GB2509957A - A device to be used to confirm attendance - Google Patents

A device to be used to confirm attendance Download PDF

Info

Publication number
GB2509957A
GB2509957A GB201300960A GB201300960A GB2509957A GB 2509957 A GB2509957 A GB 2509957A GB 201300960 A GB201300960 A GB 201300960A GB 201300960 A GB201300960 A GB 201300960A GB 2509957 A GB2509957 A GB 2509957A
Authority
GB
United Kingdom
Prior art keywords
encryption
attendance device
processor
attendance
display
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB201300960A
Other versions
GB201300960D0 (en
GB2509957B (en
Inventor
Daniel George Gould
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB1300960.0A priority Critical patent/GB2509957B/en
Publication of GB201300960D0 publication Critical patent/GB201300960D0/en
Priority to PCT/GB2014/050134 priority patent/WO2014111725A2/en
Publication of GB2509957A publication Critical patent/GB2509957A/en
Application granted granted Critical
Publication of GB2509957B publication Critical patent/GB2509957B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

An attendance device, comprises a counter arranged to generate a counter value representative of a time elapsed from registration of the attendance device with a server, a memory for storing an encryption key and a unique identifier associated with the attendance device, and processor adapted to generate an encryption of the counter value and the unique identifier, using the encryption key. The attendance device may have a receiver for receiving a registration signal from the server and update packet data including a new encryption key. The device may have a system clock which is synchronised with the system time of the server, with the counter representing a difference between the system time and a stored registration time. The attendance device may have a battery for power be operable to encrypt an indication of a battery power level with the encryption key. The device may have a display and an input button used to initiate and display the encryption. The displayed encryption code can be returned to a management facility which can decrypt the code. The device can be used to verify the attendance of a person, (employee, security guard or cleaner) at a particular location at a particular time.

Description

AN ATTENDANCE DEVICE
FtEtD Oil' THE INVENTION The present invention relates to attendance devices and in particular attendance devices for verifying the attendance of service providers at remote locations.
BACKGROUND TO THE INVENTION
There are situations in which the verification of a person's attendance at a particular location is important. For example. in a situation where a "contractor" is requested to attend a particular site location to perform work, it may be in the requestor's or "manager's" interest to verify whether such attendance took place and for how long the worker was in attendance.
Various devices exist which allow a manager to venfy and monitor the duration of attendance of contractors at distinct locations, This is usually achieved by contractors interacting with a device installed at such thcations.
However, there are limitations with these systems, such as the number of devices that can be registered to a single manager.
SUMMARY OF THE INVENTION
According to a first aspect of the invention, there is provided an attendance device, comprising a counter arranged to generate a counter value representative of a time elapsed from registration of the attendance device with a server, a memory for storing an encryption key and a unique identifier associated with the attendance device, and a first processor adapted to generate an encryption of the counter value and the unique identifier, using the encryption key.
Using a counter to monitor elapsed time provides several advantages. Whereas prior art attendance devices store comprehensive time and date information with high granularity for encryption of location and time information, the inventor has realised that valuable memory can be used up by the large variable length of standard 32 or 64 bit system time.
I
Furthermore, the attendance code is advantageously kept short so that a contractor can easily record it at a site location with minima' error. Only a finite number of bits can be encrypted into a short alphanumeric code. By reducing the number of bits taken up by time using a relatively small counter value, more space is available for other data, such as that relating to location of the attendance device at a particular site location. Since more space is available for the such infoirnation, many more attendance devices can be registered to the same manager.
According to a second aspect of the invention, there is provided an attendance device, comprising a system clock synchronised with a system time on a server, a memory for storing lO an encryption key, a unique identifier associated with the attendance device and a registration time corresponding to a time of registration of the attendance device with a server, and a first processor adapted to generate a counter va'ue from a subtraction of the registration time from the system time, and a second processor adapted to generate an encryption of the counter value and the unique identifier, using the encryption key.
i5 The attendance device may further comprise a display coupled to the processor and arranged to display the encryption. hi which case, the display is alphanumeric. Thus, a contractor can easily take down the number displayed on the display. This may be done by writing on paper or more preferably by recording the code on an electronic device such as a smart phone which may be operable to transmit the code to the server.
The attendance device may further comprise an input device arranged to provide an input signal to the processor to generate the encryption and/or the display to display the encryption.
Thus, instead of permanently displaying an encryption code in the device display which would use power, the code may only be generated and displayed on user input. Alternatively or additionally, the first processor may be adapted to generate the encryption at regular time intervals and the display arranged to display the most recent encryption generated by the first processor.
The counter preferably has a resolution of one minute or two minutes, so that an attendance code is accurate to within one or two minutes.
On synchronisation with the server the counter may be reset to zero. Alternatively, the counter may be reset to a random value to provide a further level of security to the encrypted attendance code.
The attendance device may further comprise a communications interface coupled to the memory and/or the first processor adapted to receive information from the server. This communications interface may be used to register or maintain the device. The communication interface may adapted to receive a reset signal from the server to reset the counter value to zero or a random value. The communications interface may be adapted to receive an update packet comprising an updated unique identifier and an updated encryption lO key.
Advantageously, the communications interface is an optical communications interface and may receive information from the server via an optical disp'ay. Alternatively, the communications interface could be any other wireless interface or a USB or firewire interface. The communication interface may transfer data using any known synchronous or iS asynchronous protocol.
The optical display may be a liquid crystal display, an electroluminescent display, an LED display or a plasma display panel.
The first processor and the second processor may be the same processor.
According to a third aspect of the invention, there is provided a method of monitoring attendance using an attendance device according to the first or second aspects described above, the method comprising: providing a counter value representative of a time elapsed from registration of the attendance device with a server to the processor; at the processor, generating an encryption of the counter value and the unique identifier using the encryption key; and displaying the encryption on the display.
The processor may additionally generate a checksum of the counter value and the unique identifier the encryption generated by the processor further comprises an encryption of the checksum.
The method may be initiated by receipt of an input signal at the input device.
According to a fourth aspect of the invention, there is provided a method of calibrating an attendance device according to the first aspect of the second aspect, the method comprising: at a central server: transmitting a registration packet comprising a unique identifier, an encryption key, and a counter offset; and storing a value of the current system time and the counter offset; and at the attendance device: receiving the registration packet; setting the counter to a value based on the counter offset; and storing the unique identifier and the encryption key in the memoly.
BRIEF DEscRIPTIoN OF TIlE DRAwINGs
Embodiments of the present invention shaH now be described, by way of non-limiting example only, with reference to the accompanying figures, in which: Figure 1 is a schematic diagram of an attendance device according to an embodiment of the present invention; Figure 2 is a front view of the attendance device of Figure 1; Figure 3 is a front view of a transmission display for transmitting data to the attendance device of Figure 1; Figure 4 is an illustration of the reduction in required storage space for a counter value generated by the attendance device of Figure 1; Figure 5 is an example Ulustralion oF an encryption packet before encryplion by the attendance device of Figure 1; Figure 6 is a further example illustration of an encryption packet before encryption by the attendance device of Figure 1; Figure 7 is a flow diagram of steps for generating an attendance code according to an embodiment of the present invention; Figure 8 is a flow diagram detailing steps for generating an attendance code according to a variation of the present invention; Figure 9 is a flow diagram illustrating steps for decrypting the attendance code generated by the steps shown in Figure 7; and Figure 10 is a flow diagram illustrating steps for decrypting the attendance code generated by the steps shown in Figure 8.
DESCIZII"noN OF EMBOIIN'IENTS Oil' THE INVENTION Embodiments of the present invention are concerned with providing a reliable, secure and inexpensive device to allow managers to monitor the attendance of workers, hereinafter described as "contractors" at distinct thcations. herein referred to as "site locations".
Embodiments of present invention also provide potential for many thousands of such compact and inexpensive attendance devices to be installed and registered to a single manager at site locations throughout his domain, each attendance device unique to all others.
Embodiments can be installed at a site location, and are adapted to display a short alphanumeric code containing information concerning the cuiTent time, date and location in encrypted fomt A contractor is instructed by a manager to record the code on arrival and/or departure from a site location. The code can then be returned to the manager to verify the time and location of attendance of a contractor at a particular site location and the duration of the contractor's visit, with a reduced risk of falsification by the contractor of infoimation concerning his whereabouts.
Figure 1 is a schematic diagram showing the architecture of an attendance device 10 according to an embodiment of the present invention together with its interaction with a server 12. The attendance device 10 includes a processor 14, a memory 16, a display device 18, a receiver 20, a counter 22 and an optional user input 24 together with an internal power source, such as a battery (not shown). Memory and counter busses 26, 28 are provided between the processor and both the memory 16 and the counter 22 respectively. Data can be transmitted from the processor 14 to be displayed on the display device 18 via a one-way display bus 30. The output of the optional user input 24 is also provided to the processor 14 via a user input bus 32. The receiver 20 of the attendance device is coupled to the processor 14 via an interface input bus 34a and an optional interface output bus 34b, Although Figure 1 shows the counter 22, memoiy 16 and receiver 20 as being external to the processor 14, it will be appreciated one or all of these components may be integral to the processor 14. The attendance device 10 may implemented using any known microprocessor, for example a PlC® microcontroller such as the P1C24F32KA301, P1C16F527 or PIC32MX2IOFOI6B.
The memory 16 may comprise any combination of volatile or non-volatile memory known in the art, and is adapted to store information concerning the device location and value of the counter 22 together with an encryption key for encrypting such stored data for display on the display device 18 and any other suitable configuration information.
To simplify manufacture, minimise cost and reduce energy consumption of the attendance device 10, the display device 18 is preferably an alphanumeric LCD display, as shown in more detail in Figure 2. It will be appreciated. however, that any video display known in the art which provides the requisite function could be used, such as an electroluminescent, LED or plasma display. The display device 18 is configured to display a short alphanumeric code 36 containing encrypted information relating to the location of the device and a measure of elapsed time relative to know point in time, as will be described in more detail below. The attendance code 36 is kept relatively short so as to reduce the likelihood of a contractor copying the code from the display incorrectly. The attendance code 36 may be permanently displayed on the display device 18 or alternatively the code 36 may be displayed offly in response to activation of the user input 24. The user input 18 may be a button, motion sensor or any other known input device. The processor 14 may be programmed to display the code 36 on the display device 18 only during certain times, for example during a contractor's standard working hours or only during the day/night. The particular code 36 shown in the display 18 in Figure 2 is for example only.
Referring again to Figure 1. the attendance device 10 may be calibrated or recalibrated by a server 12 or other such computing device via the attendance device's receiver 20. The server 12 transmits data via an integral or coupled transmitter 36 across a communications interface 38 to the receiver 20. The communications interface 38 may comprise any appropriate interface known in the art such as USB, firewire or a suitable wireless interface. Preferably, however, the receiver 20 compnses a plurality of photodiodes 20a and 20b, and the transmitter 36 comprises a plurality of corresponding light sources configured to as to align with the photodiodes 20a, 20b when packaged in the attendance device 10. The transmitter 36 may comprise two or more distinct transmission areas 40a, 4Db on a transmission display 42 such as a CRT or a flat panel display such as an LCD or plasma display, as shown in more detail in Figure 3. Data is transmitted via the transmission areas 40a, 4Db by the periodic transition of pixels in the transmission areas 40a, 4Db between dark and light colours, such as black and white. In other embodiments, the light sources may be LEDs or ordinary lamps transmitting data in a similar manner. It will be appreciated that other known methods of data transfer may be used.
To register the attendance device 10 to a particular manager, the communications interface 36 is set up between the attendance device 10 and the server 12. In a preferred embodiment, this iS is achieved by a manager or other user physically holding the device 10 relative to the transmission display 42 such that the photodiodes 20a, 20b align with the transmission areas 40a, 4Db. The transmitter 36 may then initiate communication between the server 12 and attendance device 10 either independently or in response to user input such as the press of a button located on the front of the device. Alternatively, communication could be initiated automatically on replacement of the battery. Where a communication interface 38 such as USB of firewire is used, transmission may be initiated by the interface 38 itself. Data is transmitted to the attendance device 10 across the communications interface 38 via any known protocol, and preferably sent using synchronous transmission.
Once communication is initiated, the server 12 transmits a registration packet to the attendance device 10. The registration packet may contain the following information: -An unique identifier for the device 10, referred to as the "locationlD". Each locationlD is unique to one of the set of the devices linked to a particular manager (company. entity, body corporate etc).
3D -An encryption key which is unique to the manager's set of devices. All devices calibrated in connection with a distinct manager may be calibrated with the same encryption key. Each encryption key may be linked to a single manager so as to be used only on devices linked to that single manager. Alternatively, private/public key encryption may be used to increase the security of the encrypted data. Each device may be supplied with one of a set of public encryption keys, the set unique to the manager's set of device. A single key for decryption may then be kept by the manager and, for example, stored at the server 12, as will be described in further detail below. As a further alternative, a double encryption technique may be used in which the data is encrypted twice by the attendance device 10 and subsequently decrypted at the server 12 using a two stage process, as will be described in more detail below. In such circumstances, the server 12 transmits two encryption keys to the attendance device 10; a primary encryption key and a secondary encryption key. The primary encryption key is unique to the manager. The secondary encryption key is one of a set of secondary encryption keys also unique to the manager, a particular secondary key chosen at random from the set and transmitted to the attendance device 10. The server 12 then links the chosen secondary encryption key with the locationlD of the attendance device 10 to which it was sent, and stores the link. On receipt, by the attendance device 10 of the location and encryption key(s), the processor 14 stores these variables in the memory 16. In a preferred embodiment, the locationlD and encryption key may be stored in REPROM or other non-volatile memory whilst the counter value may be stored in volatile memory such as RAM.
-A counter offset for reset of the counter 22 to a predetermined value. The counter offset may, by default, be set to zero. Alternatively, the counter offset may be a random number within the counter's 22 range, generated by and stored on the server 12. The processor 14 then offsets the counter 22 by the value of the counter offset. Accordingly, the counter 22 is synchronised with a system time of the server 12 offset by a known time period. Since the offset is known only to the server 12, the level of encryption of the time/date information to which the counter value relates is further increased.
Preferably, to minimize the size of the registration packet. a size of the offset is small compared to the size of the counter's 22 range. For example, for a 21 bit counter, an 8 bit offset seed may be used. This may decreases the registration time since less information needs to be transferred across the communications interface 38.
-Other configuration infoirnation may also be transmitted to the device, such as whether the device display's 18 backlight should be switched on, and whether the device display should permanently display the attendance code 34 or whether the code 34 should only be displayed on activation of the user input.
Once calibrated, the attendance device 10 may be mounted to a wall or other surface at a site location. The design of the device's 10 casing is so as to inhibit the device from being opened or dismounted without damage to the device 10. For example, the mounting screws may be tamperproof allowing only tightening of the fixing to a surface. Equally, the moulding may be click sealed once the calibration process has been completed. The attendance device 10 preferably has no user serviceable parts. In some circumstances however, the internal power source may be repbceable by a manager or an authorised person such as a maintenance engineer. The internal power source is preferably chosen to last for the device's 10 entire service period, which may correspond to the time range of the counter The counter 22 is configured to monitor time elapsed from a particular time reference, stored on the server 12. For example, the counter 22 may be a 21-bit counter having a time resolution of one or two minutes. With a two minute resolution, the time range of the counter is 2x22' (4,194,303) minutes -approximately 8 years. Thus the internal power source may be chosen with an 8 year service period in mind. The counter 22 may be a wraparound counter such that its value returns to zero after reaching its maximum value of 222. Accordingly, in instances where the counter value is reset to a predetermined random value during calibration, as long as the reset counter value and the system time of the server 12 at which the counter 22 was reset are known, the value of the counter 22 at any particular time can be determined and, vice versa, the time for any particular instantaneous value of the counter 22 can be deternilned.
Using a counter 22 to monitor elapsed time provides several advantages. Whereas prior art attendance devices store comprehensive time and date information with high granularity for encryption of location and time information, the inventor has realised that valuable memory can be used up by the large variable length of standard 32 or 64 bit system time.
Furthermore, as mentioned above, the attendance code 36 is advantageously kept short so that a contractor can easily record the attendance code 36 at a site location with minimal error.
Only a finite number of bits can be encrypted into a short aphanumenc code. The inventor has realised that by encrypting a short 21-bit counter value, more space is available for other data, such as the locationlD and an optional checksum. For example, the maximum number of bits able to be encoded into an 8 character alphanumeric code is 40 bits, calculated as follows. For each character of the code, there are 36 possibilities (0 -9, A -Z = 36 characters). Four of these characters are not used due to potential misinterpretation (-0, i, 0 and 1) which leaves 32 (2) possibilities. Each character in the code 36 therefore has a data value of 5 bits. For an 8 character code, 40 bits can be encoded (5 x 8).
As is shown in Figure 4, 11 bits of the 32 bits previously taken up by standard time are now free for other data. Using, for example, the 8 character code 36 described above, 19 bits of the 40 bit capacity are now availaNe for the locationiD and the optional checksum. Since more space is available for the locationlD, many more devices can be registered to the same lO manager. Whereas in prior art devices using standard 32-bit time and date only 8 bits were available for locationiDs (256 different IDs), the present invention can offer up to 219 different locationiDs, i.e. up to 524,288 unique devices registered to the same user. Even with the implementation of a 5 bit checksum, 2' (16,384) different locationlDs and thus attendance devices may be registered to a single manager. Such a configuration is described iS inFigure5.
Where the internal power source of the attendance device 10 is a battery, the attendance device lO may optionally extract or monitor a vaiue of the level of charge left in the battery.
This level may be stored in the memory 16 or extracted when required by the processor 14.
A small number of bits of the 40 bit display capacity may be used to encrypt an indication of the level of the battery or simply, using a single bit, an indication that the battery charge is running low, so that a manager can keep track of the battery level of each of his devices in each location, hi such cases, a reduction in size of either the locationlD, counter or checksum may be made. For example. figure 6 shows a configuration in which the size of the checksum has been reduced to 4 bits to make room for a 1 bit battery indication.
It will be appreciated that the number of bits allocated to each of the counter 22, locationiD, checksum may by chosen at the managers discretion. For example, where fewer devices are required and thus a smaller number of unique locationlDs are required, the locationlD can be made smaller leaving room for a larger counter, checksum, or battery indicator value.
Equally, if the capacity of the counter is increased. counter granularity can be reduced, thus increasing the accuracy of monitoring of contractors while the time range of the counter is maintained, it will, however, be appreciated that an increase in size of one vanable will lead to a compromise in the size of another. Such choices depend on the requirements of the manager. It will also be appreciated that with larger displays the number of encryptable bits will increase.
Once the attendance device 10 has been installed at a site location, it is ready for operation.
Generation and display of the attendance code by the attendance device 10 will now be explained in detail with reference to Figures 5 to 8. As mentioned above, the device may generate an attendance code on activation of the optional user input 24. Alternatively, if no user input 24 is provided, the attendance device 10 may penodically update the display 18 to display an up to date attendance code based on the current value of the counter 22 and the locationlD. In either case, the processor may load 50 the current counter value. locationlD and encryption keyKs) from the memory 16. Based on the counter value and the locationlD, a checksum is optionally generated using any known method. Using the encryption key(s) the processor 14 can encrypt an encryption packet comprising the counter value, location ID optional checksum and optional battery level indication, examples of which are shown in Figures 5 and 6, into an 8 digit alphanumeric code 36 and displayed 54 on the display device 18.
A flow chart showing the steps of alternative method of encryption using double encryption is shown Figure 8. The attendance device 10 encrypts, at step 57, some but not all of the bits of the encryption packet using the stored primary encryption key. For example, the attendance device 10 may encrypt 2 bytes K 16 bits) out of the S byte registration packet. The attendance device 10 may then perform a second encryption at step 58 using the secondary encryption key, in which some but not all of the bits of the encryption packet are encrypted.
The result is a registration packet in which all of the bits have been encrypted at least once using the primary encryption key, and some have been encrypted twice using both the primary and secondary encryption keys. Bits which have only been encrypted using the primary encryption key contain data relating to the locationlD. the 8 digit alphanumeric code 36 is then displayed 54 on the display device 18.
At the time that an attendance code is generated, the counter value may be stored in non-volatile memory. Then, on subsequent generations of attendance codes, the current counter value can be checked against stored counter values to ensure that an attendance code is never issued twice. The attendance device 10 may not issue a code if the current counter value matches on of the counter values stored in the non-volatile memory.
As mentioned above, the steps shown in Figures 7 or 8 may be performed in real time, at set time periods, or in respond to user input. In any case, the contractor may then record the attendance code 36 so that he/she can subsequently confirm his attendance at a site location.
When a contractor has visited one or more site locations and recorded one or more corresponding attendance codes 36, the contractor may pass these codes by way of electronic transmission or any other known method either back to the associated manager or directly to lO the server 12 together with his identity and preferably the identity of his manager.
Attendance codes may be recorded on site using a handheld device such as a smart phone and sent in real time to the manager or server 12 via a wireless communications networlc.
Processes of decryption and verification of the attendance code 36 are shown in Figures 9 and iS 10. Referring first to Figure 9, the server 12 may receive 60 an attendance code together with information concerning the identify of the contractor and/or identity of his associated manager using any suitable method. So that the server 12 can choose the correct decryption key, which correspond to the encryption key used to encrypt the original locationlD. counter value and optional checksum and battery level indicator, one of a) the contractors identity and b) the manager's identity must be known. Once the server 12 has identified the manager and associated decryption key, the attendance code can be decrypted 62, and the locationlD, counter value and optional checksum and battery level indicator extracted.
Figure 10 shows an alternative method of decryption where a double key encryption is adopted. Like steps have been accorded like reference numerals. As discussed above, the encrypted attendance code is a product of encryption using both of the primary and secondary encryption codes. Decryption may be performed as follows. The identity of the manager is verified as described above with referenced to Figure 9. The manger's unique primary encryption key can therefore be ascertained which may then be used to perform the first part 68 of decryption of the attendance code. At this point, the server 12 may then extract 70 part or all of the locationlD from part decrypted attendance code since these parts have only been encrypted once, using the primary encryption key. Based on the part of the thcationlD extracted from the part decrypted code, the server 12 may fetch 72 the secondary encryption key, which was linked to the extracted location on registration, and subsequently complete the second and final step of encryption of the attendance code using the secondary encryption key, thus extracting the remaining information -counter value and optional checksum and battery level indicator -as descñbed above with reference to Figure 9.
A number of verification steps 66 maybe performed on the decrypted elements 64. Firstly, if a checksum has been used, the server 12 may recompute the checksum of the decrypted locationlD and counter value and compare the recomputed checksum with the decrypted checksum to determine the validity of the decryption. If the checksums match, there is a high chance that the attendance code is authentic and error free, so no further verification may be necessary. However, there is a small chance of a false positive. Accordingly, further checks may further checked alnngside decrypted attendance codes having non matching checksums.
In the event that the calcu'ated checksums do not match, the decryption may be marked as "bad" and stored for subsequent analysis. Any suitable checksum verification technique known in the art may be used. For example, the extracted counter value may be analysed to check that the time/date it relates to is between the time of registration of the device arid the culTent time. Equally, the extracted location[D may be checked to see whether it appears on the server.
A near miss analysis may then be performed on "bad" decryptions. The expected time/date and location of a contractor at a particular time can be input by a manager. The server 12 may then calculate expected attendance codes over a time period centred on the expected time and date of attendance. For example, where a contractor was due to arrive at a site location at 12.15 am, 3/1/20 13, expected attendance codes for the period of 12 pm -12.30 pm on 3/1/20 13 may be generated. In addition codes having with substituted letters representing common typographical errors can also be generated. The server 12 may then compare the expected attendance codes with the "bad" attendance code to find near matches. The server 12 may then record near matches and a probability that the "bad" code was simply a user error or typographical mistake. Any other suitable near miss technique known in the art may be used.
Extracted information from validated attendance codes may then be analysed. Using the counter value and the stored offset relating the corresponding locationlD of the attendance device 10, the time at which the contractor visited the site location and recorded the attendance code 36 can be calculated. Accordingly, a manager can determine the time at which the contractor was at the site location. Furthermore, if the manager has instructed the contractor to record attendance codes on arrival and departure from the site, the manager has a comprehensive record of the time the contractor spent at that site location. The battery level indicator can also be analysed to determine whether the battery is low in an attendance device 10 and if so, indicate that a manager or an authorised person may be required to replace the battery.
The server 12 is preferably provided with a database (not shown) to store all coflected data concerning managers and associated contractors such that information regarding attendance can be accessed and analysed, and reports generated in real time or at a later date.
As an alternative to the counter 22, the processor 14 of the attendance device may have a system time. In such cases, on calibration, the system time of the attendance device is stored in the memory 16. On generation of the attendance code 36, a counter value is generated by subtracting the current system time from the system time stored in the memory 16, which colTesponds to the time of registration of the attendance device 10 with the server 12 and then scaling the product to a resolution of, for example. one or two minutes. The calcubted counter value is thus equivalent to the counter value generated by the counter 22 described above, providing the same benefits over standard time/date encryption as those discussed above in relation to the counter 22 generated counter value.

Claims (22)

  1. Ci Al MS 1. An attendance device, comprising: a counter arranged to generate a counter value representative of a time elapsed from registration of the attendance device with a server; a memory for storing an encryption key and a unique identifier associated with the attendance device; and a first processor adapted to generate an encryption of the counter value and the unique identifier, using the encryption key.
  2. 2. An attendance device, comprising: a system clock synchronised with a system time on a server; a memory for storing an encryption key, a unique identifier associated with the attendance device and a registration time corresponding to a time of registration of the attendance device with a server; and a second processor adapted to generate a counter value from a subtraction of the registration time from the system time; and a first processor adapted to generate an encryption of the counter value and the unique identifier, using the encryption key.
  3. 3. An attendance device as claimed in claims I or 2. wherein the attendance device has a battery and wherein the first processor is adapted to generate an encryption of a battery level using the encryption key, the battery level representative of the level of charge in the battery.
  4. 4. An attendance device as claimed in any of claims I to 3, wherein the first processor is adapted to generate an encryption of a checksum using the encryption key, the checksum being a function of the counter value and the unique identifier.
  5. 5. An attendance device as claimed in any of claims 1 to 4, further comprising a display coupled to the processor and arranged to display the encryption.
  6. 6. An attendance device as claimed in claim 5, wherein the display is alphanumeric.
  7. 7. An attendance device as claimed in claims 5 or 6, further comprising an input device alTanged to provide an input signal to the processor to generate the encryption and/or the display to display the encryption.
  8. 8. An attendance device as claimed in claims 5 or 6. wherein the first processor is S adapted to generate the encryption at regular time intervals and the display is arranged to display the most recent encryption generated by the first processor.
  9. 9. An attendance device as claimed in any preceding claim, wherein the counter has a resolution of one minute or two minutes.
  10. 10. An attendance device as claimed in any preceding claim, wherein on synchronisation with the server the counter is reset to zero or a random value.
  11. 11. An attendance device as claimed in any preceding claim, further comprising a communications interface coupled to the memory and/or the first processor adapted to receive information from the server.
  12. 12. An attendance device as claimed in claim 11, wherein communication interface is adapted to receive a reset signal from the server to reset the counter value to zero or a random value.
  13. 13. An attendance device as claimed in claims II or 12, wherein the communications interface is adapted to receive an update packet comprising an updated unique identifier and an updated encryption key.
  14. 14. An attendance device as claimed in claim ii, wherein the communications interface is an optical communications interface.
  15. 15. An attendance device as claimed in claim 12, wherein the communications interface can receive information from the server via an optical display.
  16. 16. An attendance device as claimed in claim 13, wherein the optical display is one of a liquid crystal display, an electroluminescent display, an LED display and a plasma display panel.
  17. 17. An attendance device as claimed in any of claims 4 to 16, wherein the first processor and the second processor are the same processor.
  18. 18. A method of monitoring attendance using an attendance device as claimed in any of dairns 7 to 17, the method comprising: S providing a counter value representative of a time elapsed from registration of the attendance device with a server to the processor; at the first processor, generating an encryption of the counter value and the unique identifier using the encryption key; and displaying the encryption on the display.
  19. 19. A method according to claim 18, wherein the processor generates the checksum of the counter value and the unique identifier and wherein the encryption generated by the first processor further comprises an encryption of the checksum.
  20. 20. A method according to claim 19, wherein the encryption generated by the first processor further comprises an encryption of the battery level.
  21. 21. A method according to claims 18 or 19, the method initiated by receipt of an input signal at the input device.
  22. 22. A method of calibrating an attendance device as daimed in any of claims 9 to 14, comprising: at a central server: transmitting a registration packet comprising a unique identifier, an encryption key. and a counter offset; and storing a value of the current system time and the counter offset; and at the attendance device: receiving the registration packet; setting the counter to a value based on the counter offset; and storing the unique identifier and the encryption key in the memory.CLAIMS1. An attendance device, comprising: a communications interface for registering the attendance device with a server; S a counter arranged to generate a counter value representative of a time elapsed from registration of the attendance device with the server; a memory for storing an encryption key and a unique identifier associated with the attendance device; and a processor adapted to generate an encryption of the counter value and the unique identifier, using the encryption key, wherein the processor is adapted to generate an encryption of a checksum using the encryption key, the checksum being a function of the counter value and the unique identifier.2. An attendance device, comprising: a communications interface for registering the attendance device with a server; a system clock synchronised with a system time on the sewer; a memory for storing an encryption key, a unique identifier associated with the c attendance device arid a registration time corresponding to a time of registration of the attendance device with the server; and a processor adapted to generate a counter value from a subtraction of the registration time from the system time; and to generate an encryption of the counter value and the unique identifier, using the encryption key, wherein the processor is adapted to generate an encryption of a checksum using the encryption key, the checksum being a function of the counter value and the unique identifier.3, An atiendance device as claimed in claims I or 2, wherein the attendance device has a battery and wherein the processor is adapted to generate an encryption of a battery lev& using the encryption key, the battery level representative of the level of charge in the battery.4. An attendance device as claimed in any of claims Ito 3, ftmrther comprising a display coupled to the processor and arranged to dispby the encryption.5, An attendance device as claimed in claim 4, wherein the display is alphanumeric.6. An attendance device as claimed in claims 4 or 5, further comprising an input device arranged to provide an input signal to the processor to generate the encryption and/or the display to display the encryption.7. An attendance device as claimed in claims 4 or 5, wherein the processor is adapted to generate the encryption at regular time intervals aiid the display is arranged to display the most recent encryption generated by the processor.8. An attendance device as claimed in any preceding claim, wherein the counter has a resolution of one minute or two minutes.9. An attendance device as claimed in any preceding claim, wherein on synchronisation with the server the counter is reset to zero or a random value.10. An attendance device as claimed in any preceding claim, wherein the communications interface is coupled to the memory and/or the processor and is adapted to receive 0 information from the sewer.C'tJ is ii. An attendance device as claimed in claim 10, wherein the communication interface is adapted to receive a reset signal from the server to reset the counter value to zero or a random value.12. An attendance device as claimed in claims 10 or it, wherein the communications interface is adapted to receive an update packet comprising an updated unique identifier and an updated encryption key.13. An attendance device as claimed in any of claims tO to 12, wherein the communications interface is an optical communications interface.14. An attendance device as claimed in claim 13, wherein the communications interface can receive information from the sewer via an optical display.15. An attendance device as claimed in claim 14, wherein the optical display is one of a liquid crystal display, an electroluminescent display, an LED display and a plasma display panel.16. An attendance device as claimed in any of claims 2 to 15, wherein the processor comprises a first processor adapted to generate the counter value from the subtraction of the registration time from the system time and a second processor adapted to generate the encryption of the counter value and the unique identifier, using the encryption key.17. A method of monitoring attendance using an attendance device as claimed in any of claims 5 to 16, the method comprising: providing a counter value representative of a time elapsed from registration of the attendance device with a server to the processor; at the processor, generating an encryption of the counter value and the unique identifier using the encryption key; and displaying the encryption on the display, wherein the processor generates a checksum of the counter value and the unique identifier and wherein the encryption generated by the processor further comprises an encryption of the checksum." 18. A method according to claim 17, wherein the encryption generated by the processor further comprises an encryption of the battery level.19. A method according to claims 17 or 18, the method initiated by receipt ofan input signal at the input device.20. A method of calibrating an attendance device as claimed in any of claims ito 16, comprising: at a central server: transmitting a registration packet comprising a unique identifier, an encryption key, and a counter offset; and storing a value of the current system time and the counter offset; and at the attendance device: receiving the registration packet; setting the counter to a value based on the counter offset; and storing the unique identifier and the encryption key in the memory. r (4
GB1300960.0A 2013-01-18 2013-01-18 An attendance device Expired - Fee Related GB2509957B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB1300960.0A GB2509957B (en) 2013-01-18 2013-01-18 An attendance device
PCT/GB2014/050134 WO2014111725A2 (en) 2013-01-18 2014-01-17 An attendance device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1300960.0A GB2509957B (en) 2013-01-18 2013-01-18 An attendance device

Publications (3)

Publication Number Publication Date
GB201300960D0 GB201300960D0 (en) 2013-03-06
GB2509957A true GB2509957A (en) 2014-07-23
GB2509957B GB2509957B (en) 2016-04-06

Family

ID=47843581

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1300960.0A Expired - Fee Related GB2509957B (en) 2013-01-18 2013-01-18 An attendance device

Country Status (2)

Country Link
GB (1) GB2509957B (en)
WO (1) WO2014111725A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778759A (en) * 2015-05-11 2015-07-15 张仁平 Novel attendance system
CN112037352A (en) * 2020-08-17 2020-12-04 江细方 Fingerprint punched-card machine for staff attendance with function of improving fingerprint identification degree

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108961456A (en) * 2018-06-25 2018-12-07 深圳市前海富达科技有限公司 A kind of intelligence manages night watching punch card method and system in real time
CN109389697A (en) * 2018-09-25 2019-02-26 天地(常州)自动化股份有限公司 Recording method, device and readable storage medium for recording time of downhole inspection data
CN113781675B (en) * 2021-08-19 2023-06-23 杭州宇链科技有限公司 Trusted inspection card punching method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004025575A1 (en) * 2002-09-15 2004-03-25 Magnus Maurex Method for position notification
WO2005048199A1 (en) * 2003-11-05 2005-05-26 Ask Uk Systems Limited Time and location monitoring system
WO2005091230A1 (en) * 2004-03-22 2005-09-29 Nixu Oy Apparatus for monitoring remote work
US20070168488A1 (en) * 2004-04-30 2007-07-19 Mekiki Creates Co., Ltd. Working information processing system, device, method, and computer program
GB2490718A (en) * 2011-05-12 2012-11-14 Degould Ltd An attendance device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5572192A (en) * 1994-03-17 1996-11-05 Detection Systems, Inc. Personal security system with guard tour features
IL123949A (en) * 1998-04-03 2001-07-24 On Track Innovations Ltd Data transaction card having extended range
US7058814B1 (en) * 2000-09-28 2006-06-06 International Business Machines Corporation System and method for providing time-limited access to people, objects and services
WO2004075525A1 (en) * 2003-02-20 2004-09-02 Ase R & D Europe Method for offering time on smart card and method for time registration by means of mobile communication device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004025575A1 (en) * 2002-09-15 2004-03-25 Magnus Maurex Method for position notification
WO2005048199A1 (en) * 2003-11-05 2005-05-26 Ask Uk Systems Limited Time and location monitoring system
WO2005091230A1 (en) * 2004-03-22 2005-09-29 Nixu Oy Apparatus for monitoring remote work
US20070168488A1 (en) * 2004-04-30 2007-07-19 Mekiki Creates Co., Ltd. Working information processing system, device, method, and computer program
GB2490718A (en) * 2011-05-12 2012-11-14 Degould Ltd An attendance device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778759A (en) * 2015-05-11 2015-07-15 张仁平 Novel attendance system
CN112037352A (en) * 2020-08-17 2020-12-04 江细方 Fingerprint punched-card machine for staff attendance with function of improving fingerprint identification degree

Also Published As

Publication number Publication date
WO2014111725A3 (en) 2014-12-18
GB201300960D0 (en) 2013-03-06
WO2014111725A2 (en) 2014-07-24
GB2509957B (en) 2016-04-06

Similar Documents

Publication Publication Date Title
DK2598843T3 (en) SECURING AND CHECKING THE SYSTEM TIME FOR A CHARGING STATION
US20020104004A1 (en) Method and apparatus for synchronizing real-time clocks of time stamping cryptographic modules
EP2352971B1 (en) Measurement device, particularly energy counter and method for recognition of manipulations
GB2509957A (en) A device to be used to confirm attendance
US9467293B1 (en) Generating authentication codes associated with devices
US8701209B2 (en) Measurement data management and authentication method and measurement data management and authentication system
US20250190636A1 (en) Tamper evident system for modification and distribution of secured vehicle operating parameters
US20110167008A1 (en) Database licensing and customer service system for wireless camera flash systems
CN108573140A (en) Intelligent seal and it establishes server and the intelligent seal service system based on block chain technology beyond the clouds
CN111654591B (en) Picture tamper-proof method, computer device and storage medium
ES2668647T3 (en) Securing and synchronizing the system time of a charging station
JP5223860B2 (en) Time information distribution system, time distribution station, terminal, time information distribution method and program
US20040000587A1 (en) Electronic balloting module and electronic balloting method
CN110570564A (en) single-machine lock and control method thereof
US9276738B2 (en) Digital tachograph
WO2022179120A1 (en) Gateway interception method and apparatus, electronic device and storage medium
CN112632642B (en) Clock checking method and device and electronic equipment
CN110580759A (en) Manageable single-machine lock, realization method thereof and centralized single-machine lock management system
JP4868322B2 (en) Information processing system and information processing method
JP4073091B2 (en) Electronic document authentication apparatus and authentication method
EP1430639B1 (en) Time stamping device and method
JP4147103B2 (en) Time information acquisition system
US20240267228A1 (en) System and gateway for attesting a data record
JP2007215104A (en) Terminal equipment
Pinkas et al. Policy requirements for time-stamping authorities (tsas)

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20230118