Utilizing a radio frequency identification tag to assess the battery level of a peripheral device

ABSTRACT

Pursuant to at least some embodiments, the present disclosure relates to a method that includes configuring an RFID tag to store information related to a battery charge level of a battery of a peripheral device, reading the RFID tag, and disabling a subsequent reading of the RFID tag in response to determining that the RFID tag includes stored information indicative of the battery charge level being low or depleted.

FIELD OF THE DISCLOSURE

The present disclosure relates to communications between or amongelectronic devices and, more particularly, to methods, apparatuses, andsystems for utilizing a radio frequency identification (RFID) tag toassess the battery level of a peripheral device.

BACKGROUND OF THE DISCLOSURE

Peripheral devices for use with electronic equipment are typicallyequipped with small batteries in order to provide a device package thatis compact in size and light in weight. By way of illustration and notlimitation, examples of peripheral devices may include Bluetoothheadsets, smart watches, keypads, computer mice, pointers, and othertypes of devices. These peripheral devices are sometimes referred to asaccessory devices, and the two terms are used interchangeably herein.The power consumption of peripheral devices may be significant relativeto the battery capacity. There is a need for techniques to drive downpower consumption on such devices without compromising user experience.

Security and control of access to smartphones and other electronicdevices is very important, but access control is currently an area ofpoor user experience. For example, password-based authentication schemeshave been used in smartphones for a long time. However, passwords areunwieldy for smartphones and result in a suboptimal user experience.Over the past few years, smartphones have included several alternativetypes of user authentication such as facial recognition and fingerprintrecognition. Such biometric authentication systems often have a highlikelihood of failure. For example, facial recognition systems are verysensitive to lighting conditions, whereas fingerprint sensors are quitesensitive to the cleanliness of the fingertip and the sensor. Otheraccess control mechanisms include keeping the smartphone unlocked whenattached to a Bluetooth peer or a specific Wi-Fi access point; however,such mechanisms have inherent security loopholes.

Passwords and security codes used to authenticate users are prone tosecurity problems, particularly when such passwords are simple. Usersprefer to set up simple passwords or personal identification numbers(PINs) to make them easier to remember, and to make it faster to unlockthe smartphone. At the same time, simple passwords may be easier foronlookers to watch and read.

Electronic access control mechanisms are not limited to the smartphoneenvironment. Of perhaps even greater significance are electronicmechanisms for controlling access to physical locations such asbuildings, homes, or cars. Conventionally, electronic badges are used toallow access to offices. Badges generally are equipped with a radiofrequency identification (RFID) tag, which is scanned by an RFID readerat a point of entry or access point to allow access to the holder of thebadge. If the badge is lost, there is a significant security problem—aperson who finds the badge may be able to access the office. It is easyto see that a similar problem exists with conventional car keys, homekeys, and office keys.

RFID technology uses electromagnetic fields to transfer data. RFID tagsare attached to objects and are “read” by RFID readers. These RFID tagsmay be powered solely by RF power received from the RFID reader, or bymagnetic induction, or the RFID tags may be equipped with a battery. Inaddition to access control, another exemplary use of RFID technology isto track objects and manage inventory. RFID is preferable over barcodesfor many applications since the tag does not need to be in a line ofsight of the reader.

An operation of reading an RFID tag can be used as a trigger to performsome other action or actions. One such illustrative system is describedin U.S. Pat. No. 8,862,052, entitled “NFC mobile communication deviceand NFC reader.” Likewise, a method of using RFID to initiate aconnection between a handheld device and a base unit is described inU.S. Patent Application No. 7,236,742, entitled “System and method forwireless data transfer for a mobile unit”, Univ. Brigham Young.

BRIEF SUMMARY OF THE INVENTION

In at least some embodiments, the present invention relates to a methodthat includes configuring an RFID tag to store information related to abattery charge level of a battery of a peripheral device, reading theRFID tag, and disabling a subsequent reading of the RFID tag in responseto determining that the RFID tag includes stored information indicativeof the battery charge level being low or depleted.

Additionally, in at least some embodiments, the present inventionrelates to a method that includes storing information in an RFID tagrelated to a battery charge level of a peripheral device; reading theRFID tag to retrieve the stored battery charge level; and determiningwhether or not to communicate with the peripheral device in response tothe retrieved stored battery charge level.

Further, in at least some embodiments, the present invention relates toan apparatus that includes an RFID tag configured to store informationrelated to a battery charge level of a battery of a peripheral device;an RFID reader configured for reading the RFID tag; and a mobile device,operatively coupled to the RFID reader, and configured for disabling asubsequent reading of the RFID tag in response to determining that theRFID tag includes stored information indicative of the battery chargelevel being low or depleted.

Additionally, in at least some embodiments, the present inventionrelates to an apparatus that includes an RFID tag configured for storinginformation related to a battery charge level of a peripheral device; anRFID reader configured for reading the RFID tag to retrieve the storedbattery charge level; and a mobile device, operatively coupled to theRFID reader, and configured for determining whether or not tocommunicate with the peripheral device in response to the retrievedstored battery charge level.

Further, in at least some embodiments, the present invention relates toan apparatus that includes an RFID tag configured for storinginformation related to a battery charge level of a peripheral device; anRFID reader configured for reading the RFID tag to retrieve the storedbattery charge level; and a battery charger, operatively coupled to theRFID reader, and configured to initiate a charging of a battery of theperipheral device in response to the retrieved stored battery chargelevel indicating a battery charge level below an optimum threshold.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a hardware block diagram showing an illustrative system forutilizing a radio frequency identification (RFID) tag to enhance a userexperience with a peripheral device in accordance with a set ofexemplary embodiments.

FIG. 2 is a hardware block diagram illustrating exemplary internalcomponents for the mobile device of FIG. 1.

FIG. 3 is a flowchart showing a first illustrative operational sequencethat may be performed by the system of FIG. 1.

FIG. 4 is a flowchart showing a second illustrative operational sequencethat may be performed by the system of FIG. 1.

FIG. 5 is a flowchart showing an illustrative operational sequence forperforming a presence-based procedure for displaying one or moremessages on the peripheral device of FIG. 1.

FIG. 6 is a flowchart showing an illustrative operational sequence forperforming a fast wakeup of the peripheral device of FIG. 1 so that theperipheral device is prepared for handling an incoming call orconnection.

FIG. 7 is a flowchart showing an illustrative operational sequence forusing RFID to read, record, or assess a battery status for theperipheral device of FIG. 1.

FIG. 8 is a flowchart showing an illustrative operational sequence forusing the RFID tag of FIG. 1 to optimize wireless scanning andconnection establishment.

FIG. 9 is a flowchart showing an illustrative operational sequence forusing the RFID tag of FIG. 1 to improve an authentication procedure foraccessing the mobile device.

FIG. 10 is a flowchart showing an illustrative operational sequence forusing the RFID tag of FIG. 1 to provide a robust user authenticationprocedure for accessing the mobile device.

FIG. 11 is a flowchart showing an illustrative operational sequence forproviding a robust user authentication procedure for accessing themobile device of FIG. 1 without using RFID technology.

FIG. 12 is a flowchart showing an illustrative operational sequence forproviding a two-factor authentication procedure for granting access tophysical premises according to a set of illustrative embodiments.

DETAILED DESCRIPTION

Use of RFID technology in the context of smartphones and wirelessdevices is advantageous. By equipping a smartphone with an RFID reader,it is possible to interact with RFID tags to enhance the user experiencein many significant ways. If a peripheral device is equipped with anRFID tag, the RFID reader on the smartphone may read the RFID tag andtrigger other actions on the peripheral device. For example, aperipheral device may be placed in a power saving mode and be activatedonly in response to the smartphone triggering the RFID reader to readthe RFID tag. This functionality enables significant battery lifeimprovement in the peripheral device.

The following problems should be considered in order to make theinteraction between the smartphone and the peripheral device effectiveand useful. First, if it is desired to display a message to a user whois in possession of a wearable peripheral device, then a smartphone maybe used to establish a robust two-way communication channel betweenitself and the peripheral device (e.g., using Bluetooth or WiFi). RFIDdoes not constitute such a two-way communication channel.

Second, even if the peripheral device is located in close proximity tothe smartphone, the peripheral device may not be able to establish aconnection to the smartphone. This situation may arise if the battery onthe peripheral device is low or depleted. As a result, the smartphonewill repeatedly read the RFID tag in an attempt to trigger theperipheral device to an “on” state.

Third, for peripheral devices that are expected to establish wirelessconnections, scanning the wireless medium can drain the battery power ofthe peripheral device significantly. For instance, if the peripheraldevice is expected to scan for WiFi access points in the same way thatsmartphones do, the battery life of the peripheral device would suffersignificantly. Techniques to minimize power consumption prior toestablishing wireless connections are beneficial.

In at least some sets of embodiments, RFID readers and tags are used toachieve reduced power consumption. In other sets of embodiments, RFIDtechnology is used to solve practical problems that may arise whencontrolling access to electronic devices or physical areas, such aseliminating or reducing the risk of illegal access due to lost RFIDbadges and RFID key fobs. Yet another set of embodiments provides a userauthentication scheme for a smartphone that reduces a reliance onpasswords and biometric authentication, while maintaining at least adesired level of security that has heretofore been provided by passwordsand biometric authentication. Still another object of the presentinvention is to provide a smartphone user authentication scheme thatprovides a password or personal identification number (PIN) mechanismthat is robust against spying and interception.

Pursuant to at least some embodiments, the present disclosure relates toa peripheral device that is equipped with an RFID tag. The RFID tagincludes a memory device configured for electronically storinginformation, an RF receiver configured for receiving an interrogationsignal, and an RF transmitter operatively coupled to the RF receiver andthe memory device. The RF transmitter is configured for: (a) modulatingan RF carrier with the electronically stored information from the memorydevice, and (b) transmitting the modulated RF carrier, in response tothe RF receiver receiving the interrogation signal. The receivedinterrogation signal is used to control one or more operationalparameters or operational states of the peripheral device.Illustratively, operational states include an “on” state of the deviceand the interrogation signal is used to power the peripheral device toan “on” state.

According to another set of embodiments, the received interrogationsignal is used to provide a message or a notification from a mobiledevice to the peripheral device.

According to another set of embodiments, the received interrogationsignal is used to initiate and complete a communications link between amobile device and the peripheral device. The mobile device is equippedwith an RFID reader. The RFID reader includes an RF transmitter forgenerating the interrogation signal, and an RF receiver for receivingand demodulating the modulated RF carrier transmitted by the RFID tag.In response to the mobile device issuing a command to the RFID reader,the RFID reader transmits the interrogation signal. In response to theRFID tag receiving the interrogation signal, the peripheral devicedetects an energizing of the RFID tag. The energizing of the RFID tagprovides an indication to the peripheral device that a bi-directionalcommunication link should be established between the mobile device andthe peripheral device.

FIG. 1 is a hardware block diagram showing an illustrative system 100for utilizing a radio frequency identification (RFID) tag 102 to enhancea user experience with a peripheral device 104 in accordance with a setof exemplary embodiments. The peripheral device 104 is equipped with theRFID tag 102. By way of illustration and not limitation, peripheraldevice 104 may, but need not, represent a Bluetooth headset, a smartwatch, a keypad, a computer mouse, a pointer, or another type ofperipheral device. It may be noted that these peripheral devices aresometimes referred to as accessory devices, and the two terms are usedinterchangeably herein. Moreover, in some embodiments, the peripheraldevice 104 may, but need not, represent a laptop computer, a personalcomputer, a tablet device, or any other type of computer. In otherembodiments, the peripheral device may, but need not, represent a secondmobile device. For example, assuming that the peripheral device 104 is acomputer, then if the computer is equipped or associated with the RFIDtag 102, the mobile device 111 can use the RFID reader 112 to write oneor more WiFi connection parameters to the RFID tag 102 as describedpreviously to enable the computer to connect to a Wi-Fi network.

The RFID tag 102 includes a memory device 109 configured forelectronically storing information, an RF receiver 103 configured forreceiving an interrogation signal 108 via an antenna 107, and an RFtransmitter 105 operatively coupled to the RF receiver 103 and thememory device 109, and configured for modulating an RF carrier with theelectronically stored information to provide a modulated RF carrier 119,and transmitting the modulated RF carrier 119 in response to the RFreceiver 103 receiving the interrogation signal 108. The RF receiver 103and the RF transmitter 105 are operatively coupled to the antenna 107.The received interrogation signal 108 may be used to control one or moreoperational parameters of the peripheral device 104. Illustratively, theone or more operational parameters include powering the peripheraldevice 104 to an “on” state. Optionally, the RFID tag 102 may include aprocessor, whereupon the RFID tag 102 may be referred to as an activeRFID tag. If the RFID tag 102 does not include a processor, then theRFID tag 102 may be referred to as a passive RFID tag.

A mobile device 111 is equipped with an RFID reader 112. The RFID reader112 includes an RF transmitter 115 for generating the interrogationsignal 108, an RF receiver 113 for receiving and demodulating themodulated RF carrier 119 transmitted by the RFID tag 102, a processor114 operatively coupled to the RF receiver 113 and the RF transmitter115 for controlling the RF receiver 113 and the RF transmitter 115, andan optional memory 117 operatively coupled to the processor 114. Anantenna 106 is operatively coupled to the RF transmitter 115 and to theRF receiver 113. The RFID reader 112 may, but need not, also include anRFID writer 120 that is configured to write information to the RFID tag102. In response to the mobile device 111 issuing a command to the RFIDreader 112, the RFID reader 112 transmits the interrogation signal 108.In response to the RFID tag 102 receiving the interrogation signal 108,the peripheral device 104 detects an energizing of the RFID tag 102. Theenergizing of the RFID tag 102 provides an indication to the peripheraldevice 104 that a communication link should be established between themobile device 111 and the peripheral device 104.

The mobile device 111 is representative of any communication device thatis operated by persons (or users) or possibly by other entities (e.g.,other computers) desiring or requiring communication capabilities. Insome embodiments, for example, the mobile device 111 may be any of asmartphone, a cellular telephone, a personal digital assistants (PDA),another type of handheld or portable electronic device, a headset, anMP3 player, a battery-powered device, a wearable device, a wristwatch, aradio, a navigation device, a laptop or notebook computer, a netbook, apager, a PMP (personal media player), a DVR (digital video recorder), agaming device, a game interface, a camera, an e-reader, an e-book, atablet device, a navigation device with a video-capable screen, amultimedia docking stations, or another type of electronic mobiledevice.

FIG. 2 is a block diagram illustrating exemplary internal components 200of the mobile device 111 of FIG. 1. As shown in FIG. 2, the components200 include one or more wireless transceivers 202, a processor portion204 (e.g., a microprocessor, microcomputer, application-specificintegrated circuit, etc.), a memory portion 206, one or more outputdevices 208, and one or more input devices 210. In at least someembodiments, a user interface is present that comprises one or moreoutput devices 208, such as a display, and one or more input devices210, such as a keypad or touch sensor. The internal components 200 canfurther include a component interface 212 to provide a direct connectionto auxiliary components or accessories for additional or enhancedfunctionality. The internal components 200 preferably also include apower supply 214, such as a battery, for providing power to the otherinternal components while enabling the mobile device to be portable. Allof the internal components 200 can be coupled to one another, and incommunication with one another, by way of one or more internalcommunication links 232 (e.g., an internal bus).

In the present embodiment of FIG. 2, the wireless transceivers 202particularly include a cellular transceiver 203 and a wireless localarea network (WLAN) transceiver 205. More particularly, the cellulartransceiver 203 is configured to conduct cellular communications, suchas 3G, 4G, 4G-LTE, etc., vis-à-vis cell towers (not shown), albeit inother embodiments, the cellular transceiver 203 can be configuredinstead or additionally to utilize any of a variety of othercellular-based communication technologies such as analog communications(using AMPS), digital communications (using CDMA, TDMA, GSM, iDEN, GPRS,EDGE, etc.), and/or next generation communications (using UMTS, WCDMA,LTE, IEEE 802.16, etc.) or variants thereof.

The WLAN transceiver 205 may, but need not, be configured to conductWi-Fi communications in accordance with the IEEE 802.11 (a, b, g, or n)standard with access points. In other embodiments, the WLAN transceiver205 can instead (or in addition) conduct other types of communicationscommonly understood as being encompassed within Wi-Fi communicationssuch as some types of peer-to-peer (e.g., Wi-Fi Peer-to-Peer)communications. Further, in other embodiments, the WLAN transceiver 205can be replaced or supplemented with one or more other wirelesstransceivers configured for non-cellular wireless communicationsincluding, for example, wireless transceivers employing ad hoccommunication technologies such as HomeRF (radio frequency), Home Node B(3G femtocell), Bluetooth and/or other wireless communicationtechnologies such as infrared technology. Thus, although in the presentembodiment the mobile device 108 has two of the wireless transceivers203 and 205, the present disclosure is intended to encompass numerousembodiments in which any arbitrary number of (e.g., more than two)wireless transceivers employing any arbitrary number of (e.g., two ormore) communication technologies are present.

Exemplary operation of the wireless transceivers 202 in conjunction withothers of the internal components 200 of the mobile device 111 (FIG. 1)can take a variety of forms and can include, for example, operation inwhich, upon reception of wireless signals, the internal componentsdetect communication signals and the transceiver 202 (FIG. 2)demodulates the communication signals to recover incoming information,such as voice and/or data, transmitted by the wireless signals. Afterreceiving the incoming information from the transceiver 202, theprocessor 204 formats the incoming information for the one or moreoutput devices 208. Likewise, for transmission of wireless signals, theprocessor 204 formats outgoing information, which may or may not beactivated by the input devices 210, and conveys the outgoing informationto one or more of the wireless transceivers 202 for modulation tocommunication signals. The wireless transceiver(s) 202 convey themodulated signals by way of wireless and (possibly wired as well)communication links to other devices such as the server 106 and one ormore of the content provider websites (as well as possibly to otherdevices such as a cell tower, access point, or another server or any ofa variety of remote devices).

Depending upon the embodiment, the input and output devices 208, 210 ofthe internal components 200 can include a variety of visual, audioand/or mechanical outputs. For example, the output device(s) 208 caninclude one or more visual output devices 216 such as a liquid crystaldisplay and light emitting diode indicator, one or more audio outputdevices 218 such as a speaker, alarm and/or buzzer, and/or one or moremechanical output devices 220 such as a vibrating mechanism. The visualoutput devices 216 can include, among other things, a video screen.Likewise, by example, the input device(s) 210 can include one or morevisual input devices 222 such as an optical sensor that may, but neednot, be a camera, one or more audio input devices 224 such as amicrophone, and one or more mechanical input devices 226 such as a flipsensor, keyboard, keypad, selection button, navigation cluster, touchpad, touchscreen, capacitive sensor, motion sensor, and switch. Actionsthat can actuate one or more of the input devices 210 can include notonly the physical pressing/actuation of buttons or other actuators, butcan also include, for example, opening the mobile device (if it can takeon open or closed positions), unlocking the device, moving the device toactuate a motion, moving the device to actuate a location positioningsystem, and operating the device.

As shown in FIG. 2, the internal components 200 may also include one ormore of various types of sensors 228. The sensors 228 can include, forexample, proximity sensors (a light detecting sensor, an ultrasoundtransceiver or an infrared transceiver), touch sensors, altitudesensors, a location circuit that can include, for example, a GlobalPositioning System (GPS) receiver, a triangulation receiver, anaccelerometer, a tilt sensor, a gyroscope, or any other informationcollecting device that can identify a current location or user-deviceinterface (carry mode) of the mobile device 108. Although the sensors228 are for the purposes of FIG. 2 considered to be distinct from theinput devices 210, in other embodiments it is possible that one or moreof the input devices can also be considered to constitute one or more ofthe sensors (and vice-versa). Additionally, even though in the presentembodiment the input devices 210 are shown to be distinct from theoutput devices 208, it should be recognized that in some embodiments oneor more devices serve both as input device(s) and output device(s). Forexample, in embodiments where a touchscreen is employed, the touchscreencan be considered to constitute both a visual output device and amechanical input device.

The memory portion 206 of the internal components 200 can encompass oneor more memory devices of any of a variety of forms (e.g., read-onlymemory, random access memory, static random access memory, dynamicrandom access memory, etc.), and can be used by the processor 204 tostore and retrieve data. In some embodiments, the memory portion 206 canbe integrated with the processor portion 204 in a single device (e.g., aprocessing device including memory or processor-in-memory (PIM)), albeitsuch a single device will still typically have distinctportions/sections that perform the different processing and memoryfunctions and that can be considered separate devices.

The data that is stored by the memory portion 206 can include, but neednot be limited to, operating systems, applications, and informationaldata, such as a database. Each operating system includes executable codethat controls basic functions of the communication device, such asinteraction among the various components included among the internalcomponents 200, communication with external devices via the wirelesstransceivers 202 and/or the component interface 212, and storage andretrieval of applications and data, to and from the memory portion 206.In addition, the mobile device 108 can include one or more applications.Each application can include executable code that utilizes an operatingsystem to provide more specific functionality for the communicationdevices, such as file system service and the handling of protected andunprotected data stored in the memory portion 206. Informational data isnon-executable code or information that can be referenced and/ormanipulated by an operating system or application for performingfunctions of the communication device. One such application is clientapplication 132, as shown in FIG. 1, which is provided for performingthe methods described herein.

The client application 132 is intended to be representative of any of avariety of client applications that can perform the same or similarfunctions on any of various types of mobile devices, such as mobilephones, tablets, laptops, etc. The client application 132 is asoftware-based application that operates on the processor portion 204(FIG. 2) and is configured to provide an interface between the mobiledevice 111 (FIG. 1) and one or more others of the components of thesystem 100. In addition, the client application 132 governs operation ofone or more of the input and output devices 210, 208 (FIG. 2). Further,the client application 132 (FIG. 1) may be configured to work inconjunction with a visual interface, such as a display screen, thatallows a user of the mobile device 111 to initiate various actions. Theclient application 132 can take any of numerous forms and, depending onthe embodiment, be configured to operate on, and communicate with,various operating systems and devices. It is to be understood thatvarious processes described herein as performed by the mobile device 111can be performed in accordance with operation of the client application132 in particular, and/or other application(s), depending on theembodiment.

FIG. 3 is a flowchart showing a first illustrative operational sequencethat may be performed by the system of FIG. 1, and particularly by aperipheral device. The operational sequence of FIG. 3 commences at block301 where a peripheral device, such as the peripheral device 104 (FIG.1), is equipped with an RFID tag, such as the RFID tag 102. The RFID tag102 includes a memory device 109 configured for electronically storinginformation, an RF receiver 103 configured for receiving aninterrogation signal 108, and an RF transmitter 105 operatively coupledto the RF receiver 103 and the memory device 109.

At block 302 (FIG. 3), the interrogation signal 108 is received by theRF receiver 103. Next, at block 303 (FIG. 3), the RF transmitter 105(FIG. 1) is configured for: (a) modulating an RF carrier with theelectronically stored information from the memory device 109, and (b)transmitting the modulated RF carrier, in response to the RF receiver103 receiving the interrogation signal 108 at block 302 (FIG. 3). Theoperational sequence of FIG. 3 then progresses to block 305 where thereceived interrogation signal is used to control one or more operationalparameters of the peripheral device 104 (FIG. 1). Illustratively, theone or more operational parameters include powering the peripheraldevice 104 from an “off” state, “sleep” state, or “standby” state to an“on” state. Alternatively or additionally, the one or more operationalparameters include powering the peripheral device 104 from an “on” stateto an “off” state, “sleep” state, or “standby” state.

FIG. 4 is a flowchart showing a second illustrative operational sequencethat may be performed by the system of FIG. 1. The operational sequenceof FIG. 4 commences at block 401 where a mobile device 111 (FIG. 1) isequipped with an RFID reader 112. The RFID reader 112 includes an RFtransmitter 115 for generating the interrogation signal, an RF receiver113 for receiving and demodulating the modulated RF carrier transmittedby the RFID tag, and a processor 114 for controlling the RF receiver 113and the RF transmitter 115.

Next, at block 403, in response to the mobile device 111 (FIG. 1)issuing a command to the RFID reader 112, the RFID reader 112 transmitsthe interrogation signal. The operational sequence of FIG. 4 progressesto block 405 where, in response to the RFID tag 102 (FIG. 1) receivingthe interrogation signal, the peripheral device 104 detects anenergizing of the RFID tag 102. The energizing of the RFID tag 102provides an indication to the peripheral device 104 that a communicationlink should be established between the mobile device 111 and theperipheral device 104.

FIG. 5 is a flowchart showing an illustrative operational sequence forperforming a presence-based procedure for displaying one or moremessages on the peripheral device 104 (FIG. 1). The operational sequenceof FIG. 5 commences at block 501 where a message is received or acceptedat the mobile device 111 (FIG. 1) for subsequent display on theperipheral device 104. Next, at block 503 (FIG. 5), the RFID reader 112(FIG. 1) associated with the mobile device 111 commences reading theRFID tag 102 associated with the peripheral device 104. Thiscommencement of reading the RFID tag 102 triggers the peripheral device104 to wake up a modem 125 and a processor 121 within the peripheraldevice 104. The processor 121 may be operatively coupled to a memory123.

The operational sequence of FIG. 5 progresses to block 505 where theperipheral device 104 (FIG. 1) initiates a communications link to themobile device 111. For purposes of illustration, the communications linkmay, but need not, be a Bluetooth link. At block 506, a test isperformed to ascertain whether or not the mobile device 111 (FIG. 1)detects an initiation of a communications link from the peripheraldevice 104. If so, the program advances to block 507 (FIG. 5) where, inresponse to the mobile device 111 (FIG. 1) detecting an initiation of acommunications link from the peripheral device 104, the mobile device111 completes an establishment of the initiated communications link anddelivers the message to the peripheral device 104. The negative branchfrom block 506 leads to block 509 (FIG. 5) where, in response to themobile device 111 (FIG. 1) not detecting an initiation of acommunications link from the peripheral device 104, the mobile devicedisplays the received message or conveys an error message to the user.

The operational sequence of FIG. 5 ensures that the mobile device 111(FIG. 1) attempts to display messages on the peripheral device 104 onlywhen the peripheral device 104 is within communication range of themobile device 111 (for example, when the peripheral device is a watchworn by the user and the mobile device is a smartphone in the user'spossession). The trigger of commencing the reading of the RFID tag 102at block 503 (FIG. 5) can also be used to notify the user of the mobiledevice 111 (FIG. 1) in any of a number of ways. For example, when theRFID tag 102 on the peripheral device 104 is read, the peripheral device104 can power an LED on the peripheral device 104 indicating to the useran arrival of the message at either the mobile device 111, or theperipheral device 104, or both. The power supplied to the LED can, butneed not, be derived solely from the RFID tag 102 reading activity fromthe RFID reader 112, without involving an additional power source (suchas a battery) or a processor on the peripheral device 104. For example,RF power transmitted from the RFID reader 112 and received by the RFIDtag 102 may be used to illuminate the LED.

FIG. 6 is a flowchart showing an illustrative operational sequence forperforming a fast wakeup of the peripheral device 104 (FIG. 1) so thatthe peripheral device 104 is prepared for handling an incoming call orconnection. The operational sequence of FIG. 6 commences at block 601where the mobile device 111 (FIG. 1) receives an incoming call or anincoming request for a connection. Next, at block 603, establishing afirst connection between the mobile device 111 and the peripheral device104 is performed at least partially in parallel with establishing asecond connection between the mobile device 111 and a network that is incommunication with the mobile device 111. This parallelization cansignificantly reduce the chances of the peripheral device 104 not beingready when the call/connection to the network is established. Forexample, the establishment of the first connection can be initiated whenthe user takes actions to place a voice call (such as launching a voicecalling service or a dial-pad on the phone). In another example, theestablishment of the first connection can be initiated when the mobiledevice receives a page message from the cellular network and prior totransmitting a response to the page message.

The operational sequence of FIG. 6 progresses to block 605 where themobile device 111 (FIG. 1) receives a paging message from the network.Illustratively, the network is a cellular network. Next, at block 607,the mobile device 111 (FIG. 1) commands the RFID reader 112 to performan RFID read of the RFID tag 102 to activate the peripheral device 104.Accordingly, the mobile device 111-peripheral device 104 connection isestablished in parallel with the mobile device 111- network connection.

FIG. 7 is a flowchart showing an illustrative operational sequence forusing the RFID tag 102 to read, record, or assess a battery status forthe peripheral device 104 (FIG. 1). The peripheral device 104 writes itsbattery status to the memory device 109 of the RFID tag 102. The batterystatus may comprise a battery depletion status indicator that isindicative of battery power being depleted below a predetermined orspecified threshold. This threshold may be determined with respect to aminimum amount of voltage, a minimum amount of current draw, or aminimum power draw required for proper operation of the peripheraldevice 104.

The operational sequence of FIG. 7 commences at block 701 where, inresponse to the peripheral device 104 (FIG. 1) depleting its batterypower below a predetermined or specified threshold, the batterydepletion status indicator is set (written) in the memory device 109 ofthe RFID tag 102. Next, at block 703 (FIG. 7), the mobile device 111(FIG. 1) initiates a wake-up of the peripheral device 104 by commencinga reading of the RFID tag 102 by the RFID reader 112.

The operational sequence of FIG. 7 continues to block 705 where the RFIDreader 112 (FIG. 1) receives information from the RFID tag 102 includingthe set battery depletion status indicator. The information is sent fromthe RFID reader 112 to the mobile device 111 at block 707 (FIG. 7). Thisinformation serves as an indication to the mobile device 111 (FIG. 1)that the peripheral device 104 is not going to respond to an activationof the RFID tag 102. Accordingly, at block 709, the mobile device 111(FIG. 1) ceases trying to wake up the peripheral device 104.

Alternatively or additionally, block 701 of FIG. 7 may include writingthe battery depletion status indicator to the RFID tag 102 (FIG. 1) soas to enable a proactive charging of the peripheral device 104 using acharging apparatus such as an inductive charging mat. Such a chargingapparatus may be configured to charge one or more batteries of otherdevices such as the mobile device 111 or the peripheral device 104, andmay be further configured to read the RFID tag 102 to determine thebattery status of the peripheral device 104 in order to determine if thecharging apparatus should charge that peripheral device 104. Forexample, battery charging may be initiated in response to the retrievedstored battery charge level indicating a battery charge level below anoptimum threshold. ‘An extension of this idea would be to have separateRFID tags on each of a plurality of batteries. Use of separate RFID tagsenables monitoring of a set of removable batteries.

FIG. 8 is a flowchart showing an illustrative operational sequence forusing the RFID tag 102 of FIG. 1 to optimize wireless scanning andconnection establishment. The RFID reader 112 may, but need not, beconfigured for writing to the RFID tag 102. If so configured, then datathat is written to the RFID tag 102 by the RFID reader 112 is thenaccessible to the peripheral device 104 when access to the data isneeded. The flowchart of FIG. 8 illustrates how the RFID tag 102(FIG. 1) can be used to minimize a scanning operation for initiating andsetting up WiFi access at a WiFi-enabled peripheral device such as theperipheral device 104, assuming that a user has access to the mobiledevice 111 and the RFID reader 112 associated therewith.

The operational sequence of FIG. 8 commences at block 801 where themobile device 111 (FIG. 1) commands the RFID reader 112 to perform anRFID read operation to attempt to read the RFID tag 102 associated withthe peripheral device 104. At block 803 (FIG. 8), in response to theRFID tag 102 of the peripheral device 104 being successfully read, themobile device 111 commands the RFID reader 112 to write a set of WiFiaccess point (AP) parameters to the RFID tag 102. Illustratively, theset of WiFi AP parameters include: (a) a WiFi AP service setidentification (SSID), (b) a frequency, and (c) a security key.

The operational sequence of FIG. 8 progresses to block 805 where theperipheral device 104 (FIG. 1) is awakened or powered to an “on” statein response to the RFID tag 102 being successfully read by the RFIDreader 112 at block 801 (FIG. 8). Next, at block 807, subsequent to theperipheral device 104 (FIG. 1) being awakened, the peripheral device 104uses the set of WiFi AP parameters to establish a WiFi connection to theAP. At block 809 (FIG. 8), when the WiFi AP information changes (e.g.,due to a user with the mobile device 111 (FIG. 1) and the peripheraldevice 104 moving to a different location), then the mobile device 104repeats the operations of blocks 801 through 807 (FIG. 8).

Techniques similar to those described with reference to blocks 801-809may be employed to facilitate or speed up a Bluetooth connection to theperipheral device 104 (FIG. 1). For example, instead of or in additionto the RFID reader 112 writing the set of WiFi AP parameters to the RFIDtag 102 at block 803 (FIG. 8), the RFID reader 112 (FIG. 1) writes aBluetooth security code to the RFID tag 102.

The peripheral device 104 may, but need not, have the capability tocommunicate with one or more cellular networks. For situations in whichthe peripheral device 104 is capable of communicating with a cellularnetwork, the RFID tag 102 can be used to speed up a procedure forlocating an appropriate cell of the cellular network for establishing acommunications link to the cellular network. For example, the mobiledevice 111 may learn relevant network parameters of the cellular networkand then command the RFID reader 112 to write such parameters to theRFID tag 102. These network parameters are then used by the peripheraldevice 104 when a communications link is to be established between theperipheral device 104 and the cellular network. Examples of such networkparameters may include a public land mobile network identifier (PLMNID), a carrier frequency, and a paging cycle.

Illustratively, the RFID tag 102 may be used to enable a subscriberidentity module (SIM) or universal subscriber identity module (USIM)emulation between the mobile device 111 and the peripheral device 104.Parameters needed to enable the peripheral device 104 to use theSIM/USIM credentials of the mobile device 111 are written to a securememory location of the RFID tag 102, such as the memory device 109.These parameters may then be accessed by the peripheral device 104 whichuses the parameters to establish a communications link with the cellularnetwork.

In any of the foregoing examples, the peripheral device 104 may, butneed not, represent a laptop computer, a personal computer, a tabletdevice, or any other type of computer. For example, if a computer isequipped or associated with the RFID tag 102, the mobile device 111 canuse the RFID reader 112 to write one or more WiFi connection parametersto the RFID tag 102 as described previously to enable the computer toconnect to a Wi-Fi network.

According to a further set of embodiments disclosed herein, a maximumcommunication range between the RFID reader 112 and the RFID tag 102 maybe employed in conjunction with the procedure of FIG. 8 toadvantageously filter a plurality of available Bluetooth connections, orto advantageously filter a plurality of available WiFi access points, orboth. For example, a plurality of available Bluetooth connections may befiltered to identify a subset of one or more Bluetooth connections fromthe plurality of available Bluetooth connections. The subset maycorrespond to devices that are in relatively close proximity to themobile device 111 relative to at least one other available Bluetoothconnection from the plurality of available Bluetooth connections.Likewise, a plurality of available WiFi access points may be filtered toidentify a subset of one or more WiFi access points from the pluralityof available WiFi access points. The subset may correspond to WiFiaccess points that are in relatively close proximity to the mobiledevice 111 relative to at least one other available WiFi access pointfrom the plurality of available WiFi access points.

The use of a maximum communication range between the RFID tag 102 andthe RFID reader 112 may be useful in a crowded environment such as anoffice or public location. In these types of environments, when themobile device 111 is attempting to establish a connection with theperipheral device 104, it is highly likely that many peer peripheraldevices will be discovered for a potential connection, and theperipheral device 104 that is of interest may not even be in acommunication range that enables RF communication between the RFID tag102 and the RFID reader 112. For example, there may be many peerperipheral devices offering a WiFi Peer-to-peer connectivity service orBluetooth service. When there are a large number of such devices,isolating the device of interest may consume additional battery powerand processing capability. Thus, as described previously, the RFID tag102 and the RFID reader 112 may be used to quickly optimize the searchfor appropriate WiFi access points or Bluetooth connections or both. Forexample, the mobile device 111 can first command the RFID reader 112 toattempt an RFID read operation of the RFID tag 102 to determine if theperipheral device 104 of interest is in close proximity. If the RFIDreader 112 is able to read the RFID tag 102 of the peripheral device 104(indicating that the peripheral device 104 is in close proximity), thenthe mobile device 111 can attempt to establish a peer-to-peer connectionvia WiFi or Bluetooth. The RFID read operation of the RFID tag 102 canalso provide connectivity parameters (such as identifiers) to help makethe peer-to-peer connection establishment quicker.

FIG. 9 is a flowchart showing an illustrative operational sequence forusing the RFID tag 102 of FIG. 1 to improve an authentication procedurefor accessing the mobile device 111. The flowchart of FIG. 9 illustratesan improved authentication procedure that reduces or eliminates the needfor a user to frequently re-enter his or her password. Illustratively,the mobile device 111 may, but need not, be a smartphone or tabletdevice. In the context of FIG. 9, it is assumed that the user's mobiledevice 111 is equipped with an RFID reader 112. The RFID reader 112 isused with a physically separate RFID tag 102. The RFID tag 102 may be ina key fob or a badge, or the RFID tag 102 may be part of the peripheraldevice 104. The peripheral device may, but need not, be a smart-watch orany other wearable device.

The operational sequence of FIG. 9 commences at block 901 where themobile device 111 (FIG. 1) authenticates a user biometrically, or byreceiving a password from the user. Next, at block 903 (FIG. 9), themobile device 111 (FIG. 1) commands the RFID reader 112 to initiate areading of the RFID tag 102 (FIG. 1) of the peripheral device 104. Inresponse to a successful reading of the RFID tag 102 by the RFID reader112, the mobile device 111 writes a code to the RFID tag 102 at block905 (FIG. 9). The code may, but need not, include a time stamp basedupon a current time of day.

At block 907, the mobile device 111 (FIG. 1) commands the RFID reader112 to initiate a read operation of the RFID tag 102. Next, at block 909(FIG. 9), a test is performed to ascertain whether or not the RFID tag102 (FIG. 1) was successfully read by the RFID reader 112. If so, theprogram progresses to block 909 where, in response to the RFID tag 102being successfully read by the RFID reader 112, and optionally also inresponse to the time stamp of block 905 (FIG. 9) being no older than apredetermined or specified amount of time, the user is considered to beauthenticated, and the mobile device 111 (FIG. 1) is unlocked. As anexample, block 907 can be performed in response to the user trying tointeract with the phone (for example, via the display).

The negative branch from block 908 (FIG. 9) leads to block 911 where, inresponse to the RFID tag 102 (FIG. 1) not being successfully read by theRFID reader 112 (for example, the RFID tag 102 is not near the mobiledevice 111), the user may be authenticated, by the mobile device,biometrically or using a manually entered password. From block 909 orblock 911, the operational sequence of FIG. 9 then progresses to block913 where, each time that the user is successfully authenticated using amanually entered password or biometrically, the mobile device 111(FIG. 1) instructs the RFID reader 112 to initiate a writing of a freshcode or time stamp to the RFID tag 102 on the peripheral device 104.

Optionally, in response to the fresh code or time stamp being written atblock 913 (FIG. 9), and for purposes of illustration, while the user isin possession of the peripheral device 104 (FIG. 1), the mobile device111 may be programmed such that a predetermined or specified amount oftime must elapse until the user would once again need to reenter apassword or perform biometric authentication. For example, the freshnessof the code or time stamp on the RFID tag 102 associated with theperipheral device 104 guarantees the authenticity of the user. Theuser's need to reenter the password on the mobile device could belimited to situations when (a) the code or time stamp stored in thememory device 109 of the RFID tag 102 is outdated, or (b) the RFID tag102 is not near the mobile device.

FIG. 10 is a flowchart showing an illustrative operational sequence forusing the RFID tag 102 of FIG. 1 to provide a robust user authenticationprocedure for accessing the mobile device 111. More specifically, theprocedure of FIG. 10 describes a more robust alternative to theconventional password/security personal identification number (PIN) thatis entered to authenticate the user. It is assumed that the user (a) hasa mobile device 111 (FIG. 1) equipped with an RFID reader 112, and (b) aperipheral device 104 that is physically separate from the mobile device111 and that is equipped with the RFID tag 102.

The operational sequence of FIG. 10 commences at block 1001 where themobile device 111 (FIG. 1) commands the RFID reader 112 to write a codeto the RFID tag 102 of the peripheral device 104. Next, at block 1003(FIG. 10), the peripheral device 104 (FIG. 1) generates an audibleoutput, a visual output, an electronic output, or any combination ofaudible, visual, and electronic outputs, where the audible, visual, orelectronic output is indicative of the code. Using the audible, visual,or electronic output of the peripheral device 104, a predeterminedcomputation is performed at block 1005 (FIG. 10) to generate a new code.This predetermined computation may be performed, for example, by theuser, or by the peripheral device 104 (FIG. 1), or by both the user andthe peripheral device 104. This predetermined computation may, but neednot, be a simple computation that would be relatively easy for users toremember. One illustrative example of the predetermined computation ofblock 1005 (FIG. 10) could be a reversal of the digits/characters of thecode, or a pre-defined reordering of the digits/characters of the code.Then, at block 1007 (FIG. 10), the new code generated at block 1005 isinput into the mobile device 111 (FIG. 1) and serves to authenticate theuser, such that the mobile device 111 is unlocked.

The procedure of FIG. 10 provides a relatively secure RFID-based methodfor controlling access to the mobile device 111 (FIG. 1) relative tousing conventional passwords due to the following considerations. First,use of the peripheral device 104 as a part of the authentication processmakes it difficult or impossible to unlock and access the mobile device111 without having access to the peripheral device 104. Second, the codethat is used changes each time, making it useless for someone to spy thecode being entered, or to intercept the code sent to the peripheraldevice 104. Third, the user computation of block 1005 (FIG. 10)eliminates the risk of illegal unlocking and access if both the mobiledevice 111 (FIG. 1) and the peripheral device 104 are stolen.

FIG. 11 is a flowchart showing an illustrative operational sequence forproviding a robust user authentication procedure for unlocking andaccessing the mobile device 111 (FIG. 1) without using RFID technology.It is assumed that the user is in possession of the peripheral device104 (which may, but need not, be a smart watch) in addition to themobile device 111. The operational sequence of FIG. 11 commences atblock 1101 where the mobile device 111 (FIG. 1) establishes acommunications link to the peripheral device 104 using a wirelesscommunication technology. Illustratively, the wireless communicationtechnology is Bluetooth or WiFi. At block 1103 (FIG. 11), once thecommunications link to the peripheral device 104 is established, themobile device 111 (FIG. 1) enters a peripheral authentication mode. Whenthe mobile device 111 is in the peripheral authentication mode, thissignifies that the peripheral device 104 is to be used for userauthentication.

The operational sequence of FIG. 11 progresses to block 1105 where theuser performs a specific pre-defined action on the peripheral device 104(FIG. 1), which causes the peripheral device 104 to send an indicationto the mobile device 111. At block 1107 (FIG. 11), the indication isreceived by the mobile device 111 (FIG. 1), causing the mobile device111 to become unlocked. Illustrative examples of the pre-defined actionare (a) touching the peripheral device 104 (e.g., touching the displayof a smart-watch), (b) entering a code or a password on the peripheraldevice 104, or (c) a user defined touch gesture.

The mobile device 111 may be programmed such that, when in peripheralauthentication mode, the user cannot unlock the mobile device 111directly via the user interface of the mobile device 111. When thewireless communications link between the mobile device 111 and theperipheral device 104 is broken, the mobile device 111 reverts toconventional user authentication via the user interface of the mobiledevice 111.

FIG. 12 is a flowchart showing an illustrative operational sequence forproviding a two-factor authentication procedure for granting access to aphysical premises according to a set of illustrative embodiments. Theoperational sequence of FIG. 12 may be utilized to eliminate or reducethe problem of unintended or unauthorized access when a key fob, badge,or access card containing an RFID tag 102 (FIG. 1) is lost or stolen. Itis assumed herein that a user whose key fob, badge, or access card hasbeen lost or stolen (a) has a mobile device 111 equipped with an RFIDreader 112, and (b) a physically separate RFID tag 102. The RFID tag 102may be in the key fob or badge, or the RFID tag 102 may be part of anaccessory device such as a smart-watch.

In the set of embodiments described with reference to FIG. 12, it isassumed that the RFID reader 112 (FIG. 1) also includes an RFID writerconfigured to write information to the RFID tag 102. The operationalsequence of FIG. 12 commences at block 1201 where the RFID reader 112(FIG. 1) associated with the mobile device 111 writes a code to the RFIDtag 102. The code may, but need not, include a timestamp based on thetime of day. Next, at block 1203 (FIG. 12), in response to a detectionof a key fob, badge, or accessory device equipped with an RFID tag 102approaching a point of entry to a physical premises (which is indicativeof the user who possesses the RFID tag approaching the physicalpremises), a second RFID reader associated with the point of entryperforms an RFID read of the RFID tag 102.

The operational sequence of FIG. 12 progresses to block 1205 where, inresponse to the second RFID reader: (a) successfully identifying andvalidating the RFID tag 102, (b) reading the code that was written tothe RFID tag at block 1201, and (c) determining that the code is noolder than a predetermined or pre-configured duration as determined, forexample, from a time stamp in the code, then the user is authenticatedand allowed access to the physical premises. At block 1207 (FIG. 12), inresponse to the code being older than the predetermined orpre-configured duration, or in response to the RFID tag 102 (FIG. 1) notbeing successfully validated, the user is not allowed access to thephysical premises. If the second RFID reader successfully identifies theRFID tag 102 and the code is older than the pre-configured duration, itis an indication that the RFID tag 102 may not be near the mobile device111 and hence may be stolen. The foregoing procedure may require thatthe second RFID reader have knowledge of the time of day.

The operational sequence of FIG. 12 may, but need not, be enhanced ormodified as follows. For example, the mobile device 111 (FIG. 1) may notwrite the code to the RFID tag 102 unless the user has beenauthenticated biometrically or using a password. This added safeguard isto eliminate the possibility of someone stealing a user's mobile device111 and programming the RFID tag 102 to gain access to the premises.Pursuant to another exemplary embodiment, the procedure of FIG. 12 maybe performed such that the mobile device 111 writes one or more codes tothe RFID tag 102 based on information received or stored at the mobiledevice 111 that identifies or specifies the location of the mobiledevice. For example, when the location of the mobile device 111 is closeto the user's work location, a code is written to the RFID tag 102. Theforegoing procedure avoids unnecessary writing of the code to the RFIDtag 102 (and the associated power consumption).

According to another exemplary embodiment, the procedure of FIG. 12 maybe configured such that a single RFID tag 102 can be used to enablesecure access to multiple locations. For example, an identifying RFIDtag 102 is placed at each of a plurality of doors or points of entryrequiring authentication for access. Each RFID tag 102 may be associatedwith a specific door or point of entry, or a specific type of door, or aspecific type of point of entry. For example, if the RFID tag 102 isplaced on a residential premises, the RFID tag is associated with a homedoor, whereas if the RFID tag 102 is placed on a car door, thisindicates that the RFID tag is controlling access to a vehicle.Accordingly, a user wanting to enter a particular location launches anapplication on the mobile device 111. The mobile device 111 thenperforms an RFID read of the RFID tag 102. Based on the RFID read, themobile device 111 determines the type of premises the user is trying toenter. The mobile device 111 then programs the RFID tag 102 (forexample, in a key fob in the user's possession) with the code asdescribed previously. The user then scans the RFID tag 102 (key fob) toaccess the premises.

The aforementioned operational sequences of FIGS. 3-12 are merelyexamples that are intended to be encompassed by the present disclosure.The present disclosure is intended to encompass numerous other mannersof operation in addition to those specifically described previously.Numerous other examples of operation of the system 100 in accordancewith the process of FIGS. 3-12, or variations of these processes, can beenvisioned and are encompassed herein.

For example, in at least some embodiments, the present disclosurerelates to a peripheral device that is equipped with an RFID tag. TheRFID tag includes a memory device configured for electronically storinginformation, an RF receiver configured for receiving an interrogationsignal, and an RF transmitter operatively coupled to the RF receiver andthe RF transmitter, and configured for modulating an RF carrier with theelectronically stored information and transmitting the modulated RFcarrier in response to the RF receiver receiving the interrogationsignal. The received interrogation signal is used to control one or moreoperational parameters of the peripheral device. Illustratively, the oneor more operational parameters include powering the peripheral device toan “on” state.

According to a set of further embodiments of the present invention, amobile device is equipped with an RFID reader. The RFID reader includesan RF transmitter for generating the interrogation signal and an RFreceiver for receiving and demodulating the modulated RF carriertransmitted by the RFID tag. In response to the mobile device issuing acommand to the RFID reader, the RFID reader transmits the interrogationsignal. In response to the RFID tag receiving the interrogation signal,the peripheral device detects an energizing of the RFID tag. Theenergizing of the RFID tag provides an indication to the peripheraldevice that a communication link should be established between themobile device and the peripheral device.

It should be appreciated that one or more embodiment encompassed by thepresent disclosure are advantageous in one or more respects.

Thus, it is specifically intended that the present disclosure not belimited to the embodiments and illustrations contained herein, butinclude modified forms of those embodiments including portions of theembodiments and combinations of elements of different embodiments ascome within the scope of the following claims.

What is claimed is:
 1. A method comprising: configuring an RFID tag tostore information related to a battery charge level of a battery of aperipheral device; reading the RFID tag; and disabling a subsequentreading of the RFID tag in response to determining that the RFID tagincludes stored information indicative of the battery charge level beinglow or depleted.
 2. The method of claim 1 further comprising initiatinga charging of the battery in response to determining that the RFID tagincludes stored information indicative of the battery charge level beinglow or depleted.
 3. The method of claim 2 further comprising initiatingthe charging of the battery using an inductive charging mat.
 4. Themethod of claim 3 further comprising configuring the inductive chargingmat to include the RFID reader.
 5. The method of claim 1 furthercomprising configuring the peripheral device to include a plurality ofrespective batteries each equipped with a corresponding RFID tag.
 6. Amethod comprising: storing information in an RFID tag related to abattery charge level of a peripheral device; reading the RFID tag toretrieve the stored battery charge level; and determining whether or notto communicate with the peripheral device in response to the retrievedstored battery charge level.
 7. The method of claim 6 whereindetermining whether or not to communicate with the peripheral deviceincludes not attempting to communicate with the peripheral device inresponse to the retrieved stored battery charge level being below athreshold or indicating a zero operational battery charge.
 8. The methodof claim 6 where determining whether or not to communicate with theperipheral device includes not attempting to awaken the peripheraldevice for placing the device into an active state for communication inresponse to the retrieved stored battery level indicating that a batterycharge level is below a threshold, or indicating a zero operationalbattery charge.
 9. The method of claim 6 wherein determining whether ornot to communicate with the peripheral device includes initiating acharging of a battery of the peripheral device in response to theretrieved stored battery charge level indicating a battery charge levelis below a threshold, or indicating a zero operational battery charge.10. An apparatus comprising: an RFID tag configured to store informationrelated to a battery charge level of a battery of a peripheral device;an RFID reader configured for reading the RFID tag; and a mobile device,operatively coupled to the RFID reader, and configured for disabling asubsequent reading of the RFID tag in response to determining that theRFID tag includes stored information indicative of the battery chargelevel being low or depleted.
 11. The apparatus of claim 10 wherein acharging of the battery is initiated in response to determining that theRFID tag includes stored information indicative of the battery chargelevel being low or depleted.
 12. The apparatus of claim 11 furthercomprising an inductive charging mat configured for initiating thecharging of the battery.
 13. The apparatus of claim 12 wherein theinductive charging mat is configured to include the RFID reader.
 14. Theapparatus of claim 10 wherein the peripheral device is configured toinclude a plurality of respective batteries each equipped with acorresponding RFID tag.
 15. An apparatus comprising: an RFID tagconfigured for storing information related to a battery charge level ofa peripheral device; an RFID reader configured for reading the RFID tagto retrieve the stored battery charge level; and a mobile device,operatively coupled to the RFID reader, and configured for determiningwhether or not to communicate with the peripheral device in response tothe retrieved stored battery charge level.
 16. The apparatus of claim 15wherein the mobile device is further configured to not attempt tocommunicate with the peripheral device in response to the retrievedstored battery charge level being below a threshold or indicating a zerooperational battery charge.
 17. The apparatus of claim 15 wherein themobile device is further configured to not attempt to awaken theperipheral device for placing the device into an active state forcommunication in response to the retrieved stored battery levelindicating that a battery charge level is below a threshold, orindicating a zero operational battery charge.
 18. The apparatus of claim15 further comprising a battery charger configured to initiate acharging of a battery of the peripheral device in response to theretrieved stored battery level indicating a battery charge level isbelow a threshold, or indicating a zero operational battery charge. 19.An apparatus comprising: an RFID tag configured for storing informationrelated to a battery charge level of a peripheral device; an RFID readerconfigured for reading the RFID tag to retrieve the stored batterycharge level; and a battery charger, operatively coupled to the RFIDreader, and configured to initiate a charging of a battery of theperipheral device in response to the retrieved stored battery chargelevel indicating a battery charge level below an optimum threshold. 20.The apparatus of claim 19 wherein the battery charger comprises aninductive charging mat.