GB2532417A - Security device - Google Patents

Security device Download PDF

Info

Publication number
GB2532417A
GB2532417A GB1420170.1A GB201420170A GB2532417A GB 2532417 A GB2532417 A GB 2532417A GB 201420170 A GB201420170 A GB 201420170A GB 2532417 A GB2532417 A GB 2532417A
Authority
GB
United Kingdom
Prior art keywords
security device
security
contact
user
wearer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1420170.1A
Other versions
GB201420170D0 (en
Inventor
Huff Derek
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Integrated Design Ltd
Original Assignee
Integrated Design Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Integrated Design Ltd filed Critical Integrated Design Ltd
Priority to GB1420170.1A priority Critical patent/GB2532417A/en
Publication of GB201420170D0 publication Critical patent/GB201420170D0/en
Publication of GB2532417A publication Critical patent/GB2532417A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/06Mechanical actuation by tampering with fastening

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

A wearable security token stores personal identification data and can communicate with and/or be interrogated by an external device to reveal said data. The security device can further detect continued contact with a wearer and can store or indicate when this contact is or has been broken. The security wristband may communicate the contact indication during interrogation by the external reader and this may occur after a first interrogation or during subsequent communications. The physical contact may be sensed through one or more means, such as physical contact, electrical properties of skin, thermal properties, pulse or heart monitoring and nerve impulses. The device may include audible or visual alarm means for indicating that it was removed from a user. The device may be integrated into an object worn by a user and can be incorporated into an article of clothing. The device may use near field communication in order to interact with the external reader. The security wristband may be used to store a monetary value or allowed spending limit, or to authorize a user to complete a particular task or allow entry to a certain location. This authorization may be removed is the device is removed.

Description

Security Device This invention relates to a security device. In particular, it relates to a security device in the form of a token which is wearable or carriable by a user, to identify the user.
Many security, access control, cashless payment and other systems involve the provision of a token to identify the person. These are mainly in the form of a card or tag bearing electronically readable data. However, unless a token is non-removably attached to a body, or implanted within it, then the token may be stolen from a person or transferred accidentally or fraudulently to a different person. Various measures may be made to try to counter this, such as requiring the entry of PINs (Personal Identification Numbers), the use of signature strips and the like. However, these may become known by a third party either with or without the consent of the legitimate user which allows the third party to impersonate the original holder.
Implanting a remotely readable tag would overcome this risk but is currently not considered acceptable.
As an example, in an airport a security validation is made 'ground side' by the presentation and checking of a passport and a valid ticket. However, a check must then be made again at boarding because the credentials may have been passed to another person in the meantime which can be a security risk.
The present invention arose in an attempt to provide an improved security token.
According to the present invention, in a first aspect, there is provided a security device comprising a wearable device adapted to store personal identification data and to communicate with and/or be interrogated by an external device to reveal said data and further including sensor means for detecting continued contact with a wearer, and means for indicating that contact is or has been broken.
Preferably, the security device includes means for indicating, during communication with or interrogation by said external device, that the contact is or was broken.
The sensor means may comprise means for sensing physical contact, electrical properties of skin (such as resistance or capacitance for example), thermal sensor, pulse or heart rate sensors, nerve impulse sensors and so on.
The sensor means may be an integral part of the device or may be one or more separate sensors connected to the device by means of wire or a physical or wireless connection.
The apparatus is most preferably arranged such that after a device has been interrogated to determine ID information stored upon it, if the device is removed or detached from the body of the wearer, or for the allowed amount therefrom, this is detected by means of a changed signal at the sensor.
Preferably, the removal state is stored such that upon future interrogation and/or by visible or electronic inspection of a device, it can be determined that the device has been removed from a user.
The device may communicate with, or be interrogated by, an external means by virtue of a direct, physical connection and/or by a wireless method such as BluetoothTM, Near Field Communication (NFC) or otherwise.
The device is preferably in the form of a wristband or incorporated within a wristband. It may, however, be embodied in many different ways. It may, for example, be a pendant hung round a user's neck or in the form of a ring which the user wears on his finger. It may be incorporated within clothing.
Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which: Figure 1 shows a device attached to a patient's wrist; and Figure 2 shows schematically some components of the device.
Referring to the figures, a security device in the form of a smart tag may be embodied as a wristband 1 as shown in Figure 1 and worn around the user's wrist.
Wearable technology is well established nowadays and the security device 1 includes electronic circuitry, as shown schematically in Figure 2, comprising a processor 2, a memory 3, one or more sensors 5 and a communicating module 4 arranged to communicate (or be interrogated by) an external device. Preferably, this operates using a wireless radio communication means, most preferably by Near Field Communication (NFC). It may alternatively use BluetoothTM or indeed radio, optical or other types of communication. In other embodiments, a device may be provided with a contact or socket such that an external device can be plugged into or make physical connection with the wearable token 1 in order to communicate.
The security device 1 includes one or more sensors 5. One is shown in the figure but there may be more than one in some embodiments. This may be a switch contact sensor (ie one which detects physical contact) and which detects removal of the sensor, from a user's skin caused by removal of the wearable device, or may be a skin resistance or capacitance sensor, a thermal sensor measuring the temperature of a person's skin, a pulse rate sensor for measuring a person's pulse rate, a heart beat sensor, blood pressure monitor, nerve impulse sensors or other types of sensor.
Where the wearable device 1 is a wristband then clearly the sensor will be mounted on the inside of this such that it can physically contact a wearer's skin or be physically close enough to function and sensor the desired parameter.
More than one type of sensor may be used.
The processor 2 and memory 3 are used to store ID data. This may be a simple ID code or PIN or may be more complicated data such as a digitised photograph or many other types of data. This can be interrogated via the communications module 4 so that an external reader connected to this can determine the ID.
The system can be arranged to continually check, by virtue of sensor 5, that the device is still in the proximity of (or physically touching) a wearer. Alternatively, a signal can be generated by the sensor to the processor when the sensor no longer senses proximity. If a break in contact is detected (indicating the device has been removed) this may be recorded, and this information may then be transmitted with the ID, or separately, upon a subsequent interrogation of the devices. Alternatively, or in addition, an alarm may be actuated. This might be visual (by illuminating an LED or other light emitter on the device) and/or audible. It may alternatively, or in addition, be arranged to transmit a signal to a remote device.
Thus, once the security device 1 has been fitted it may be validated, including validation of the identification data stored in the memory 3 and also data from the sensor 5 (which might include a specific heart rate monitor, etc) and it will hold that validation unless it is cancelled or changed by detectable events, typically removal. By this means, it is possible to give an individual the authority to perform a controlled task such as the operation of a machine or to conduct a particular financial operation for example or to gain access to a particular area. However, if the device is removed from the wearer then this will be detected and so the user may now be precluded from continuing with those tasks.
In essence, once a wearer has been validated by a security process then as long as the wearer continues wearing the device uninterrupted he can continue with a particular operation or task. For example, if a token is fitted and interrogated before or during presentation of a valid passport and ticket, then a subsequent interrogation of the device at the time of boarding for example would indicate whether the device has been removed and therefore indicate the possibility of the passport and ticket have been transferred to another person.
In addition to basic ID data, the memory may store and communicate other data which may be relevant to a particular task or function for example and this may include a flight number, baggage information, clearance level, and so on or may include biometric, photographic ID or may other types of relevant data.
The device may also be used to detect other information including time, location, heart rate, stress or sports/exercise related information and so. Some of this may require other elements such as a GPS module or other location sensing means. The device may also have means for connecting to a telecommunications network such as 36 or 4G network or Wi-Fi network by the inclusion of appropriate hardware and software, which will be known the art, and may indeed form part of a mobile telephone type device. It may have means for receiving a SIM (Subscriber Identity Module) of a telecommunications network.
In other embodiments, the sensor need not necessarily be an integral part of the actual wearable device/wristband 1 but may be a separate device such as a small sensor which is fixed to a user's body, perhaps by adhesive, removable adhesive tape and so on and which is connected, either by a physical connection such as a wire or wirelessly to a separate device incorporating the remainder or some of the other devices shown in Figure 2.
A small delay may be incorporated, such that if the security device is removed inadvertently for just a small period of time, typically by less time than that usually needed to transfer from one person to another, a signal indicating removal is not stored or generated. Depending on circumstances, this might be, for example, one second, half a second or another time period.
The security device may be used for monetary transactions, for example cashless purchasing whereby the device is pre-loaded, or able to be loaded, with a given value of money to spend up to a particular limit. If the device is removed from a user the limit is reset to zero. It may then be revalidated and/or increased again once the device is back in contact with the original wearer.
The security device may be used as an identification device to identify a wearer as having been authorised for a particular task or for access to a particular place. For example, authorised to be on a construction site, student campus, secure building or a music festival. Preferably, it is embodied in a tamper-proof or tamper-evident construction.
The authority may then be rescinded if the device is removed.

Claims (14)

  1. Claims 1. A security device comprising a wearable device adapted to store personal identification data and to communicate with and/or be interrogated by an external device to reveal said data and further including sensor means for detecting continued contact with a wearer, and means for indicating that contact is or has been broken.
  2. 2. A security device as claimed in Claim 1, including means for indicating, during communication with or interrogation by said external device, that the contact is or was 10 broken.
  3. 3. A security device as claimed in Claim 1 or Claim 2, wherein the sensor comprises one or more means for sensing one or more of: physical contact, electrical properties of skin, thermal properties, pulse or heart rate monitoring and nerve impulses.
  4. 4. A security device as claimed in any preceding claim, adapted such, if after a device has been first interrogated to determine the identification data stored upon, if a device is removed or detached from the body of the wearer then this is indicated or stored.
  5. 5. A security device as claimed in Claim 4, wherein the fact that the device was removed from the user is indicated in a subsequent interrogation and/or communication device.
  6. 6. A security device as claimed in Claim 4 or Claim 5, including audible and/or visual alarm means for indicating that a device was removed from a wearer.
  7. 7. A security device as claimed in any preceding claim, incorporated into a wristband.
  8. 8. A security device as claimed in any of Claims 1 to 7 incorporated into a device which is worn by a user.
  9. 9. A security device as claimed in any of Claims 1 to 6 incorporated in an article of clothing.
  10. 10. A security device as claimed in any preceding claim, adapted to communicate with an external reader by Near Field Communication (NFC).
  11. 11. A security device as claimed in any preceding claim, adapted to store a monetary value or allowed spending limit, and to adjust this if disconnection from a wearer is 10 detected.
  12. 12. A security device as claimed in any preceding claim, usable to identify a user as a having been authorised for a particular task and/or access to a particular place.
  13. 13. A security device as claimed in Claim 12, wherein the authorisation is rescinded if removal of the device is detected.
  14. 14. A security device substantially as hereinbefore described with reference to, and as illustrated by, the accompanying drawings.
GB1420170.1A 2014-11-13 2014-11-13 Security device Withdrawn GB2532417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1420170.1A GB2532417A (en) 2014-11-13 2014-11-13 Security device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1420170.1A GB2532417A (en) 2014-11-13 2014-11-13 Security device

Publications (2)

Publication Number Publication Date
GB201420170D0 GB201420170D0 (en) 2014-12-31
GB2532417A true GB2532417A (en) 2016-05-25

Family

ID=52248287

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1420170.1A Withdrawn GB2532417A (en) 2014-11-13 2014-11-13 Security device

Country Status (1)

Country Link
GB (1) GB2532417A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5831535A (en) * 1997-07-24 1998-11-03 Elmo-Tech Ltd. Electronic monitoring device and monitoring system including same
GB2383666A (en) * 2001-12-28 2003-07-02 Alan Dodds Proximity alarm and positioning system
US20030174049A1 (en) * 2002-03-18 2003-09-18 Precision Dynamics Corporation Wearable identification appliance that communicates with a wireless communications network such as bluetooth
US20040257202A1 (en) * 2003-06-19 2004-12-23 Coughlin Michael E. RFID tag and method of user verification
US20080235144A1 (en) * 2007-03-23 2008-09-25 Simon Phillips Pre-authenticated identification token

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5831535A (en) * 1997-07-24 1998-11-03 Elmo-Tech Ltd. Electronic monitoring device and monitoring system including same
GB2383666A (en) * 2001-12-28 2003-07-02 Alan Dodds Proximity alarm and positioning system
US20030174049A1 (en) * 2002-03-18 2003-09-18 Precision Dynamics Corporation Wearable identification appliance that communicates with a wireless communications network such as bluetooth
US20040257202A1 (en) * 2003-06-19 2004-12-23 Coughlin Michael E. RFID tag and method of user verification
US20080235144A1 (en) * 2007-03-23 2008-09-25 Simon Phillips Pre-authenticated identification token

Also Published As

Publication number Publication date
GB201420170D0 (en) 2014-12-31

Similar Documents

Publication Publication Date Title
US9013300B2 (en) Method of communicating information through a wearable device
US10754433B2 (en) Multi-device authentication
TWI646442B (en) Survivability detection technology for user authentication
JP2019145152A (en) Trusted device
US9649052B2 (en) Systems, apparatus, and methods for using eyewear, or other wearable item, to confirm the identity of an individual
KR20160077976A (en) Electronic device having user identifying function and user authentication method
DK2880585T3 (en) BIOMETRIC AUTHENTICATION OF A PERSON
US20170161709A1 (en) Method and system to organize and manage transactions
EP3281139B1 (en) Method and system for associating a user with a wearable device
JP2015055952A (en) Settlement system, settlement method, authentication server, authentication method, and program
US20190053739A1 (en) Wearable apparatus, settlement system, and settlement method
US11100379B1 (en) Multi-purpose smart card with user trusted bond
EP3494713B1 (en) Wearable nfc device for secure data interaction
KR101777651B1 (en) Payment method using blank card system
US20200387765A1 (en) Security Measures in Relation to Data Tags and Contactless Cards
GB2532417A (en) Security device
WO2017141279A1 (en) Smart bracelet with electronic circuit for multifunction activity with smartphone nfc, and activities for authentication combined data (cda) for payments in safety and contactless
US20200053536A1 (en) System and device for internet of things
JP2023542399A (en) Device for electronic recognition of users
CN109255217A (en) Wearable device

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)