GB2426615A - Proximity key - Google Patents

Proximity key Download PDF

Info

Publication number
GB2426615A
GB2426615A GB0510603A GB0510603A GB2426615A GB 2426615 A GB2426615 A GB 2426615A GB 0510603 A GB0510603 A GB 0510603A GB 0510603 A GB0510603 A GB 0510603A GB 2426615 A GB2426615 A GB 2426615A
Authority
GB
United Kingdom
Prior art keywords
key
equipment
software
distance
locking function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0510603A
Other versions
GB0510603D0 (en
GB2426615B (en
Inventor
Charles Richard Whiteman
Conor O'reilly
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0510603A priority Critical patent/GB2426615B/en
Publication of GB0510603D0 publication Critical patent/GB0510603D0/en
Publication of GB2426615A publication Critical patent/GB2426615A/en
Application granted granted Critical
Publication of GB2426615B publication Critical patent/GB2426615B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A proximity Key system consisting of two parts (the Key and the Software) prevents electronic equipment being used unless the Key-holder is nearby. The Key is a battery powered electrical device able to communicate via encoded radio waves. The Software configures programmable electrical equipment so that it can communicate with the Key (e.g. via Bluetooth<TM> technology) and estimate distance between the equipment and the Key. Use prevention is achieved by automatic locking of the equipment's central processing unit when a pre-selected distance between the Key and the equipment is exceeded. The equipment is unlocked by the user manually inputting a password or the Key moving back within the pre-selected distance. The Key and equipment (via the Software) can also be configured to emit a visual, audible or vibrating alarm when the pre-selected distance is exceeded.

Description

DESCRIPTION
Proximity Key The invention is an electronic security device. It has been designed to prevent electronic equipment being used unless the key-holder is nearby. Use prevention is achieved by locking the equipment's central processing umt. The invention could be used with equipment such as (but not limited to): computers mobile phones personal digital assistants mobile entertainment devices The invention is made up of two parts - an electronic key (the "Key") and the related software (the "Software"). The invention can be added to a piece of equipment at: the time of production - by the manufacturer any time after production - by the owner of the equipment (if it is programmable) Key The Key is a small battery powered electronic device which can communicate via encoded radio waves. It is able to pair itself with electronic equipment ("Paired Equipment") using a publicly available radio frequency. Pairing enables the Key to
technology). It can be configured with: a distance measurement system or systems an alarm triggering system an alarm or alarms (visual/audible/vibrating) Software The Software is written in a form that can be downloaded by Paired Equipment (e.g. via the internet, a data storage device, mobile phone networks or a computer). It enables the Paired Equipment to communicate with the Key using radio waves and recognise whether radio signals have been transmitted by the Key (e.g. by using Bluetooth technology). The Software allows Paired Equipment to be configured with: a distance measurement system or systems an electronic locking function or functions (the "Locking Function") an alarm triggering system an alarm or alarms (visual/audible/vibrating) The Software allows the user to set: the method by which distance between the Paired Equipment and the Key is calculated the trigger distance for the Locking Function and alarm(s) the operation mode required by the user Distance measurement The invention enables Paired Equipment to estimate the distance between itself and the Key. This can be done by a number of methods including: signal strength the delay in receiving a "response signal" from the Key when a "request signal" has been sent by the Paired Equipment Trigger distance The invention allows the user to program the Paired Equipment with a trigger distance. This is the distance between the Key and the Paired Equipment at which the Locking Function and alarm(s) are activated (if switched on). Security functions The invention configures Paired Equipment with a Locking Function to prevent it being used when the trigger distance is exceeded. The function blocks access to the Paired Equipment's central processing unit. There are a number of systems currently in existence - the one most relevant to this invention is the password protected key-lock system. Both the Key and Paired Equipment can also be configured with alarms. These alert the Key-bolder when the trigger distance has been exceeded. The alarms can be visual, audible or vibrating. Operation modes Mode 1: The Locking Function is activated when the trigger distance is exceeded. The function can only be de-activated by the user manually inputting a password. Mode 2: The same as mode I except that the Locking Function is automatically deactivated if the Key moves back within the trigger distance. Alarm functions: These can be activated in the same way as the Locking Function. The type of alarm signal and its duration can be pre-selected by the user.

Claims (1)

  1. CLAIMS Proximity Key A proximity key system consisting of two parts - the "Key" and the "Software" which prevents electronic equipment being used unless the Key is within a preselected distance from the equipment. A Key (as claimed in Claim 1) which is a battery powered electrical device able to communicate with equipment (programmed with the Software) by emitting and receiving encoded radio waves e.g. by using Bluetooth technology. A Key (as claimed in Claim 2) configured with a distance measuring system or systems. A Key (as claimed in Claim 2) which can be configured with an alarm triggering system. A Key (as claimed in Claim 2) which can be configured with an alarm or alarms (audible/visual/vibrating). A Key (as claimed in Claim 2) which has switches enabling its alarms (as claimed in claim 5) to be turned on or off. Software (as claimed in Claim 1) which can be downloaded by equipment to enable the equipment ("Paired Equipment") to communicate with the Key by sending and receiving encoded radio waves e.g. by using Bluetooth technology. Software (as claimed in Claim 7) which can program Paired Equipment with a distance measurement system or systems. Software (as claimed in Claim 7) which enables Paired Equipment to estimate the distance between itself and the Key via radio communication between itself and the Key. Software (as claimed in Claim 7) which can lock the central processing unit of Paired Equipment (the "Locking Function") e.g. by activating the equipment's password protected key-lock. Software (as claimed in Claim 7) which enables the user, via Paired Equipment, to adjust the distance at which the Locking Function (as claimed in Claim 10) and alarm(s) (as claimed in Claims 5 and 17) are triggered (the "Trigger Distance"). Software (as claimed in Claim 7) which can activate the Locking Function (as claimed in Claim 10) when the Trigger Distance is exceeded. . Software (as claimed in Claim 7) which allows different modes to be selected for the Locking Function (as claimed in Claim 10). Software (as claimed in Claim 7) which programs Paired Equipment with a Locking Function mode that requires manual unlocking (e.g. by entering a password) after the Trigger Distance has been exceeded. Software (as claimed in Claim 7) which programs Paired Equipment with a Locking Function mode that automatically de-activates the Locking Function when the Key moves back within the Trigger Distance. Software (as claimed in Claim 7) which programs Paired Equipment with an alarm triggering system. Software (as claimed in Claim 7) which programs Paired Equipment with an alarm or alarms (audible/visual/vibrating). Software (as claimed in Claim 7) which allows the user to prc-select which (if any) of the Paired Equipment's and Key's alarms are activated when the Trigger Distance is exceeded. Software (as claimed in Claim 7) which allows the user to pre-select how long the alarms (as claimed in Claims 5 and 17) operate for.
GB0510603A 2005-05-25 2005-05-25 Proximity key with alarm function Expired - Fee Related GB2426615B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0510603A GB2426615B (en) 2005-05-25 2005-05-25 Proximity key with alarm function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0510603A GB2426615B (en) 2005-05-25 2005-05-25 Proximity key with alarm function

Publications (3)

Publication Number Publication Date
GB0510603D0 GB0510603D0 (en) 2005-06-29
GB2426615A true GB2426615A (en) 2006-11-29
GB2426615B GB2426615B (en) 2010-03-03

Family

ID=34834578

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0510603A Expired - Fee Related GB2426615B (en) 2005-05-25 2005-05-25 Proximity key with alarm function

Country Status (1)

Country Link
GB (1) GB2426615B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5821854A (en) * 1997-06-16 1998-10-13 Motorola, Inc. Security system for a personal computer
GB2341061A (en) * 1998-06-16 2000-03-01 Nec Corp Portable data communication terminal with separate user authenticating security device in radio communication with the terminal
US6189105B1 (en) * 1998-02-20 2001-02-13 Lucent Technologies, Inc. Proximity detection of valid computer user
US20030074575A1 (en) * 2001-10-11 2003-04-17 Hoberock Tim M. Computer or computer resource lock control device and method of implementing same
WO2003049051A1 (en) * 2001-11-29 2003-06-12 Ensure Technologies, Inc. Method of securing access to a user having an enhanced security proximity token
EP1404083A2 (en) * 2002-09-30 2004-03-31 Harris Corporation Removable cryptographic ignition key system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5821854A (en) * 1997-06-16 1998-10-13 Motorola, Inc. Security system for a personal computer
US6189105B1 (en) * 1998-02-20 2001-02-13 Lucent Technologies, Inc. Proximity detection of valid computer user
GB2341061A (en) * 1998-06-16 2000-03-01 Nec Corp Portable data communication terminal with separate user authenticating security device in radio communication with the terminal
US20030074575A1 (en) * 2001-10-11 2003-04-17 Hoberock Tim M. Computer or computer resource lock control device and method of implementing same
WO2003049051A1 (en) * 2001-11-29 2003-06-12 Ensure Technologies, Inc. Method of securing access to a user having an enhanced security proximity token
EP1404083A2 (en) * 2002-09-30 2004-03-31 Harris Corporation Removable cryptographic ignition key system and method

Also Published As

Publication number Publication date
GB0510603D0 (en) 2005-06-29
GB2426615B (en) 2010-03-03

Similar Documents

Publication Publication Date Title
US9953190B2 (en) System including a portable storage device equipped with a user proximity detector and method of preventing the loss thereof
US8115609B2 (en) Multi function bluetooth apparatus
US7190264B2 (en) Wireless computer monitoring device with automatic arming and disarming
US8750797B2 (en) Proximity access and alarm apparatus
US9222285B1 (en) Theft deterrent device and method of use
US20150109126A1 (en) Child Monitoring System
JP5703196B2 (en) Portable machine
US20110086632A1 (en) Object range detector and lock down device
WO2013023091A2 (en) Proximity tag
JP2007019719A (en) Portable terminal device, radio communication unit and usage restricting system
US20110175733A1 (en) Silent anti-theft protection system for goods presented to the public
US20170136989A1 (en) Portable, self-contained anti-theft vehicle alarm system with automatic proximity control
US8830061B2 (en) Portable reverse alarm system
JP2005151392A (en) Mobile communication terminal equipped with missing/illegal use preventing function
JP2007019718A (en) Mobile terminal device and use limitation system
RU149834U1 (en) ALARM SYSTEM WITH ALARM FUNCTION FUNCTION ON A COMPUTERIZED USER DEVICE
JP2010504574A (en) Equipment to manage belongings
CN201314171Y (en) Anti-theft code case
JP4692130B2 (en) Authentication apparatus and program
WO2012019645A1 (en) Loss and theft protection for mobile devices using a wireless link to a wearable accessory
JP4748048B2 (en) Authentication system
GB2426615A (en) Proximity key
JP2010191552A (en) Authentication object device and key, and wireless authentication system
JP2007060102A (en) Use limit system and portable terminal
JPWO2009057182A1 (en) Misplacement prevention system, misplacement prevention method, and portable terminal

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20150525