TITLE
"SECURITY IDENTIFICATION AND INFORMATION SYSTEM"
FIELD OF THE INVENTION
The present invention relates to a security identification and information system for verifying that a person is authorised to use an installation.
DISCUSSION OF THE PRIOR ART
One area of application for the security identification system of the present invention is seen as the hospitality industry. In the hospitality industry generally, and in particular in hotels and bars, there is a trend towards increased automation in order to provide better stock control, more secure cash transactions and improved productivity of bar tenders and other service personnel. To this end, automatic beverage dispensing apparatus are now available which are now available which are programmed to dispense a predetermined volume of spirits and/or other alcoholic beverages at the press of a button. Computerised cash register systems are now also available, such as the INFOTEL (RTM) cash register system, which may be electronically connected to a beverage dispensing machine so that data relating to the number and type of beverages dispensed by the machine can be automatically communicated to the cash register system for charging and accounting purposes.
Some such prior art automated systems require every operator to be issued a personal identification number (PIN) which must be keyed in before the operator can use the system. However, in the context of the hospitality industry such security measures are generally inconvenient and easily circumvented should an operator be observed keying in his PIN. Furthermore, if the operator is required to type his/her PIN every time he/she desires to use, for example, the cash register to record a transaction and obtain change for the customer, this results
in additional delay for the customer and a reduction in productivity for the operator.
The present invention was developed with a view to providing a security identification system which can be used to verify that a person is an authorised user without needless delays or loss of productivity. The security identification apparatus of the present invention further allows the logging/recordal of a range of information which may be utilised for stock control, marketing, personnel monitoring and the like.
BRIEF DESCRIPTION OF THE PRESENT INVENTION
In accordance with the present invention there is provided a security identification and information system characterised in that it comprises:
personal identification means for identifying a person wishing to use an installation;
first detecting means provided in association with a control means used for controlling operation of the installation, the detecting means being adapted to detect the personal identification means of the person wishing to use the installation and to generate a security signal in response; and,
processing means operatively connected to the detecting means and adapted to verify that the person is authorised to use the installation.
Preferably, the processing means also records the operation of the installation by the person responsive to the security signal.
Still preferably, the processing means is also adapted to inhibit operation of the installation responsive to the security signal if the person is not authorised to use the installation.
The personal identification means may further comprise a non-contact personal identification means wherein the person does not need to touch any part of the installation in order to activate the detecting means. More preferably, the personal identification means comprises a transmitter carried by the person for transmitting an electromagnetic signal that can be detected by the detecting means when the transmitter is brought into the proximity of the beverage dispensing apparatus.
In accordance with the present invention there is further provided a security identification and information system for beverage dispensing apparatus, characterised in that the system comprises:
personal identification means for identifying a person wishing to use a beverage dispensing apparatus;
first detecting means provided in connection with the beverage dispensing apparatus for detecting the personal identification means of the person wishing to use the beverage dispensing apparatus and for generating a first security signal responsive to the detection; and,
processing means operatively connected to the first detecting means and adapted to verify that the person is authorised to use the beverage dispensing apparatus and to record operation of the beverage dispensing apparatus by the person responsive to the first security signal.
Preferably, the processing means is also adapted to inhibit operation of the beverage dispensing apparatus responsive to the first security signal if the person is not authorised to use the beverage dispensing apparatus.
The security system of the present invention may further comprise:
second detecting means provided in connection with a cash register used for recording sale of beverages from the beverage dispensing apparatus,
the second detecting means being adapted to detect the personal identification means of a person wishing to use the cash register and to generate a second security signal responsive to the detection; and,
wherein the processing means is also operatively connected to the second detecting means and is adapted to verify that the person is authorised to use the cash register and to record operation of the cash register by the person responsive to the second security signal.
Preferably, the processing means is also adapted to inhibit operation of the cash register responsive to the second security signal if the person is not authorised to use the cash register.
The security identification system of the present invention may still further comprise:
third detecting means provided in connection with a computer system used for management purposes in monitoring sales of stock or beverages, the third detecting means being adapted to detect the personal identification means of a person wishing to use the computer system and to generate a third security signal responsive to the detection; and
wherein the processing means is also operatively connected to the third detecting means and is adapted to verify that the person is authorised to use the computer system.
Typically, the beverage dispensing apparatus, cash register and computer system can all be electronically interconnected so that data from the cash register and beverage dispensing apparatus can be transferred to the computer system.
ln accordance with the present invention there is still further provided a method of gathering information relating to one or more installations, the method comprising the steps of:
providing one or more users of the or each installation with a personal identification means;
providing one or more installations with first detecting means for detecting the or each personal identification means;
generating a first signal in response to the detecting means detecting an identification means;
feeding that signal to a processing means adapted to both authorise operation of the or each installation by the or each user and record or cause to be recorded information relating to the or each user and the or each installation; and
optionally accessing the recorded information at a later time.
DESCRIPTION OF THE DRAWINGS
The present invention will now be described, by way of example only, with reference to one embodiment thereof and the accompanying drawing, in which:
Fig. 1 is a schematic flow diagram of an embodiment of the security identification system for beverage dispensing apparatus according to one embodiment of the present invention;
Fig. 2 is a flow chart of a scenario of use of the security identification system of Fig. 1 ;
Fig. 3 is a flow chart of the security identification system of Fig. 1 with specific regard to access of the host computer by a manager;
Fig. 4 is a schematic flow diagram of a further embodiment of the security identification system of the present invention adapted for use in a hotel environment by a hotel guest; and
Fig. 5 is a flow chart of the use of the security identification system of Fig. 4.
DESCRIPTION
In the embodiment of Fig. 1 of the security identification system a personal identification band 10 is provided which may, for example, be in the form of a ring worn on the finger or a wrist band for identifying a person wishing to use a beverage dispensing apparatus 12. A detector provided in the beverage dispensing apparatus 12 is adapted to detect the personal identification band 10 of the person wishing to use the beverage dispensing apparatus 12 and generates a security signal responsive to this detection. The personal identification band 10 worn by the user preferably provides a non-contact means for identifying the person, so that the person does not need to touch any part of the beverage dispensing apparatus 12 in order to activate the detector. Preferably the personal identification band 10 comprises a miniature, low-power transmitter for transmitting an electromagnetic signal that can be detected by the detector when the identification band is brought into the proximity of the beverage dispensing apparatus 12. The sensitivity of the detector can be adjusted to prevent the detector from being activated until the personal identification band is brought within a predetermined distance of the beverage dispensing apparatus, for example, within 10 to 20 cm of the beverage dispensing apparatus 12.
A data processing means, in this case provided in connection with a central or host computer 14 is operatively connected to the detector within the beverage dispensing apparatus 12, and is adapted to verify that the person is authorised to use the beverage dispensing apparatus 12 and to record the operation of the beverage dispensing apparatus 12 by the person responsive to the security
signal generated by the detector. Preferably, the central computer 14 will inhibit operation of the beverage dispensing apparatus 21 unless it receives the appropriate security signal indicating that the person is authorised to use the beverage dispensing apparatus 12.
There are several off-the-shelf identification systems available which may be used to provide the personal identification band and the detector components of this embodiment of the security identification system. For example, the Texas Instruments Registration and Identification System (sold under the trade mark TIRIS) is designed to provide automatic identification in a wide range of applications and environments. A basic TIRIS system has three components, a tag, a reader, and an antenna. The tag, also referred to as the transponder, contains program data which may be read by the reader. In order to interrogate the tag, the reader transmits short bursts of electromagnetic energy which charges up the transponder in a matter of milliseconds. Once charged, the transponder transmits data back to the reader which can either be sent directly to a host computer or programmable logic controller (PLC), or it can be stored in a portable reader and later unloaded to the computer for data processing. TIRIS transponders or tags may be READ ONLY devices or READ/WRITE devices, and come in a variety of shapes and sizes. READ ONLY tags contain a unique, factory-programmed code that is 20 digits in length. READ/WRITE tags can be customised by the end user with individual identification codes that may be changed thousands of times. A typical read cycle for a TIRIS transponder is typically less than 100 milliseconds, providing almost instantaneous identification and verification.
Because the tag or transponder is battery-free, low frequency FM device, it can be manufactured within quite small dimensions and may easily be attached to or embedded within a wrist band or attached to a ring.
One advantage of providing the personal identification means in the form of a band which may be worn on the user's finger or wrist is that it leaves the user's
hands free to operate the beverage dispensing apparatus 12. Indeed, provided the central or host computer 14 verifies that the person is authorised to use the beverage dispensing apparatus responsive to the security signal generated by the detector, the user can operate the beverage dispensing apparatus without being aware of the process of identification and verification which occurs every time their hand is brought near to the beverage dispensing apparatus 12.
The embodiment of the security identification system illustrated schematically in Fig. 1 was designed for use in the hospitality industry, for example, in connection with automatic drink dispensing apparatus used in the public bar of a hotel. A typical drink dispensing apparatus of this kind, used for dispensing alcoholic beverages, is that described in International Application No. PCT/AU92/00623. Any other type of beverage dispensing apparatus may also be employed with the security identification system of the present invention. For example, a post-mix type drink dispensing machine, which may be modified for dispensing mixed drinks, can be fitted with a suitable detector for detecting the personal identification means of an authorised user.
A first detector, for example, in the form of a TIRIS reader, is provided in close proximity to the operating controls within the beverage dispensing apparatus 12. A second detector, or similar form, is provided in an electronic cash register 16. Like the first detector in the beverage dispensing apparatus 12, the second detector is adapted to detect the personal identification band 10 of a person wishing to use the cash register 16 and to generate a second security signal responsive to the detection. The central or host computer 14 is also operatively connected to the second detector in the cash register 16 and is adapted to verify that the person is authorised to use the cash register and to record operation of the cash register by the person responsive to the second security signal. Unless the central or host computer 14 verifies that the person is authorised to use the cash register 16 it will inhibit operation of the cash register. The process of detection, identification and verification is preferably instantaneous and
"invisible" to the user, except when operation of the cash register is inhibited by the central or host computer 14.
In order to provide a still further level of security the central or host computer 14 may itself be fitted with a similar detecting means adapted to detect the personal identification band 10 of a person wishing to use the computer system and to generate a security signal responsive to this detection. If the central or host computer 14 verifies that the person is authorised to use the central or host computer, or to access certain types of information stored in the central or host computer, then it will not inhibit operation of the computer system. Advantageously, an antenna for the detector, (which may be a TIRIS-type reader), is located immediately below the keys of a keyboard used for accessing the central or host computer 14. In order to operate the keyboard of the central or host computer 14 the user must be wearing a personal identification band which identifies the operator as an authorised person. Unless the person is authorised, operation of the keyboard of the central or host computer 14 will be inhibited. Figs. 2 and 3 clearly represent graphically a hypothetical chain of events in the use of the present invention.
It is envisaged that a dongrel may be provided with any or each of the installation, cash register or host computer. Such a dongrel contains the appropriate detector and is in operative connection with either the installation, cash register or host computer.
It will be appreciated that with the illustrated embodiment the security identification system a greatly enhanced level of security is provided at both the "shop floor" level and the management level, without in any way compromising productivity of employees or customer service. Provided a bar tender is wearing his/her personal identification band 10, he/she can use the beverage dispensing apparatus 12 and cash register 16 in the normal manner. Simultaneously, management is provided with real time data concerning the productivity of individual bar tenders, automatic reconciliation of the number and volume of
beverages dispensed and the number and cash value of transactions recorded by the cash register 16. Any discrepancies can be linked to individual bar tenders by means of their personal identification band, each of which incorporates a transponder having a personalised identification code stored therein. If desired, the central or host computer 14 can be programmed to permit operation of the beverage dispensing apparatus and cash register by particular individuals at certain times of the day only. In this way, security may be further enhanced should a particular operator's personal identification band be lost or misplaced whilst off duty. Additional information may be monitored using the system of the present invention, including stock levels.
It will further be appreciated that the security identification system of the present invention may be readily modified to suit particular applications within a variety of industries. For example and with particular relevance to the hospitality industry guests may be issued with a personal identification band when checking in to a hotel. Provided the hotel guest wears their personal identification band they will then be able to operate beverage dispensing apparatus provided at strategic locations throughout the hotel, for example, in private bars or lounge areas. Every time the guest attempts to operate a beverage dispensing apparatus the central computer system 14 verifies that the person is indeed a guest in the hotel authorised to use the beverage dispensing apparatus, and records operation of the beverage dispensing apparatus so that the drinks can be automatically charged to the guest's hotel bill for payment at the time of check out. The same personal identification band may allow the hotel guest as seen with reference to Figs. 4 and 5, to operate other guest facilities provided throughout the hotel, for example their room door 20, drink vending machines of differing forms 22 and 24 and perhaps the gym door 26.
It is envisaged that the security identification system of the present invention may be utilised with reference to the operation of a variety of industrial and domestic equipment or installations, including fuel pumps or bowsers, telephones, facsimiles, computers, video and television, vehicles and the like.
Each is envisaged to fall within the scope of the term installation as used previously and each has a form of control means by which their operation is achieved and/or governed. For example, the nozzle of a hose of a fuel bowser may have the detecting means provided therein whilst the personal identification means may be provided on the vehicle adjacent the petrol tank access hole or on the operator of the bowser. The detecting means is similarly connected to a processing means by which the operator may be verified as authorised and through which an account for that operator may be verified as authorised and through which an account for that operator may be billed for the cost of the fuel.
Numerous further variations and modifications to the security identification system will suggest themselves to persons skilled in the electronics and communications arts, in addition to those already described, without departing from the basic inventive concepts. For example, in the illustrated embodiment, a centralised data processing means is employed to verify that the person is authorised to use the beverage dispensing apparatus, cash register and/or central computer system. However, each of the beverage dispensing apparatus and cash registers may be provided with its own data processing means, for example, an on-line board microprocessor for providing localised verification and recordal of operation. Each of the localised microprocessor units can then be interrogated by the central computer system at predetermined intervals to collect operational data and perform various management functions. Furthermore, although it is preferred that the personal identification means be of the contact variety, so as to be practically invisible to the user, a contact-type personal identification means, for example, such as a fingerprint, may also be employed in particular applications.
It is to be understood that remote access to the host computer 14 of the described embodiments may be provided by way of modem or similar communication means from an external user. For example, outside management may require access to the host computer 14 for various monitoring functions. Such outside management must be provided with, for example a
terminal equipped with a detector and a modem. The host computer 14 ensures the management user of the remote terminal has a personal identification band 10 and that their access is authorised. In this manner chosen information may be made available to certain groups, locally or remote, with the host computer governing to whom information is to be made available on the basis of their personal identification band. For example, an external service provider may be granted access to the host computer 14 and certain information by issue of one or more personal identification bands and perhaps a suitable detector dongrel installed on their remote access terminal. Such may be provided for calibration or similar purposes. Further, such an arrangement allows a head office of a hotel chain to access individual hotel's host computers.