Personal identification badge that resets on the removal of the badge from the wearer
First Claim
Patent Images
1. A security badge to be worn by a person, said badge comprising:
- a data processor having a non-volatile memory and a volatile memory;
a transceiver for sending signals generated by said processor and receiving signals specifying operations to be carried out by said badge, said signals including access signals that are stored in the volatile memory and are developed in response to authentication of the person and that provide said person access to a secure system; and
an attachment sensor for detecting the removal of said badge from said person, said attachment sensor causing information stored in said volatile memory to be altered such that said person no longer has access to said secure system when said attachment sensor detects said removal, wherein said volatile memory stores information related to a security clearance associated with said person.
2 Assignments
0 Petitions
Accused Products
Abstract
A security badge to be worn by a person seeking access to a secure system. The badge includes a data processor having a non-volatile and a volatile memory, a transceiver, and an attachment sensor. The volatile memory stores information related to the wearer'"'"'s security clearance. This information is loaded after the badge is attached to the person and the person'"'"'s identity is verified. This information is deleted from the volatile memory if the badge is removed from the wearer or subjected to tampering. The data processing system has sufficient computing power to allow the badge to execute encrypted communications with the secure system.
-
Citations
37 Claims
-
1. A security badge to be worn by a person, said badge comprising:
-
a data processor having a non-volatile memory and a volatile memory;
a transceiver for sending signals generated by said processor and receiving signals specifying operations to be carried out by said badge, said signals including access signals that are stored in the volatile memory and are developed in response to authentication of the person and that provide said person access to a secure system; and
an attachment sensor for detecting the removal of said badge from said person, said attachment sensor causing information stored in said volatile memory to be altered such that said person no longer has access to said secure system when said attachment sensor detects said removal, wherein said volatile memory stores information related to a security clearance associated with said person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A security badge to be worn by a person, said badge comprising:
-
a data processor having a non-volatile memory and a volatile memory;
a transceiver for sending signals generated by said processor and receiving signals specifying operations to be carried out by said badge, said signals including signals that provide said person access to a secure system;
an attachment sensor for detecting the removal of said badge from said person, said attachment sensor causing information stored in said volatile memory to be altered such that said person no longer has access to said secure system when said attachment sensor detects said removal, wherein said volatile memory stores information related to a security clearance associated with said person; and
a random number generator that comprises a sensor for sensing an environmental variable that determines a random number generated by said random number generator. - View Dependent Claims (19, 20)
-
-
21. An access device adapted to be associate with a person, comprising:
-
a sensor operable to detect separation of the device and the person; and
a processor adapted to receive and store access signals developed in response to authentication of the person and indicating access privileges associated with the person, the processor operable to generate authentication signals from the stored access privileges and further operable to alter the generated authentication signals responsive to the sensor indicating the separation of the device from the person exceeds a threshold value. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A method of utilizing an access device to provide a user with access to a computer system, the method comprising:
-
authenticating the user;
developing user access information indicating access privileges associated with the user in response to authentication of the user;
storing in the access device the user access information;
associating the device with the user;
detecting whether the access device is associated with the user;
providing the user access to the computer system according to the access privileges indicated by the access information while the device is associated with the user; and
denying the user access to the computer system when the access device is detected as not being associated with the user. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
generating a random number;
encoding the access information using the random number prior to accessing the access information.
-
-
34. The method of claim 33 further comprising:
-
sensing an environmental variable; and
generating the random number using the sensed environmental variable.
-
-
35. The method of claim 34 wherein the sensed environmental variable comprises at least one of temperature and thermal noise of resistor.
-
36. The method of claim 29 further comprising storing in the access device a secret code that expires after a time and denying the user access to the computer system when the secret code has expired.
-
37. The method of claim 29 wherein authenticating the user comprises at least one of performing a retinal scan on the user and performing a fingerprint scan on the user.
Specification