WO2003040896A1 - Personal access control system - Google Patents

Personal access control system Download PDF

Info

Publication number
WO2003040896A1
WO2003040896A1 PCT/DK2002/000746 DK0200746W WO03040896A1 WO 2003040896 A1 WO2003040896 A1 WO 2003040896A1 DK 0200746 W DK0200746 W DK 0200746W WO 03040896 A1 WO03040896 A1 WO 03040896A1
Authority
WO
WIPO (PCT)
Prior art keywords
operator
display
computer
signal
transponder
Prior art date
Application number
PCT/DK2002/000746
Other languages
French (fr)
Inventor
Bent Jensen
Tommy L. Jensen
Per Winther
Original Assignee
Secure Access Management Aps
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Secure Access Management Aps filed Critical Secure Access Management Aps
Publication of WO2003040896A1 publication Critical patent/WO2003040896A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • G07C2209/64Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle using a proximity sensor

Definitions

  • This invention relates generally to a personal access control system, particularly a personal access control to areas or sections of buildings with high security level, and more particularly for operators of a display comiected to a computer, e.g. a system preventing non-authorized persons prying into computer displays, which includes a transmitter and a receiver reacting on the transmitted signals originating from the vicinity of the operator, and a threshold detector.
  • a computer e.g. a system preventing non-authorized persons prying into computer displays, which includes a transmitter and a receiver reacting on the transmitted signals originating from the vicinity of the operator, and a threshold detector.
  • an operator is considered any person authorized to enter a section or area of a building or use a computer and its display, e.g. a doctor, a medical secretary, a social worker, a scientist, or a rector.
  • the meaning of the word "display” is: The visual representation of the output of an electronic device, as the screen of a cathode ray tube or a
  • U.S. Pat. No. 4,593,273 to Narcisse discloses an out-of-range monitor and alarm system for supervised persons, which includes a base unit transmitting a signal to a mobile unit carried by the person being supervised.
  • the mobile unit responds to a threshold circuit, which is adjustable to a prescribed distance between the base and the supervised person.
  • a threshold circuit which is adjustable to a prescribed distance between the base and the supervised person.
  • a transmitter in the mobile unit signals to the base to indicate the straying of the supervised person beyond acceptable limits.
  • the mobile unit may also sound an alarm to alert the supervised person that he is straying beyond the prescribed area.
  • 4,918,425 to Greenberg et al. discloses a monitoring and locating sys- tem for an object attached to a transponder monitored by a base station having an associated ID code where the base indicated by an alarm the absence of a timely appropriate response from the transponder.
  • the base is capable of performing and participating in homing techniques to locate the lost transponder.
  • a list of the IDs of all transponders reported missing is distributed from a central source by nationwide communication to a network of radio stations, each station broadcasting the list in an encoded signal in repetitive sequence along with regular programming. Cruising vehicles of public safety departments operating locally nationwide are equipped with automatic monitors for receiving specially encoded messages including IDs from transponders within their area.
  • Each transponder after failing to receive a signal from its base for a predetermined time period has the capability of scanning the band of the radio station network, locking onto the local station of the network and receiving its ID from the locked-on station when reported lost. Upon receipt of its ID from the locked-on station, the transponder initiates transmission of the specially coded message to make its presence known to the monitor of a local cruising vehicle and thereafter is capable of establishing communication with a local base for participation in local homing.
  • the object of the invention is to satisfy the need to prevent non-authorized person's access, particularly to areas or sections of buildings with high security level or e.g. cash registers, and more particularly to prevent non-authorized persons to pry into data on displays that have been left by their operators for a short term, e.g. few minutes.
  • a short term e.g. for photo copying a document or responding to a telephone call.
  • unauthorized persons or clients will have the opportunity of taking money from the cash register or prying into the data still displayed on the screen and possibly call new records concerning other persons up to the screen.
  • the principal object of the invention is to provide means for controlling the unauthorized personal access to areas or sections of buildings with high security level, a cash register or to a display of a computer during the absence of the operator thereby preventing prying into the data left on the display.
  • Another object of the invention is, when the computer is part of a network, to locate the operator, when sending a message to him and his whereabouts is unknown.
  • another object of the invention is to have the identification of the operator established with passive components not needing a power supply thereby making the identification key simpler and easier to carry around.
  • another object of the invention is to indicate a method for preventing non- authorized persons to pry on data represented on a display, also when the computer is a part of or a hub in a network.
  • the invention disclosed herein includes a personal control system for operators comprising: (1) A control box situated between the computer and the display, where the control box, having at least a receiver, a decoder logic, a memory, and an
  • ON/OFF-logic frequently receive signals for maintaining the connection between computer and display, these signals being generated by
  • a key or ID module being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where in the receiver
  • a threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.
  • the object of the subject matter invention is to turn off, automatically, the access to e.g. a display, when the operator leaves the surroundings of the display and to turn on, automatically, the display, when the operator is approaching the display, and to this end the elements of the personal control system comprise a control box situated between the computer and the display, where the control box frequently request signals transmitted by an identification key, being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal to- gether with the operator's ID code to the control box, where a threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.
  • the display can be either switched off or it can switch to a mode, where a screen saver takes over the control of the display.
  • the unauthorized person will have no access neither to the data represented on the screen nor to any other data present in the computer.
  • This is of great importance, as data represented on a screen often are sensible, e.g. when a doctor has patient data or an auditor has taxation data on the screen.
  • the operator of the display e.g. a doctor, can leave the workstation for short periods without having sensible data laid open to public inspection.
  • the personal control system With the personal control system it will be possible to have more than one operator to a given display, so different operators can have access to the display, as long as they carry a recognized identification key, thereby easing the use of the computer and display. This is an advantage when e.g. several operators have access to a cash register or when servants in a restaurant address the cash register for orders.
  • the computer When the computer is part of or a hub in a network, it will also be possible to locate any operator, when his whereabouts is unknown.
  • the invention further suggests a connection from the control box to the computer making it possible to transmit the operator's identity to the computer or the computer network. Thereby, it will be possible to address the display closest to the addressed operator and possibly to have the operator respond using the closest display and keyboard.
  • an op- erator can avoid entering user-ids and passwords, as the operator's ID is already known to the computer.
  • Such identification key is often made as a transponder. This is an advance, as it is often seen, that if a gadget is too heavy, the carrier has a tendency to lay down the heavy gadget on a table and forget all about it. This causes great confusion and some operators might even unintentionally swap identification keys.
  • identification keys according to this embodiment, the carrying of the key will cause no extra burden on the operator. When all the operators are carrying their personal transponders, it will, also, be easier to locate an operator, when his whereabouts is unknown.
  • the invention disclosed herein also includes a method for a control system for operators of a display connected to a computer using:
  • control box situated between the computer and the display, where the control box, having at least a receiver, a decoder logic, a memory, and an ON/OFF-logic, frequently receive signals for maintaining the connection between computer and display, these signals being generated by
  • a key or ID module being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where in the receiver
  • a threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.
  • the object of the method is to turn off, automatically, the display, when the operator leaves the surroundings of the display and to turn on, automatically, the display, when he is approaching the display, and to this end the method suggest the use of a control box situated between the computer and the display, where the control box frequently request signals transmitted by an identification key, being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where a threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his sig- nals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.
  • the method suggests either to switch off the display or to switch to a mode, where a screen saver takes over the control of the display. In both cases, the unauthorized person will have no access neither to the data represented on the screen nor to any other data present in the computer.
  • the method With the method it will be possible to have more than one operator to a given display, so different operators can have access to the display, as long as they carry a recognized identification key, thereby easing the use of the computer and display.
  • the computer is part of or a hub in a network, the method also suggests locat- ing any operator, when his whereabouts is unknown. Thereby, it will be possible to address the display closest to the addressed operator and possibly to have the operator respond using the closest display and keyboard.
  • a further embodiment of the method also suggests the use of an identification key made as a transponder.
  • an identification key made as a transponder. This is, as mentioned above, an advantage, as it is often seen, that if a gadget is too heavy, the carrier has a tendency to lay down the heavy gadget on a table and forget all about it. This causes great confusion and some operators might even unintentionally swap identification keys.
  • the carrying of the key will cause no extra burden on the operator. When all the operators are carrying their personal transponders, it will, also, be easier to locate an operator, when his whereabouts is unknown. It is to be understood that the present improvements are applicable to a range of computers and displays, including those with display built into the computer housing.
  • Fig. 1 shows a flow chart representing a typical chain of decisions and actions performed by the control box according to the present invention.
  • Fig. 2 shows a flow chart for the control box in the learning mode, where a new ID is introduced to the control box.
  • Fig. 3 shows a block diagram representing an identification key and, in dotted lines, the possibility of transforming it to a transponder.
  • Fig. 4 shows a block diagram representing a control box with the elements necessary for identifying the keys and, in dotted lines, the possibility of transmitting signals to a transponder.
  • Fig. 5 shows the arrangement of the control box between the computer and the display.
  • Fig. 6 shows an example of an operator carrying the identification key or the transponder, respectively.
  • Fig. 1 shows a flow chart representing a typical chain of decisions and actions per- formed by the control box during start up and operation of the computer with the display.
  • Fig. 2 shows a flow chart for the control box in the learning mode, where a new operator's ID is introduced to the control box after the learn key has been activated.
  • the ID is entered by any means appropriate and the reception is checked.
  • IDs As a security measure only known IDs will be allowed, so to this end also the ID is compared to stored IDs, and if unknown, the ID will be erased. If, however, the ID is known, the ID is added to the list of active IDs, and a visible signal of acceptance will be given to the operator, after which the learning mode will be left, and the con- trol box will start looking for input as mentioned above.
  • Fig. 3 is a block diagram representing an identification key 1.
  • the basic elements of the identification key 1 in relation to the present invention are the code generation logic 2, which frequently produces a signal mixed with the identification code for the operator assigned to the identification key.
  • the signal is lead to a transmitter 3 sending the signal by any means appropriate to the purpose.
  • the transmission can take place by means of radio, acoustics, Infra Red or visible light and the transmission as such is not important as long as the range of the transmitted signals is limited, e.g. to below 100 meters (300 feet).
  • Fig. 4 is a block diagram representing a control box 4 with the elements necessary for identifying the identification keys.
  • the basic elements important to the present invention are the receiver 5 being able to receive the signals transmitted from the identification key 1 and comparing the amplitude of the received signal with a predetermined value for setting the range of the operator's distance from the display. Having been accepted by the receiver 5 the signal is lead to the decoder logic 6, which reads the ID and checks with the accepted values of operators, which values are stored in the memory 8. Depending on the ID check a signal is lead to the ON/OFF logic 7, which drives the unit 9 turning ON or OFF the display.
  • the functions of the elements shown in figs. 3 and 4 can be realized either in a hardware configuration or in a software configuration. In the software configuration the
  • control box can be realized as a program sequence being run in the computer, thereby enabling the computer to control the display depending on the presence of an operator with the identification key attached to him.
  • Fig. 5 shows the arrangement of the control box 4 between the computer and the display.
  • the signals between the CPU and display can be ei- o ther be through wiring, but also by means of radio, acoustics, Infra Red or visible light but the communication between CPU and display as such is not important.
  • the important measure is that the control box 4 is arranged between the CPU and the display thereby being able to control the display in dependency of the presence of an operator as disclosed in the present invention.
  • s Fig. 6 shows an example of an operator carrying the identification key 1 or the transponder 1, respectively. This is just an example and as outlined in the claims, there are many possible ways of arranging the identification key 1 or the transponder 1 respectively.
  • the identification key 1 should not carry any power supply and will therefore be easier to carry around to the operator.
  • the identification key 1 should be transformed to a transponder carrying a receiver 11, which can activate the code generation logic 2. In this way, the 5 identification key will now work as a transponder with the same control results for the display.
  • Parts or elements for the electric or electronic circuits described in the present invention also contain standard elements such a switches, power supplies, integrated circuits, optical communication elements, operational amplifiers, antennas, housings, o etc. all being evident to persons skilled in the art. Even if such standard elements are not mentioned, they are just presumed present, particularly if they have no contribution to the invention and therefore are not mentioned.

Abstract

A display is connected to a computer and will show the data put on the screen by the operator. When the operator for any reason leaves the display, the data will be open to public inspection, thereby making it possible for unauthorized persons to pry into other people's privacy. To this end, the present invention suggests a personal access control system for operators of a display connected to a computer comprising: (1) A control box situated between the computer and the display, where the control box, having at least a receiver, a decoder logic, a memory, and an ON/OFF-logic, frequently receive signals for maintaining the connection between computer and display, these signals being generated by (2) A key or ID module being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where in the receiver (3) A threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.

Description

PERSONAL ACCESS CONTROL SYSTEM
BACKGROUND OF THE INVENTION
Field of the Invention This invention relates generally to a personal access control system, particularly a personal access control to areas or sections of buildings with high security level, and more particularly for operators of a display comiected to a computer, e.g. a system preventing non-authorized persons prying into computer displays, which includes a transmitter and a receiver reacting on the transmitted signals originating from the vicinity of the operator, and a threshold detector. In the present description an operator is considered any person authorized to enter a section or area of a building or use a computer and its display, e.g. a doctor, a medical secretary, a social worker, a scientist, or a rector. The meaning of the word "display" is: The visual representation of the output of an electronic device, as the screen of a cathode ray tube or a plasma screen [Webster's Encyclopedic Unabridged Dictionary, Random House, 1996].
Description of the Prior Art
The problem of detecting the presence of persons or articles in allowed areas has been addressed and solved by various systems. U.S. Pat. No. 4,593,273 to Narcisse discloses an out-of-range monitor and alarm system for supervised persons, which includes a base unit transmitting a signal to a mobile unit carried by the person being supervised. The mobile unit responds to a threshold circuit, which is adjustable to a prescribed distance between the base and the supervised person. When the distance is exceeded as indicated by a drop in sig- nal strength, a transmitter in the mobile unit signals to the base to indicate the straying of the supervised person beyond acceptable limits. The mobile unit may also sound an alarm to alert the supervised person that he is straying beyond the prescribed area. U.S. Pat. No. 4,918,425 to Greenberg et al. discloses a monitoring and locating sys- tem for an object attached to a transponder monitored by a base station having an associated ID code where the base indicated by an alarm the absence of a timely appropriate response from the transponder. The base is capable of performing and participating in homing techniques to locate the lost transponder. A list of the IDs of all transponders reported missing is distributed from a central source by nationwide communication to a network of radio stations, each station broadcasting the list in an encoded signal in repetitive sequence along with regular programming. Cruising vehicles of public safety departments operating locally nationwide are equipped with automatic monitors for receiving specially encoded messages including IDs from transponders within their area. Each transponder, after failing to receive a signal from its base for a predetermined time period has the capability of scanning the band of the radio station network, locking onto the local station of the network and receiving its ID from the locked-on station when reported lost. Upon receipt of its ID from the locked-on station, the transponder initiates transmission of the specially coded message to make its presence known to the monitor of a local cruising vehicle and thereafter is capable of establishing communication with a local base for participation in local homing.
SUMMARY OF THE INVENTION
Among the object of the invention is to satisfy the need to prevent non-authorized person's access, particularly to areas or sections of buildings with high security level or e.g. cash registers, and more particularly to prevent non-authorized persons to pry into data on displays that have been left by their operators for a short term, e.g. few minutes. Often, it happens that an operator at a cash register or a display during the servicing of customers or clients will have to leave for a short term, e.g. for photo copying a document or responding to a telephone call. In the absence of the operator, unauthorized persons or clients will have the opportunity of taking money from the cash register or prying into the data still displayed on the screen and possibly call new records concerning other persons up to the screen. This, of course, is not satisfying to neither the operator, who might have cash loss or a professional secrecy obli- gation, nor to the person, whose data are read by unauthorized persons. The principal object of the invention, therefore, is to provide means for controlling the unauthorized personal access to areas or sections of buildings with high security level, a cash register or to a display of a computer during the absence of the operator thereby preventing prying into the data left on the display. Another object of the invention is, when the computer is part of a network, to locate the operator, when sending a message to him and his whereabouts is unknown. Further, another object of the invention is to have the identification of the operator established with passive components not needing a power supply thereby making the identification key simpler and easier to carry around. Still, another object of the invention is to indicate a method for preventing non- authorized persons to pry on data represented on a display, also when the computer is a part of or a hub in a network.
Briefly described, the invention disclosed herein includes a personal control system for operators comprising: (1) A control box situated between the computer and the display, where the control box, having at least a receiver, a decoder logic, a memory, and an
ON/OFF-logic, frequently receive signals for maintaining the connection between computer and display, these signals being generated by
(2) A key or ID module being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where in the receiver
(3) A threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.
The object of the subject matter invention is to turn off, automatically, the access to e.g. a display, when the operator leaves the surroundings of the display and to turn on, automatically, the display, when the operator is approaching the display, and to this end the elements of the personal control system comprise a control box situated between the computer and the display, where the control box frequently request signals transmitted by an identification key, being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal to- gether with the operator's ID code to the control box, where a threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.
During the cut-off phase, the display can be either switched off or it can switch to a mode, where a screen saver takes over the control of the display. In both cases, the unauthorized person will have no access neither to the data represented on the screen nor to any other data present in the computer. This is of great importance, as data represented on a screen often are sensible, e.g. when a doctor has patient data or an auditor has taxation data on the screen. Thereby, the operator of the display, e.g. a doctor, can leave the workstation for short periods without having sensible data laid open to public inspection. With the personal control system it will be possible to have more than one operator to a given display, so different operators can have access to the display, as long as they carry a recognized identification key, thereby easing the use of the computer and display. This is an advantage when e.g. several operators have access to a cash register or when servants in a restaurant address the cash register for orders. When the computer is part of or a hub in a network, it will also be possible to locate any operator, when his whereabouts is unknown. To this end, the invention further suggests a connection from the control box to the computer making it possible to transmit the operator's identity to the computer or the computer network. Thereby, it will be possible to address the display closest to the addressed operator and possibly to have the operator respond using the closest display and keyboard. Further, an op- erator can avoid entering user-ids and passwords, as the operator's ID is already known to the computer. When many operators have access to a computer system, it might be more cost reducing to have the identification of the operator established with passive components not needing a power supply, thereby making the identification key simpler, more cost reductive, and easier to carry around. Such identification key is often made as a transponder. This is an advance, as it is often seen, that if a gadget is too heavy, the carrier has a tendency to lay down the heavy gadget on a table and forget all about it. This causes great confusion and some operators might even unintentionally swap identification keys. With identification keys according to this embodiment, the carrying of the key will cause no extra burden on the operator. When all the operators are carrying their personal transponders, it will, also, be easier to locate an operator, when his whereabouts is unknown.
The invention disclosed herein also includes a method for a control system for operators of a display connected to a computer using:
(1) A control box situated between the computer and the display, where the control box, having at least a receiver, a decoder logic, a memory, and an ON/OFF-logic, frequently receive signals for maintaining the connection between computer and display, these signals being generated by
(2) A key or ID module being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where in the receiver
(3) A threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display. The object of the method is to turn off, automatically, the display, when the operator leaves the surroundings of the display and to turn on, automatically, the display, when he is approaching the display, and to this end the method suggest the use of a control box situated between the computer and the display, where the control box frequently request signals transmitted by an identification key, being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where a threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his sig- nals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.
During the cut-off phase, the method suggests either to switch off the display or to switch to a mode, where a screen saver takes over the control of the display. In both cases, the unauthorized person will have no access neither to the data represented on the screen nor to any other data present in the computer.
With the method it will be possible to have more than one operator to a given display, so different operators can have access to the display, as long as they carry a recognized identification key, thereby easing the use of the computer and display. When the computer is part of or a hub in a network, the method also suggests locat- ing any operator, when his whereabouts is unknown. Thereby, it will be possible to address the display closest to the addressed operator and possibly to have the operator respond using the closest display and keyboard.
A further embodiment of the method also suggests the use of an identification key made as a transponder. This is, as mentioned above, an advantage, as it is often seen, that if a gadget is too heavy, the carrier has a tendency to lay down the heavy gadget on a table and forget all about it. This causes great confusion and some operators might even unintentionally swap identification keys. With the use of an identification key according to this embodiment of the method, the carrying of the key will cause no extra burden on the operator. When all the operators are carrying their personal transponders, it will, also, be easier to locate an operator, when his whereabouts is unknown. It is to be understood that the present improvements are applicable to a range of computers and displays, including those with display built into the computer housing.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 shows a flow chart representing a typical chain of decisions and actions performed by the control box according to the present invention.
Fig. 2 shows a flow chart for the control box in the learning mode, where a new ID is introduced to the control box.
Fig. 3 shows a block diagram representing an identification key and, in dotted lines, the possibility of transforming it to a transponder.
Fig. 4 shows a block diagram representing a control box with the elements necessary for identifying the keys and, in dotted lines, the possibility of transmitting signals to a transponder.
Fig. 5 shows the arrangement of the control box between the computer and the display. Fig. 6 shows an example of an operator carrying the identification key or the transponder, respectively.
DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT
Fig. 1 shows a flow chart representing a typical chain of decisions and actions per- formed by the control box during start up and operation of the computer with the display. After initiation, where the control box checks whether or not a new operator shall be introduced to the system and allows the operator to find his identification key etc. the control box looks for any input from the identification key being sufficiently large to be entered. After having received the ID it is checked whether or not the ID is valid. If the input is not sufficiently large to be entered or the ID is not valid, the display will be turned off, and the control box will again look for input. When the ID is valid, the display will either be turned on or stay turned on for a while exceeding the period between the transmissions of the identification key, where the duration of the period could be, as an example, 10 seconds, depending on the acceptable duration from an operator leaves the display until the display is turned off. If the operator is still close to the display, the display will stay turned on. Fig. 2 shows a flow chart for the control box in the learning mode, where a new operator's ID is introduced to the control box after the learn key has been activated. Here the ID is entered by any means appropriate and the reception is checked.
As a security measure only known IDs will be allowed, so to this end also the ID is compared to stored IDs, and if unknown, the ID will be erased. If, however, the ID is known, the ID is added to the list of active IDs, and a visible signal of acceptance will be given to the operator, after which the learning mode will be left, and the con- trol box will start looking for input as mentioned above.
Fig. 3 is a block diagram representing an identification key 1. The basic elements of the identification key 1 in relation to the present invention are the code generation logic 2, which frequently produces a signal mixed with the identification code for the operator assigned to the identification key. The signal is lead to a transmitter 3 sending the signal by any means appropriate to the purpose. The transmission can take place by means of radio, acoustics, Infra Red or visible light and the transmission as such is not important as long as the range of the transmitted signals is limited, e.g. to below 100 meters (300 feet).
Fig. 4 is a block diagram representing a control box 4 with the elements necessary for identifying the identification keys. The basic elements important to the present invention are the receiver 5 being able to receive the signals transmitted from the identification key 1 and comparing the amplitude of the received signal with a predetermined value for setting the range of the operator's distance from the display. Having been accepted by the receiver 5 the signal is lead to the decoder logic 6, which reads the ID and checks with the accepted values of operators, which values are stored in the memory 8. Depending on the ID check a signal is lead to the ON/OFF logic 7, which drives the unit 9 turning ON or OFF the display. The functions of the elements shown in figs. 3 and 4 can be realized either in a hardware configuration or in a software configuration. In the software configuration the
5 control box can be realized as a program sequence being run in the computer, thereby enabling the computer to control the display depending on the presence of an operator with the identification key attached to him.
Fig. 5 shows the arrangement of the control box 4 between the computer and the display. It should be noted, that the signals between the CPU and display can be ei- o ther be through wiring, but also by means of radio, acoustics, Infra Red or visible light but the communication between CPU and display as such is not important. The important measure is that the control box 4 is arranged between the CPU and the display thereby being able to control the display in dependency of the presence of an operator as disclosed in the present invention. s Fig. 6 shows an example of an operator carrying the identification key 1 or the transponder 1, respectively. This is just an example and as outlined in the claims, there are many possible ways of arranging the identification key 1 or the transponder 1 respectively. In a further embodiment of the invention it is suggested having a transmitter 10 in o the control box 4, thereby letting the control box 4 contain the power supply to the transmitter. This, of course, will have the effect, that the identification key 1 should not carry any power supply and will therefore be easier to carry around to the operator. In addition, the identification key 1 should be transformed to a transponder carrying a receiver 11, which can activate the code generation logic 2. In this way, the 5 identification key will now work as a transponder with the same control results for the display.
Parts or elements for the electric or electronic circuits described in the present invention also contain standard elements such a switches, power supplies, integrated circuits, optical communication elements, operational amplifiers, antennas, housings, o etc. all being evident to persons skilled in the art. Even if such standard elements are not mentioned, they are just presumed present, particularly if they have no contribution to the invention and therefore are not mentioned.
This disclosure is illustrative and not limiting; further modifications will be apparent in light of this disclosure and are intended to fall within the scope of the appended claims. Also, it is to be understood that the various features described herein may in at least some cases be independent of one another, and it is contemplated that a computing device or its display may include only some of these features.

Claims

PATENT CLAIMS
1. Personal access control system for operators of a display connected to a computer comprising:
(1) A control box situated between the computer and the display, where the control box, having at least a receiver, a decoder logic, a memory, and an
ON/OFF-logic, frequently receive signals for maintaining the connection between computer and display, these signals being generated by
(2) A key or ID module being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where in the receiver
(3) A threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.
2. Control system according to claim 1, where the control box is arranged in the wiring between computer and display.
3. Confrol system according to claim 2, where range of the transmitter is limited to below 10 meters [30 feet].
4. Confrol system according to claim 3, where range of the transmitter is limited to below 3 meters [10 feet].
5. Confrol system according to claim 3, where the transponder is placed in the garment of the operator.
6. Control system according to claim 5, where the transponder is placed in the spectacles of the operator.
7. Control system according to claim 5, where the transponder is placed in the jewelry of the operator.
8. Personal access control system for operators of a display connected to a computer being installed in a network comprising:
(1) A confrol box situated between the computer and the display, where the control box, having at least a receiver, a decoder logic, a memory, and an
5 ON/OFF-logic, frequently receive signals for maintaining the connection between computer and display, these signals being generated by
(2) A key or ID module being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the. control box, where in the re- o ceiver
(3) A threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized s operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display, and
(4) A connection from the control box to the computer making it possible to transmit the operator's identity to the computer or the computer network.
9. Confrol system according to claim 8, where the control box is arranged in the o wiring between computer and display.
10. Confrol system according to claim 9, where range of the transmitter is limited to below 10 meters [30 feet].
11. Control system according to claim 10, where range of the transmitter is limited to below 3 meters [10 feet]. 5
12. Control system according to claim 10, where the fransponder is placed in the garment of the operator.
13. Confrol system according to claim 12, where the fransponder is placed in the spectacles of the operator.
14. Control system according to claim 12, where the transponder is placed in the o jewelry of the operator.
15. Personal access confrol system for operators of a display connected to a computer comprising:
(1) A control box situated between the computer and the display, where the control box frequently emits request signals to be responded by,
5 (2) A fransponder, being placed on or in the vicinity of an operator, having a circuitry being able to prepare a response to the request signal from and emit the response together with the operator's ID code to the control box, where in the receiver
(3) A threshold circuit supervising the amplitude of the signal comparing the ιo amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his transponder signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the dis- i5 play.
16. Control system according to claim 15, where the control box is arranged in the wiring between computer and display.
17. Control system according to claim 16, where range of the fransmitter is limited to below 10 meters [30 feet].
20 18. Control system according to claim 17, where range of the transmitter is limited to below 3 meters [10 feet].
19. Control system according to claim 17, where the transponder is placed in the garment of the operator.
20. Confrol system according to claim 19, where the transponder is placed in the 25 spectacles of the operator.
21. Control system according to claim 19, where the fransponder is placed in the jewelry of the operator.
22. Personal access control system for operators of a display connected to a computer being installed in a network comprising:
30 (1) A control box situated between the computer and the display, where the control box frequently emits request signals to be responded by, (2) A fransponder, being placed on or in the vicinity of an operator, having a circuitry being able to prepare a response to the request signal from and emit the response together with the operator's ID code to the confrol box, where in the receiver (3) A threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his transponder signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display, and
(4) A connection from the control box to the computer making it possible to transmit the operator's identity to the computer or the computer network.
23. Control system according to claim 22, where the control box is arranged in the wiring between computer and display.
24. Control system according to claim 23, where range of the transmitter is limited to below 10 meters [30 feet].
25. Control system according to claim 24, where range of the transmitter is limited to below 3 meters [10 feet].
26. Confrol system according to claim 24, where the transponder is placed in the garment of the operator.
27. Confrol system according to claim 26, where the transponder is placed in the spectacles of the operator.
28. Confrol system according to claim 26, where the transponder is placed in the jewelry of the operator.
29. Method for verifying the presence of an operator using a personal access confrol system according to claim 1 comprising the use of
(1) A confrol box situated between the computer and the display, where the confrol box, having at least a receiver, a decoder logic, a memory, and an ON/OFF-logic, frequently receive signals for maintaining the connection between computer and display, these signals being generated by (2) A key or ID module being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where in the receiver (3) A threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the ON/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold cir- cuit reactivates the ON/OFF-logic circuit for the display.
30. Method for verifying the presence of an operator according to claim 29, where the control box is arranged in the wiring between computer and display.
31. Method for verifying the presence of an operator according to claim 30, where range of the fransmitter is limited to below 10 meters [30 feet].
32. Method for verifying the presence of an operator according to claim 31 , where range of the transmitter is limited to below 3 meters [10 feet].
33. Method for verifying the presence of an operator according to claim 31, where the transponder is placed in the garment of the operator.
34. Method for verifying the presence of an operator according to claim 33, where the transponder is placed in the spectacles of the operator.
35. Method for verifying the presence of an operator according to claim 33, where the transponder is placed in the jewelry of the operator.
36. Method for verifying the presence of an operator using a personal access control system according to claim 8 comprising the use of (1) A control box situated between the computer and the display, where the confrol box, having at least a receiver, a decoder logic, a memory, and an
ON/OFF-logic, frequently receive signals for maintaining the connection between computer and display, these signals being generated by
(2) A key or ID module being placed on or in the vicinity of an operator, having a circuitry being able to prepare a signal and transmit the signal together with the operator's ID code to the control box, where in the receiver (3) A threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the ON/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/OFF-logic circuit for the display.
37. Method for verifying the presence of an operator according to claim 29, where the control box is arranged in the wiring between computer and display.
38. Method for verifying the presence of an operator according to claim 30, where range of the transmitter is limited to below 10 meters [30 feet].
39. Method for verifying the presence of an operator according to claim 31, where range of the fransmitter is limited to below 3 meters [10 feet].
40. Method for verifying the presence of an operator according to claim 31, where the transponder is placed in the garment of the operator.
41. Method for verifying the presence of an operator according to claim 33, where the transponder is placed in the spectacles of the operator.
42. Method for verifying the presence of an operator according to claim 33, where the fransponder is placed in the j ewelry of the operator.
43. Method for verifying the presence of an operator using a personal access confrol system according to claim 15 comprising the use of
(1) A control box situated between the computer and the display, where the control box frequently emits transmitted request signals to be responded by,
(2) A transponder, being placed on or in the vicinity of an operator, having a circuitry being able to prepare a response to the request signal from and emit the response together with the operator's ID code to the confrol box, where in the receiver (3) A threshold circuit supervises the amplitude and/or phase of the response comparing the response to a predetermined value and triggering a cut off circuitry for the display, until the operator or another authorized operator approaches the display with his transponder signals, where the threshold circuit inactivates the cut off circuit for the display.
44. Method for verifying the presence of an operator according to claim 43, where 5 the confrol box is arranged in the wiring between computer and display.
45. Confrol system according to claim 44, where range of the fransmitter is limited to below 10 meters [30 feet].
46. Control system according to claim 45, where range of the fransmitter is limited to below 3 meters [10 feet]. o
47. Control system according to claim 45, where the transponder is placed in the garment of the operator.
48. Control system according to claim 47, where the transponder is placed in the spectacles of the operator.
49. Confrol system according to claim 47, where the transponder is placed in the s j ewelry of the operator.
50. Method for verifying the location of an operator using a personal access control system according to claim 22 comprising the use of:
(1) A control box situated between the computer and the display, where the control box frequently emits request signals to be responded by, 0 (2) A fransponder, being placed on or in the vicinity of an operator, having a circuitry being able to prepare a response to the request signal from and emit the response together with the operator's ID code to the confrol box, where in the receiver
(3) A threshold circuit supervising the amplitude of the signal comparing the 5 amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his transponder signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the dis- o play, and (4) A connection from the confrol box to the computer making it possible to transmit the operator's identity to the computer or the computer network.
51. Method for verifying the location of an operator according to claim 50, where the control box is arranged in the wiring between computer and display.
52. Method for verifying the location of an operator according to claim 51, where range of the transmitter is limited to below 10 meters [30 feet].
53. Method for verifying the location of an operator according to claim 52, where range of the transmitter is limited to below 3 meters [10 feet].
54. Method for verifying the location of an operator according to claim 52, where the transponder is placed in the garment of the operator.
55. Method for verifying the location of an operator according to claim 54, where the fransponder is placed in the spectacles of the operator.
56. Method for verifying the location of an operator according to claim 54, where the transponder is placed in the jewelry of the operator.
57. Device for being placed on or in the vicinity of an operator in a personal access control system according to claim 1 comprising a code generation logic, the output from which is lead to a transmitter having a limited range.
58. Device according to claim 57, where the range is limited to 10 m [30 feet].
59. Device according to claim 58, where the range is limited to 3 m [10 feet].
60. Device according to claim 58, where it is placed in the garment of the operator.
61. Device according to claim 60, where it is placed in the spectacles of the operator.
62. Device according to claim 60, where it is placed in the jewelry of the operator.
63. Transponder for being placed on or in the vicinity of an operator in a personal access confrol system according to claim 15 comprising a receiver for the signals from the confrol box, the signals being lead to a code generation logic, the output from which is lead to a fransmitter having a limited range.
64. Transponder according to claim 63, the range of which is limited to 10 m [30 feet].
65. Transponder according to claim 64, the range of which is limited to 3 m [10 feet].
66. Transponder according to claim 64, where it is placed in the garment of the operator.
67. Transponder according to claim 66, where it is placed in the spectacles of the operator.
68. Transponder according to claim 66, where it is placed in the jewelry of the operator.
69. Confrol box according to claim 1 , comprising
(1) a receiver, a decoder logic, a memory, and an ON/OFF-logic, having in the receiver (2) A threshold circuit supervising the amplitude of the signal comparing the amplitude of the signal to a predetermined minimum value and triggering the (ON)/OFF-logic circuitry for the display, if the signal amplitude is below the predetermined value, until the operator or another authorized operator approaches the display with his signals, whereby the threshold circuit reactivates the ON/(OFF)-logic circuit for the display.
70. Control box according to claim 69, further comprising a fransmitter for frequently emitting request signals, which are being echoed by a fransponder together with the identification of the operator, assigned to the fransponder.
PCT/DK2002/000746 2001-11-05 2002-11-05 Personal access control system WO2003040896A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DK200101641A DK200101641A (en) 2001-11-05 2001-11-05 Personal access control system
DKPA200101641 2001-11-05

Publications (1)

Publication Number Publication Date
WO2003040896A1 true WO2003040896A1 (en) 2003-05-15

Family

ID=8160815

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DK2002/000746 WO2003040896A1 (en) 2001-11-05 2002-11-05 Personal access control system

Country Status (2)

Country Link
DK (1) DK200101641A (en)
WO (1) WO2003040896A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7698641B2 (en) 2005-06-01 2010-04-13 Samsung Electronics Co., Ltd. Display apparatus, display system, and authenticating method for using display apparatus
US7950063B2 (en) * 2004-05-04 2011-05-24 Heidelberger Druckmaschinen Ag Diagnosis system with identification display device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2060228A (en) * 1979-10-09 1981-04-29 Mastiff Security Syst Ltd Computer System
US5377269A (en) * 1992-10-29 1994-12-27 Intelligent Security Systems, Inc. Security access and monitoring system for personal computer
EP0929024A1 (en) * 1998-01-07 1999-07-14 Ian David Evans Method and apparatus for preventing unintentional perusal of computer display information
GB2345178A (en) * 1998-12-21 2000-06-28 Alexis Chatila A computer system with a user-proximity operated display
US6137480A (en) * 1996-12-27 2000-10-24 Sony Corporation Computer system using a portable card for managing security and power-saving features
WO2000068765A1 (en) * 1999-05-05 2000-11-16 Ericsson, Inc. Methods and devices for enabling displays of electronic devices based on separation thereof
US6189105B1 (en) * 1998-02-20 2001-02-13 Lucent Technologies, Inc. Proximity detection of valid computer user
GB2358427A (en) * 2000-01-21 2001-07-25 Roke Manor Research Automatic locking

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2060228A (en) * 1979-10-09 1981-04-29 Mastiff Security Syst Ltd Computer System
US5377269A (en) * 1992-10-29 1994-12-27 Intelligent Security Systems, Inc. Security access and monitoring system for personal computer
US6137480A (en) * 1996-12-27 2000-10-24 Sony Corporation Computer system using a portable card for managing security and power-saving features
EP0929024A1 (en) * 1998-01-07 1999-07-14 Ian David Evans Method and apparatus for preventing unintentional perusal of computer display information
US6189105B1 (en) * 1998-02-20 2001-02-13 Lucent Technologies, Inc. Proximity detection of valid computer user
GB2345178A (en) * 1998-12-21 2000-06-28 Alexis Chatila A computer system with a user-proximity operated display
WO2000068765A1 (en) * 1999-05-05 2000-11-16 Ericsson, Inc. Methods and devices for enabling displays of electronic devices based on separation thereof
GB2358427A (en) * 2000-01-21 2001-07-25 Roke Manor Research Automatic locking

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7950063B2 (en) * 2004-05-04 2011-05-24 Heidelberger Druckmaschinen Ag Diagnosis system with identification display device
US7698641B2 (en) 2005-06-01 2010-04-13 Samsung Electronics Co., Ltd. Display apparatus, display system, and authenticating method for using display apparatus

Also Published As

Publication number Publication date
DK200101641A (en) 2003-05-06

Similar Documents

Publication Publication Date Title
US5146207A (en) Secure field monitoring device for use in electronic house arrest monitoring system
US6999562B2 (en) Security control and communication system and method
US5023901A (en) Surveillance system having a voice verification unit
US8700769B2 (en) System and method for providing configurable security monitoring utilizing an integrated information system
US8638218B2 (en) Wireless takeover of an alarm system
US6798344B2 (en) Security alarm system and method with realtime streaming video
CN1989531A (en) Wi-fi premises to vehicle telematics interface
US20030117280A1 (en) Security communication and remote monitoring/response system
WO2005088846A1 (en) Phone for unmanned guard and method of preventing crimes using the same
CA2176393A1 (en) Programmable multi-access verification vehicle monitoring system
US7394359B2 (en) Security system with wireless RF portable monitor
EP1068599B1 (en) Automatic control system for security apparatus
JP2004502061A (en) Method and apparatus for controlling a parking space shut-off device for a vehicle
JP2009059085A (en) Security system
US20010056305A1 (en) Electronic device, user identification assisting device, appliance management device, electronic device management system, and appliance management system
WO2003040896A1 (en) Personal access control system
KR100343045B1 (en) A burglar alarm and method thereof by internet
US11606681B2 (en) Navigation method for evacuation in emergency state
KR20030034704A (en) System and method for managing going and coming and neglect one's duty using a bluetooth
JP3147837B2 (en) Emergency monitoring device
JP4564180B2 (en) Monitoring system
KR20010074035A (en) Mobile terminal and security system by using the mobile terminal
KR20010007732A (en) Position tracing system and thereof control method
JP2019028580A (en) Monitoring system
KR100431757B1 (en) Method for controlling and managing remote going and coming using a pda loading bluetooth

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP