US20200329037A1 - Security system with a wireless security device - Google Patents
Security system with a wireless security device Download PDFInfo
- Publication number
- US20200329037A1 US20200329037A1 US16/915,584 US202016915584A US2020329037A1 US 20200329037 A1 US20200329037 A1 US 20200329037A1 US 202016915584 A US202016915584 A US 202016915584A US 2020329037 A1 US2020329037 A1 US 2020329037A1
- Authority
- US
- United States
- Prior art keywords
- wireless
- security
- security device
- wireless security
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000007246 mechanism Effects 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 4
- 238000001514 detection method Methods 0.000 description 11
- 230000033001 locomotion Effects 0.000 description 10
- 230000005540 biological transmission Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000004044 response Effects 0.000 description 8
- 238000000034 method Methods 0.000 description 6
- 230000000007 visual effect Effects 0.000 description 6
- 238000005259 measurement Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000004913 activation Effects 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 2
- 210000001124 body fluid Anatomy 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 210000001525 retina Anatomy 0.000 description 2
- 230000008054 signal transmission Effects 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/26—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
- G07C2209/64—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle using a proximity sensor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- This disclosure relates generally to electronic systems, and, more particularly, to security systems utilizing wireless security devices.
- PIN personal identification number
- RFID passive radio-frequency identification
- a device includes a security controller to determine whether a wireless security device is authorized to access at least one resource protected by a secure access device based, at least in part, on identification signals that originate from the wireless security device.
- the security controller is configured to receive location information corresponding to the wireless security device from at least one wireless device.
- the security controller is configured to direct the security access device to disable at least one security measure that restricts user access to the at least one resource based, at least in part, on the location information corresponding to the wireless security device.
- a system includes a secure access device to control access to protected resources and a wireless device to identify a location of a wireless security device in an environment.
- the system also include a security controller to determine whether the wireless security device is authorized to access at least one resource protected by the secure access device based, at least in part, on identification signals that originate from the wireless security device and the identified location of the wireless security device in the environment.
- a wireless security device includes a controller to determine whether a user is authorized to utilize the wireless security device based, at least in part, on a biometric input from the user.
- the wireless security device also includes a wireless transmitter to automatically emit one or more identification signals when directed by the controller responsive to the determination.
- a security system is configured to disable at least one security measure that restricts user access to protected resources based, at least in part, on the one or more identification signals and a detected location of the wireless security device.
- FIGS. 1A-1D are block diagram examples of a security system according to embodiments of the invention.
- FIGS. 2A-2B and 3A-3B are block diagram examples for utilizing the wireless security device shown in FIG. 1A .
- FIG. 4 is a block diagram example of the wireless security device shown in FIG. 1A .
- FIG. 5 is a block diagram example of the secure access device according to embodiments of the invention.
- FIG. 6 is an example operational flowchart for the wireless security device and the security system according to embodiments of the invention.
- Security systems can implement one or more security measures to restrict user access to various protected resources, such as secured equipment or secured areas of a building or office.
- a wireless security device or key fob can automatically transmit identification signals that, when received by the security system, disable at least one of the security measures.
- the security system and the wireless security device can also implement multiple techniques to help ensure access to the protected resources is not granted to unauthorized users. Embodiments are shown and described below in greater detail.
- FIG. 1A is block diagram example of a security system 100 according to embodiments of the invention.
- the security system 100 includes one or more secure access devices, for example, included in a personal computer 110 , an access point 120 , an entry device 130 , and/or a security control unit 140 , which can selectively restrict access to protected resources.
- the secure access devices in the personal computer 110 or the access point 120 can authenticate a user, e.g., through a user log-on procedure, before allowing the user to utilize its processing resources.
- the entry device 130 includes a secure access device
- the entry device 130 can authenticate personal that are authorized to utilize an entrance 135 to a secured area, such as a building or an office.
- a wireless security device 400 includes a wireless transceiver 410 that can wirelessly communicate with one or more of the secure access devices and prompt them to disable security measures that restrict access to their protected resources. For example, the wireless security device 400 can transmit or emit identification signals that direct the secure access devices to disable their respective security measures.
- the wireless security device 400 is shown in FIG. 1A as a key fob-type device, in some embodiments, it or the related functionality can be integrated into and/or downloaded onto other electronic devices, e.g., mobile phones or handsets, laptop computers, digital music players, or any other device that can transmit identification signals to the security system 100 .
- the wireless security device 400 can periodically transmit the identification signals over a predetermined range from the wireless security device 400 .
- the secure access device can receive the identification signal and disable its corresponding security measure.
- the length of the delay between transmissions i.e., the frequency of the periodic transmissions, can be sufficiently short to cause the secure access device to keep the security measure disabled, while the secure access device is within the predetermined range of the wireless security device 400 .
- the security system 100 can include a security control unit 140 to communicate with one or more of the secure access devices, such as those included in the personal computer 110 , the access point 120 , and the entry device 130 .
- the security control unit 140 can be implemented on a server or other network device, and communicate with the secure access devices over one or more networks.
- the security control unit 140 can provide a centralized location to analyze identification signals from a wireless security device 400 and control the states of the security measures that restrict access to their protected resources. Embodiments of the wireless security device 400 and security system 100 will be described below in greater detail.
- the secure access devices or the security control unit 140 can log access events or attempts to access protected resources. These logging events can track usage of the protected resources, for various reasons including billing or maintenance.
- FIG. 1A shows several example applications that can include secure access devices, it is not meant to be exclusive.
- secure access devices can be included in automobiles, controlling security measures, such as car locks and ignition. For example, the secure access devices can automatically unlock car locks, activate an ignition, or allow a user to manual perform these tasks.
- the secure access devices can be used to control access to security containers, such as safes, file cabinets, safety deposit boxes, realtor lockboxes, mailboxes, utility enclosures for circuit breakers or meters, hotel rooms, trailers, shipping containers, etc.
- FIGS. 1B-1D are top-views of an example implementation for the security system 100 with the wireless security device 400 .
- the security system 100 can be utilized to selectively grant access to a secured area 180 , for example, through entrance 135 , and selectively grant access to secured resources, such as personal computers 110 and access point 120 .
- the security system 100 can include the security control unit 140 , which can be executed on or included in a security server 155 .
- the secured server 155 in some embodiments, can be located in a remote location from the secured area 180 , such as in a separate remote security room 150 .
- the remote security room 150 can be on-site, such as in a room or building near the secured area 180 , or located off-site and able to communicate with the rest of the security system 100 through one or more networks.
- the security control unit 140 can communicate with other portions of the security system 100 through a wired or wireless connection directly to the secure access devices of the security system 100 , or through one or more intermediary network nodes, such as the access point 120 .
- the security control unit 140 can control access to the secured area 180 through the entrance 135 via the entry device 130 .
- the entry device 130 can receive identification signals from the wireless security device 400 and forward them to the security control unit 140 for analysis and processing.
- the security control unit 140 can determine whether the wireless security device 400 is authorized to access the resource protected by the entry device, e.g., access to the secured area 180 through the entrance 135 , and transmit a response to the entry device 130 to indicate whether the entry device 130 is to grant the wireless security device 400 access to the secured area 180 through the entrance 135 .
- This authorization determination can be performed in various ways, for example, by comparing the identification signals received by the entry device 130 to an access list (not shown).
- the security system 100 can also include a proximity sensor 160 , which can help avert tailgating of multiple users through the entrance 135 .
- the proximity sensor 160 can be an infrared sensor, such as a passive infrared (PIR) sensor, and can detect when an object or person is close to the wireless security device 400 .
- the proximity sensor 160 can transmit a proximity detection signal to the security control unit 140 , and the security control unit 140 can determine whether to grant the wireless security device 400 access to the secured area 180 based on the identification signals from the entry device 130 and the proximity detection signal from the proximity sensor 160 .
- the security system 100 can include one or more sensor nodes 170 , which can be utilized to detect the location of the wireless security device 400 in the secured area 180 .
- the sensor nodes 170 can be nodes of a wireless sensor network (WSN) having location-finding capabilities, for example, 802.15.4a, Zigbee Pro, and other network systems built on standard wireless sensor network technologies, such as 104.15.4.
- WSN wireless sensor network
- the wireless sensor network can be used for environmental monitoring and control, such as HVAC and lighting control, as well as, detecting a location of the wireless security device 400 .
- the sensor nodes 170 can each measure a distance to the wireless security device 400 and report those distances to the security control unit 140 or directly to a secured access device, such as the personal computers 110 or the access point 120 .
- the security control unit 140 or the secured access device can determine a location of the wireless security device 400 within the secured area 180 based on the distance measurements from the sensor nodes 170 , and in some embodiments, a distance measurement from the secure access devices themselves.
- the secure access devices can receive identification signals from the wireless security device 400 and forward them to the security control unit 140 for analysis and processing.
- the security control unit 140 can transmit a response to the secure access devices, such as the personal computers 110 and the access point 120 , based on the identification signals and the location of the wireless security device 400 in the secured area 180 . For example, when the location of the wireless security device 400 is determined to be within a predetermined location of the secured area 180 , such as within a specified office or cubicle in the secured area 180 , the security control unit 140 can transmit the response to the secure access device to grant access to the protected resource.
- the security control unit 140 can determine the location of the wireless device 400 in the secured area 180 . This location determination can be made continually, periodically, intermittently, randomly, or when prompted by another device in the security system 100 , for example, upon detection of movement in the wireless security device 400 .
- the secure access device can signal the security control unit 140 when the wireless security device 400 fails to provide an identification signal after access has been granted, indicating that the wireless security device 400 is out-of-range of the secure access device.
- the wireless security device 400 can also internally detect motion or movement, and signal the secure access device and/or the security control unit 140 to prompt a location determination of the wireless security device 400 .
- the security system 100 can also include one or more motion sensors (not shown) that can detect motion within the secured area 180 and prompt a location determination of the wireless security device 400 responsive to detecting the motion.
- the security control unit 140 can signal the personal computer 110 to revoke access to the protected resource, for example, by logging-out the user.
- FIGS. 2A-2B and 3A-3B are block diagram examples for utilizing the wireless security device 400 shown in FIG. 1A .
- the wireless access device 400 can transmit identification signals over a wireless range 401 .
- the wireless access device 400 can control the magnitude or size of the wireless range 401 , for example, by varying the transmit signal strength of the wireless transceiver 410 .
- the wireless range 401 is shown as substantially spherical or circular, in some embodiments, the wireless transceiver 410 of the wireless security device 400 can be directional—projecting wireless signals in a specific direction from the wireless security device 400 .
- the security system 100 includes the entry device 130 and a locking mechanism 220 , which can be at least partially housed within a wall 210 .
- the wall 210 can also define an entrance 135 and support a door 230 to restrict access to through the entrance 135 , for example, when the door 230 is coupled to the locking mechanism 220 .
- the entry device 130 can control the locking mechanism 220 to lock or unlock the door 230 , which selectively grants access to the entrance 135 , in response to wireless signals from the wireless security device 400 .
- FIGS. 2A and 2B show a door 230 as restricting access through the entrance 135 , in some embodiments, any object that can restrict access to the entrance 135 responsive to the entry device 130 and locking mechanism 220 .
- the locking mechanism 220 can lock the door 230 and deny access through the entrance 135 .
- the entry device 130 can direct the locking mechanism 220 to unlock the door 230 , granting access through the entrance 135 .
- the entry device 130 can receive identification signals from the wireless security device 400 that prompt the entry device 130 to have the locking mechanism 220 unlock the door 230 .
- the door 230 can open automatically responsive to the entry device 130 , while in other embodiments, an unlock door 230 can be manually opened by a user attempting to pass through the entrance 135 .
- the entry device 130 can include a proximity sensor (not shown) to help avert tailgating of multiple users through the door 230 .
- the proximity sensor can be an infrared sensor, such as a passive infrared (PIR) sensor, and can detect when multiple users are close to the door 230 .
- PIR passive infrared
- the entry device 130 can provide an alert, such as an audible or visual presentation, that indicates to the users that too many users are near the door 230 .
- the entry device 130 can also disable access through the entrance 135 until the excess users move away from the door 230 based on the detection by the proximity sensor.
- the wireless access device 400 can transmit identification signals over a wireless range 401 .
- the security system 100 includes a personal computer 110 having a secure access device 310 to restrict or provide access to at least some of the functions and/or resources of the personal computer 110 .
- the secure access device 310 can restrict access to at least some of the functions and/or resources of the personal computer 110 .
- the wireless range 401 can be a maximum distance wireless signals are detectable from the wireless security device 400 .
- the secure access device 310 can force one or more users to be logged off of the personal computer 110 when the wireless security device 400 is out-of-range of the secure access device 310 .
- the secure access device 310 can elect to not automatically provide access to the personal computer 110 .
- the secure access device 310 can also have a secure range 402 .
- the secure access device 310 can restrict access to at least some of the functions and/or resources of the personal computer 110 . Since, in some embodiments, the secure access device 310 can receive wireless signals from the wireless security device 400 when the wireless security device 400 is outside of the secure range 402 , the secure access device 310 may elect to provide access based on a location of the wireless security device 400 .
- the secure access device 310 can detect the location of the wireless security device 400 .
- the secure access device 310 can implement a wireless link with the wireless security device 400 and detect a distance the wireless security device 400 is from the secure access device 310 based on a signal strength analysis of the wireless link. For instance, the secure access device 310 can measure a strength of wireless signaling with the wireless security device 400 to detect a distance the wireless security device 400 is from the secure access device 310 .
- the wireless link between the secure access device 310 and the wireless security device 400 can utilize multiple frequency bands, such as 300-400 MHz UHF, 800 MHz and 2.4 GHz bands, and measure the signal strength on each frequency, possibly several times in each direction, to provide an accurate measurement of the distance between the secure access device 310 and the wireless security device 400 .
- multiple frequency bands such as 300-400 MHz UHF, 800 MHz and 2.4 GHz bands
- the distance the wireless security device 400 is from the secure access device 310 is less important than the actual location of the wireless security device 400 within the environment.
- the secure access device 310 can have access to multiple receivers located in the environment, as shown and described above in FIGS. 1B-1D , the location of the wireless security device 400 in the environment can be detected.
- the multiple receivers in some embodiments, can be nodes of a wireless sensor network (WSN) having location-finding capabilities, for example, 802.15.4a, Zigbee Pro, and other network systems built on standard wireless sensor network technologies, such as 104.15.4.
- the wireless sensor network can be used for environmental monitoring and control, such as HVAC and lighting control, as well as, detecting a location of the wireless security device 400 .
- the multiple receives can each measure a distance to the wireless security device 400 and report those distances to the secure access device 310 or to the security control unit 140 .
- the secure access device 310 or the security control unit 140 can determine a location of the wireless security device 400 based on the distance measurements from the multiple receivers and optionally the secure access device 310 .
- the secure access device 310 can grant the wireless security device 400 access to the personal computer.
- the wireless security device 400 can communicate with the secure access device 310 and/or security control unit 140 over the wireless sensor network.
- the initial challenge to the wireless security device 400 can be issued over the wireless sensor network and location determined using the wireless sensor network, but, in some embodiments, additional authentication of the wireless security device 400 can take place over another wireless network, such as WiFi.
- the secure access device 310 can grant user access to at least some of the functions and/or resources of the personal computer 110 .
- the secure access device 310 can direct the personal computer 110 to automatically log-on at least one user.
- identification signals from the wireless security device 400 can identify a particular user that is associated with the wireless security device 400 and the secure access device 310 can automatically log-on that particular user.
- the secure access device 310 can remove a login lock.
- the secure access device 310 can assert the login lock and deny one or more users the opportunity to log-on to the personal computer 110 .
- the login lock can disable various peripherals of the personal computer 110 , such as a keyboard, mouse, display device, video interface, etc.
- the secure access device 310 can provide the user the opportunity to manually log-on to the personal computer 110 .
- the secure access device 310 can also remove the login lock for all users or for particular users, such as those users associated with the wireless security device 400 .
- the secure access device 310 when the secure access device 310 is within the wireless range 401 of the wireless security device 400 , the secure access device 310 can allow a logged-on user access to particular resources of personal computer 110 that would not be accessible to the logged-on user without the presence of the wireless access device 400 .
- the secure access device 310 can restrict user access to secure data, particular programs and applications, or other resources available to the personal computer 110 , while allowing the user to log-on to the personal computer 110 and access to other programs, applications, resources, and data.
- the wireless security device 400 includes various features that help to protect the security system 100 from unauthorized user access, for example, by authenticating users attempting to utilize the wireless security device 400 and/or by protecting the wireless communication between the wireless security device 400 and the security system 100 .
- the wireless security device 400 can authenticate a user of the wireless security device 400 , for example, by including a biometric scanner 420 to scan at least a part of a user or detect a behavior of the user for the biometric input.
- the biometric scanner 420 can be a fingerprint scanner, iris or retina scanner, a bodily fluid scanner, voice recognition system, or any other device that can identify a unique physical and/or behavioral attribute of the user.
- the wireless security device 400 can receive a biometric input from the biometric scanner 420 and compare the biometric input to one or more known user profiles 471 .
- the user profiles 471 can be stored in a memory device 470 of the wireless security device 400 .
- the wireless security device 400 can include a controller 460 to receive the biometric input from the biometric scanner 420 , access the memory device 470 to locate the user profiles 471 , and compare the biometric input to the user profiles 471 .
- the user profiles 471 may be stored in the security control unit 140 , and the wireless security device 400 may send encrypted biometric data to the security control 140 unit for verification.
- the wireless security device 400 can become activated, for example, to emit identification signals.
- the controller 460 can generate the identification signals, for example, from identification signal information 473 stored in the memory device 470 .
- the identification signals can be signals that are common to multiple wireless devices, device-specific signals, and/or user-specific signals.
- the wireless security device 400 can remain active indefinitely or for a predetermined period of time.
- the security system 100 can signal the wireless security device 400 to become disabled, which can override previous user activation.
- the wireless security device 400 can become disabled, for example, by blocking the wireless transceiver 410 from sending or receiving signals. In some embodiments, the wireless security device 400 can remain disabled until the biometric scanner 420 provides the wireless security device 400 a biometric input that matches a known user profile 471 .
- the wireless security device 400 includes motion detection functionality (not shown), that can detect movement of the wireless security device 400 or of objects nearby the wireless security device 400 .
- the wireless security device 400 can remain active based on the input received from the motion detection functionality. For example, the wireless security device 400 can become disabled when the wireless security device 400 is moved after a period of inactivity. In another example, the wireless security device 400 can remain activated while in motion, but become disabled, after coming to rest for a preset period of time.
- the wireless security device 400 includes proximity detection functionality (not shown), that can detect the presence of a user near the wireless security device 400 .
- the proximity detection functionality can include capacitive sensing and/or infrared sensing, for example, a passive infrared (PIR) sensor, which can detect the presence of a user near the wireless security device 400 .
- PIR passive infrared
- the wireless security device 400 can remain active based on the input received from the proximity detection functionality. For example, the wireless security device 400 can become disabled when proximity detection functionality detects the wireless security device 400 is separated from the user.
- the wireless security device 400 can remain active based on a detected location of the wireless security device 400 in the environment covered by the wireless sensor network. For example, when the wireless security device 400 leaves the area covered by the wireless sensor network, the wireless security device 400 can become disabled.
- the wireless security device 400 can take additional defensive actions when the biometric input fails to match one or more of the known user profiles and/or after the wireless security device 400 has been inactive to a predetermined period of time.
- the wireless security device 400 can store the biometric input that failed to match the known user profiles 471 , for example, in the memory device 470 . This stored biometric input can subsequently be transferred to the security system 100 , for example, through the wireless transmitter 410 .
- the wireless security device 400 can destroy stored data, such as the known user profiles 471 , encryption data 472 , and identification signal information 473 , when the biometric input fails to match one or more of the known user profiles 471 and/or after the wireless security device 400 has been inactive to a predetermined period of time.
- the destruction of data helps to ensure information utilized by the wireless security device 400 to gain access to protected resources is not compromised if the wireless access device 400 is mislaid or stolen.
- the wireless access device 400 can transmit the alert signal through the wireless transceiver 410 .
- the alert signal is configured to indicate to the security system 100 that the wireless security device 400 may be in possession of an unauthorized user.
- the security system 100 in response to the alert signal, can shut down access to the protected resources for all users or for the particular wireless security device 400 .
- the security system 100 can identify the location that one or more of the secure access devices received the alert signal, allowing security personal to attempt to locate the wireless security device 400 .
- the wireless security device 400 has access additional networks, for example, a local area network (LAN), such as a WiFi network, a cellular network, a wide area network (WAN), an 802.16 (Wimax) network, a Free Space Optical (FSO) network, or other voice or data networks, and/or include global positioning system (GPS) functionality
- LAN local area network
- WiFi WiFi network
- WAN wide area network
- Wimax 802.16
- FSO Free Space Optical
- GPS global positioning system
- the wireless security device 400 can attempt to secure the communication with the security system 100 in several ways. For example, the wireless security device 400 can encrypt the identification signals before they are transmitted or emitted from the wireless security device 400 . In some embodiments, the controller 460 can access the encryption data 472 in the memory device 470 and generate the identification signals based on the encryption data 472 .
- the wireless security device 400 can vary the wireless frequency over which the identification signals are transmitted.
- the identification signal information 473 in the memory device 470 can indicate which wireless frequency for the wireless transceiver 410 to transmit the identification signals.
- the frequency variation can be performed based on the day, time, or other temporal indicator.
- the wireless security device 400 can emit identification signals over one wireless frequency or channel during normal business hours, and another wireless frequency during off hours.
- the frequency variation can also be based on the specific wireless security device 400 and/or the user of the wireless security device 400 .
- the wireless security device 400 can periodically transmit the identification signals, which can also be utilized as a basis for authenticating the wireless security device 400 .
- the wireless security device 400 can vary the periodicity or frequency of the transmission based on temporal indicators, such as time and/or day, or based on the wireless security device 400 and/or user of the wireless security device 400 .
- the identification signal information 473 in the memory device 470 can indicate the delay between identification signal transmissions.
- the security system 100 can be configured to receive the identification signals and authenticate the wireless security device 400 based on the contents of the identification signal and the mode of communication, e.g., which wireless frequency was utilized for transmission or the period of the identification signal transmissions.
- the security system 100 can also determine if the same or similar identification signals were received on other wireless frequencies, indicating a counterfeit device may be attempting access by transmitting the identification signals on all channels or wireless frequencies.
- the wireless security device 400 can be activated, but hold-off transmitting identification signals until the wireless security device 400 is within range of a secure access device of the security system 100 .
- the secure access device can emit a proximity signal that, when received by the wireless security device 400 , prompts the wireless security device 400 to begin transmitting the identification signals. This limits where the wireless security device 400 transmits the identification signals, and helps to avoid eavesdropping on the identification signals by unauthorized users.
- the proximity signal emitted by the security system 100 can have the same or similar security features as those discussed above with the identification signals, such as being encrypted and having varied wireless frequency and transmission periodicity.
- the wireless security device 400 when activated, can periodically transmit a “ping” signal to initiate a user authentication session.
- the ping signal can be short wireless signal, for example, a radio frequency signal that can be detected and discriminated from noise and/or interfering signals.
- the ping can include a unique data sequence and can be the same for all wireless security devices 400 , or can have characteristics that are unique to a particular wireless security device 400 or a group of wireless security devices 400 .
- the secure access device can receive the ping and respond with a request to begin the authentication process with the wireless security device 400 .
- the wireless security device 400 and the security system 100 can also perform an initial handshake or exchange of signals or datagrams to ensure the wireless security device 400 is authentic.
- the handshake can be initiated by either the wireless security device 400 or the security system 100 and can include a request by the security system 100 for a unique response.
- the wireless security device 400 can generate the unique response based on the information in the request from the security system 100 , and possibly information stored in the wireless security device 400 and/or the mode of communicating the request, such as the wireless transmission frequency.
- the security system 100 can analyze the unique response received from the wireless security device 400 to determine whether the wireless security device 400 is authentic.
- the security system 100 can also periodically and/or intermittently request a follow-up handshake for additional security.
- the wireless security device 400 can include multiple wireless transceivers that can be utilized to implement the different stages of authentication processes—initiation, location detection, and authentication. For example, as discussed above, initiation of the authentication process by either the wireless security device 400 or the secure access device can utilize a wireless transceiver that has low-power consumption to help save battery life. To help the secure access device determine a location of the wireless security device 400 , the wireless access device 400 may utilize a different wireless transceiver, for example, that can communicate with a wireless sensor network. Finally during authentication, the wireless security device 400 can utilize yet another wireless transceiver that allows for additional security or encryption, for example, that can communicate over a WiFi network. In some embodiments, any of these wireless transceivers can be utilized for any of the different stages of authentication processes.
- the security system 100 can also include the security control unit 140 , which can allow for an additional layer of defense against unauthorized access.
- the security control unit 140 can communicate with one or more of the secure access devices, such as those included in the personal computer 110 , the access point 120 , and the entry device 130 .
- the security control unit 140 can provide a centralized location to analyze identification signals from the wireless security device 400 and control the states of the security measures that restrict access to their protected resources.
- the security system 100 can secure any information utilized in determining when identification signals are received from an authentic wireless security device 400 .
- the security control unit 140 can be stored in a secured room within a building or at a remote location, and thus a theft of a personal computer 110 , the access point 120 , and the entry device 130 , may not compromise any access information utilized to allow the user of the wireless security device 400 access to protected resources.
- the centralized authentication of the wireless security device 400 can also allow for layered security.
- the security control unit 140 would be able to tell when a wireless security device 400 was currently accessing one protected resource and attempting to access another protected resource in a physically distinct regions or spaces. For instance, when the wireless security device 400 is currently accessing the personal computer 110 located in an office and also attempting to access the building, the security control unit 140 can determine at least one of the accesses is being performed by a counterfeit device.
- the wireless security device 400 can include input devices 430 that allow a user to manually activate, disable, or send an alert, for example, by actuating buttons 431 - 433 , respectively.
- the manual activation, disablement, and/or alert can be achieved when the user has already been authenticated through the biometric input process described, and/or by actuating the buttons 431 , 432 , and/or 433 in a predetermined pattern.
- FIG. 1A shows the input devices 430 as a set of buttons, in some embodiments, the input devices 430 can be a touch screen device, a roller ball or mouse device, audio recognition device, or any other device that allows a user to present a manual input to the wireless security device 400 .
- the wireless security device 400 can include output devices 480 to provide visual and/or audio indications to the user of the wireless security device 400 .
- the visual and/or audio indications can identify a state of the wireless security device 400 , such as whether it is activated or disabled, and/or actively transmitting identification signals or alert signals.
- the visual and/or audio indications can also be utilized to help a user locate a missing device, for example, by presenting an auditory sound or ring.
- the output devices 480 can include lights, speakers, visual displays, or any other visual and/or audio device that can provide an output perceptible by the user.
- FIG. 5 is a block diagram example of the secure access device 500 according to embodiments of the invention.
- the secure access device 500 includes a wireless transceiver 510 to exchange wireless signals with one or more wireless security devices 400 .
- the wireless transceiver 510 can pass received wireless signals along to a security controller 550 for analysis.
- the security controller 550 can analyze received wireless signals based, at least in part, on information stored in the memory device 540 .
- the security controller 550 can utilize the access information 541 and possibly the user profiles 542 to determine whether the wireless signals received by the wireless transceiver 510 authenticate a wireless security device 400 within range of the secure access device 500 .
- the security controller 550 can forward the received signals to another device, such as the security control unit 140 , through the security system interface 530 for analysis.
- the access information 541 can include information on an expected format of the wireless signals, and an expected mode of communication, e.g., the frequency of the wireless signals and the delay between the periodic transmissions.
- the user profiles 542 can include information on particular users or classes of users that can access or that are denied access to resources protected by the secure access device 500 .
- the classes of users can be a subset or group of one or more users that have common access privileges, which can be set arbitrarily or based on some common characteristic.
- the security controller 550 can direct the locking mechanism 520 to disable one or more security measures. For example, when the locking mechanism 520 is locking an access point 120 , the locking mechanism 520 can enable the access point 120 to provide access to a network to at least the user associated with the wireless security device 400 .
- FIG. 6 is an example operational flowchart 600 for the wireless security device and the security system according to embodiments of the invention.
- the wireless security device 400 can be configured to capture a biometric input of a user.
- the wireless security device 400 can include a biometric scanner 420 to capture the biometric input of a user.
- the biometric scanner 420 can be a fingerprint scanner, iris or retina scanner, a bodily fluid scanner, voice recognition system, or any other device that can identify a unique physical and/or behavioral attribute of the user.
- the wireless security device 400 can be configured to determine whether the user is authorized to utilize the wireless security device 400 based, at least in part, on a biometric input of the user. In some embodiments, the wireless security device 400 can be configured to authorize the user to utilize the wireless security device when the biometric input at least substantially matches one or more predefined user profiles stored in the wireless security device 400 .
- the wireless security device 400 can be configured to periodically transmit one or more identification signals when the user is authorized.
- the one or more identification signals can be configured to prompt a security system 100 to disable at least one security measure that restricts user access to resources protected by the security system 100 .
- the security system 100 can be configured to automatically re-engage the at least one security measure when the security system 100 is outside a transmission range of the wireless security device 400 .
- the wireless security device 400 can be configured to disable the wireless security device 400 from periodically transmitting the one or more identification signals when the user is not authorized to utilize the wireless security device 400 .
- the wireless security device 400 can transmit one or more alert signals instead of the identification signals.
- the alert signals can be configured to prompt the security system 100 to lock access to the protected resources for the wireless security device 400 .
Abstract
Description
- The present application is a continuation application of U.S. Non-Provisional application Ser. No. 14/512,944, filed on Oct. 13, 2014, which claims the priority and benefit of U.S. Non-Provisional application Ser. No. 12/948,587, filed on Nov. 17, 2010, all of which are incorporated by reference herein in their entirety.
- This disclosure relates generally to electronic systems, and, more particularly, to security systems utilizing wireless security devices.
- Many buildings and offices have security systems that selectively allow personnel admission through their various entrances. These security systems typically have automated locks on their entrances, which can be temporarily deactivated by personnel that are authorized to access the buildings or offices.
- Businesses will often issue authorized personnel a personal identification number (PIN) or a pass card, for example, having passive radio-frequency identification (RFID) technology, which can be utilized to gain access to the buildings or offices. The personal identification number, when entered into the security system, or the pass card, when swiped across the security system, will temporarily deactivate or unlock the automated lock for a particular entrance long enough to allow the authorized personnel access to the building or office.
- This patent application discloses a device includes a security controller to determine whether a wireless security device is authorized to access at least one resource protected by a secure access device based, at least in part, on identification signals that originate from the wireless security device. The security controller is configured to receive location information corresponding to the wireless security device from at least one wireless device. When the wireless security device is authorized to access at least one resource, the security controller is configured to direct the security access device to disable at least one security measure that restricts user access to the at least one resource based, at least in part, on the location information corresponding to the wireless security device.
- A system includes a secure access device to control access to protected resources and a wireless device to identify a location of a wireless security device in an environment. The system also include a security controller to determine whether the wireless security device is authorized to access at least one resource protected by the secure access device based, at least in part, on identification signals that originate from the wireless security device and the identified location of the wireless security device in the environment.
- A wireless security device includes a controller to determine whether a user is authorized to utilize the wireless security device based, at least in part, on a biometric input from the user. The wireless security device also includes a wireless transmitter to automatically emit one or more identification signals when directed by the controller responsive to the determination. A security system is configured to disable at least one security measure that restricts user access to protected resources based, at least in part, on the one or more identification signals and a detected location of the wireless security device.
-
FIGS. 1A-1D are block diagram examples of a security system according to embodiments of the invention. -
FIGS. 2A-2B and 3A-3B are block diagram examples for utilizing the wireless security device shown inFIG. 1A . -
FIG. 4 is a block diagram example of the wireless security device shown inFIG. 1A . -
FIG. 5 is a block diagram example of the secure access device according to embodiments of the invention. -
FIG. 6 is an example operational flowchart for the wireless security device and the security system according to embodiments of the invention. - Security systems can implement one or more security measures to restrict user access to various protected resources, such as secured equipment or secured areas of a building or office. A wireless security device or key fob can automatically transmit identification signals that, when received by the security system, disable at least one of the security measures. The security system and the wireless security device can also implement multiple techniques to help ensure access to the protected resources is not granted to unauthorized users. Embodiments are shown and described below in greater detail.
-
FIG. 1A is block diagram example of asecurity system 100 according to embodiments of the invention. Referring toFIG. 1A , thesecurity system 100 includes one or more secure access devices, for example, included in apersonal computer 110, anaccess point 120, anentry device 130, and/or asecurity control unit 140, which can selectively restrict access to protected resources. For instance, the secure access devices in thepersonal computer 110 or theaccess point 120 can authenticate a user, e.g., through a user log-on procedure, before allowing the user to utilize its processing resources. When theentry device 130 includes a secure access device, theentry device 130 can authenticate personal that are authorized to utilize anentrance 135 to a secured area, such as a building or an office. - A
wireless security device 400 includes awireless transceiver 410 that can wirelessly communicate with one or more of the secure access devices and prompt them to disable security measures that restrict access to their protected resources. For example, thewireless security device 400 can transmit or emit identification signals that direct the secure access devices to disable their respective security measures. Although thewireless security device 400 is shown inFIG. 1A as a key fob-type device, in some embodiments, it or the related functionality can be integrated into and/or downloaded onto other electronic devices, e.g., mobile phones or handsets, laptop computers, digital music players, or any other device that can transmit identification signals to thesecurity system 100. - The
wireless security device 400, in some embodiments, can periodically transmit the identification signals over a predetermined range from thewireless security device 400. Thus, when thewireless security device 400 travels within the predetermined range of a secure access device, the secure access device can receive the identification signal and disable its corresponding security measure. The length of the delay between transmissions, i.e., the frequency of the periodic transmissions, can be sufficiently short to cause the secure access device to keep the security measure disabled, while the secure access device is within the predetermined range of thewireless security device 400. - The
security system 100 can include asecurity control unit 140 to communicate with one or more of the secure access devices, such as those included in thepersonal computer 110, theaccess point 120, and theentry device 130. In some embodiments, thesecurity control unit 140 can be implemented on a server or other network device, and communicate with the secure access devices over one or more networks. Thesecurity control unit 140 can provide a centralized location to analyze identification signals from awireless security device 400 and control the states of the security measures that restrict access to their protected resources. Embodiments of thewireless security device 400 andsecurity system 100 will be described below in greater detail. - In some embodiments, the secure access devices or the
security control unit 140 can log access events or attempts to access protected resources. These logging events can track usage of the protected resources, for various reasons including billing or maintenance. AlthoughFIG. 1A shows several example applications that can include secure access devices, it is not meant to be exclusive. In some embodiments, secure access devices can be included in automobiles, controlling security measures, such as car locks and ignition. For example, the secure access devices can automatically unlock car locks, activate an ignition, or allow a user to manual perform these tasks. The secure access devices can be used to control access to security containers, such as safes, file cabinets, safety deposit boxes, realtor lockboxes, mailboxes, utility enclosures for circuit breakers or meters, hotel rooms, trailers, shipping containers, etc. -
FIGS. 1B-1D are top-views of an example implementation for thesecurity system 100 with thewireless security device 400. Referring toFIGS. 1B-1D , thesecurity system 100 can be utilized to selectively grant access to a securedarea 180, for example, throughentrance 135, and selectively grant access to secured resources, such aspersonal computers 110 andaccess point 120. - The
security system 100 can include thesecurity control unit 140, which can be executed on or included in asecurity server 155. The securedserver 155, in some embodiments, can be located in a remote location from thesecured area 180, such as in a separateremote security room 150. Theremote security room 150 can be on-site, such as in a room or building near thesecured area 180, or located off-site and able to communicate with the rest of thesecurity system 100 through one or more networks. Thesecurity control unit 140 can communicate with other portions of thesecurity system 100 through a wired or wireless connection directly to the secure access devices of thesecurity system 100, or through one or more intermediary network nodes, such as theaccess point 120. - Referring to
FIG. 1B , thesecurity control unit 140 can control access to thesecured area 180 through theentrance 135 via theentry device 130. For example, when thewireless security device 400 has been activated by a user and is within a wireless range of theentry device 130, theentry device 130 can receive identification signals from thewireless security device 400 and forward them to thesecurity control unit 140 for analysis and processing. In some embodiments, thesecurity control unit 140 can determine whether thewireless security device 400 is authorized to access the resource protected by the entry device, e.g., access to thesecured area 180 through theentrance 135, and transmit a response to theentry device 130 to indicate whether theentry device 130 is to grant thewireless security device 400 access to thesecured area 180 through theentrance 135. This authorization determination can be performed in various ways, for example, by comparing the identification signals received by theentry device 130 to an access list (not shown). - The
security system 100 can also include aproximity sensor 160, which can help avert tailgating of multiple users through theentrance 135. Theproximity sensor 160 can be an infrared sensor, such as a passive infrared (PIR) sensor, and can detect when an object or person is close to thewireless security device 400. Theproximity sensor 160 can transmit a proximity detection signal to thesecurity control unit 140, and thesecurity control unit 140 can determine whether to grant thewireless security device 400 access to thesecured area 180 based on the identification signals from theentry device 130 and the proximity detection signal from theproximity sensor 160. - Referring to
FIGS. 1C and 1D , thesecurity system 100 can include one ormore sensor nodes 170, which can be utilized to detect the location of thewireless security device 400 in thesecured area 180. Thesensor nodes 170, in some embodiments, can be nodes of a wireless sensor network (WSN) having location-finding capabilities, for example, 802.15.4a, Zigbee Pro, and other network systems built on standard wireless sensor network technologies, such as 104.15.4. In some embodiments, the wireless sensor network can be used for environmental monitoring and control, such as HVAC and lighting control, as well as, detecting a location of thewireless security device 400. - The
sensor nodes 170, in some embodiments, can each measure a distance to thewireless security device 400 and report those distances to thesecurity control unit 140 or directly to a secured access device, such as thepersonal computers 110 or theaccess point 120. Thesecurity control unit 140 or the secured access device can determine a location of thewireless security device 400 within thesecured area 180 based on the distance measurements from thesensor nodes 170, and in some embodiments, a distance measurement from the secure access devices themselves. - The secure access devices, such as the
personal computers 110 and theaccess point 120, can receive identification signals from thewireless security device 400 and forward them to thesecurity control unit 140 for analysis and processing. Thesecurity control unit 140 can transmit a response to the secure access devices, such as thepersonal computers 110 and theaccess point 120, based on the identification signals and the location of thewireless security device 400 in thesecured area 180. For example, when the location of thewireless security device 400 is determined to be within a predetermined location of thesecured area 180, such as within a specified office or cubicle in thesecured area 180, thesecurity control unit 140 can transmit the response to the secure access device to grant access to the protected resource. - After access has been granted to the protected resource, the
security control unit 140 can determine the location of thewireless device 400 in thesecured area 180. This location determination can be made continually, periodically, intermittently, randomly, or when prompted by another device in thesecurity system 100, for example, upon detection of movement in thewireless security device 400. In some embodiments, the secure access device can signal thesecurity control unit 140 when thewireless security device 400 fails to provide an identification signal after access has been granted, indicating that thewireless security device 400 is out-of-range of the secure access device. Thewireless security device 400 can also internally detect motion or movement, and signal the secure access device and/or thesecurity control unit 140 to prompt a location determination of thewireless security device 400. Thesecurity system 100 can also include one or more motion sensors (not shown) that can detect motion within thesecured area 180 and prompt a location determination of thewireless security device 400 responsive to detecting the motion. When thewireless security device 400 is detected as being outside of a predetermined location in thesecured area 180, thesecurity control unit 140 can signal thepersonal computer 110 to revoke access to the protected resource, for example, by logging-out the user. -
FIGS. 2A-2B and 3A-3B are block diagram examples for utilizing thewireless security device 400 shown inFIG. 1A . Referring toFIGS. 2A and 2B , thewireless access device 400 can transmit identification signals over awireless range 401. In some embodiments, thewireless access device 400 can control the magnitude or size of thewireless range 401, for example, by varying the transmit signal strength of thewireless transceiver 410. Although thewireless range 401 is shown as substantially spherical or circular, in some embodiments, thewireless transceiver 410 of thewireless security device 400 can be directional—projecting wireless signals in a specific direction from thewireless security device 400. - The
security system 100 includes theentry device 130 and alocking mechanism 220, which can be at least partially housed within awall 210. Thewall 210 can also define anentrance 135 and support adoor 230 to restrict access to through theentrance 135, for example, when thedoor 230 is coupled to thelocking mechanism 220. Theentry device 130 can control thelocking mechanism 220 to lock or unlock thedoor 230, which selectively grants access to theentrance 135, in response to wireless signals from thewireless security device 400. AlthoughFIGS. 2A and 2B , show adoor 230 as restricting access through theentrance 135, in some embodiments, any object that can restrict access to theentrance 135 responsive to theentry device 130 andlocking mechanism 220. - As shown in
FIG. 2A , when theentry device 130 is not within thewireless range 401 of thewireless security device 400, thelocking mechanism 220 can lock thedoor 230 and deny access through theentrance 135. InFIG. 2B , when thewireless security device 400 travels towards theentry device 130 and theentry device 130 is within thewireless range 401 of thewireless security device 400, theentry device 130 can direct thelocking mechanism 220 to unlock thedoor 230, granting access through theentrance 135. For example, when theentry device 130 is within thewireless range 401, theentry device 130 can receive identification signals from thewireless security device 400 that prompt theentry device 130 to have thelocking mechanism 220 unlock thedoor 230. In some embodiments, thedoor 230 can open automatically responsive to theentry device 130, while in other embodiments, anunlock door 230 can be manually opened by a user attempting to pass through theentrance 135. - In some embodiments, the
entry device 130 can include a proximity sensor (not shown) to help avert tailgating of multiple users through thedoor 230. The proximity sensor can be an infrared sensor, such as a passive infrared (PIR) sensor, and can detect when multiple users are close to thedoor 230. When multiple users are close to thedoor 230, theentry device 130 can provide an alert, such as an audible or visual presentation, that indicates to the users that too many users are near thedoor 230. Theentry device 130 can also disable access through theentrance 135 until the excess users move away from thedoor 230 based on the detection by the proximity sensor. - Referring to
FIGS. 3A and 3B , similar to as shown inFIGS. 2A and 2B , thewireless access device 400 can transmit identification signals over awireless range 401. Thesecurity system 100 includes apersonal computer 110 having asecure access device 310 to restrict or provide access to at least some of the functions and/or resources of thepersonal computer 110. - In
FIG. 3A , when thepersonal computer 110 is not within thewireless range 401 of thewireless security device 400, thesecure access device 310 can restrict access to at least some of the functions and/or resources of thepersonal computer 110. Thewireless range 401 can be a maximum distance wireless signals are detectable from thewireless security device 400. For example, thesecure access device 310 can force one or more users to be logged off of thepersonal computer 110 when thewireless security device 400 is out-of-range of thesecure access device 310. In some embodiments, when thepersonal computer 110 is not within thewireless range 401 of thewireless security device 400, thesecure access device 310 can elect to not automatically provide access to thepersonal computer 110. - In some embodiments, the
secure access device 310 can also have asecure range 402. When thewireless security device 400 is not within thesecure range 402 of thesecure access device 310, thesecure access device 310 can restrict access to at least some of the functions and/or resources of thepersonal computer 110. Since, in some embodiments, thesecure access device 310 can receive wireless signals from thewireless security device 400 when thewireless security device 400 is outside of thesecure range 402, thesecure access device 310 may elect to provide access based on a location of thewireless security device 400. - There are several ways the
secure access device 310 can detect the location of thewireless security device 400. Thesecure access device 310 can implement a wireless link with thewireless security device 400 and detect a distance thewireless security device 400 is from thesecure access device 310 based on a signal strength analysis of the wireless link. For instance, thesecure access device 310 can measure a strength of wireless signaling with thewireless security device 400 to detect a distance thewireless security device 400 is from thesecure access device 310. In some embodiments, the wireless link between thesecure access device 310 and thewireless security device 400 can utilize multiple frequency bands, such as 300-400 MHz UHF, 800 MHz and 2.4 GHz bands, and measure the signal strength on each frequency, possibly several times in each direction, to provide an accurate measurement of the distance between thesecure access device 310 and thewireless security device 400. - In some applications, such as in when an environment has adjoining workstations or cubicles, the distance the
wireless security device 400 is from thesecure access device 310 is less important than the actual location of thewireless security device 400 within the environment. When thesecure access device 310 can have access to multiple receivers located in the environment, as shown and described above inFIGS. 1B-1D , the location of thewireless security device 400 in the environment can be detected. The multiple receivers, in some embodiments, can be nodes of a wireless sensor network (WSN) having location-finding capabilities, for example, 802.15.4a, Zigbee Pro, and other network systems built on standard wireless sensor network technologies, such as 104.15.4. In some embodiments, the wireless sensor network can be used for environmental monitoring and control, such as HVAC and lighting control, as well as, detecting a location of thewireless security device 400. - The multiple receives, in some embodiments, can each measure a distance to the
wireless security device 400 and report those distances to thesecure access device 310 or to thesecurity control unit 140. Thesecure access device 310 or thesecurity control unit 140 can determine a location of thewireless security device 400 based on the distance measurements from the multiple receivers and optionally thesecure access device 310. When the location of thewireless security device 400 is determined to be within thesecure range 402 of thesecure access device 310, thesecure access device 310 can grant thewireless security device 400 access to the personal computer. - In some embodiments, the
wireless security device 400 can communicate with thesecure access device 310 and/orsecurity control unit 140 over the wireless sensor network. For example, the initial challenge to thewireless security device 400 can be issued over the wireless sensor network and location determined using the wireless sensor network, but, in some embodiments, additional authentication of thewireless security device 400 can take place over another wireless network, such as WiFi. - In
FIG. 3B , when thesecure access device 310 is within thewireless range 401 of thewireless security device 400 and/or thewireless security device 400 falls within the range of thesecure range 402 of thesecure access device 310, thesecure access device 310 can grant user access to at least some of the functions and/or resources of thepersonal computer 110. For example, thesecure access device 310 can direct thepersonal computer 110 to automatically log-on at least one user. In some embodiments, identification signals from thewireless security device 400 can identify a particular user that is associated with thewireless security device 400 and thesecure access device 310 can automatically log-on that particular user. - In some embodiments, when the
secure access device 310 is within thewireless range 401 of thewireless security device 400, thesecure access device 310 can remove a login lock. For example, thesecure access device 310 can assert the login lock and deny one or more users the opportunity to log-on to thepersonal computer 110. The login lock can disable various peripherals of thepersonal computer 110, such as a keyboard, mouse, display device, video interface, etc. After thesecure access device 310 is within thewireless range 401 of thewireless security device 400, thesecure access device 310 can provide the user the opportunity to manually log-on to thepersonal computer 110. Thesecure access device 310 can also remove the login lock for all users or for particular users, such as those users associated with thewireless security device 400. - In some embodiments, when the
secure access device 310 is within thewireless range 401 of thewireless security device 400, thesecure access device 310 can allow a logged-on user access to particular resources ofpersonal computer 110 that would not be accessible to the logged-on user without the presence of thewireless access device 400. For example, thesecure access device 310 can restrict user access to secure data, particular programs and applications, or other resources available to thepersonal computer 110, while allowing the user to log-on to thepersonal computer 110 and access to other programs, applications, resources, and data. - Referring back to
FIG. 1A and toFIG. 4 , which includes a block diagram example of thewireless security device 400 shown inFIG. 1A . Thewireless security device 400 includes various features that help to protect thesecurity system 100 from unauthorized user access, for example, by authenticating users attempting to utilize thewireless security device 400 and/or by protecting the wireless communication between thewireless security device 400 and thesecurity system 100. - The
wireless security device 400 can authenticate a user of thewireless security device 400, for example, by including abiometric scanner 420 to scan at least a part of a user or detect a behavior of the user for the biometric input. In some embodiments, thebiometric scanner 420 can be a fingerprint scanner, iris or retina scanner, a bodily fluid scanner, voice recognition system, or any other device that can identify a unique physical and/or behavioral attribute of the user. - The
wireless security device 400 can receive a biometric input from thebiometric scanner 420 and compare the biometric input to one or more known user profiles 471. In some embodiments, the user profiles 471 can be stored in amemory device 470 of thewireless security device 400. Thewireless security device 400 can include acontroller 460 to receive the biometric input from thebiometric scanner 420, access thememory device 470 to locate the user profiles 471, and compare the biometric input to the user profiles 471. In some embodiments, the user profiles 471 may be stored in thesecurity control unit 140, and thewireless security device 400 may send encrypted biometric data to thesecurity control 140 unit for verification. - When the biometric input matches one or more of the known
user profiles 471, thewireless security device 400 can become activated, for example, to emit identification signals. Thecontroller 460 can generate the identification signals, for example, fromidentification signal information 473 stored in thememory device 470. The identification signals can be signals that are common to multiple wireless devices, device-specific signals, and/or user-specific signals. After receiving a biometric input that matches auser profile 471, thewireless security device 400 can remain active indefinitely or for a predetermined period of time. In some embodiments, thesecurity system 100 can signal thewireless security device 400 to become disabled, which can override previous user activation. - When the biometric input fails to match at least one of the user profiles 471, the
wireless security device 400 can become disabled, for example, by blocking thewireless transceiver 410 from sending or receiving signals. In some embodiments, thewireless security device 400 can remain disabled until thebiometric scanner 420 provides the wireless security device 400 a biometric input that matches a knownuser profile 471. - The
wireless security device 400, in some embodiments, includes motion detection functionality (not shown), that can detect movement of thewireless security device 400 or of objects nearby thewireless security device 400. After receiving a biometric input that matches a knownuser profile 471, thewireless security device 400 can remain active based on the input received from the motion detection functionality. For example, thewireless security device 400 can become disabled when thewireless security device 400 is moved after a period of inactivity. In another example, thewireless security device 400 can remain activated while in motion, but become disabled, after coming to rest for a preset period of time. - The
wireless security device 400, in some embodiments, includes proximity detection functionality (not shown), that can detect the presence of a user near thewireless security device 400. The proximity detection functionality can include capacitive sensing and/or infrared sensing, for example, a passive infrared (PIR) sensor, which can detect the presence of a user near thewireless security device 400. After receiving a biometric input that matches a knownuser profile 471, thewireless security device 400 can remain active based on the input received from the proximity detection functionality. For example, thewireless security device 400 can become disabled when proximity detection functionality detects thewireless security device 400 is separated from the user. - When the
wireless security device 400 is utilized in conjunction with the wireless sensor network described above, thewireless security device 400 can remain active based on a detected location of thewireless security device 400 in the environment covered by the wireless sensor network. For example, when thewireless security device 400 leaves the area covered by the wireless sensor network, thewireless security device 400 can become disabled. - In some embodiments, the
wireless security device 400 can take additional defensive actions when the biometric input fails to match one or more of the known user profiles and/or after thewireless security device 400 has been inactive to a predetermined period of time. For example, thewireless security device 400 can store the biometric input that failed to match the knownuser profiles 471, for example, in thememory device 470. This stored biometric input can subsequently be transferred to thesecurity system 100, for example, through thewireless transmitter 410. - The
wireless security device 400 can destroy stored data, such as the knownuser profiles 471,encryption data 472, andidentification signal information 473, when the biometric input fails to match one or more of the knownuser profiles 471 and/or after thewireless security device 400 has been inactive to a predetermined period of time. The destruction of data helps to ensure information utilized by thewireless security device 400 to gain access to protected resources is not compromised if thewireless access device 400 is mislaid or stolen. - When the biometric input fails to match one or more of the known
user profiles 471 and/or after thewireless security device 400 has been inactive to a predetermined period of time, thewireless access device 400 can transmit the alert signal through thewireless transceiver 410. The alert signal is configured to indicate to thesecurity system 100 that thewireless security device 400 may be in possession of an unauthorized user. Thesecurity system 100, in response to the alert signal, can shut down access to the protected resources for all users or for the particularwireless security device 400. - The
security system 100 can identify the location that one or more of the secure access devices received the alert signal, allowing security personal to attempt to locate thewireless security device 400. When thewireless security device 400 has access additional networks, for example, a local area network (LAN), such as a WiFi network, a cellular network, a wide area network (WAN), an 802.16 (Wimax) network, a Free Space Optical (FSO) network, or other voice or data networks, and/or include global positioning system (GPS) functionality, thewireless access device 400 can transmit the alert signal over the additional networks, in attempt to alert thesecurity system 100 of the attempted unauthorized access. - The
wireless security device 400 can attempt to secure the communication with thesecurity system 100 in several ways. For example, thewireless security device 400 can encrypt the identification signals before they are transmitted or emitted from thewireless security device 400. In some embodiments, thecontroller 460 can access theencryption data 472 in thememory device 470 and generate the identification signals based on theencryption data 472. - The
wireless security device 400 can vary the wireless frequency over which the identification signals are transmitted. In some embodiments, theidentification signal information 473 in thememory device 470 can indicate which wireless frequency for thewireless transceiver 410 to transmit the identification signals. The frequency variation can be performed based on the day, time, or other temporal indicator. For example, thewireless security device 400 can emit identification signals over one wireless frequency or channel during normal business hours, and another wireless frequency during off hours. The frequency variation can also be based on the specificwireless security device 400 and/or the user of thewireless security device 400. - As discussed above, the
wireless security device 400 can periodically transmit the identification signals, which can also be utilized as a basis for authenticating thewireless security device 400. Thewireless security device 400 can vary the periodicity or frequency of the transmission based on temporal indicators, such as time and/or day, or based on thewireless security device 400 and/or user of thewireless security device 400. In some embodiments, theidentification signal information 473 in thememory device 470 can indicate the delay between identification signal transmissions. - The
security system 100 can be configured to receive the identification signals and authenticate thewireless security device 400 based on the contents of the identification signal and the mode of communication, e.g., which wireless frequency was utilized for transmission or the period of the identification signal transmissions. Thesecurity system 100 can also determine if the same or similar identification signals were received on other wireless frequencies, indicating a counterfeit device may be attempting access by transmitting the identification signals on all channels or wireless frequencies. - In some embodiments, the
wireless security device 400 can be activated, but hold-off transmitting identification signals until thewireless security device 400 is within range of a secure access device of thesecurity system 100. For example, the secure access device can emit a proximity signal that, when received by thewireless security device 400, prompts thewireless security device 400 to begin transmitting the identification signals. This limits where thewireless security device 400 transmits the identification signals, and helps to avoid eavesdropping on the identification signals by unauthorized users. In some embodiments, the proximity signal emitted by thesecurity system 100 can have the same or similar security features as those discussed above with the identification signals, such as being encrypted and having varied wireless frequency and transmission periodicity. - To help reduce power consumption, the
wireless security device 400, when activated, can periodically transmit a “ping” signal to initiate a user authentication session. The ping signal can be short wireless signal, for example, a radio frequency signal that can be detected and discriminated from noise and/or interfering signals. In some embodiments, the ping can include a unique data sequence and can be the same for allwireless security devices 400, or can have characteristics that are unique to a particularwireless security device 400 or a group ofwireless security devices 400. The secure access device can receive the ping and respond with a request to begin the authentication process with thewireless security device 400. - The
wireless security device 400 and thesecurity system 100 can also perform an initial handshake or exchange of signals or datagrams to ensure thewireless security device 400 is authentic. The handshake can be initiated by either thewireless security device 400 or thesecurity system 100 and can include a request by thesecurity system 100 for a unique response. Thewireless security device 400 can generate the unique response based on the information in the request from thesecurity system 100, and possibly information stored in thewireless security device 400 and/or the mode of communicating the request, such as the wireless transmission frequency. Thesecurity system 100 can analyze the unique response received from thewireless security device 400 to determine whether thewireless security device 400 is authentic. Thesecurity system 100 can also periodically and/or intermittently request a follow-up handshake for additional security. - In some embodiments, the
wireless security device 400 can include multiple wireless transceivers that can be utilized to implement the different stages of authentication processes—initiation, location detection, and authentication. For example, as discussed above, initiation of the authentication process by either thewireless security device 400 or the secure access device can utilize a wireless transceiver that has low-power consumption to help save battery life. To help the secure access device determine a location of thewireless security device 400, thewireless access device 400 may utilize a different wireless transceiver, for example, that can communicate with a wireless sensor network. Finally during authentication, thewireless security device 400 can utilize yet another wireless transceiver that allows for additional security or encryption, for example, that can communicate over a WiFi network. In some embodiments, any of these wireless transceivers can be utilized for any of the different stages of authentication processes. - The
security system 100 can also include thesecurity control unit 140, which can allow for an additional layer of defense against unauthorized access. Thesecurity control unit 140 can communicate with one or more of the secure access devices, such as those included in thepersonal computer 110, theaccess point 120, and theentry device 130. Thesecurity control unit 140 can provide a centralized location to analyze identification signals from thewireless security device 400 and control the states of the security measures that restrict access to their protected resources. - By centralizing the authentication of the
wireless security device 400, thesecurity system 100 can secure any information utilized in determining when identification signals are received from an authenticwireless security device 400. For example, thesecurity control unit 140 can be stored in a secured room within a building or at a remote location, and thus a theft of apersonal computer 110, theaccess point 120, and theentry device 130, may not compromise any access information utilized to allow the user of thewireless security device 400 access to protected resources. - The centralized authentication of the
wireless security device 400 can also allow for layered security. Thesecurity control unit 140 would be able to tell when awireless security device 400 was currently accessing one protected resource and attempting to access another protected resource in a physically distinct regions or spaces. For instance, when thewireless security device 400 is currently accessing thepersonal computer 110 located in an office and also attempting to access the building, thesecurity control unit 140 can determine at least one of the accesses is being performed by a counterfeit device. - The
wireless security device 400 can includeinput devices 430 that allow a user to manually activate, disable, or send an alert, for example, by actuating buttons 431-433, respectively. In some embodiments, the manual activation, disablement, and/or alert can be achieved when the user has already been authenticated through the biometric input process described, and/or by actuating thebuttons FIG. 1A shows theinput devices 430 as a set of buttons, in some embodiments, theinput devices 430 can be a touch screen device, a roller ball or mouse device, audio recognition device, or any other device that allows a user to present a manual input to thewireless security device 400. - The
wireless security device 400 can includeoutput devices 480 to provide visual and/or audio indications to the user of thewireless security device 400. The visual and/or audio indications can identify a state of thewireless security device 400, such as whether it is activated or disabled, and/or actively transmitting identification signals or alert signals. The visual and/or audio indications can also be utilized to help a user locate a missing device, for example, by presenting an auditory sound or ring. Theoutput devices 480 can include lights, speakers, visual displays, or any other visual and/or audio device that can provide an output perceptible by the user. -
FIG. 5 is a block diagram example of thesecure access device 500 according to embodiments of the invention. Referring toFIG. 5 , thesecure access device 500 includes awireless transceiver 510 to exchange wireless signals with one or morewireless security devices 400. Thewireless transceiver 510 can pass received wireless signals along to a security controller 550 for analysis. - The security controller 550 can analyze received wireless signals based, at least in part, on information stored in the
memory device 540. The security controller 550 can utilize theaccess information 541 and possibly the user profiles 542 to determine whether the wireless signals received by thewireless transceiver 510 authenticate awireless security device 400 within range of thesecure access device 500. In some embodiments, the security controller 550 can forward the received signals to another device, such as thesecurity control unit 140, through thesecurity system interface 530 for analysis. - The
access information 541 can include information on an expected format of the wireless signals, and an expected mode of communication, e.g., the frequency of the wireless signals and the delay between the periodic transmissions. The user profiles 542 can include information on particular users or classes of users that can access or that are denied access to resources protected by thesecure access device 500. The classes of users can be a subset or group of one or more users that have common access privileges, which can be set arbitrarily or based on some common characteristic. - When the wireless signals indicate that the
wireless security device 400 is authentic, the security controller 550 can direct thelocking mechanism 520 to disable one or more security measures. For example, when thelocking mechanism 520 is locking anaccess point 120, thelocking mechanism 520 can enable theaccess point 120 to provide access to a network to at least the user associated with thewireless security device 400. -
FIG. 6 is an exampleoperational flowchart 600 for the wireless security device and the security system according to embodiments of the invention. Referring toFIG. 6 , in afirst block 610, thewireless security device 400 can be configured to capture a biometric input of a user. In some embodiments, thewireless security device 400 can include abiometric scanner 420 to capture the biometric input of a user. Thebiometric scanner 420 can be a fingerprint scanner, iris or retina scanner, a bodily fluid scanner, voice recognition system, or any other device that can identify a unique physical and/or behavioral attribute of the user. - In a
next block 620, thewireless security device 400 can be configured to determine whether the user is authorized to utilize thewireless security device 400 based, at least in part, on a biometric input of the user. In some embodiments, thewireless security device 400 can be configured to authorize the user to utilize the wireless security device when the biometric input at least substantially matches one or more predefined user profiles stored in thewireless security device 400. - In a
next block 630, thewireless security device 400 can be configured to periodically transmit one or more identification signals when the user is authorized. The one or more identification signals can be configured to prompt asecurity system 100 to disable at least one security measure that restricts user access to resources protected by thesecurity system 100. Thesecurity system 100 can be configured to automatically re-engage the at least one security measure when thesecurity system 100 is outside a transmission range of thewireless security device 400. - In a
next block 640, thewireless security device 400 can be configured to disable thewireless security device 400 from periodically transmitting the one or more identification signals when the user is not authorized to utilize thewireless security device 400. In some embodiments, thewireless security device 400 can transmit one or more alert signals instead of the identification signals. The alert signals can be configured to prompt thesecurity system 100 to lock access to the protected resources for thewireless security device 400. - One of skill in the art will recognize that the concepts taught herein can be tailored to a particular application in many other ways. In particular, those skilled in the art will recognize that the illustrated embodiments are but one of many alternative implementations that will become apparent upon reading this disclosure.
- The preceding embodiments are examples. Although the specification may refer to “an”, “one”, “another”, or “some” embodiment(s) in several locations, this does not necessarily mean that each such reference is to the same embodiment(s), or that the feature only applies to a single embodiment.
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/915,584 US20200329037A1 (en) | 2010-11-17 | 2020-06-29 | Security system with a wireless security device |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US94858710A | 2010-11-17 | 2010-11-17 | |
US201414512944A | 2014-10-13 | 2014-10-13 | |
US16/915,584 US20200329037A1 (en) | 2010-11-17 | 2020-06-29 | Security system with a wireless security device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US201414512944A Continuation | 2010-11-17 | 2014-10-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200329037A1 true US20200329037A1 (en) | 2020-10-15 |
Family
ID=62091467
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/751,559 Active US9972146B1 (en) | 2010-11-17 | 2015-06-26 | Security system with a wireless security device |
US16/915,584 Abandoned US20200329037A1 (en) | 2010-11-17 | 2020-06-29 | Security system with a wireless security device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/751,559 Active US9972146B1 (en) | 2010-11-17 | 2015-06-26 | Security system with a wireless security device |
Country Status (1)
Country | Link |
---|---|
US (2) | US9972146B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11262111B2 (en) * | 2016-07-12 | 2022-03-01 | Es Energy Save Holding Ab | Heat pump apparatus module |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017149159A1 (en) * | 2016-03-03 | 2017-09-08 | Afilias Technologies Limited | Counterfeit electronic device detection |
US10713205B2 (en) * | 2017-02-24 | 2020-07-14 | Digital 14 Llc | Universal serial bus (USB) disconnection switch system, computer program product, and method |
DE102018123423A1 (en) * | 2018-09-24 | 2020-03-26 | ASTRA Gesellschaft für Asset Management mbH & Co. KG | Access control system |
US11201873B2 (en) | 2018-12-19 | 2021-12-14 | T-Mobile Usa, Inc. | Multi-factor authentication with geolocation and voice command |
US11140175B2 (en) | 2018-12-19 | 2021-10-05 | T-Mobile Usa, Inc. | Multi-factor authentication with geolocation and short-range communication |
US10769872B2 (en) * | 2018-12-19 | 2020-09-08 | T-Mobile Usa, Inc. | Multi-factor authentication with geolocation and short-range communication with indoor-outdoor detection |
US11222522B2 (en) | 2019-01-14 | 2022-01-11 | TeamOfDefenders LLC | Devices, systems, and methods for monitoring controlled spaces for transitory uses |
US11527147B2 (en) | 2019-08-09 | 2022-12-13 | TeamOfDefenders LLC | Devices, systems, and methods for monitoring controlled spaces for transitory uses |
CN110988421B (en) * | 2019-12-10 | 2022-08-19 | 国网山东省电力公司日照供电公司 | Intelligent safety protection device and system applied to electric energy metering mechanism |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050218215A1 (en) * | 2004-04-02 | 2005-10-06 | Lauden Gary A | Biometric identification system |
US6958676B1 (en) * | 2002-02-06 | 2005-10-25 | Sts International Ltd | Vehicle passenger authorization system |
US20070092114A1 (en) * | 2005-10-26 | 2007-04-26 | Swisscom Mobile Ag | Method, communication system and remote server for comparing biometric data recorded with biometric sensors with reference data |
US20070197261A1 (en) * | 2004-03-19 | 2007-08-23 | Humbel Roger M | Mobile Telephone All In One Remote Key Or Software Regulating Card For Radio Bicycle Locks, Cars, Houses, And Rfid Tags, With Authorisation And Payment Function |
US20100042835A1 (en) * | 2008-08-18 | 2010-02-18 | Keep Security Inc. | System and method for permission confirmation by transmitting a secure request through a central server to a mobile biometric device |
US20100274678A1 (en) * | 2009-04-22 | 2010-10-28 | Gofigure Payments, Llc | Systems, methods and devices for facilitating mobile payments |
US20110185178A1 (en) * | 2008-03-31 | 2011-07-28 | Compugroup Holding Ag | Communication method of an electronic health insurance card with a reading device |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6720874B2 (en) | 2000-09-29 | 2004-04-13 | Ids Systems, Inc. | Portal intrusion detection apparatus and method |
US7512806B2 (en) * | 2000-11-30 | 2009-03-31 | Palmsource, Inc. | Security technique for controlling access to a network by a wireless device |
US7197168B2 (en) * | 2001-07-12 | 2007-03-27 | Atrua Technologies, Inc. | Method and system for biometric image assembly from multiple partial biometric frame scans |
US20030023882A1 (en) | 2001-07-26 | 2003-01-30 | Charlie Udom | Biometric characteristic security system |
US7233789B2 (en) | 2001-11-15 | 2007-06-19 | Avaya Technology Corp. | Wireless security and access device |
US7543156B2 (en) * | 2002-06-25 | 2009-06-02 | Resilent, Llc | Transaction authentication card |
US7155416B2 (en) | 2002-07-03 | 2006-12-26 | Tri-D Systems, Inc. | Biometric based authentication system with random generated PIN |
US7230519B2 (en) * | 2003-06-19 | 2007-06-12 | Scriptpro Llc | RFID tag and method of user verification |
AU2003904317A0 (en) | 2003-08-13 | 2003-08-28 | Securicom (Nsw) Pty Ltd | Remote entry system |
US7597250B2 (en) * | 2003-11-17 | 2009-10-06 | Dpd Patent Trust Ltd. | RFID reader with multiple interfaces |
US7378939B2 (en) | 2004-03-30 | 2008-05-27 | Sengupta Uttam K | Method and apparatus for providing proximity based authentication, security, and notification in a wireless system |
CA2550812A1 (en) | 2005-06-22 | 2006-12-22 | Axigon Healthcare Technologies Incorporated | Two-way wireless monitoring system and method |
US20080028230A1 (en) | 2006-05-05 | 2008-01-31 | Tri-D Systems, Inc. | Biometric authentication proximity card |
US7843312B2 (en) | 2006-12-12 | 2010-11-30 | Honeywell International Inc. | Wireless control of security system with key-operated key fob |
US7969280B2 (en) | 2007-05-11 | 2011-06-28 | Slevin Richard S | Biometric universal security remote |
US7804403B2 (en) | 2007-06-11 | 2010-09-28 | Honeywell International Inc. | Security system control module |
US9313313B2 (en) | 2008-07-22 | 2016-04-12 | Nissaf Ketari | Proximity access and/or alarm apparatus |
-
2015
- 2015-06-26 US US14/751,559 patent/US9972146B1/en active Active
-
2020
- 2020-06-29 US US16/915,584 patent/US20200329037A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6958676B1 (en) * | 2002-02-06 | 2005-10-25 | Sts International Ltd | Vehicle passenger authorization system |
US20070197261A1 (en) * | 2004-03-19 | 2007-08-23 | Humbel Roger M | Mobile Telephone All In One Remote Key Or Software Regulating Card For Radio Bicycle Locks, Cars, Houses, And Rfid Tags, With Authorisation And Payment Function |
US20050218215A1 (en) * | 2004-04-02 | 2005-10-06 | Lauden Gary A | Biometric identification system |
US20070092114A1 (en) * | 2005-10-26 | 2007-04-26 | Swisscom Mobile Ag | Method, communication system and remote server for comparing biometric data recorded with biometric sensors with reference data |
US20110185178A1 (en) * | 2008-03-31 | 2011-07-28 | Compugroup Holding Ag | Communication method of an electronic health insurance card with a reading device |
US20100042835A1 (en) * | 2008-08-18 | 2010-02-18 | Keep Security Inc. | System and method for permission confirmation by transmitting a secure request through a central server to a mobile biometric device |
US20100274678A1 (en) * | 2009-04-22 | 2010-10-28 | Gofigure Payments, Llc | Systems, methods and devices for facilitating mobile payments |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11262111B2 (en) * | 2016-07-12 | 2022-03-01 | Es Energy Save Holding Ab | Heat pump apparatus module |
Also Published As
Publication number | Publication date |
---|---|
US9972146B1 (en) | 2018-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200329037A1 (en) | Security system with a wireless security device | |
KR102538002B1 (en) | Method and system for managing a door entry using beacon signal | |
US9972151B2 (en) | Wireless access control system including lock assembly generated magnetic field based unlocking and related methods | |
US9978195B2 (en) | Wireless access control system including remote access wireless device generated magnetic field based unlocking and related methods | |
US9336637B2 (en) | Wireless access control system and related methods | |
US9196104B2 (en) | Wireless access control system and related methods | |
US20160086400A1 (en) | Wireless access control system including distance based lock assembly and remote access device enrollment and related methods | |
WO2016177671A1 (en) | Using a secondary mobile device to identify a trusted environment | |
US20140077929A1 (en) | Wireless access control system and related methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CYPRESS SEMICONDUCTOR CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BEARD, PAUL;WRIGHT, DAVID;SIGNING DATES FROM 20101115 TO 20101117;REEL/FRAME:053113/0031 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |