (e.g., encryption ofthe data transferred, etc.). For example, encryption can include ahashing algorithm and/or other form of data encryption.

Enabling and/or disabling the control lines 118 of the embedded devicecan include a validation process between the reader 102 and the tag 116.For example, the reader 102 and the tag 116 can exchange a number ofencryption keys and/or encrypted tokens to validate the other. In thisexample, the reader 102 can validate the tag 116 and the tag 116 canvalidate the reader 102. The exchange of the number of encryption keys(e.g., hand shake, etc.) can include a number of different RFIDprotocols. For example, the RFID protocol used by the reader 102 and thetag 116 can determine the radio frequency and/or modulation type used,the order of the exchange, the type of encryption used, etc. Theexchange can be a challenge-response communication between the tag 116and the reader 102. The challenge-response communication can include thetag 116 sending a token to the reader 102 (e.g., challenge, etc.) and inresponse the reader 102 can send an encryption token and/or response tothe tag 116 for validation. Similarly, the tag 116 can send an encryptedtoken to the reader 102 and the reader 102 can respond to tag 116 withthe decrypted token.

The type of protocol and the encryption key used can be determined basedon a level of security desired. For example, if the level of security islow, the encryption method can be relatively simple. An exampleembodiment of a simple encryption can include performing an exclusive-OR(e.g., logical operation exclusive disjunction, etc.) of the encryptionkey with the data. In another example, if the level of security is high,multiple encryption keys using much more complex encryption algorithms,such as Data Encryption Standard (DES), Advanced Encryption Standard(AES), skipjack (e.g., block cipher, etc.), or blowfish (e.g., symmetricblock cipher, etc.) can be utilized to minimize the probability ofunauthorized use. Using different encryption methods for each level ofaccess can be another example embodiment of high security encryption.

The validation process can enable access to an encrypted system of theembedded device. For example, the validation process can enable accessto encrypted software (e.g., password protected, etc.) of the embeddeddevice. If the reader 102 and the tag 116 are validated, access can alsobe granted to the encrypted software of the embedded device.

The validation process can be utilized with the encryption of the databeing transferred. For example, the reader 102 and the tag 116 canperform a validation process as described herein. In the same example,data transferred from a different computing device to the embeddeddevice 120 can also be encrypted data. The validation of the reader 102and encryption of the data transferred can add additional security tothe embedded system 104 when used together.

The embedded device 120 can be automatically deactivated if the reader102 is removed from close proximity with the tag 116. For example, thereader can be removed from the area of the tag 116 and can remove thetag 116 from the excitation field. Removing the tag 116 from theexcitation field can deactivate the tag 116 by removing the electricalenergy provided by the excitation field. Deactivating the tag candisable the coupled control lines 118. This can provide additionalsecurity by ensuring that if the authorized user of the reader 102leaves the area of the embedded system 104, the control lines of theembedded device 120 are disabled and can restrict access to unauthorizedusers.

The embedded device 120 can complete the communication (e.g., datatransfer, etc.) if the communication was initiated when the tag 116 waswithin the excitation field of the reader 116. The automaticdeactivation can apply to communication that was not initiated while thetag 116 was within the excitation field of the reader 102. This canensure that the communication is completed, even if the user takes thereader 102 away from the tag 116 (e.g., tag 116 is no longer within theexcitation field, etc.). This can also avoid any problems with partialupdates and/or partial communications. The embedded device can bedeactivated, as described herein, after the communication is complete.

The tag 116 can be utilized to activate or deactivate an embedded device120 (e.g., computing device, etc.) with a limited power supply (e.g.,battery, no power supply, connected to a grid that is attempting toconserve electrical energy, etc.) communicating with and commanding theembedded device 120 using tag 116 when tag 116 is within the excitationfield of the reader 102. The embedded system 104 may not consume any ofthe limited power supply of the embedded device 120 attempting todetermine if activation or deactivation commands are forthcoming whenthe reader 102 is not present. In this example, the tag 116 can act as azero standby current control interface to embedded device 120.

The embedded system 104 can be utilized to increase security of anembedded device 120 that is in an unsecure location. For example, theembedded device 120 can be located in an area that can be accessedwithout security by unauthorized users. The embedded system 104 canincrease the security of the embedded device 120 by the validationprocess and/or utilizing encrypted data transfers as described herein.

FIG. 2 illustrates a flow diagram of a method 222 for providing standbyactivation of a device in accordance with one or more embodiments of thepresent disclosure. Standby activation, as described herein, can includeactivation of the device (e.g., embedded device 120, etc.) with littleand/or no power consumption by the tag (e.g., tag 116) when the reader(e.g., reader 102) is not present.

At 224 a tag is coupled to a computing device. As described herein thetag can be coupled to a number of control lines of the computing device(e.g., device, embedded device 120, etc.). The number of control linescan include a number of power lines and/or a number of communicationlines of the computing device.

The computing device can be connected to a power source and/or utilizepower from the reader. As described herein the reader can utilize anactivation zone to transfer radio energy to a receiving device (e.g.,tag, embedded device, etc.). In another example, the reader can bephysically connected (e.g., electrical connection, etc.) to thecomputing device and the reader can act as a temporary power supply forthe computing device. If the computing device is connected to a powersource other than the reader (e.g., electricity grid, battery power,etc.), then the tag can enable and/or disable the number of power linesconnecting the computing device to the power source. If the computingdevice utilizes electrical power from the reader, the tag can enableand/or disable the number of power lines connecting the computing deviceand the electrical power provided by the reader.

As described herein, the tag can also be connected to the number ofcommunication lines. The number of communication lines can be enabledand/or disabled by the tag to control incoming and/or outgoingcommunication with the computing device.

At 226 the tag is activated by the radio frequency energy from a tagreader, wherein activating the tag provides an initial response to thereader indicating the presence of the tag. Activating the tag caninclude placing the tag within an excitation area of the tag reader. Theexcitation area can provide electrical energy to the tag and enablecircuitry (e.g., various forms of transistor logic, application specificintegrated, etc.) within the tag to begin a validation process with thereader.

The tag and the reader can perform the validation process in a number ofways based on a protocol. The validation process can ensure that a useris authorized to communicate with the computing device. The validationprocess can utilize a number of encrypted keys within the reader and/orthe tag to validate that the user of the reader is authorized tocommunicate with the computing device. If the validation process issuccessful (e.g., the reader is validated, the user is authorized, etc.)then the tag can be activated and access to the computing device can begiven to the user of the tag reader. The reader can indicate to the userthat a valid tag is present upon a successful completion of thevalidation process.

Commands from the user interface (e.g., user interface 106, etc.) can betransferred to the tag upon a successful completion of the validationprocess. The tag can confirm that the commands from the user interfaceare complete and/or correct. The tag can communicate the commands to theembedded system (e.g., embedded system 120, etc.). The embedded systemcan send an acknowledgement of the receipt of the commands from the tag.Upon receipt of the acknowledgement from the embedded system, the tagcan communicate to the reader that the embedded system has received thecommands.

The signal processor (e.g., signal processor 108, etc.) can indicate tothe user interface that the embedded system has successfully receivedthe commands. The reader can be decoupled from the tag and the tag canbe shut down (e.g., powered off, etc.) if the reader is no longerproviding power to the tag.

Commands communicated to the computing device can include providingelectrical power to the computing device. For example, if the tag iscoupled to the number of power lines within the computing device, theactivated tag can enable the power lines and start the computing device.Access to the computing device can also include providing communicationaccess to the computing device. For example, if the tag is coupled tothe number of communication lines of the computing device, the activatedtag can enable the communication lines of the computing device and allowthe tag reader and/or a different computing device to communicate withthe computing device coupled to the tag.

The user of the tag reader can automatically deactivate the tag byremoving the tag from the excitation field of the tag reader. Forexample, the user of the tag reader can remove the tag reader from thelocation of the tag. Removing the tag reader from the location of thetag can remove the tag from the excitation field and the tag can losethe electrical energy provided by the excitation field. This candeactivate the tag and also disable the connection lines (e.g., powerlines, communication lines, etc.).

The method 222 can reserve electrical power for a computing deviceand/or provide security for a computing device located in an unsecurearea.

FIG. 3 illustrates a block diagram of an example of a computing device330 in accordance with one or more embodiments of the presentdisclosure. The computing device 330, as described herein, can alsoinclude a computer readable medium (CRM) 332 in communication withprocessing resources 340-1, 340-2, . . . , 340-N. CRM 332 can be incommunication with a device 338 (e.g., a Jave® application server, amongothers) having processor resources 340-1, 340-2, . . . , 340-N. Thedevice 338 can be in communication with a tangible non-transitory CRM332 storing a set of computer-readable instructions (CRI) 334 (e.g.,modules, etc.) executable by one or more of the processor resources340-1, 340-2, . . . , 340-N, as described herein. The CRI 334 can alsobe stored in remote memory managed by a server and represent aninstallation package that can be downloaded, installed, and executed.The device 338 can include memory resources 342, and the processorresources 340-1, 340-2, . . . , 340-N can be coupled to the memoryresources 342.

Processor resources 340-1, 340-2, . . . , 340-N can execute CRI 334 thatcan be stored on an internal or external non-transitory CRM 332. Theprocessor resources 340-1, 340-2, . . . , 340-N can execute CRI 334 toperform various functions. For example, the processor resources 340-1,340-2, . . . , 340-N can execute CRI 334 to perform a number offunctions (e.g., communicate with the reader 102, etc.). Anon-transitory CRM (e.g., CRM 332), as used herein, can include volatileand/or non-volatile memory. Volatile memory can include memory thatdepends upon power to store information, such as various types ofdynamic random access memory (DRAM), among others. Non-volatile memorycan include memory that does not depend upon power to store information.Examples of non-volatile memory can include solid state media such asflash memory, electrically erasable programmable read-only memory(EEPROM), phase change random access memory (PCRAM), magnetic memorysuch as a hard disk, tape drives, floppy disk, and/or tape memory,optical discs, digital versatile discs (DVD), Blu-ray discs (BD),compact discs (CD), and/or a solid state drive (SSD), etc., as well asother types of computer-readable media.

The non-transitory CRM 332 can also include distributed storage media.For example, the CRM 332 can be distributed among various locations.

The non-transitory CRM 332 can be integral, or communicatively coupled,to a computing device, in a wired and/or a wireless manner. For example,the non-transitory CRM 332 can be an internal memory, a portable memory,a portable disk, or a memory associated with another computing resource(e.g., enabling OR's to be transferred and/or executed across a networksuch as the Internet).

The CRM 332 can be in communication with the processor resources 340-1,340-2, . . . , 340-N via a communication path 336. The communicationpath 336 can be local or remote to a machine (e.g., a computer)associated with the processor resources 340-1, 340-2, . . . , 340-N.Examples of a local communication path 336 can include an electronic businternal to a machine (e.g., a computer) where the CRM 332 is one ofvolatile, non-volatile, fixed, and/or removable storage medium incommunication with the processor resources 340-1, 340-2, . . . , 340-Nvia the electronic bus. Examples of such electronic buses can includeIndustry Standard Architecture (ISA), Peripheral Component Interconnect(PCI), Advanced Technology Attachment (ATA), Small Computer SystemInterface (SCSI), Universal Serial Bus (USB), among other types ofelectronic buses and variants thereof.

The communication path 336 can be such that the CRM 332 is remote fromthe processor resources e.g., 340-1, 340-2, . . . , 340-N, such as in anetwork relationship between the CRM 332 and the processor resources(e.g., 340-1, 340-2, . . . , 340-N). That is, the communication path 336can be a network relationship. Examples of such a network relationshipcan include a local area network (LAN), wide area network (WAN),personal area network (PAN), and the Internet, among others. In suchexamples, the CRM 332 can be associated with a first computing deviceand the processor resources 340-1, 340-2, . . . , 340-N can beassociated with a second computing device (e.g., a Jave® server, etc.) .. . .

As described herein, a “module” can include computer readableinstructions (e.g., CRI 334) that can be executed by a processor toperform a particular function. A module can also include hardware,firmware, and/or logic that can perform a particular function.

As used herein, “logic” is an alternative or additional processingresource to execute the actions and/or functions, etc., describedherein, which includes hardware (e.g., various forms of transistorlogic, application specific integrated circuits (ASICs), etc.), asopposed to computer executable instructions (e.g., software, firmware,etc.) stored in memory and executable by a processor.

Although specific embodiments have been illustrated and describedherein, those of ordinary skill in the art will appreciate that anyarrangement calculated to achieve the same techniques can be substitutedfor the specific embodiments shown. This disclosure is intended to coverany and all adaptations or variations of various embodiments of thedisclosure.

It is to be understood that the above description has been made in anillustrative fashion, and not a restrictive one. Combination of theabove embodiments, and other embodiments not specifically describedherein will be apparent to those of skill in the art upon reviewing theabove description.

The scope of the various embodiments of the disclosure includes anyother applications in which the above structures and methods are used.Therefore, the scope of various embodiments of the disclosure should bedetermined with reference to the appended claims, along with the fullrange of equivalents to which such claims are entitled.

In the foregoing Detailed Description, various features are groupedtogether in example embodiments illustrated in the figures for thepurpose of streamlining the disclosure. This method of disclosure is notto be interpreted as reflecting an intention that the embodiments of thedisclosure require more features than are expressly recited in eachclaim.

Rather, as the following claims reflect, inventive subject matter liesin less than all features of a single disclosed embodiment. Thus, thefollowing claims are hereby incorporated into the Detailed Description,with each claim standing on its own as a separate embodiment.

What is claimed:
 1. A method for providing a standby activation system,comprising: coupling a passive tag to a computing device, whereincoupling the passive tag includes connecting the passive tag to a numberof control lines to manipulate a functionality of the computing devicevia a tag reader, wherein the control lines include a number ofcommunication lines to transfer data to and receive data from thecomputing device via the tag reader; activating the passive tagutilizing the tag reader by placing the excitation field of the readerwithin an area of the passive tag, wherein activating the passive tagenables the computing device, enables encrypted communication betweenthe tag reader and the passive tag via the tag reader, and provides theencrypted communication from the passive tag to the computing device viathe tag reader; deactivating the passive tag by removing the excitationfield of the reader from the area of the passive tag; and completing acommunication between the computing device and the tag reader afterdeactivating the passive tag when the communication is started at a timewhen the excitation field of the reader is within the area of thepassive tag.
 2. The method of claim 1, wherein the method includescommunicating a number of commands from the reader to the passive tagusing encrypted communication.
 3. The method of claim 2, wherein thenumber of commands are transferred from the passive tag to the computingdevice.
 4. The method of claim 1, wherein activating the passive tagcomprises utilizing electromagnetic fields from the reader to provideelectrical energy to the passive tag.
 5. The method of claim 1, whereinactivating the passive tag comprises utilizing a contactlesscommunication system.
 6. The method of claim 1, further comprisingdeactivating the Passive tag by removing the passive tag from anexcitation field.
 7. A system for standby activation, the systemcomprising: a first computing device; a passive tag coupled to the firstcomputing device; and a reader to activate the passive tagcommunicatively coupled to the first computing device, whereinactivating the passive tag comprises: placing the excitation field ofthe reader within an area of the passive tag; providing electricalenergy to activate the passive tag; manipulating a functionality of thefirst computing device via control lines, wherein the control linesinclude a number of communication lines to transfer data to and receivedata from the first computing device; providing encrypted communicationbetween the reader and the passive tag; transferring a command from thereader to the passive tag; transferring the command from the passive tagto the computing device; providing electrical energy to enable the firstcomputing device; providing a second computing device encrypted accessto the first computing device; deactivating the passive tag by removingthe excitation field of the reader from the area of the passive tag; andcompleting a communication between the first computing device and thetag reader after deactivating the passive tag when the communication isstarted at a time when the excitation field of the reader is within thearea of the passive tag.
 8. The system of claim 7, wherein the readerchanges a number of settings of the first computing device.
 9. Thesystem of claim 7, wherein the reader utilizes radio-frequencyelectromagnetic fields to activate the passive tag and provideelectrical energy to the passive tag.
 10. The system of claim 7, whereinthe passive tag is not connected to a power resource.
 11. A system forstandby activation, the system comprising: a passive tag coupled to afirst computing device, wherein the passive tag comprises an antenna toaccept a radio frequency energy transfer, wherein the passive tag iscoupled to a number of control lines to manipulate a functionality ofthe first computing device, wherein the control lines include a numberof communication lines to transfer data to and receive data from thefirst computing device; a reader capable of activating the passive tagby providing the radio frequency energy transfer when the passive tag iswithin an excitation field, wherein activating the passive tag enablesencrypted communication between the tag reader and the tag, and providesthe encrypted communication from the tag to the first computing device;and a second computing device capable of transferring and receiving datawith the first computing device when the passive tag is activated,wherein communication between the first computing device and the tagreader is completed after the passive tag is deactivated during thecommunication when the communication is started at a time when theexcitation field of the reader is within the area of the passive tag.12. The system of claim 11, wherein the radio frequency energy transfersupplies electrical energy for operation of the tag and access to thefirst computing device.
 13. The system of claim 11, wherein the secondcomputing device transfers data to the first computing device inresponse to activating the passive tag.
 14. The system of claim 11,wherein the data is encrypted for transferring and receiving between thefirst computing device and the second computing device.
 15. The systemof claim 11, wherein the reader performs a validation of the passive tagand the activated passive tag performs a validation of the reader. 16.The system of claim 15, wherein the validation includes achallenge-response communication between the passive tag and the reader,wherein the passive tag and the reader each incorporate an encryptionkey.
 17. The system of claim 11, wherein the second computing device cancomplete transferring and receiving of data if the passive tag isoutside the excitation field of the reader after an initiation of thetransfer and receiving of data.