GB2532417A - Security device - Google Patents
Security device Download PDFInfo
- Publication number
- GB2532417A GB2532417A GB1420170.1A GB201420170A GB2532417A GB 2532417 A GB2532417 A GB 2532417A GB 201420170 A GB201420170 A GB 201420170A GB 2532417 A GB2532417 A GB 2532417A
- Authority
- GB
- United Kingdom
- Prior art keywords
- security device
- security
- contact
- user
- wearer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/06—Mechanical actuation by tampering with fastening
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
A wearable security token stores personal identification data and can communicate with and/or be interrogated by an external device to reveal said data. The security device can further detect continued contact with a wearer and can store or indicate when this contact is or has been broken. The security wristband may communicate the contact indication during interrogation by the external reader and this may occur after a first interrogation or during subsequent communications. The physical contact may be sensed through one or more means, such as physical contact, electrical properties of skin, thermal properties, pulse or heart monitoring and nerve impulses. The device may include audible or visual alarm means for indicating that it was removed from a user. The device may be integrated into an object worn by a user and can be incorporated into an article of clothing. The device may use near field communication in order to interact with the external reader. The security wristband may be used to store a monetary value or allowed spending limit, or to authorize a user to complete a particular task or allow entry to a certain location. This authorization may be removed is the device is removed.
Description
Security Device This invention relates to a security device. In particular, it relates to a security device in the form of a token which is wearable or carriable by a user, to identify the user.
Many security, access control, cashless payment and other systems involve the provision of a token to identify the person. These are mainly in the form of a card or tag bearing electronically readable data. However, unless a token is non-removably attached to a body, or implanted within it, then the token may be stolen from a person or transferred accidentally or fraudulently to a different person. Various measures may be made to try to counter this, such as requiring the entry of PINs (Personal Identification Numbers), the use of signature strips and the like. However, these may become known by a third party either with or without the consent of the legitimate user which allows the third party to impersonate the original holder.
Implanting a remotely readable tag would overcome this risk but is currently not considered acceptable.
As an example, in an airport a security validation is made 'ground side' by the presentation and checking of a passport and a valid ticket. However, a check must then be made again at boarding because the credentials may have been passed to another person in the meantime which can be a security risk.
The present invention arose in an attempt to provide an improved security token.
According to the present invention, in a first aspect, there is provided a security device comprising a wearable device adapted to store personal identification data and to communicate with and/or be interrogated by an external device to reveal said data and further including sensor means for detecting continued contact with a wearer, and means for indicating that contact is or has been broken.
Preferably, the security device includes means for indicating, during communication with or interrogation by said external device, that the contact is or was broken.
The sensor means may comprise means for sensing physical contact, electrical properties of skin (such as resistance or capacitance for example), thermal sensor, pulse or heart rate sensors, nerve impulse sensors and so on.
The sensor means may be an integral part of the device or may be one or more separate sensors connected to the device by means of wire or a physical or wireless connection.
The apparatus is most preferably arranged such that after a device has been interrogated to determine ID information stored upon it, if the device is removed or detached from the body of the wearer, or for the allowed amount therefrom, this is detected by means of a changed signal at the sensor.
Preferably, the removal state is stored such that upon future interrogation and/or by visible or electronic inspection of a device, it can be determined that the device has been removed from a user.
The device may communicate with, or be interrogated by, an external means by virtue of a direct, physical connection and/or by a wireless method such as BluetoothTM, Near Field Communication (NFC) or otherwise.
The device is preferably in the form of a wristband or incorporated within a wristband. It may, however, be embodied in many different ways. It may, for example, be a pendant hung round a user's neck or in the form of a ring which the user wears on his finger. It may be incorporated within clothing.
Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which: Figure 1 shows a device attached to a patient's wrist; and Figure 2 shows schematically some components of the device.
Referring to the figures, a security device in the form of a smart tag may be embodied as a wristband 1 as shown in Figure 1 and worn around the user's wrist.
Wearable technology is well established nowadays and the security device 1 includes electronic circuitry, as shown schematically in Figure 2, comprising a processor 2, a memory 3, one or more sensors 5 and a communicating module 4 arranged to communicate (or be interrogated by) an external device. Preferably, this operates using a wireless radio communication means, most preferably by Near Field Communication (NFC). It may alternatively use BluetoothTM or indeed radio, optical or other types of communication. In other embodiments, a device may be provided with a contact or socket such that an external device can be plugged into or make physical connection with the wearable token 1 in order to communicate.
The security device 1 includes one or more sensors 5. One is shown in the figure but there may be more than one in some embodiments. This may be a switch contact sensor (ie one which detects physical contact) and which detects removal of the sensor, from a user's skin caused by removal of the wearable device, or may be a skin resistance or capacitance sensor, a thermal sensor measuring the temperature of a person's skin, a pulse rate sensor for measuring a person's pulse rate, a heart beat sensor, blood pressure monitor, nerve impulse sensors or other types of sensor.
Where the wearable device 1 is a wristband then clearly the sensor will be mounted on the inside of this such that it can physically contact a wearer's skin or be physically close enough to function and sensor the desired parameter.
More than one type of sensor may be used.
The processor 2 and memory 3 are used to store ID data. This may be a simple ID code or PIN or may be more complicated data such as a digitised photograph or many other types of data. This can be interrogated via the communications module 4 so that an external reader connected to this can determine the ID.
The system can be arranged to continually check, by virtue of sensor 5, that the device is still in the proximity of (or physically touching) a wearer. Alternatively, a signal can be generated by the sensor to the processor when the sensor no longer senses proximity. If a break in contact is detected (indicating the device has been removed) this may be recorded, and this information may then be transmitted with the ID, or separately, upon a subsequent interrogation of the devices. Alternatively, or in addition, an alarm may be actuated. This might be visual (by illuminating an LED or other light emitter on the device) and/or audible. It may alternatively, or in addition, be arranged to transmit a signal to a remote device.
Thus, once the security device 1 has been fitted it may be validated, including validation of the identification data stored in the memory 3 and also data from the sensor 5 (which might include a specific heart rate monitor, etc) and it will hold that validation unless it is cancelled or changed by detectable events, typically removal. By this means, it is possible to give an individual the authority to perform a controlled task such as the operation of a machine or to conduct a particular financial operation for example or to gain access to a particular area. However, if the device is removed from the wearer then this will be detected and so the user may now be precluded from continuing with those tasks.
In essence, once a wearer has been validated by a security process then as long as the wearer continues wearing the device uninterrupted he can continue with a particular operation or task. For example, if a token is fitted and interrogated before or during presentation of a valid passport and ticket, then a subsequent interrogation of the device at the time of boarding for example would indicate whether the device has been removed and therefore indicate the possibility of the passport and ticket have been transferred to another person.
In addition to basic ID data, the memory may store and communicate other data which may be relevant to a particular task or function for example and this may include a flight number, baggage information, clearance level, and so on or may include biometric, photographic ID or may other types of relevant data.
The device may also be used to detect other information including time, location, heart rate, stress or sports/exercise related information and so. Some of this may require other elements such as a GPS module or other location sensing means. The device may also have means for connecting to a telecommunications network such as 36 or 4G network or Wi-Fi network by the inclusion of appropriate hardware and software, which will be known the art, and may indeed form part of a mobile telephone type device. It may have means for receiving a SIM (Subscriber Identity Module) of a telecommunications network.
In other embodiments, the sensor need not necessarily be an integral part of the actual wearable device/wristband 1 but may be a separate device such as a small sensor which is fixed to a user's body, perhaps by adhesive, removable adhesive tape and so on and which is connected, either by a physical connection such as a wire or wirelessly to a separate device incorporating the remainder or some of the other devices shown in Figure 2.
A small delay may be incorporated, such that if the security device is removed inadvertently for just a small period of time, typically by less time than that usually needed to transfer from one person to another, a signal indicating removal is not stored or generated. Depending on circumstances, this might be, for example, one second, half a second or another time period.
The security device may be used for monetary transactions, for example cashless purchasing whereby the device is pre-loaded, or able to be loaded, with a given value of money to spend up to a particular limit. If the device is removed from a user the limit is reset to zero. It may then be revalidated and/or increased again once the device is back in contact with the original wearer.
The security device may be used as an identification device to identify a wearer as having been authorised for a particular task or for access to a particular place. For example, authorised to be on a construction site, student campus, secure building or a music festival. Preferably, it is embodied in a tamper-proof or tamper-evident construction.
The authority may then be rescinded if the device is removed.
Claims (14)
- Claims 1. A security device comprising a wearable device adapted to store personal identification data and to communicate with and/or be interrogated by an external device to reveal said data and further including sensor means for detecting continued contact with a wearer, and means for indicating that contact is or has been broken.
- 2. A security device as claimed in Claim 1, including means for indicating, during communication with or interrogation by said external device, that the contact is or was 10 broken.
- 3. A security device as claimed in Claim 1 or Claim 2, wherein the sensor comprises one or more means for sensing one or more of: physical contact, electrical properties of skin, thermal properties, pulse or heart rate monitoring and nerve impulses.
- 4. A security device as claimed in any preceding claim, adapted such, if after a device has been first interrogated to determine the identification data stored upon, if a device is removed or detached from the body of the wearer then this is indicated or stored.
- 5. A security device as claimed in Claim 4, wherein the fact that the device was removed from the user is indicated in a subsequent interrogation and/or communication device.
- 6. A security device as claimed in Claim 4 or Claim 5, including audible and/or visual alarm means for indicating that a device was removed from a wearer.
- 7. A security device as claimed in any preceding claim, incorporated into a wristband.
- 8. A security device as claimed in any of Claims 1 to 7 incorporated into a device which is worn by a user.
- 9. A security device as claimed in any of Claims 1 to 6 incorporated in an article of clothing.
- 10. A security device as claimed in any preceding claim, adapted to communicate with an external reader by Near Field Communication (NFC).
- 11. A security device as claimed in any preceding claim, adapted to store a monetary value or allowed spending limit, and to adjust this if disconnection from a wearer is 10 detected.
- 12. A security device as claimed in any preceding claim, usable to identify a user as a having been authorised for a particular task and/or access to a particular place.
- 13. A security device as claimed in Claim 12, wherein the authorisation is rescinded if removal of the device is detected.
- 14. A security device substantially as hereinbefore described with reference to, and as illustrated by, the accompanying drawings.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1420170.1A GB2532417A (en) | 2014-11-13 | 2014-11-13 | Security device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1420170.1A GB2532417A (en) | 2014-11-13 | 2014-11-13 | Security device |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201420170D0 GB201420170D0 (en) | 2014-12-31 |
GB2532417A true GB2532417A (en) | 2016-05-25 |
Family
ID=52248287
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1420170.1A Withdrawn GB2532417A (en) | 2014-11-13 | 2014-11-13 | Security device |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2532417A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5831535A (en) * | 1997-07-24 | 1998-11-03 | Elmo-Tech Ltd. | Electronic monitoring device and monitoring system including same |
GB2383666A (en) * | 2001-12-28 | 2003-07-02 | Alan Dodds | Proximity alarm and positioning system |
US20030174049A1 (en) * | 2002-03-18 | 2003-09-18 | Precision Dynamics Corporation | Wearable identification appliance that communicates with a wireless communications network such as bluetooth |
US20040257202A1 (en) * | 2003-06-19 | 2004-12-23 | Coughlin Michael E. | RFID tag and method of user verification |
US20080235144A1 (en) * | 2007-03-23 | 2008-09-25 | Simon Phillips | Pre-authenticated identification token |
-
2014
- 2014-11-13 GB GB1420170.1A patent/GB2532417A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5831535A (en) * | 1997-07-24 | 1998-11-03 | Elmo-Tech Ltd. | Electronic monitoring device and monitoring system including same |
GB2383666A (en) * | 2001-12-28 | 2003-07-02 | Alan Dodds | Proximity alarm and positioning system |
US20030174049A1 (en) * | 2002-03-18 | 2003-09-18 | Precision Dynamics Corporation | Wearable identification appliance that communicates with a wireless communications network such as bluetooth |
US20040257202A1 (en) * | 2003-06-19 | 2004-12-23 | Coughlin Michael E. | RFID tag and method of user verification |
US20080235144A1 (en) * | 2007-03-23 | 2008-09-25 | Simon Phillips | Pre-authenticated identification token |
Also Published As
Publication number | Publication date |
---|---|
GB201420170D0 (en) | 2014-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9013300B2 (en) | Method of communicating information through a wearable device | |
US10754433B2 (en) | Multi-device authentication | |
TWI646442B (en) | Survivability detection technology for user authentication | |
JP2019145152A (en) | Trusted device | |
US9649052B2 (en) | Systems, apparatus, and methods for using eyewear, or other wearable item, to confirm the identity of an individual | |
KR20160077976A (en) | Electronic device having user identifying function and user authentication method | |
DK2880585T3 (en) | BIOMETRIC AUTHENTICATION OF A PERSON | |
US20170161709A1 (en) | Method and system to organize and manage transactions | |
EP3281139B1 (en) | Method and system for associating a user with a wearable device | |
JP2015055952A (en) | Settlement system, settlement method, authentication server, authentication method, and program | |
US20190053739A1 (en) | Wearable apparatus, settlement system, and settlement method | |
US11100379B1 (en) | Multi-purpose smart card with user trusted bond | |
EP3494713B1 (en) | Wearable nfc device for secure data interaction | |
KR101777651B1 (en) | Payment method using blank card system | |
US20200387765A1 (en) | Security Measures in Relation to Data Tags and Contactless Cards | |
GB2532417A (en) | Security device | |
WO2017141279A1 (en) | Smart bracelet with electronic circuit for multifunction activity with smartphone nfc, and activities for authentication combined data (cda) for payments in safety and contactless | |
US20200053536A1 (en) | System and device for internet of things | |
JP2023542399A (en) | Device for electronic recognition of users | |
CN109255217A (en) | Wearable device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |