US20200329037A1 - Security system with a wireless security device - Google Patents

Security system with a wireless security device Download PDF

Info

Publication number
US20200329037A1
US20200329037A1 US16/915,584 US202016915584A US2020329037A1 US 20200329037 A1 US20200329037 A1 US 20200329037A1 US 202016915584 A US202016915584 A US 202016915584A US 2020329037 A1 US2020329037 A1 US 2020329037A1
Authority
US
United States
Prior art keywords
wireless
security
security device
wireless security
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/915,584
Inventor
Paul Frank Beard
David G. Wright
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cypress Semiconductor Corp
Original Assignee
Cypress Semiconductor Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cypress Semiconductor Corp filed Critical Cypress Semiconductor Corp
Priority to US16/915,584 priority Critical patent/US20200329037A1/en
Assigned to CYPRESS SEMICONDUCTOR CORPORATION reassignment CYPRESS SEMICONDUCTOR CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WRIGHT, DAVID, BEARD, PAUL
Publication of US20200329037A1 publication Critical patent/US20200329037A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • G07C2209/64Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle using a proximity sensor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Definitions

  • This disclosure relates generally to electronic systems, and, more particularly, to security systems utilizing wireless security devices.
  • PIN personal identification number
  • RFID passive radio-frequency identification
  • a device includes a security controller to determine whether a wireless security device is authorized to access at least one resource protected by a secure access device based, at least in part, on identification signals that originate from the wireless security device.
  • the security controller is configured to receive location information corresponding to the wireless security device from at least one wireless device.
  • the security controller is configured to direct the security access device to disable at least one security measure that restricts user access to the at least one resource based, at least in part, on the location information corresponding to the wireless security device.
  • a system includes a secure access device to control access to protected resources and a wireless device to identify a location of a wireless security device in an environment.
  • the system also include a security controller to determine whether the wireless security device is authorized to access at least one resource protected by the secure access device based, at least in part, on identification signals that originate from the wireless security device and the identified location of the wireless security device in the environment.
  • a wireless security device includes a controller to determine whether a user is authorized to utilize the wireless security device based, at least in part, on a biometric input from the user.
  • the wireless security device also includes a wireless transmitter to automatically emit one or more identification signals when directed by the controller responsive to the determination.
  • a security system is configured to disable at least one security measure that restricts user access to protected resources based, at least in part, on the one or more identification signals and a detected location of the wireless security device.
  • FIGS. 1A-1D are block diagram examples of a security system according to embodiments of the invention.
  • FIGS. 2A-2B and 3A-3B are block diagram examples for utilizing the wireless security device shown in FIG. 1A .
  • FIG. 4 is a block diagram example of the wireless security device shown in FIG. 1A .
  • FIG. 5 is a block diagram example of the secure access device according to embodiments of the invention.
  • FIG. 6 is an example operational flowchart for the wireless security device and the security system according to embodiments of the invention.
  • Security systems can implement one or more security measures to restrict user access to various protected resources, such as secured equipment or secured areas of a building or office.
  • a wireless security device or key fob can automatically transmit identification signals that, when received by the security system, disable at least one of the security measures.
  • the security system and the wireless security device can also implement multiple techniques to help ensure access to the protected resources is not granted to unauthorized users. Embodiments are shown and described below in greater detail.
  • FIG. 1A is block diagram example of a security system 100 according to embodiments of the invention.
  • the security system 100 includes one or more secure access devices, for example, included in a personal computer 110 , an access point 120 , an entry device 130 , and/or a security control unit 140 , which can selectively restrict access to protected resources.
  • the secure access devices in the personal computer 110 or the access point 120 can authenticate a user, e.g., through a user log-on procedure, before allowing the user to utilize its processing resources.
  • the entry device 130 includes a secure access device
  • the entry device 130 can authenticate personal that are authorized to utilize an entrance 135 to a secured area, such as a building or an office.
  • a wireless security device 400 includes a wireless transceiver 410 that can wirelessly communicate with one or more of the secure access devices and prompt them to disable security measures that restrict access to their protected resources. For example, the wireless security device 400 can transmit or emit identification signals that direct the secure access devices to disable their respective security measures.
  • the wireless security device 400 is shown in FIG. 1A as a key fob-type device, in some embodiments, it or the related functionality can be integrated into and/or downloaded onto other electronic devices, e.g., mobile phones or handsets, laptop computers, digital music players, or any other device that can transmit identification signals to the security system 100 .
  • the wireless security device 400 can periodically transmit the identification signals over a predetermined range from the wireless security device 400 .
  • the secure access device can receive the identification signal and disable its corresponding security measure.
  • the length of the delay between transmissions i.e., the frequency of the periodic transmissions, can be sufficiently short to cause the secure access device to keep the security measure disabled, while the secure access device is within the predetermined range of the wireless security device 400 .
  • the security system 100 can include a security control unit 140 to communicate with one or more of the secure access devices, such as those included in the personal computer 110 , the access point 120 , and the entry device 130 .
  • the security control unit 140 can be implemented on a server or other network device, and communicate with the secure access devices over one or more networks.
  • the security control unit 140 can provide a centralized location to analyze identification signals from a wireless security device 400 and control the states of the security measures that restrict access to their protected resources. Embodiments of the wireless security device 400 and security system 100 will be described below in greater detail.
  • the secure access devices or the security control unit 140 can log access events or attempts to access protected resources. These logging events can track usage of the protected resources, for various reasons including billing or maintenance.
  • FIG. 1A shows several example applications that can include secure access devices, it is not meant to be exclusive.
  • secure access devices can be included in automobiles, controlling security measures, such as car locks and ignition. For example, the secure access devices can automatically unlock car locks, activate an ignition, or allow a user to manual perform these tasks.
  • the secure access devices can be used to control access to security containers, such as safes, file cabinets, safety deposit boxes, realtor lockboxes, mailboxes, utility enclosures for circuit breakers or meters, hotel rooms, trailers, shipping containers, etc.
  • FIGS. 1B-1D are top-views of an example implementation for the security system 100 with the wireless security device 400 .
  • the security system 100 can be utilized to selectively grant access to a secured area 180 , for example, through entrance 135 , and selectively grant access to secured resources, such as personal computers 110 and access point 120 .
  • the security system 100 can include the security control unit 140 , which can be executed on or included in a security server 155 .
  • the secured server 155 in some embodiments, can be located in a remote location from the secured area 180 , such as in a separate remote security room 150 .
  • the remote security room 150 can be on-site, such as in a room or building near the secured area 180 , or located off-site and able to communicate with the rest of the security system 100 through one or more networks.
  • the security control unit 140 can communicate with other portions of the security system 100 through a wired or wireless connection directly to the secure access devices of the security system 100 , or through one or more intermediary network nodes, such as the access point 120 .
  • the security control unit 140 can control access to the secured area 180 through the entrance 135 via the entry device 130 .
  • the entry device 130 can receive identification signals from the wireless security device 400 and forward them to the security control unit 140 for analysis and processing.
  • the security control unit 140 can determine whether the wireless security device 400 is authorized to access the resource protected by the entry device, e.g., access to the secured area 180 through the entrance 135 , and transmit a response to the entry device 130 to indicate whether the entry device 130 is to grant the wireless security device 400 access to the secured area 180 through the entrance 135 .
  • This authorization determination can be performed in various ways, for example, by comparing the identification signals received by the entry device 130 to an access list (not shown).
  • the security system 100 can also include a proximity sensor 160 , which can help avert tailgating of multiple users through the entrance 135 .
  • the proximity sensor 160 can be an infrared sensor, such as a passive infrared (PIR) sensor, and can detect when an object or person is close to the wireless security device 400 .
  • the proximity sensor 160 can transmit a proximity detection signal to the security control unit 140 , and the security control unit 140 can determine whether to grant the wireless security device 400 access to the secured area 180 based on the identification signals from the entry device 130 and the proximity detection signal from the proximity sensor 160 .
  • the security system 100 can include one or more sensor nodes 170 , which can be utilized to detect the location of the wireless security device 400 in the secured area 180 .
  • the sensor nodes 170 can be nodes of a wireless sensor network (WSN) having location-finding capabilities, for example, 802.15.4a, Zigbee Pro, and other network systems built on standard wireless sensor network technologies, such as 104.15.4.
  • WSN wireless sensor network
  • the wireless sensor network can be used for environmental monitoring and control, such as HVAC and lighting control, as well as, detecting a location of the wireless security device 400 .
  • the sensor nodes 170 can each measure a distance to the wireless security device 400 and report those distances to the security control unit 140 or directly to a secured access device, such as the personal computers 110 or the access point 120 .
  • the security control unit 140 or the secured access device can determine a location of the wireless security device 400 within the secured area 180 based on the distance measurements from the sensor nodes 170 , and in some embodiments, a distance measurement from the secure access devices themselves.
  • the secure access devices can receive identification signals from the wireless security device 400 and forward them to the security control unit 140 for analysis and processing.
  • the security control unit 140 can transmit a response to the secure access devices, such as the personal computers 110 and the access point 120 , based on the identification signals and the location of the wireless security device 400 in the secured area 180 . For example, when the location of the wireless security device 400 is determined to be within a predetermined location of the secured area 180 , such as within a specified office or cubicle in the secured area 180 , the security control unit 140 can transmit the response to the secure access device to grant access to the protected resource.
  • the security control unit 140 can determine the location of the wireless device 400 in the secured area 180 . This location determination can be made continually, periodically, intermittently, randomly, or when prompted by another device in the security system 100 , for example, upon detection of movement in the wireless security device 400 .
  • the secure access device can signal the security control unit 140 when the wireless security device 400 fails to provide an identification signal after access has been granted, indicating that the wireless security device 400 is out-of-range of the secure access device.
  • the wireless security device 400 can also internally detect motion or movement, and signal the secure access device and/or the security control unit 140 to prompt a location determination of the wireless security device 400 .
  • the security system 100 can also include one or more motion sensors (not shown) that can detect motion within the secured area 180 and prompt a location determination of the wireless security device 400 responsive to detecting the motion.
  • the security control unit 140 can signal the personal computer 110 to revoke access to the protected resource, for example, by logging-out the user.
  • FIGS. 2A-2B and 3A-3B are block diagram examples for utilizing the wireless security device 400 shown in FIG. 1A .
  • the wireless access device 400 can transmit identification signals over a wireless range 401 .
  • the wireless access device 400 can control the magnitude or size of the wireless range 401 , for example, by varying the transmit signal strength of the wireless transceiver 410 .
  • the wireless range 401 is shown as substantially spherical or circular, in some embodiments, the wireless transceiver 410 of the wireless security device 400 can be directional—projecting wireless signals in a specific direction from the wireless security device 400 .
  • the security system 100 includes the entry device 130 and a locking mechanism 220 , which can be at least partially housed within a wall 210 .
  • the wall 210 can also define an entrance 135 and support a door 230 to restrict access to through the entrance 135 , for example, when the door 230 is coupled to the locking mechanism 220 .
  • the entry device 130 can control the locking mechanism 220 to lock or unlock the door 230 , which selectively grants access to the entrance 135 , in response to wireless signals from the wireless security device 400 .
  • FIGS. 2A and 2B show a door 230 as restricting access through the entrance 135 , in some embodiments, any object that can restrict access to the entrance 135 responsive to the entry device 130 and locking mechanism 220 .
  • the locking mechanism 220 can lock the door 230 and deny access through the entrance 135 .
  • the entry device 130 can direct the locking mechanism 220 to unlock the door 230 , granting access through the entrance 135 .
  • the entry device 130 can receive identification signals from the wireless security device 400 that prompt the entry device 130 to have the locking mechanism 220 unlock the door 230 .
  • the door 230 can open automatically responsive to the entry device 130 , while in other embodiments, an unlock door 230 can be manually opened by a user attempting to pass through the entrance 135 .
  • the entry device 130 can include a proximity sensor (not shown) to help avert tailgating of multiple users through the door 230 .
  • the proximity sensor can be an infrared sensor, such as a passive infrared (PIR) sensor, and can detect when multiple users are close to the door 230 .
  • PIR passive infrared
  • the entry device 130 can provide an alert, such as an audible or visual presentation, that indicates to the users that too many users are near the door 230 .
  • the entry device 130 can also disable access through the entrance 135 until the excess users move away from the door 230 based on the detection by the proximity sensor.
  • the wireless access device 400 can transmit identification signals over a wireless range 401 .
  • the security system 100 includes a personal computer 110 having a secure access device 310 to restrict or provide access to at least some of the functions and/or resources of the personal computer 110 .
  • the secure access device 310 can restrict access to at least some of the functions and/or resources of the personal computer 110 .
  • the wireless range 401 can be a maximum distance wireless signals are detectable from the wireless security device 400 .
  • the secure access device 310 can force one or more users to be logged off of the personal computer 110 when the wireless security device 400 is out-of-range of the secure access device 310 .
  • the secure access device 310 can elect to not automatically provide access to the personal computer 110 .
  • the secure access device 310 can also have a secure range 402 .
  • the secure access device 310 can restrict access to at least some of the functions and/or resources of the personal computer 110 . Since, in some embodiments, the secure access device 310 can receive wireless signals from the wireless security device 400 when the wireless security device 400 is outside of the secure range 402 , the secure access device 310 may elect to provide access based on a location of the wireless security device 400 .
  • the secure access device 310 can detect the location of the wireless security device 400 .
  • the secure access device 310 can implement a wireless link with the wireless security device 400 and detect a distance the wireless security device 400 is from the secure access device 310 based on a signal strength analysis of the wireless link. For instance, the secure access device 310 can measure a strength of wireless signaling with the wireless security device 400 to detect a distance the wireless security device 400 is from the secure access device 310 .
  • the wireless link between the secure access device 310 and the wireless security device 400 can utilize multiple frequency bands, such as 300-400 MHz UHF, 800 MHz and 2.4 GHz bands, and measure the signal strength on each frequency, possibly several times in each direction, to provide an accurate measurement of the distance between the secure access device 310 and the wireless security device 400 .
  • multiple frequency bands such as 300-400 MHz UHF, 800 MHz and 2.4 GHz bands
  • the distance the wireless security device 400 is from the secure access device 310 is less important than the actual location of the wireless security device 400 within the environment.
  • the secure access device 310 can have access to multiple receivers located in the environment, as shown and described above in FIGS. 1B-1D , the location of the wireless security device 400 in the environment can be detected.
  • the multiple receivers in some embodiments, can be nodes of a wireless sensor network (WSN) having location-finding capabilities, for example, 802.15.4a, Zigbee Pro, and other network systems built on standard wireless sensor network technologies, such as 104.15.4.
  • the wireless sensor network can be used for environmental monitoring and control, such as HVAC and lighting control, as well as, detecting a location of the wireless security device 400 .
  • the multiple receives can each measure a distance to the wireless security device 400 and report those distances to the secure access device 310 or to the security control unit 140 .
  • the secure access device 310 or the security control unit 140 can determine a location of the wireless security device 400 based on the distance measurements from the multiple receivers and optionally the secure access device 310 .
  • the secure access device 310 can grant the wireless security device 400 access to the personal computer.
  • the wireless security device 400 can communicate with the secure access device 310 and/or security control unit 140 over the wireless sensor network.
  • the initial challenge to the wireless security device 400 can be issued over the wireless sensor network and location determined using the wireless sensor network, but, in some embodiments, additional authentication of the wireless security device 400 can take place over another wireless network, such as WiFi.
  • the secure access device 310 can grant user access to at least some of the functions and/or resources of the personal computer 110 .
  • the secure access device 310 can direct the personal computer 110 to automatically log-on at least one user.
  • identification signals from the wireless security device 400 can identify a particular user that is associated with the wireless security device 400 and the secure access device 310 can automatically log-on that particular user.
  • the secure access device 310 can remove a login lock.
  • the secure access device 310 can assert the login lock and deny one or more users the opportunity to log-on to the personal computer 110 .
  • the login lock can disable various peripherals of the personal computer 110 , such as a keyboard, mouse, display device, video interface, etc.
  • the secure access device 310 can provide the user the opportunity to manually log-on to the personal computer 110 .
  • the secure access device 310 can also remove the login lock for all users or for particular users, such as those users associated with the wireless security device 400 .
  • the secure access device 310 when the secure access device 310 is within the wireless range 401 of the wireless security device 400 , the secure access device 310 can allow a logged-on user access to particular resources of personal computer 110 that would not be accessible to the logged-on user without the presence of the wireless access device 400 .
  • the secure access device 310 can restrict user access to secure data, particular programs and applications, or other resources available to the personal computer 110 , while allowing the user to log-on to the personal computer 110 and access to other programs, applications, resources, and data.
  • the wireless security device 400 includes various features that help to protect the security system 100 from unauthorized user access, for example, by authenticating users attempting to utilize the wireless security device 400 and/or by protecting the wireless communication between the wireless security device 400 and the security system 100 .
  • the wireless security device 400 can authenticate a user of the wireless security device 400 , for example, by including a biometric scanner 420 to scan at least a part of a user or detect a behavior of the user for the biometric input.
  • the biometric scanner 420 can be a fingerprint scanner, iris or retina scanner, a bodily fluid scanner, voice recognition system, or any other device that can identify a unique physical and/or behavioral attribute of the user.
  • the wireless security device 400 can receive a biometric input from the biometric scanner 420 and compare the biometric input to one or more known user profiles 471 .
  • the user profiles 471 can be stored in a memory device 470 of the wireless security device 400 .
  • the wireless security device 400 can include a controller 460 to receive the biometric input from the biometric scanner 420 , access the memory device 470 to locate the user profiles 471 , and compare the biometric input to the user profiles 471 .
  • the user profiles 471 may be stored in the security control unit 140 , and the wireless security device 400 may send encrypted biometric data to the security control 140 unit for verification.
  • the wireless security device 400 can become activated, for example, to emit identification signals.
  • the controller 460 can generate the identification signals, for example, from identification signal information 473 stored in the memory device 470 .
  • the identification signals can be signals that are common to multiple wireless devices, device-specific signals, and/or user-specific signals.
  • the wireless security device 400 can remain active indefinitely or for a predetermined period of time.
  • the security system 100 can signal the wireless security device 400 to become disabled, which can override previous user activation.
  • the wireless security device 400 can become disabled, for example, by blocking the wireless transceiver 410 from sending or receiving signals. In some embodiments, the wireless security device 400 can remain disabled until the biometric scanner 420 provides the wireless security device 400 a biometric input that matches a known user profile 471 .
  • the wireless security device 400 includes motion detection functionality (not shown), that can detect movement of the wireless security device 400 or of objects nearby the wireless security device 400 .
  • the wireless security device 400 can remain active based on the input received from the motion detection functionality. For example, the wireless security device 400 can become disabled when the wireless security device 400 is moved after a period of inactivity. In another example, the wireless security device 400 can remain activated while in motion, but become disabled, after coming to rest for a preset period of time.
  • the wireless security device 400 includes proximity detection functionality (not shown), that can detect the presence of a user near the wireless security device 400 .
  • the proximity detection functionality can include capacitive sensing and/or infrared sensing, for example, a passive infrared (PIR) sensor, which can detect the presence of a user near the wireless security device 400 .
  • PIR passive infrared
  • the wireless security device 400 can remain active based on the input received from the proximity detection functionality. For example, the wireless security device 400 can become disabled when proximity detection functionality detects the wireless security device 400 is separated from the user.
  • the wireless security device 400 can remain active based on a detected location of the wireless security device 400 in the environment covered by the wireless sensor network. For example, when the wireless security device 400 leaves the area covered by the wireless sensor network, the wireless security device 400 can become disabled.
  • the wireless security device 400 can take additional defensive actions when the biometric input fails to match one or more of the known user profiles and/or after the wireless security device 400 has been inactive to a predetermined period of time.
  • the wireless security device 400 can store the biometric input that failed to match the known user profiles 471 , for example, in the memory device 470 . This stored biometric input can subsequently be transferred to the security system 100 , for example, through the wireless transmitter 410 .
  • the wireless security device 400 can destroy stored data, such as the known user profiles 471 , encryption data 472 , and identification signal information 473 , when the biometric input fails to match one or more of the known user profiles 471 and/or after the wireless security device 400 has been inactive to a predetermined period of time.
  • the destruction of data helps to ensure information utilized by the wireless security device 400 to gain access to protected resources is not compromised if the wireless access device 400 is mislaid or stolen.
  • the wireless access device 400 can transmit the alert signal through the wireless transceiver 410 .
  • the alert signal is configured to indicate to the security system 100 that the wireless security device 400 may be in possession of an unauthorized user.
  • the security system 100 in response to the alert signal, can shut down access to the protected resources for all users or for the particular wireless security device 400 .
  • the security system 100 can identify the location that one or more of the secure access devices received the alert signal, allowing security personal to attempt to locate the wireless security device 400 .
  • the wireless security device 400 has access additional networks, for example, a local area network (LAN), such as a WiFi network, a cellular network, a wide area network (WAN), an 802.16 (Wimax) network, a Free Space Optical (FSO) network, or other voice or data networks, and/or include global positioning system (GPS) functionality
  • LAN local area network
  • WiFi WiFi network
  • WAN wide area network
  • Wimax 802.16
  • FSO Free Space Optical
  • GPS global positioning system
  • the wireless security device 400 can attempt to secure the communication with the security system 100 in several ways. For example, the wireless security device 400 can encrypt the identification signals before they are transmitted or emitted from the wireless security device 400 . In some embodiments, the controller 460 can access the encryption data 472 in the memory device 470 and generate the identification signals based on the encryption data 472 .
  • the wireless security device 400 can vary the wireless frequency over which the identification signals are transmitted.
  • the identification signal information 473 in the memory device 470 can indicate which wireless frequency for the wireless transceiver 410 to transmit the identification signals.
  • the frequency variation can be performed based on the day, time, or other temporal indicator.
  • the wireless security device 400 can emit identification signals over one wireless frequency or channel during normal business hours, and another wireless frequency during off hours.
  • the frequency variation can also be based on the specific wireless security device 400 and/or the user of the wireless security device 400 .
  • the wireless security device 400 can periodically transmit the identification signals, which can also be utilized as a basis for authenticating the wireless security device 400 .
  • the wireless security device 400 can vary the periodicity or frequency of the transmission based on temporal indicators, such as time and/or day, or based on the wireless security device 400 and/or user of the wireless security device 400 .
  • the identification signal information 473 in the memory device 470 can indicate the delay between identification signal transmissions.
  • the security system 100 can be configured to receive the identification signals and authenticate the wireless security device 400 based on the contents of the identification signal and the mode of communication, e.g., which wireless frequency was utilized for transmission or the period of the identification signal transmissions.
  • the security system 100 can also determine if the same or similar identification signals were received on other wireless frequencies, indicating a counterfeit device may be attempting access by transmitting the identification signals on all channels or wireless frequencies.
  • the wireless security device 400 can be activated, but hold-off transmitting identification signals until the wireless security device 400 is within range of a secure access device of the security system 100 .
  • the secure access device can emit a proximity signal that, when received by the wireless security device 400 , prompts the wireless security device 400 to begin transmitting the identification signals. This limits where the wireless security device 400 transmits the identification signals, and helps to avoid eavesdropping on the identification signals by unauthorized users.
  • the proximity signal emitted by the security system 100 can have the same or similar security features as those discussed above with the identification signals, such as being encrypted and having varied wireless frequency and transmission periodicity.
  • the wireless security device 400 when activated, can periodically transmit a “ping” signal to initiate a user authentication session.
  • the ping signal can be short wireless signal, for example, a radio frequency signal that can be detected and discriminated from noise and/or interfering signals.
  • the ping can include a unique data sequence and can be the same for all wireless security devices 400 , or can have characteristics that are unique to a particular wireless security device 400 or a group of wireless security devices 400 .
  • the secure access device can receive the ping and respond with a request to begin the authentication process with the wireless security device 400 .
  • the wireless security device 400 and the security system 100 can also perform an initial handshake or exchange of signals or datagrams to ensure the wireless security device 400 is authentic.
  • the handshake can be initiated by either the wireless security device 400 or the security system 100 and can include a request by the security system 100 for a unique response.
  • the wireless security device 400 can generate the unique response based on the information in the request from the security system 100 , and possibly information stored in the wireless security device 400 and/or the mode of communicating the request, such as the wireless transmission frequency.
  • the security system 100 can analyze the unique response received from the wireless security device 400 to determine whether the wireless security device 400 is authentic.
  • the security system 100 can also periodically and/or intermittently request a follow-up handshake for additional security.
  • the wireless security device 400 can include multiple wireless transceivers that can be utilized to implement the different stages of authentication processes—initiation, location detection, and authentication. For example, as discussed above, initiation of the authentication process by either the wireless security device 400 or the secure access device can utilize a wireless transceiver that has low-power consumption to help save battery life. To help the secure access device determine a location of the wireless security device 400 , the wireless access device 400 may utilize a different wireless transceiver, for example, that can communicate with a wireless sensor network. Finally during authentication, the wireless security device 400 can utilize yet another wireless transceiver that allows for additional security or encryption, for example, that can communicate over a WiFi network. In some embodiments, any of these wireless transceivers can be utilized for any of the different stages of authentication processes.
  • the security system 100 can also include the security control unit 140 , which can allow for an additional layer of defense against unauthorized access.
  • the security control unit 140 can communicate with one or more of the secure access devices, such as those included in the personal computer 110 , the access point 120 , and the entry device 130 .
  • the security control unit 140 can provide a centralized location to analyze identification signals from the wireless security device 400 and control the states of the security measures that restrict access to their protected resources.
  • the security system 100 can secure any information utilized in determining when identification signals are received from an authentic wireless security device 400 .
  • the security control unit 140 can be stored in a secured room within a building or at a remote location, and thus a theft of a personal computer 110 , the access point 120 , and the entry device 130 , may not compromise any access information utilized to allow the user of the wireless security device 400 access to protected resources.
  • the centralized authentication of the wireless security device 400 can also allow for layered security.
  • the security control unit 140 would be able to tell when a wireless security device 400 was currently accessing one protected resource and attempting to access another protected resource in a physically distinct regions or spaces. For instance, when the wireless security device 400 is currently accessing the personal computer 110 located in an office and also attempting to access the building, the security control unit 140 can determine at least one of the accesses is being performed by a counterfeit device.
  • the wireless security device 400 can include input devices 430 that allow a user to manually activate, disable, or send an alert, for example, by actuating buttons 431 - 433 , respectively.
  • the manual activation, disablement, and/or alert can be achieved when the user has already been authenticated through the biometric input process described, and/or by actuating the buttons 431 , 432 , and/or 433 in a predetermined pattern.
  • FIG. 1A shows the input devices 430 as a set of buttons, in some embodiments, the input devices 430 can be a touch screen device, a roller ball or mouse device, audio recognition device, or any other device that allows a user to present a manual input to the wireless security device 400 .
  • the wireless security device 400 can include output devices 480 to provide visual and/or audio indications to the user of the wireless security device 400 .
  • the visual and/or audio indications can identify a state of the wireless security device 400 , such as whether it is activated or disabled, and/or actively transmitting identification signals or alert signals.
  • the visual and/or audio indications can also be utilized to help a user locate a missing device, for example, by presenting an auditory sound or ring.
  • the output devices 480 can include lights, speakers, visual displays, or any other visual and/or audio device that can provide an output perceptible by the user.
  • FIG. 5 is a block diagram example of the secure access device 500 according to embodiments of the invention.
  • the secure access device 500 includes a wireless transceiver 510 to exchange wireless signals with one or more wireless security devices 400 .
  • the wireless transceiver 510 can pass received wireless signals along to a security controller 550 for analysis.
  • the security controller 550 can analyze received wireless signals based, at least in part, on information stored in the memory device 540 .
  • the security controller 550 can utilize the access information 541 and possibly the user profiles 542 to determine whether the wireless signals received by the wireless transceiver 510 authenticate a wireless security device 400 within range of the secure access device 500 .
  • the security controller 550 can forward the received signals to another device, such as the security control unit 140 , through the security system interface 530 for analysis.
  • the access information 541 can include information on an expected format of the wireless signals, and an expected mode of communication, e.g., the frequency of the wireless signals and the delay between the periodic transmissions.
  • the user profiles 542 can include information on particular users or classes of users that can access or that are denied access to resources protected by the secure access device 500 .
  • the classes of users can be a subset or group of one or more users that have common access privileges, which can be set arbitrarily or based on some common characteristic.
  • the security controller 550 can direct the locking mechanism 520 to disable one or more security measures. For example, when the locking mechanism 520 is locking an access point 120 , the locking mechanism 520 can enable the access point 120 to provide access to a network to at least the user associated with the wireless security device 400 .
  • FIG. 6 is an example operational flowchart 600 for the wireless security device and the security system according to embodiments of the invention.
  • the wireless security device 400 can be configured to capture a biometric input of a user.
  • the wireless security device 400 can include a biometric scanner 420 to capture the biometric input of a user.
  • the biometric scanner 420 can be a fingerprint scanner, iris or retina scanner, a bodily fluid scanner, voice recognition system, or any other device that can identify a unique physical and/or behavioral attribute of the user.
  • the wireless security device 400 can be configured to determine whether the user is authorized to utilize the wireless security device 400 based, at least in part, on a biometric input of the user. In some embodiments, the wireless security device 400 can be configured to authorize the user to utilize the wireless security device when the biometric input at least substantially matches one or more predefined user profiles stored in the wireless security device 400 .
  • the wireless security device 400 can be configured to periodically transmit one or more identification signals when the user is authorized.
  • the one or more identification signals can be configured to prompt a security system 100 to disable at least one security measure that restricts user access to resources protected by the security system 100 .
  • the security system 100 can be configured to automatically re-engage the at least one security measure when the security system 100 is outside a transmission range of the wireless security device 400 .
  • the wireless security device 400 can be configured to disable the wireless security device 400 from periodically transmitting the one or more identification signals when the user is not authorized to utilize the wireless security device 400 .
  • the wireless security device 400 can transmit one or more alert signals instead of the identification signals.
  • the alert signals can be configured to prompt the security system 100 to lock access to the protected resources for the wireless security device 400 .

Abstract

A device includes a security controller to determine whether a wireless security device is authorized to access at least one resource protected by a secure access device based, at least in part, on identification signals that originate from the wireless security device. The security controller is configured to receive location information corresponding to the wireless security device from at least one wireless device. When the wireless security device is authorized to access at least one resource, the security controller is configured to direct the security access device to disable at least one security measure that restricts user access to the at least one resource based, at least in part, on the location information corresponding to the wireless security device.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation application of U.S. Non-Provisional application Ser. No. 14/512,944, filed on Oct. 13, 2014, which claims the priority and benefit of U.S. Non-Provisional application Ser. No. 12/948,587, filed on Nov. 17, 2010, all of which are incorporated by reference herein in their entirety.
  • TECHNICAL FIELD
  • This disclosure relates generally to electronic systems, and, more particularly, to security systems utilizing wireless security devices.
  • BACKGROUND
  • Many buildings and offices have security systems that selectively allow personnel admission through their various entrances. These security systems typically have automated locks on their entrances, which can be temporarily deactivated by personnel that are authorized to access the buildings or offices.
  • Businesses will often issue authorized personnel a personal identification number (PIN) or a pass card, for example, having passive radio-frequency identification (RFID) technology, which can be utilized to gain access to the buildings or offices. The personal identification number, when entered into the security system, or the pass card, when swiped across the security system, will temporarily deactivate or unlock the automated lock for a particular entrance long enough to allow the authorized personnel access to the building or office.
  • SUMMARY
  • This patent application discloses a device includes a security controller to determine whether a wireless security device is authorized to access at least one resource protected by a secure access device based, at least in part, on identification signals that originate from the wireless security device. The security controller is configured to receive location information corresponding to the wireless security device from at least one wireless device. When the wireless security device is authorized to access at least one resource, the security controller is configured to direct the security access device to disable at least one security measure that restricts user access to the at least one resource based, at least in part, on the location information corresponding to the wireless security device.
  • A system includes a secure access device to control access to protected resources and a wireless device to identify a location of a wireless security device in an environment. The system also include a security controller to determine whether the wireless security device is authorized to access at least one resource protected by the secure access device based, at least in part, on identification signals that originate from the wireless security device and the identified location of the wireless security device in the environment.
  • A wireless security device includes a controller to determine whether a user is authorized to utilize the wireless security device based, at least in part, on a biometric input from the user. The wireless security device also includes a wireless transmitter to automatically emit one or more identification signals when directed by the controller responsive to the determination. A security system is configured to disable at least one security measure that restricts user access to protected resources based, at least in part, on the one or more identification signals and a detected location of the wireless security device.
  • DESCRIPTION OF THE DRAWINGS
  • FIGS. 1A-1D are block diagram examples of a security system according to embodiments of the invention.
  • FIGS. 2A-2B and 3A-3B are block diagram examples for utilizing the wireless security device shown in FIG. 1A.
  • FIG. 4 is a block diagram example of the wireless security device shown in FIG. 1A.
  • FIG. 5 is a block diagram example of the secure access device according to embodiments of the invention.
  • FIG. 6 is an example operational flowchart for the wireless security device and the security system according to embodiments of the invention.
  • DETAILED DESCRIPTION
  • Security systems can implement one or more security measures to restrict user access to various protected resources, such as secured equipment or secured areas of a building or office. A wireless security device or key fob can automatically transmit identification signals that, when received by the security system, disable at least one of the security measures. The security system and the wireless security device can also implement multiple techniques to help ensure access to the protected resources is not granted to unauthorized users. Embodiments are shown and described below in greater detail.
  • FIG. 1A is block diagram example of a security system 100 according to embodiments of the invention. Referring to FIG. 1A, the security system 100 includes one or more secure access devices, for example, included in a personal computer 110, an access point 120, an entry device 130, and/or a security control unit 140, which can selectively restrict access to protected resources. For instance, the secure access devices in the personal computer 110 or the access point 120 can authenticate a user, e.g., through a user log-on procedure, before allowing the user to utilize its processing resources. When the entry device 130 includes a secure access device, the entry device 130 can authenticate personal that are authorized to utilize an entrance 135 to a secured area, such as a building or an office.
  • A wireless security device 400 includes a wireless transceiver 410 that can wirelessly communicate with one or more of the secure access devices and prompt them to disable security measures that restrict access to their protected resources. For example, the wireless security device 400 can transmit or emit identification signals that direct the secure access devices to disable their respective security measures. Although the wireless security device 400 is shown in FIG. 1A as a key fob-type device, in some embodiments, it or the related functionality can be integrated into and/or downloaded onto other electronic devices, e.g., mobile phones or handsets, laptop computers, digital music players, or any other device that can transmit identification signals to the security system 100.
  • The wireless security device 400, in some embodiments, can periodically transmit the identification signals over a predetermined range from the wireless security device 400. Thus, when the wireless security device 400 travels within the predetermined range of a secure access device, the secure access device can receive the identification signal and disable its corresponding security measure. The length of the delay between transmissions, i.e., the frequency of the periodic transmissions, can be sufficiently short to cause the secure access device to keep the security measure disabled, while the secure access device is within the predetermined range of the wireless security device 400.
  • The security system 100 can include a security control unit 140 to communicate with one or more of the secure access devices, such as those included in the personal computer 110, the access point 120, and the entry device 130. In some embodiments, the security control unit 140 can be implemented on a server or other network device, and communicate with the secure access devices over one or more networks. The security control unit 140 can provide a centralized location to analyze identification signals from a wireless security device 400 and control the states of the security measures that restrict access to their protected resources. Embodiments of the wireless security device 400 and security system 100 will be described below in greater detail.
  • In some embodiments, the secure access devices or the security control unit 140 can log access events or attempts to access protected resources. These logging events can track usage of the protected resources, for various reasons including billing or maintenance. Although FIG. 1A shows several example applications that can include secure access devices, it is not meant to be exclusive. In some embodiments, secure access devices can be included in automobiles, controlling security measures, such as car locks and ignition. For example, the secure access devices can automatically unlock car locks, activate an ignition, or allow a user to manual perform these tasks. The secure access devices can be used to control access to security containers, such as safes, file cabinets, safety deposit boxes, realtor lockboxes, mailboxes, utility enclosures for circuit breakers or meters, hotel rooms, trailers, shipping containers, etc.
  • FIGS. 1B-1D are top-views of an example implementation for the security system 100 with the wireless security device 400. Referring to FIGS. 1B-1D, the security system 100 can be utilized to selectively grant access to a secured area 180, for example, through entrance 135, and selectively grant access to secured resources, such as personal computers 110 and access point 120.
  • The security system 100 can include the security control unit 140, which can be executed on or included in a security server 155. The secured server 155, in some embodiments, can be located in a remote location from the secured area 180, such as in a separate remote security room 150. The remote security room 150 can be on-site, such as in a room or building near the secured area 180, or located off-site and able to communicate with the rest of the security system 100 through one or more networks. The security control unit 140 can communicate with other portions of the security system 100 through a wired or wireless connection directly to the secure access devices of the security system 100, or through one or more intermediary network nodes, such as the access point 120.
  • Referring to FIG. 1B, the security control unit 140 can control access to the secured area 180 through the entrance 135 via the entry device 130. For example, when the wireless security device 400 has been activated by a user and is within a wireless range of the entry device 130, the entry device 130 can receive identification signals from the wireless security device 400 and forward them to the security control unit 140 for analysis and processing. In some embodiments, the security control unit 140 can determine whether the wireless security device 400 is authorized to access the resource protected by the entry device, e.g., access to the secured area 180 through the entrance 135, and transmit a response to the entry device 130 to indicate whether the entry device 130 is to grant the wireless security device 400 access to the secured area 180 through the entrance 135. This authorization determination can be performed in various ways, for example, by comparing the identification signals received by the entry device 130 to an access list (not shown).
  • The security system 100 can also include a proximity sensor 160, which can help avert tailgating of multiple users through the entrance 135. The proximity sensor 160 can be an infrared sensor, such as a passive infrared (PIR) sensor, and can detect when an object or person is close to the wireless security device 400. The proximity sensor 160 can transmit a proximity detection signal to the security control unit 140, and the security control unit 140 can determine whether to grant the wireless security device 400 access to the secured area 180 based on the identification signals from the entry device 130 and the proximity detection signal from the proximity sensor 160.
  • Referring to FIGS. 1C and 1D, the security system 100 can include one or more sensor nodes 170, which can be utilized to detect the location of the wireless security device 400 in the secured area 180. The sensor nodes 170, in some embodiments, can be nodes of a wireless sensor network (WSN) having location-finding capabilities, for example, 802.15.4a, Zigbee Pro, and other network systems built on standard wireless sensor network technologies, such as 104.15.4. In some embodiments, the wireless sensor network can be used for environmental monitoring and control, such as HVAC and lighting control, as well as, detecting a location of the wireless security device 400.
  • The sensor nodes 170, in some embodiments, can each measure a distance to the wireless security device 400 and report those distances to the security control unit 140 or directly to a secured access device, such as the personal computers 110 or the access point 120. The security control unit 140 or the secured access device can determine a location of the wireless security device 400 within the secured area 180 based on the distance measurements from the sensor nodes 170, and in some embodiments, a distance measurement from the secure access devices themselves.
  • The secure access devices, such as the personal computers 110 and the access point 120, can receive identification signals from the wireless security device 400 and forward them to the security control unit 140 for analysis and processing. The security control unit 140 can transmit a response to the secure access devices, such as the personal computers 110 and the access point 120, based on the identification signals and the location of the wireless security device 400 in the secured area 180. For example, when the location of the wireless security device 400 is determined to be within a predetermined location of the secured area 180, such as within a specified office or cubicle in the secured area 180, the security control unit 140 can transmit the response to the secure access device to grant access to the protected resource.
  • After access has been granted to the protected resource, the security control unit 140 can determine the location of the wireless device 400 in the secured area 180. This location determination can be made continually, periodically, intermittently, randomly, or when prompted by another device in the security system 100, for example, upon detection of movement in the wireless security device 400. In some embodiments, the secure access device can signal the security control unit 140 when the wireless security device 400 fails to provide an identification signal after access has been granted, indicating that the wireless security device 400 is out-of-range of the secure access device. The wireless security device 400 can also internally detect motion or movement, and signal the secure access device and/or the security control unit 140 to prompt a location determination of the wireless security device 400. The security system 100 can also include one or more motion sensors (not shown) that can detect motion within the secured area 180 and prompt a location determination of the wireless security device 400 responsive to detecting the motion. When the wireless security device 400 is detected as being outside of a predetermined location in the secured area 180, the security control unit 140 can signal the personal computer 110 to revoke access to the protected resource, for example, by logging-out the user.
  • FIGS. 2A-2B and 3A-3B are block diagram examples for utilizing the wireless security device 400 shown in FIG. 1A. Referring to FIGS. 2A and 2B, the wireless access device 400 can transmit identification signals over a wireless range 401. In some embodiments, the wireless access device 400 can control the magnitude or size of the wireless range 401, for example, by varying the transmit signal strength of the wireless transceiver 410. Although the wireless range 401 is shown as substantially spherical or circular, in some embodiments, the wireless transceiver 410 of the wireless security device 400 can be directional—projecting wireless signals in a specific direction from the wireless security device 400.
  • The security system 100 includes the entry device 130 and a locking mechanism 220, which can be at least partially housed within a wall 210. The wall 210 can also define an entrance 135 and support a door 230 to restrict access to through the entrance 135, for example, when the door 230 is coupled to the locking mechanism 220. The entry device 130 can control the locking mechanism 220 to lock or unlock the door 230, which selectively grants access to the entrance 135, in response to wireless signals from the wireless security device 400. Although FIGS. 2A and 2B, show a door 230 as restricting access through the entrance 135, in some embodiments, any object that can restrict access to the entrance 135 responsive to the entry device 130 and locking mechanism 220.
  • As shown in FIG. 2A, when the entry device 130 is not within the wireless range 401 of the wireless security device 400, the locking mechanism 220 can lock the door 230 and deny access through the entrance 135. In FIG. 2B, when the wireless security device 400 travels towards the entry device 130 and the entry device 130 is within the wireless range 401 of the wireless security device 400, the entry device 130 can direct the locking mechanism 220 to unlock the door 230, granting access through the entrance 135. For example, when the entry device 130 is within the wireless range 401, the entry device 130 can receive identification signals from the wireless security device 400 that prompt the entry device 130 to have the locking mechanism 220 unlock the door 230. In some embodiments, the door 230 can open automatically responsive to the entry device 130, while in other embodiments, an unlock door 230 can be manually opened by a user attempting to pass through the entrance 135.
  • In some embodiments, the entry device 130 can include a proximity sensor (not shown) to help avert tailgating of multiple users through the door 230. The proximity sensor can be an infrared sensor, such as a passive infrared (PIR) sensor, and can detect when multiple users are close to the door 230. When multiple users are close to the door 230, the entry device 130 can provide an alert, such as an audible or visual presentation, that indicates to the users that too many users are near the door 230. The entry device 130 can also disable access through the entrance 135 until the excess users move away from the door 230 based on the detection by the proximity sensor.
  • Referring to FIGS. 3A and 3B, similar to as shown in FIGS. 2A and 2B, the wireless access device 400 can transmit identification signals over a wireless range 401. The security system 100 includes a personal computer 110 having a secure access device 310 to restrict or provide access to at least some of the functions and/or resources of the personal computer 110.
  • In FIG. 3A, when the personal computer 110 is not within the wireless range 401 of the wireless security device 400, the secure access device 310 can restrict access to at least some of the functions and/or resources of the personal computer 110. The wireless range 401 can be a maximum distance wireless signals are detectable from the wireless security device 400. For example, the secure access device 310 can force one or more users to be logged off of the personal computer 110 when the wireless security device 400 is out-of-range of the secure access device 310. In some embodiments, when the personal computer 110 is not within the wireless range 401 of the wireless security device 400, the secure access device 310 can elect to not automatically provide access to the personal computer 110.
  • In some embodiments, the secure access device 310 can also have a secure range 402. When the wireless security device 400 is not within the secure range 402 of the secure access device 310, the secure access device 310 can restrict access to at least some of the functions and/or resources of the personal computer 110. Since, in some embodiments, the secure access device 310 can receive wireless signals from the wireless security device 400 when the wireless security device 400 is outside of the secure range 402, the secure access device 310 may elect to provide access based on a location of the wireless security device 400.
  • There are several ways the secure access device 310 can detect the location of the wireless security device 400. The secure access device 310 can implement a wireless link with the wireless security device 400 and detect a distance the wireless security device 400 is from the secure access device 310 based on a signal strength analysis of the wireless link. For instance, the secure access device 310 can measure a strength of wireless signaling with the wireless security device 400 to detect a distance the wireless security device 400 is from the secure access device 310. In some embodiments, the wireless link between the secure access device 310 and the wireless security device 400 can utilize multiple frequency bands, such as 300-400 MHz UHF, 800 MHz and 2.4 GHz bands, and measure the signal strength on each frequency, possibly several times in each direction, to provide an accurate measurement of the distance between the secure access device 310 and the wireless security device 400.
  • In some applications, such as in when an environment has adjoining workstations or cubicles, the distance the wireless security device 400 is from the secure access device 310 is less important than the actual location of the wireless security device 400 within the environment. When the secure access device 310 can have access to multiple receivers located in the environment, as shown and described above in FIGS. 1B-1D, the location of the wireless security device 400 in the environment can be detected. The multiple receivers, in some embodiments, can be nodes of a wireless sensor network (WSN) having location-finding capabilities, for example, 802.15.4a, Zigbee Pro, and other network systems built on standard wireless sensor network technologies, such as 104.15.4. In some embodiments, the wireless sensor network can be used for environmental monitoring and control, such as HVAC and lighting control, as well as, detecting a location of the wireless security device 400.
  • The multiple receives, in some embodiments, can each measure a distance to the wireless security device 400 and report those distances to the secure access device 310 or to the security control unit 140. The secure access device 310 or the security control unit 140 can determine a location of the wireless security device 400 based on the distance measurements from the multiple receivers and optionally the secure access device 310. When the location of the wireless security device 400 is determined to be within the secure range 402 of the secure access device 310, the secure access device 310 can grant the wireless security device 400 access to the personal computer.
  • In some embodiments, the wireless security device 400 can communicate with the secure access device 310 and/or security control unit 140 over the wireless sensor network. For example, the initial challenge to the wireless security device 400 can be issued over the wireless sensor network and location determined using the wireless sensor network, but, in some embodiments, additional authentication of the wireless security device 400 can take place over another wireless network, such as WiFi.
  • In FIG. 3B, when the secure access device 310 is within the wireless range 401 of the wireless security device 400 and/or the wireless security device 400 falls within the range of the secure range 402 of the secure access device 310, the secure access device 310 can grant user access to at least some of the functions and/or resources of the personal computer 110. For example, the secure access device 310 can direct the personal computer 110 to automatically log-on at least one user. In some embodiments, identification signals from the wireless security device 400 can identify a particular user that is associated with the wireless security device 400 and the secure access device 310 can automatically log-on that particular user.
  • In some embodiments, when the secure access device 310 is within the wireless range 401 of the wireless security device 400, the secure access device 310 can remove a login lock. For example, the secure access device 310 can assert the login lock and deny one or more users the opportunity to log-on to the personal computer 110. The login lock can disable various peripherals of the personal computer 110, such as a keyboard, mouse, display device, video interface, etc. After the secure access device 310 is within the wireless range 401 of the wireless security device 400, the secure access device 310 can provide the user the opportunity to manually log-on to the personal computer 110. The secure access device 310 can also remove the login lock for all users or for particular users, such as those users associated with the wireless security device 400.
  • In some embodiments, when the secure access device 310 is within the wireless range 401 of the wireless security device 400, the secure access device 310 can allow a logged-on user access to particular resources of personal computer 110 that would not be accessible to the logged-on user without the presence of the wireless access device 400. For example, the secure access device 310 can restrict user access to secure data, particular programs and applications, or other resources available to the personal computer 110, while allowing the user to log-on to the personal computer 110 and access to other programs, applications, resources, and data.
  • Referring back to FIG. 1A and to FIG. 4, which includes a block diagram example of the wireless security device 400 shown in FIG. 1A. The wireless security device 400 includes various features that help to protect the security system 100 from unauthorized user access, for example, by authenticating users attempting to utilize the wireless security device 400 and/or by protecting the wireless communication between the wireless security device 400 and the security system 100.
  • The wireless security device 400 can authenticate a user of the wireless security device 400, for example, by including a biometric scanner 420 to scan at least a part of a user or detect a behavior of the user for the biometric input. In some embodiments, the biometric scanner 420 can be a fingerprint scanner, iris or retina scanner, a bodily fluid scanner, voice recognition system, or any other device that can identify a unique physical and/or behavioral attribute of the user.
  • The wireless security device 400 can receive a biometric input from the biometric scanner 420 and compare the biometric input to one or more known user profiles 471. In some embodiments, the user profiles 471 can be stored in a memory device 470 of the wireless security device 400. The wireless security device 400 can include a controller 460 to receive the biometric input from the biometric scanner 420, access the memory device 470 to locate the user profiles 471, and compare the biometric input to the user profiles 471. In some embodiments, the user profiles 471 may be stored in the security control unit 140, and the wireless security device 400 may send encrypted biometric data to the security control 140 unit for verification.
  • When the biometric input matches one or more of the known user profiles 471, the wireless security device 400 can become activated, for example, to emit identification signals. The controller 460 can generate the identification signals, for example, from identification signal information 473 stored in the memory device 470. The identification signals can be signals that are common to multiple wireless devices, device-specific signals, and/or user-specific signals. After receiving a biometric input that matches a user profile 471, the wireless security device 400 can remain active indefinitely or for a predetermined period of time. In some embodiments, the security system 100 can signal the wireless security device 400 to become disabled, which can override previous user activation.
  • When the biometric input fails to match at least one of the user profiles 471, the wireless security device 400 can become disabled, for example, by blocking the wireless transceiver 410 from sending or receiving signals. In some embodiments, the wireless security device 400 can remain disabled until the biometric scanner 420 provides the wireless security device 400 a biometric input that matches a known user profile 471.
  • The wireless security device 400, in some embodiments, includes motion detection functionality (not shown), that can detect movement of the wireless security device 400 or of objects nearby the wireless security device 400. After receiving a biometric input that matches a known user profile 471, the wireless security device 400 can remain active based on the input received from the motion detection functionality. For example, the wireless security device 400 can become disabled when the wireless security device 400 is moved after a period of inactivity. In another example, the wireless security device 400 can remain activated while in motion, but become disabled, after coming to rest for a preset period of time.
  • The wireless security device 400, in some embodiments, includes proximity detection functionality (not shown), that can detect the presence of a user near the wireless security device 400. The proximity detection functionality can include capacitive sensing and/or infrared sensing, for example, a passive infrared (PIR) sensor, which can detect the presence of a user near the wireless security device 400. After receiving a biometric input that matches a known user profile 471, the wireless security device 400 can remain active based on the input received from the proximity detection functionality. For example, the wireless security device 400 can become disabled when proximity detection functionality detects the wireless security device 400 is separated from the user.
  • When the wireless security device 400 is utilized in conjunction with the wireless sensor network described above, the wireless security device 400 can remain active based on a detected location of the wireless security device 400 in the environment covered by the wireless sensor network. For example, when the wireless security device 400 leaves the area covered by the wireless sensor network, the wireless security device 400 can become disabled.
  • In some embodiments, the wireless security device 400 can take additional defensive actions when the biometric input fails to match one or more of the known user profiles and/or after the wireless security device 400 has been inactive to a predetermined period of time. For example, the wireless security device 400 can store the biometric input that failed to match the known user profiles 471, for example, in the memory device 470. This stored biometric input can subsequently be transferred to the security system 100, for example, through the wireless transmitter 410.
  • The wireless security device 400 can destroy stored data, such as the known user profiles 471, encryption data 472, and identification signal information 473, when the biometric input fails to match one or more of the known user profiles 471 and/or after the wireless security device 400 has been inactive to a predetermined period of time. The destruction of data helps to ensure information utilized by the wireless security device 400 to gain access to protected resources is not compromised if the wireless access device 400 is mislaid or stolen.
  • When the biometric input fails to match one or more of the known user profiles 471 and/or after the wireless security device 400 has been inactive to a predetermined period of time, the wireless access device 400 can transmit the alert signal through the wireless transceiver 410. The alert signal is configured to indicate to the security system 100 that the wireless security device 400 may be in possession of an unauthorized user. The security system 100, in response to the alert signal, can shut down access to the protected resources for all users or for the particular wireless security device 400.
  • The security system 100 can identify the location that one or more of the secure access devices received the alert signal, allowing security personal to attempt to locate the wireless security device 400. When the wireless security device 400 has access additional networks, for example, a local area network (LAN), such as a WiFi network, a cellular network, a wide area network (WAN), an 802.16 (Wimax) network, a Free Space Optical (FSO) network, or other voice or data networks, and/or include global positioning system (GPS) functionality, the wireless access device 400 can transmit the alert signal over the additional networks, in attempt to alert the security system 100 of the attempted unauthorized access.
  • The wireless security device 400 can attempt to secure the communication with the security system 100 in several ways. For example, the wireless security device 400 can encrypt the identification signals before they are transmitted or emitted from the wireless security device 400. In some embodiments, the controller 460 can access the encryption data 472 in the memory device 470 and generate the identification signals based on the encryption data 472.
  • The wireless security device 400 can vary the wireless frequency over which the identification signals are transmitted. In some embodiments, the identification signal information 473 in the memory device 470 can indicate which wireless frequency for the wireless transceiver 410 to transmit the identification signals. The frequency variation can be performed based on the day, time, or other temporal indicator. For example, the wireless security device 400 can emit identification signals over one wireless frequency or channel during normal business hours, and another wireless frequency during off hours. The frequency variation can also be based on the specific wireless security device 400 and/or the user of the wireless security device 400.
  • As discussed above, the wireless security device 400 can periodically transmit the identification signals, which can also be utilized as a basis for authenticating the wireless security device 400. The wireless security device 400 can vary the periodicity or frequency of the transmission based on temporal indicators, such as time and/or day, or based on the wireless security device 400 and/or user of the wireless security device 400. In some embodiments, the identification signal information 473 in the memory device 470 can indicate the delay between identification signal transmissions.
  • The security system 100 can be configured to receive the identification signals and authenticate the wireless security device 400 based on the contents of the identification signal and the mode of communication, e.g., which wireless frequency was utilized for transmission or the period of the identification signal transmissions. The security system 100 can also determine if the same or similar identification signals were received on other wireless frequencies, indicating a counterfeit device may be attempting access by transmitting the identification signals on all channels or wireless frequencies.
  • In some embodiments, the wireless security device 400 can be activated, but hold-off transmitting identification signals until the wireless security device 400 is within range of a secure access device of the security system 100. For example, the secure access device can emit a proximity signal that, when received by the wireless security device 400, prompts the wireless security device 400 to begin transmitting the identification signals. This limits where the wireless security device 400 transmits the identification signals, and helps to avoid eavesdropping on the identification signals by unauthorized users. In some embodiments, the proximity signal emitted by the security system 100 can have the same or similar security features as those discussed above with the identification signals, such as being encrypted and having varied wireless frequency and transmission periodicity.
  • To help reduce power consumption, the wireless security device 400, when activated, can periodically transmit a “ping” signal to initiate a user authentication session. The ping signal can be short wireless signal, for example, a radio frequency signal that can be detected and discriminated from noise and/or interfering signals. In some embodiments, the ping can include a unique data sequence and can be the same for all wireless security devices 400, or can have characteristics that are unique to a particular wireless security device 400 or a group of wireless security devices 400. The secure access device can receive the ping and respond with a request to begin the authentication process with the wireless security device 400.
  • The wireless security device 400 and the security system 100 can also perform an initial handshake or exchange of signals or datagrams to ensure the wireless security device 400 is authentic. The handshake can be initiated by either the wireless security device 400 or the security system 100 and can include a request by the security system 100 for a unique response. The wireless security device 400 can generate the unique response based on the information in the request from the security system 100, and possibly information stored in the wireless security device 400 and/or the mode of communicating the request, such as the wireless transmission frequency. The security system 100 can analyze the unique response received from the wireless security device 400 to determine whether the wireless security device 400 is authentic. The security system 100 can also periodically and/or intermittently request a follow-up handshake for additional security.
  • In some embodiments, the wireless security device 400 can include multiple wireless transceivers that can be utilized to implement the different stages of authentication processes—initiation, location detection, and authentication. For example, as discussed above, initiation of the authentication process by either the wireless security device 400 or the secure access device can utilize a wireless transceiver that has low-power consumption to help save battery life. To help the secure access device determine a location of the wireless security device 400, the wireless access device 400 may utilize a different wireless transceiver, for example, that can communicate with a wireless sensor network. Finally during authentication, the wireless security device 400 can utilize yet another wireless transceiver that allows for additional security or encryption, for example, that can communicate over a WiFi network. In some embodiments, any of these wireless transceivers can be utilized for any of the different stages of authentication processes.
  • The security system 100 can also include the security control unit 140, which can allow for an additional layer of defense against unauthorized access. The security control unit 140 can communicate with one or more of the secure access devices, such as those included in the personal computer 110, the access point 120, and the entry device 130. The security control unit 140 can provide a centralized location to analyze identification signals from the wireless security device 400 and control the states of the security measures that restrict access to their protected resources.
  • By centralizing the authentication of the wireless security device 400, the security system 100 can secure any information utilized in determining when identification signals are received from an authentic wireless security device 400. For example, the security control unit 140 can be stored in a secured room within a building or at a remote location, and thus a theft of a personal computer 110, the access point 120, and the entry device 130, may not compromise any access information utilized to allow the user of the wireless security device 400 access to protected resources.
  • The centralized authentication of the wireless security device 400 can also allow for layered security. The security control unit 140 would be able to tell when a wireless security device 400 was currently accessing one protected resource and attempting to access another protected resource in a physically distinct regions or spaces. For instance, when the wireless security device 400 is currently accessing the personal computer 110 located in an office and also attempting to access the building, the security control unit 140 can determine at least one of the accesses is being performed by a counterfeit device.
  • The wireless security device 400 can include input devices 430 that allow a user to manually activate, disable, or send an alert, for example, by actuating buttons 431-433, respectively. In some embodiments, the manual activation, disablement, and/or alert can be achieved when the user has already been authenticated through the biometric input process described, and/or by actuating the buttons 431, 432, and/or 433 in a predetermined pattern. Although FIG. 1A shows the input devices 430 as a set of buttons, in some embodiments, the input devices 430 can be a touch screen device, a roller ball or mouse device, audio recognition device, or any other device that allows a user to present a manual input to the wireless security device 400.
  • The wireless security device 400 can include output devices 480 to provide visual and/or audio indications to the user of the wireless security device 400. The visual and/or audio indications can identify a state of the wireless security device 400, such as whether it is activated or disabled, and/or actively transmitting identification signals or alert signals. The visual and/or audio indications can also be utilized to help a user locate a missing device, for example, by presenting an auditory sound or ring. The output devices 480 can include lights, speakers, visual displays, or any other visual and/or audio device that can provide an output perceptible by the user.
  • FIG. 5 is a block diagram example of the secure access device 500 according to embodiments of the invention. Referring to FIG. 5, the secure access device 500 includes a wireless transceiver 510 to exchange wireless signals with one or more wireless security devices 400. The wireless transceiver 510 can pass received wireless signals along to a security controller 550 for analysis.
  • The security controller 550 can analyze received wireless signals based, at least in part, on information stored in the memory device 540. The security controller 550 can utilize the access information 541 and possibly the user profiles 542 to determine whether the wireless signals received by the wireless transceiver 510 authenticate a wireless security device 400 within range of the secure access device 500. In some embodiments, the security controller 550 can forward the received signals to another device, such as the security control unit 140, through the security system interface 530 for analysis.
  • The access information 541 can include information on an expected format of the wireless signals, and an expected mode of communication, e.g., the frequency of the wireless signals and the delay between the periodic transmissions. The user profiles 542 can include information on particular users or classes of users that can access or that are denied access to resources protected by the secure access device 500. The classes of users can be a subset or group of one or more users that have common access privileges, which can be set arbitrarily or based on some common characteristic.
  • When the wireless signals indicate that the wireless security device 400 is authentic, the security controller 550 can direct the locking mechanism 520 to disable one or more security measures. For example, when the locking mechanism 520 is locking an access point 120, the locking mechanism 520 can enable the access point 120 to provide access to a network to at least the user associated with the wireless security device 400.
  • FIG. 6 is an example operational flowchart 600 for the wireless security device and the security system according to embodiments of the invention. Referring to FIG. 6, in a first block 610, the wireless security device 400 can be configured to capture a biometric input of a user. In some embodiments, the wireless security device 400 can include a biometric scanner 420 to capture the biometric input of a user. The biometric scanner 420 can be a fingerprint scanner, iris or retina scanner, a bodily fluid scanner, voice recognition system, or any other device that can identify a unique physical and/or behavioral attribute of the user.
  • In a next block 620, the wireless security device 400 can be configured to determine whether the user is authorized to utilize the wireless security device 400 based, at least in part, on a biometric input of the user. In some embodiments, the wireless security device 400 can be configured to authorize the user to utilize the wireless security device when the biometric input at least substantially matches one or more predefined user profiles stored in the wireless security device 400.
  • In a next block 630, the wireless security device 400 can be configured to periodically transmit one or more identification signals when the user is authorized. The one or more identification signals can be configured to prompt a security system 100 to disable at least one security measure that restricts user access to resources protected by the security system 100. The security system 100 can be configured to automatically re-engage the at least one security measure when the security system 100 is outside a transmission range of the wireless security device 400.
  • In a next block 640, the wireless security device 400 can be configured to disable the wireless security device 400 from periodically transmitting the one or more identification signals when the user is not authorized to utilize the wireless security device 400. In some embodiments, the wireless security device 400 can transmit one or more alert signals instead of the identification signals. The alert signals can be configured to prompt the security system 100 to lock access to the protected resources for the wireless security device 400.
  • One of skill in the art will recognize that the concepts taught herein can be tailored to a particular application in many other ways. In particular, those skilled in the art will recognize that the illustrated embodiments are but one of many alternative implementations that will become apparent upon reading this disclosure.
  • The preceding embodiments are examples. Although the specification may refer to “an”, “one”, “another”, or “some” embodiment(s) in several locations, this does not necessarily mean that each such reference is to the same embodiment(s), or that the feature only applies to a single embodiment.

Claims (16)

What is claimed is:
1-20. (canceled)
21. A wireless security device comprising:
a controller;
a wireless transceiver coupled to the controller, the wireless transceiver for sending and receiving information from and to the controller;
at least one user interface coupled to the controller, the at least one user interface for receiving user input for processing by the controller; and
a memory device coupled to the controller, the memory device for storing biometric information for user authentication,
wherein the wireless security device is configured to send, by the wireless transceiver, encrypted biometric information stored in the memory device to a security control unit.
22. The wireless security device of claim 21, further configured to send, by the wireless transceiver, encrypted information to a security control unit based on a location of the wireless security device.
23. The wireless security device of claim 22, wherein the location of the wireless security device is determined by at least one sensor node.
24. The wireless security device of claim 21, wherein the at least one user interface includes at least one of an output device, a biometric scanner, and an input device.
25. the wireless security device of claim 21, wherein the memory device is for storing a plurality of user profiles, the user profiles including biometric information.
26. The wireless security device of claim 21, wherein the memory device is for storing encryption data for secure communication with a security control unit.
27. The wireless security device of claim 21, further configured to send, by the wireless transceiver, encrypted information to a security control unit based on a proximity of the wireless security device to a proximity sensor.
28. A security system comprising:
a security control unit;
an input coupled to the security control unit, the input for receiving wireless communication from a wireless security device;
a secure location, the secure location comprising an access control mechanism that is controlled by the security control unit.
29. The security system of claim 28, further comprising at least one sensor node, the at least one sensor not for calculating a distance of the wireless security device from the at least one sensor node.
30. The security system of claim 28, further comprising a plurality of sensor nodes, the plurality of sensor nodes for determining a location of the wireless security device.
31. The security system of claim 28, further comprising a proximity sensor, the proximity sensor for detecting a proximity of the wireless security device to the proximity sensor.
32. The security system of claim 28 wherein the secure location is a physical location, the physical location including an entrance and a locking mechanism to control physical access to the physical location.
33. The security system of claim 28, wherein the secure location is a computing device.
34. The security system of claim 28, wherein the secure location is a network, the network accessed by an access point in operative communication with the security control unit.
35. The security system of claim 28, wherein the security control unit is located in a physically separate location from the secure location.
US16/915,584 2010-11-17 2020-06-29 Security system with a wireless security device Abandoned US20200329037A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/915,584 US20200329037A1 (en) 2010-11-17 2020-06-29 Security system with a wireless security device

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US94858710A 2010-11-17 2010-11-17
US201414512944A 2014-10-13 2014-10-13
US16/915,584 US20200329037A1 (en) 2010-11-17 2020-06-29 Security system with a wireless security device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US201414512944A Continuation 2010-11-17 2014-10-13

Publications (1)

Publication Number Publication Date
US20200329037A1 true US20200329037A1 (en) 2020-10-15

Family

ID=62091467

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/751,559 Active US9972146B1 (en) 2010-11-17 2015-06-26 Security system with a wireless security device
US16/915,584 Abandoned US20200329037A1 (en) 2010-11-17 2020-06-29 Security system with a wireless security device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/751,559 Active US9972146B1 (en) 2010-11-17 2015-06-26 Security system with a wireless security device

Country Status (1)

Country Link
US (2) US9972146B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11262111B2 (en) * 2016-07-12 2022-03-01 Es Energy Save Holding Ab Heat pump apparatus module

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017149159A1 (en) * 2016-03-03 2017-09-08 Afilias Technologies Limited Counterfeit electronic device detection
US10713205B2 (en) * 2017-02-24 2020-07-14 Digital 14 Llc Universal serial bus (USB) disconnection switch system, computer program product, and method
DE102018123423A1 (en) * 2018-09-24 2020-03-26 ASTRA Gesellschaft für Asset Management mbH & Co. KG Access control system
US11201873B2 (en) 2018-12-19 2021-12-14 T-Mobile Usa, Inc. Multi-factor authentication with geolocation and voice command
US11140175B2 (en) 2018-12-19 2021-10-05 T-Mobile Usa, Inc. Multi-factor authentication with geolocation and short-range communication
US10769872B2 (en) * 2018-12-19 2020-09-08 T-Mobile Usa, Inc. Multi-factor authentication with geolocation and short-range communication with indoor-outdoor detection
US11222522B2 (en) 2019-01-14 2022-01-11 TeamOfDefenders LLC Devices, systems, and methods for monitoring controlled spaces for transitory uses
US11527147B2 (en) 2019-08-09 2022-12-13 TeamOfDefenders LLC Devices, systems, and methods for monitoring controlled spaces for transitory uses
CN110988421B (en) * 2019-12-10 2022-08-19 国网山东省电力公司日照供电公司 Intelligent safety protection device and system applied to electric energy metering mechanism

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050218215A1 (en) * 2004-04-02 2005-10-06 Lauden Gary A Biometric identification system
US6958676B1 (en) * 2002-02-06 2005-10-25 Sts International Ltd Vehicle passenger authorization system
US20070092114A1 (en) * 2005-10-26 2007-04-26 Swisscom Mobile Ag Method, communication system and remote server for comparing biometric data recorded with biometric sensors with reference data
US20070197261A1 (en) * 2004-03-19 2007-08-23 Humbel Roger M Mobile Telephone All In One Remote Key Or Software Regulating Card For Radio Bicycle Locks, Cars, Houses, And Rfid Tags, With Authorisation And Payment Function
US20100042835A1 (en) * 2008-08-18 2010-02-18 Keep Security Inc. System and method for permission confirmation by transmitting a secure request through a central server to a mobile biometric device
US20100274678A1 (en) * 2009-04-22 2010-10-28 Gofigure Payments, Llc Systems, methods and devices for facilitating mobile payments
US20110185178A1 (en) * 2008-03-31 2011-07-28 Compugroup Holding Ag Communication method of an electronic health insurance card with a reading device

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6720874B2 (en) 2000-09-29 2004-04-13 Ids Systems, Inc. Portal intrusion detection apparatus and method
US7512806B2 (en) * 2000-11-30 2009-03-31 Palmsource, Inc. Security technique for controlling access to a network by a wireless device
US7197168B2 (en) * 2001-07-12 2007-03-27 Atrua Technologies, Inc. Method and system for biometric image assembly from multiple partial biometric frame scans
US20030023882A1 (en) 2001-07-26 2003-01-30 Charlie Udom Biometric characteristic security system
US7233789B2 (en) 2001-11-15 2007-06-19 Avaya Technology Corp. Wireless security and access device
US7543156B2 (en) * 2002-06-25 2009-06-02 Resilent, Llc Transaction authentication card
US7155416B2 (en) 2002-07-03 2006-12-26 Tri-D Systems, Inc. Biometric based authentication system with random generated PIN
US7230519B2 (en) * 2003-06-19 2007-06-12 Scriptpro Llc RFID tag and method of user verification
AU2003904317A0 (en) 2003-08-13 2003-08-28 Securicom (Nsw) Pty Ltd Remote entry system
US7597250B2 (en) * 2003-11-17 2009-10-06 Dpd Patent Trust Ltd. RFID reader with multiple interfaces
US7378939B2 (en) 2004-03-30 2008-05-27 Sengupta Uttam K Method and apparatus for providing proximity based authentication, security, and notification in a wireless system
CA2550812A1 (en) 2005-06-22 2006-12-22 Axigon Healthcare Technologies Incorporated Two-way wireless monitoring system and method
US20080028230A1 (en) 2006-05-05 2008-01-31 Tri-D Systems, Inc. Biometric authentication proximity card
US7843312B2 (en) 2006-12-12 2010-11-30 Honeywell International Inc. Wireless control of security system with key-operated key fob
US7969280B2 (en) 2007-05-11 2011-06-28 Slevin Richard S Biometric universal security remote
US7804403B2 (en) 2007-06-11 2010-09-28 Honeywell International Inc. Security system control module
US9313313B2 (en) 2008-07-22 2016-04-12 Nissaf Ketari Proximity access and/or alarm apparatus

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6958676B1 (en) * 2002-02-06 2005-10-25 Sts International Ltd Vehicle passenger authorization system
US20070197261A1 (en) * 2004-03-19 2007-08-23 Humbel Roger M Mobile Telephone All In One Remote Key Or Software Regulating Card For Radio Bicycle Locks, Cars, Houses, And Rfid Tags, With Authorisation And Payment Function
US20050218215A1 (en) * 2004-04-02 2005-10-06 Lauden Gary A Biometric identification system
US20070092114A1 (en) * 2005-10-26 2007-04-26 Swisscom Mobile Ag Method, communication system and remote server for comparing biometric data recorded with biometric sensors with reference data
US20110185178A1 (en) * 2008-03-31 2011-07-28 Compugroup Holding Ag Communication method of an electronic health insurance card with a reading device
US20100042835A1 (en) * 2008-08-18 2010-02-18 Keep Security Inc. System and method for permission confirmation by transmitting a secure request through a central server to a mobile biometric device
US20100274678A1 (en) * 2009-04-22 2010-10-28 Gofigure Payments, Llc Systems, methods and devices for facilitating mobile payments

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11262111B2 (en) * 2016-07-12 2022-03-01 Es Energy Save Holding Ab Heat pump apparatus module

Also Published As

Publication number Publication date
US9972146B1 (en) 2018-05-15

Similar Documents

Publication Publication Date Title
US20200329037A1 (en) Security system with a wireless security device
KR102538002B1 (en) Method and system for managing a door entry using beacon signal
US9972151B2 (en) Wireless access control system including lock assembly generated magnetic field based unlocking and related methods
US9978195B2 (en) Wireless access control system including remote access wireless device generated magnetic field based unlocking and related methods
US9336637B2 (en) Wireless access control system and related methods
US9196104B2 (en) Wireless access control system and related methods
US20160086400A1 (en) Wireless access control system including distance based lock assembly and remote access device enrollment and related methods
WO2016177671A1 (en) Using a secondary mobile device to identify a trusted environment
US20140077929A1 (en) Wireless access control system and related methods

Legal Events

Date Code Title Description
AS Assignment

Owner name: CYPRESS SEMICONDUCTOR CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BEARD, PAUL;WRIGHT, DAVID;SIGNING DATES FROM 20101115 TO 20101117;REEL/FRAME:053113/0031

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STCV Information on status: appeal procedure

Free format text: NOTICE OF APPEAL FILED

STCV Information on status: appeal procedure

Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION