This application is related to the field of security and more particularly to the field of monitoring and displaying access rights of a user having an identity badge.
Users wear a badge to display that they are authorized to be present in a location. Additionally, users need to know that the persons in their presence have the authority to be there. A positive authorization may take the form of a display showing a photo of the individual authenticated, may consist of the display of a random synchronized image, may consists of a single image that indicates the user is authenticated, or may consists of a single a (green) light added to a static display (i.e. traditional badge).
Recently, badges have begun to dynamically display that the wearer is authorized within a given zone (defined by the badge readers). Either the user's photo is displayed when authorized to be present, or a random (yet synchronized) image is displayed on the badge of all authorized personnel within a zone. The authorization is established at the time the user enters the zone. The badge image may change dynamically over time, however the user's authority is read only when entering or leaving the zone. In such a case, it may be desirable to indicate the user's change in authority while the user remains in the given zone.
Accordingly, it would be desirable to provide a system that addresses these issues.
According to the system described herein, a security system includes a first security badge having a visual portion that varies according to signals provided to the first security badge and an authorization server that periodically provides signals to the first security badge in response to a query of the authorization server by the first security badge while the first security badge remains in a controlled zone, the signals varying independently of reader access of the first security badge. The first security badge may be read by a reader only in connection with initial entry into the controlled zone. Authorization of a user of the first security badge may vary while the user remains in the controlled zone. The first security badge may include a visual image of a user of the first security badge and displays additional information. The additional information may include name and authorization status of the user. Authorization status of the user may be indicated by a watermark superimposed on the image of the user, a word or phrase dynamically provided on the first security badge, dimming the image of the user, dimming the first security badge, a strikethrough superimposed on the image of the user, an LED provided on the first security badge, and/or a background color of the first security badge. Authorization status of the user may be indicated by a sound provided by the first security badge. The first security badge may query the authorization server using a smartphone that is in communication with the first security badge and with the authorization server. A query message from the first security badge to the authorization server may include location information indicating a location of the first security badge. The authorization server may use the location information to determine authorization for the first security badge. The security system may also include a second security badge provided in the controlled zone. The first security badge may indicate authorization status of the second security badge. The second security badge may query the authorization server for authorization status of the second security badge. The second security badge may query the first security badge for authorization status of the second security badge.
According further to the system described herein, operating a security system includes providing a first security badge having a visual portion that varies according to signals provided to the first security badge, the first security badge periodically querying an authorization server while the first security badge remains in a controlled zone, and the authorization server providing the signals to the first security badge, the signals varying independently of reader access of the first security badge. The first security badge may be read by a reader only in connection with initial entry into the controlled zone. Authorization of a user of the first security badge may vary while the user remains in the controlled zone. The first security badge may include a visual image of a user of the first security badge and displays additional information. The additional information may include name and authorization status of the user. Authorization status of the user may be indicated by a watermark superimposed on the image of the user, a word or phrase dynamically provided on the first security badge, dimming the image of the user, dimming the first security badge, a strikethrough superimposed on the image of the user, an LED provided on the first security badge, and/or a background color of the first security badge.
According further to the system described herein, a non-transitory computer readable medium contains software that operates a security system. The software includes executable code that implements the method of one of claims 15-20.
The system described herein relates to concepts of continuous validation and display refresh showing a of a user's access authority. A user's access rights may be continuously monitored while the user is in a controlled zone. The zone may be defined by a reader, or by a beacon device that continuously facilitates the authentication or authorization process. Access rights are not merely determined at entry and exit to a defined zone. Instead, the user maintains a permanent connection to an authentication/authorization server or makes frequent contact with authorization servers so that access authority of the user is continuously or repeatedly updated and displayed.
The user may lose access or have the status of diminished authority for any of a number of reasons:
Reduced or partial authority might be displayed in a number of ways, indicated by the following:
One or more (or all) of the badges in a zone may have a summary indication of the status of all individuals within a zone. Similarly, one or more (or all) of the badges in a zone may have an alert mechanism to warn badge wearers of a potential authorization problem. For example, if any an individual is not authorized, or has limited authority (such as a lower clearance level), the summary indication for all badges might be configured to light up an LED to provide a single blinking red led. The same LED may display a solid green light to show all known badge holders within a zone are deemed to be authorized. Alternatively, to alert users of potential issues, a badge might vibrate, similar to vibration provided by a cell phone when receiving a phone call in a vibrate mode. Alternatively, some or all of the badges may have associated therewith an alternative device with a GUI display (for example, a cell phone) that is used to provide summary status for an associated one of the badges using, for example, email, text messaging, an image on the cell phone, phone vibration, a sound, etc.
Server functionality for each of the badges may be provided by a single centralized server device that is continuously in communication with the badges or may be provided through other devices, including other badges. For example, each badge holder may carry an associated cell phone that is in communication with a remote/central validation server. As another example, only select badges in a particular zone may access a validation server (using one or more of the mechanisms discussed herein) while other badges in the same zone access server functionality by communicating with one of the select badges. Users within a zone having one of the select badges may request identity information from other users within the zone and may validate authorization of some or all of the other users. A validation server could display status of badges in a particular zone in a visual manner or using an audible manner. The status might be presented as a positive affirmation (for example a low beep may be emitted for each authorized user within presence of another authorized user and/or another user having one of the select badges). Thus, for example, a security guard wearing a select badge in the vicinity of a user wearing a visually plausible, yet invalid, badge could use the lack of a sound to detect the presence of the invalid badge. As another example, an authorized user may detect an unauthorized user in close proximity by the absence of a sound. Of course, other mechanisms, discussed herein, could also be used for this purpose.
If a badge of a user user losses communication with all corresponding authorization server(s), a last access state and/or an out of communication indicator status may be displayed on the badge, or the badge may default to an invalid state. Any state information received from an authorization server may be valid for a specific period of time, or may have a duration that is considered valid.
The presence of any individual that is not authorized to be in a controlled zone could be logged by the system and appropriate alerts may be generated to security staff. Additionally, each badge holder may use their badge, or a device associated with their badge, to report a suspected unauthorized person within a zone along with a geographic location of the reporting badge holder and an estimate for a geographic position of the suspected unauthorized person.
Embodiments of the system are described with reference to the several figures of the drawings, briefly described as follows.
Referring to
Referring to
The additional information 204 may be used to uniquely identify one or more of: the user, the identity badge 102, authentication status of the user, etc. In some embodiments, each badge holder may be issued a unique number (e.g., employee number) that may be encoded and displayed in an appropriate format (e.g., a bar code or a QR code) in the additional information 204 on the identity badge 102. In an embodiment herein, at least a portion of the additional information 204 may dynamically indicate an authorization level of the user at a current location (zone) of the user. For example, if the user is in a secure room, the additional information 204 may indicate “AUTHORIZED” or “UNAUTHORIZED”, depending on whether the user is authorized to be in the room. As with the image 202, the AUTHORIZED/UNAUTHORIZED indication (or similar) may be transmitted to the identity badge 102 (i.e., electronically) and may be modifiable while the user is wearing the identity badge 102. Dynamically modifying the additional information 204 to indicate whether a user is authorized in a particular zone is described in more detail elsewhere herein. Note that the dynamic indication may last only a certain amount of time, which may or may not depend on a rate of refresh for dynamically modifying the identity badge 102. For example, if the identity badge 102 is refreshed once per minute, the indicator “AUTHORIZED” may automatically change to “UNAUTHORIZED” after, for instance, two minutes if a refresh signal is not received.
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
In some embodiments, some or all of the badges in a zone may indicate authorization status of some or all of the other badge holders in the zone. Thus, for example, in the embodiment of
Referring to
Referring to
As described in more detail elsewhere herein, the server receives location information from the badges 102a-102c as well as signals from badge readers (not shown) and information regarding permissible authorizations of different users and, based on received data, provides signals to the badges 102a-102c to cause each of the badges 102a-102c to provide an authorization indication as described elsewhere herein. For example, a badge holder having the badge 102a may enter a particular zone that is off limits to the badge holder. In such a case, the server 402 may receive a signal from the badge indicating that the badge is in the particular zone and, in response thereto, send a signal to the badge 102a to indicate that the badge holder is not authorized to be in the particular zone. As discussed elsewhere herein, this indication can take any of a variety of forms, such as dimming information displayed on the badge 102a. Operation of the server 402 is described in more detail elsewhere herein.
Referring to
Referring to
Processing begins at a test step 602 where it is determined if the badge holder is authorized to be in a zone where the badge is located. Note that, as discussed elsewhere herein, it is possible for a badge holder to be initially authorized for a controlled zone and then to become unauthorized for the controlled zone for any number of reasons, including a mistake in the initial authorization, a change in status/access rights, entry of others with higher authorization level, etc. Change in authorization may occur while the badge holder remains in the controlled zone (i.e., may be independent of the badge holder entering or leaving the controlled zone). Querying the server 402 iteratively allows for proper handling of any authorization changes that occur while a user remains in a single zone. If it is determined at the step 602 that the badge holder is not authorized, control transfers from the step 602 to a step 604 where signals are provided to the badge to indicate that the badge holder is not authorized. Following the step 604, processing returns back to the step 602, discussed above, for another iteration.
If it is determined at the step 602 that the badge holder is authorized, then control transfers from the step 602 to a test step 606 where it is determined if the badge holder requires an escort in a particular zone. As discussed elsewhere herein, in some cases, a badge holder may be required to have an authorized escort present while the badge holder is in a particular zone. Also, as discussed elsewhere herein, a badge holder may be required to maintain an additional device, such as a mobile phone, and thus “escort” could be understood to include a required device instead of (or in addition to) a required person. If it is determined at the test step 606 that an escort is not needed, then control transfers from the test step 606 to a step 608 where signals indicating that the badge holder is authorized to be in the zone are provided to the badge. Following the step 608, processing returns back to the step 602, discussed above, for another iteration.
If it is determined at the test step 606 that an escort is required, then control transfers from the test step 606 to a test step 612 where it is determined if the required escort has been provided. In the case of the escort being another person, the test at the step 612 determined if a badge of the other person is detected in the zone. If the “escort” is an other device, the test at the step detects the other device. Note that, generally, an “escort” could include more than one person, more than one device, or some combination of people and devices. If it is determined at the step 612 that an escort has been provided, then control transfers from the step 612 to the step 608, discussed above, where signals indicating that the badge holder is authorized to be in the zone are provided to the badge. Following the step 608, processing returns back to the step 602, discussed above, for another iteration. If it is determined at the step 612 that an escort has not been provided, then control transfers from the step 612 to the step 604, discussed above, where signals are provided to the badge to indicate that the badge holder is not authorized. Following the step 604, processing returns back to the step 602, discussed above, for another iteration.
Various embodiments discussed herein may be combined with each other in appropriate combinations in connection with the system described herein. Additionally, in some instances, the order of steps in the flow charts, flow diagrams and/or described flow processing may be modified, where appropriate. Further, various aspects of the system described herein may be implemented using software, hardware, a combination of software and hardware and/or other computer-implemented modules or devices having the described features and performing the described functions. The system may further include a display and/or other computer components for providing a suitable interface with other computers and/or with a user. Software implementations of the system described herein may include executable code that is stored in a computer-readable medium and executed by one or more processors. The computer-readable medium may include volatile memory and/or non-volatile memory, and may include, for example, a computer hard drive, ROM, RAM, flash memory, portable computer storage media such as a CD-ROM, a DVD-ROM, a flash drive or other drive with, for example, a universal serial bus (USB) interface, and/or any other appropriate tangible or non-transitory computer-readable medium or computer memory on which executable code may be stored and executed by a processor. The system described herein may be used in connection with any appropriate operating system.
Other embodiments of the invention will be apparent to those skilled in the art from a consideration of the specification or practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with the true scope and spirit of the invention being indicated by the following claims.
This application claims priority to U.S. provisional patent application No. 62/443,990 filed on Jan. 9, 2017 and titled “CONTINUOUS AUTHORIZATION MONITORING”, which is incorporated by reference herein.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2017/001724 | 12/27/2017 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62443990 | Jan 2017 | US |