Access control through secure channel using personal identification system
First Claim
1. A method for operating a computer security system comprising:
- providing a badge to an individual, the badge comprising;
a non-volatile memory; and
an attachment sensor for detecting the removal of said badge from an individual, said attachment sensor causing information stored in said volatile memory to be rendered unreadable when said attachment sensor detects said removal;
determining whether the individual possessing the badge belongs to a set of authorized individuals, said determining comprising evaluating the individual, separate from the badge, using an identity verification system; and
in response to said identity verification system determining the individual belongs to the set of authorized individual, subsequently causing an administrative device to load information into said volatile memory of said badge, said information specifying the level of access to said computer system to which the individual is entitled.
2 Assignments
0 Petitions
Accused Products
Abstract
A security system based on a tamper resistant badge that becomes deactivated if the badge is removed from the person authorized to wear the badge. The badge has a volatile memory for storing the security clearance information associated with the wearer and a processor having sufficient power to perform encrypted communications. The badge also has an attachment sensor that resets the security clearance information if the badge is removed from the wearer. A secure data processing system utilizing the badges includes an administrative computer, A, and a client computer, C. Computer A has an identity verification system for authenticating the identity of individuals having badges and loading the clearance information into the volatile memory after the badge is attached to the wearer. The C computers access the information in the badge'"'"'s volatile memory to provide access to the wearer at the access level specified in the volatile memory.
175 Citations
19 Claims
-
1. A method for operating a computer security system comprising:
- providing a badge to an individual, the badge comprising;
a non-volatile memory; and
an attachment sensor for detecting the removal of said badge from an individual, said attachment sensor causing information stored in said volatile memory to be rendered unreadable when said attachment sensor detects said removal;
determining whether the individual possessing the badge belongs to a set of authorized individuals, said determining comprising evaluating the individual, separate from the badge, using an identity verification system; and
in response to said identity verification system determining the individual belongs to the set of authorized individual, subsequently causing an administrative device to load information into said volatile memory of said badge, said information specifying the level of access to said computer system to which the individual is entitled. - View Dependent Claims (2, 3, 4)
establishing a secure communication channel between the administrative device and that badge by encrypting signals sent and received by said transceivers in the administrative device and that badge; and
sending said information on said secure communication channel.
- providing a badge to an individual, the badge comprising;
-
3. The method of claim 1 wherein said identity verification system compares the retina of the individual with data derived from a previous measurement on the individual'"'"'s retina.
-
4. The method of claim 1 wherein said information loaded by the administrative device into the badge includes code that is periodically changed.
-
5. A security badge comprising:
-
a non-volatile memory;
a volatile memory;
a transceiver for sending and receiving signals utilized by said badge; and
an attachment sensor for detecting the removal of said badge from an individual, said attachment sensor causing information stored in said volatile memory to be rendered unreadable when said attachment sensor detects said removal;
wherein an administrative device may load information in said volatile memory of said badge in response to and subsequent to an identity verification system authenticating an individual maintaining said badge as belong sing to a set of authorized individuals, said information specifying the level of access to a client computer to which the individual is entitled. - View Dependent Claims (6, 7)
establishing a secure communication channel between the administrative device and that badge by encrypting signals sent and received by said transceiver in the badge; and
sending said information on said secure communication channel.
-
-
8. A method for operating a computer system comprising an administrative computer, said method comprising:
-
providing a badge to an individual, said badge having a volatile memory, a transceiver for sending and receiving signals, and an attachment sensor for detecting the removal of said badge from that individual, said attachment sensor causing information stored in said volatile memory to be rendered unreadable when said attachment sensor detects said removal;
providing the administrative computer with a transceiver for communicating with the badge and an identity verification system for determining whether the individual, distinct from the badge, belongs to a set of authorized individuals; and
upon determining that the individual possessing the badge personally belongs to the set of authorized individuals, subsequently causing the administrative computer to load information in said volatile memory of said badge, said information specifying the level of access to said computer system to which the individual is entitled. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
establishing a secure communication channel between the administrative computer and the badge by encrypting signals sent and received by said transceivers in the administrative computer and that badge; and
sending said information on said secure communication channel.
-
-
10. The method of claim 8 wherein said identity verification system compares the retina of the individual with data derived from a previous measurement on the individual'"'"'s retina.
-
11. The method of claim 8 wherein said identity verification system compares a finger print of the individual with data derived from a previous measurement on the individual'"'"'s finger print.
-
12. The method of claim 8 wherein said identity verification system compares the voice of the individual with data derived from a previous measurement on the individual'"'"'s voice.
-
13. The method of claim 8 wherein said identity verification system compares answers to queries posited to the individual with data previously provided by the individual.
-
14. The method claim 8, wherein said computer system further comprises a client computer, the method further comprising:
-
providing the client computer with a transceiver for communicating with the badge possessed by the individual;
causing the client computer to verify authenticity of the badge separate from the individual by receiving data derived from the data stored in said volatile memory of the badge by the administrative computer; and
causing the client computer to provide the individual with access to said computer system, where level of access depends on the data stored in the badge.
-
-
15. The method of claim 14, wherein said computer system further comprises a client computer, and wherein the client computer periodically verifies presence of the individual by sending to and receiving signals from the badge.
-
16. The method of claim 15, wherein the client computer utilizes a first secure code to exchange data with the badge when verifying the authenticity of the badge.
-
17. The method of claim 16, wherein the client computer utilizes a second secure code to verify the presence of that individual, said second secure code requiring less computational resources than said first secure code.
-
18. The method of claim 17, wherein said second secure code depends on said first secure code and changes each time the client computer verifies the presence of the individual.
-
19. The method of claim 18, wherein said information loaded by the administrative computer into the badge includes a code that is periodically changed.
Specification