The present invention relates to authorization, and, in particular, to a wirelessly-managed system for presenting a display of authorization status.
The use of displayed credentials, such as security badges or parking ticket stubs, is a common means of providing visual evidence of one's authorization. Today's reproduction technologies, such as color printers and photocopiers, together with readily-available image processing software, make it simple to counterfeit such credentials. Non-visual credentials that make use of radio signals and/or magnetic stripes can be used, but they require a substantial investment for on-site reading capability.
It would be desirable to provide a system in which displayed credentials are difficult to counterfeit, but that can be read visually by security personnel.
Users of the system are each provided with an indicator module capable of presenting a visual display. An authorization module keeps track of which users are authorized to access a facility, such as a secured area or a parking facility. The authorization module sends messages, such as SMS messages, to the authorized indicator modules directing them to present a common valid display. The common valid display changes repeatedly over time, but, in general, the modules of authorized users present the same display at any one time. In this way, a user may be granted or denied access based on whether the display on his module is the same as that of known authorized modules.
An authorization system is provided that makes use of a central authorization module and one or more indicator modules. In an exemplary embodiment, the indicator modules are security badges that have the ability to present a plurality of different displays. To provide this ability, the badges are equipped with, for example, a color LCD (liquid crystal display).
Security personnel may determine whether or not a user is authorized to access a particular area by whether or not the user's badge is presenting a valid display. The display may be, for example, a particular background color on the badge, or it may be more complicated pattern of colors and/or shapes, images, and/or text. All valid badges will have a common display at any one time.
To prevent unauthorized (including formerly-authorized) users from gaining access, the valid display is changed from time to time. When the valid display is changed, the authorization module sends an indicator message to the badges of all authorized users, indicating what the new valid display is. As a result, the badges of all authorized users will present the new display, while those of unauthorized users, or users whose authorization has expired, will not.
A security guard responsible for checking users' badges may himself be provided with a badge or other module that receives the indicator messages and presents the currently-valid display. As a result, the guard can reference this module when a user seeks access, and compare the display on his own module to the display on the user's badge.
In this embodiment, the indicator messages are sent over a wireless telecommunications network, such as a CDMA (code division multiple access) network. In this way, badges can be updated even when they are not in the immediate vicinity of the authorization module. (Such badges could belong to, for example, employees who have not yet arrived at work. Their badges will be updated before they arrive.)
In a related embodiment, the indicator modules may be mounted on a car dashboard or windshield to indicate whether the car is authorized to enter or park in a particular area. In such an embodiment, the authorization module may be provided with the capability to accept payment for parking, either directly through a kiosk or indirectly over a network.
Because the authorization module and the indicator modules can communicate through a messaging system over a wireless telecommunications network, no special identification-reading equipment is required on-site. The functions of the authorization module can be performed at a separate facility and may even be outsourced to a security services provider.
An exemplary authorization system makes use of an authorization module and a plurality of indicator modules. Each user of the system is provided with an indicator module. The authorization module identifies which users are currently authorized, and, to all of those authorized users, it sends a valid indicator message. The valid indicator message identifies what display is currently valid, and the indicator modules present the currently-valid display.
The indicator module may take one of several different forms depending on the type of authorization managed by the system. For example, where the authorization at issue is that of individuals seeking access to a secured area, the indicator module may have the general form of a badge, with a clip and/or a strap to facilitate attachment to a user's clothing or his person. Where the authorization at issue is authorization to park in a particular area, the indicator module may have a suction cup or an adhesive attachment to attach to a car's windshield or dashboard.
An exemplary indicator module is illustrated in
Another exemplary indicator module is illustrated in
One of the indicator modules may be a benchmark indicator module that presents the currently valid display for verification purposes. The display hardware of a benchmark indicator module may be, for example, a computer monitor. The benchmark indicator module may be prominently positioned so that all persons in an area (such as a secured facility) can see the currently-valid display. As an alternative, the benchmark indicator may be positioned in, for example, a guard station for reference by security personnel only.
As illustrated in
As illustrated in
The authorization management logic 44 determines which users are authorized and is responsible for keeping the information in the user data storage up to date. For example, when a user's authorization expires, the authorization management logic is responsible for clearing any flag in the user data storage that indicates the user is authorized.
The authorization management logic may interface with an authorization interface 46. The authorization interface receives input that allows the authorization management logic to maintain the information in the user data storage. For example, the authorization interface may operate a Web page or other computer network interface that allows an organization's personnel or security department to designate users who are authorized to access a particular secured area. As an alternative, the authorization interface may be a kiosk at which individuals wishing to pay for parking can identify themselves and pay for authorization to park in a particular area.
Based on the information stored in the user data storage, communication logic 48 in the authorization module operates to send a valid indicator message to authorized users' respective indicator modules. The indicator message provides information on what the indicator module should display in order to be accepted as valid. For example, the indicator message may direct indicator modules of authorized users to display a blue background. The indicator message may simply identify a display that is already stored by the indicator modules, or they may include information, such as a bitmap or other image data (in, for example, JPEG, GIF, TIFF, or other formats) to enable the indicator module to generate the display. Where the valid display includes the display of a security code, such as a key word or a number, the indicator message may include the text of the security code, or other information on how to generate the security code. The indicator message may be sent in an encrypted format.
The communication logic may send the indicator messages using one or more of several techniques, such as messages in SMS, SIP, HTTP, UDP, or other messaging formats. Such messages may be sent over a wireless network including, but not limited to, a CDMA or WiMAX network.
For users whose authorization has expired or who are otherwise not authorized, the communication logic may send no indicator message at all, or it may send a null indicator message. The null indicator message may instruct an indicator module to display nothing at all, or it may direct the indicator module to display an invalid indicator. The invalid indicator may be, for example, a red background. (In other embodiments, a red background may, like other colors or patterns, be used as a valid indicator.) The invalid indicator may be the same as—or at least bear a plausible resemblance to—displays that in the past were valid indicators. In this way, the user is not immediately alerted to the fact that his indicator module display is invalid.
To keep valid indicator modules in synchrony, an indicator message may be sent to each module before the modules are to change their displays. In such a case, the indicator message may include information indicating the time at which the modules are to change displays and/or the time remaining before the modules are to change their displays.
The communication logic may send indicator messages to users' indicator modules on a periodic basis (every six minutes, hourly, daily, or weekly, for example), or an aperiodic basis. The timing of the indicator messages may be randomized to some degree, so that users are left unaware of exactly when an update will take place. (This discourages a user who is aware that his authorization has expired from purposefully clearing all checkpoints just before the update.) The randomization may call for, for example, updates at random intervals but in no event greater than two hours. In another example, updates may be approximately hourly but occur randomly within a window of time on either side of the hour.
The authorization module is further provided with display selection logic 50. This logic is responsible for determining which display is considered valid. The valid display may be selected randomly or pseudo-randomly from a database of available displays. The displays available may be limited by the display capabilities of the indicator modules. For example, where the indicator modules are provided with a color LCD display, a wide variety of readily-identifiable colors and patterns may be selected (e.g. solid colors, polka-dots, stripes, geometric patterns, or images such as seasonally-appropriate holiday or sports-related images). Where the display capabilities of the indicator module are more limited, the display may be selected from a set of solid colors able to be displayed by the indicator modules. As an alternative, or in addition to a database of displays, the display selection logic may be capable of generating a new display.
The display selection logic may choose the valid display randomly, or it may select from available displays in a preselected order. As an alternative, the display selection may be partially randomized, so that the next selected display is, for example, not one of the previous ten displays, or is especially distinct from the previous display. (E.g., switching from a red display to an orange display could make it more difficult to distinguish newly-unauthorized users, as opposed to switching from red to blue.)
In one exemplary embodiment, as illustrated in
The authorization module determines which modules out of the plurality of indicator modules are authorized (step 52). The authorization module then sends to each of the plurality of authorized indicator modules an indicator message (step 54). The indicator message identifies a first valid display for the indicator modules to present, and the indicator modules present the first valid display (step 56).
After a delay interval passes (step 58), the authorization module again determines which of the plurality of indicator modules are authorized (step 60). The authorization module again sends indicator messages to the authorized modules identifying a second valid display (step 62). The indicator modules then present the second valid display (step 64), which is visually distinguishable from the first valid display.
The delay interval may be fixed in advance or chosen randomly or pseudo-randomly. For example, it may be every few minutes, hourly or daily. Preferably, the delay interval is at least one minute. The delay interval may be the time that passes between consecutive attempts by the authorization module to identify authorized indicator modules. In embodiments in which the indicator message includes a refresh time at which indicator modules are to present the new display, the delay interval may be measured by the period between consecutive refresh times. Alternatively, where indicator modules present the new display as soon as they receive a new indicator message, the delay interval may be measured between consecutive times at which the indicator messages are sent. Other techniques of measuring the delay interval may also be used, but the interval generally relates to the time between the change in valid displays, and the interval may be variable on a random or pseudorandom basis.
The process of checking which modules are authorized, and updating the display of those modules, is repeated on an ongoing basis, so that, although their display changes, (and the set of authorized modules itself may change), the authorized modules generally present the same display at the same time. Although the system aspires to keep the displays of all authorized modules in precise synchrony, it is to be understood that the synchrony may be imperfect due to processing and/or messaging delays.
In an optional feature, the authorization module periodically determines which indicator modules are not currently authorized and send a null indicator message to such modules. The null indicator message my direct those modules to present an invalid display or to present no display at all.
In a system in which the all those in possession of a compatible indicator module are considered authorized, the authorization module need not perform the separate step of identifying which indicator modules are authorized, and may instead send a valid indicator message to all indicator modules.
In one embodiment, the authorization module may identify one or more subscribers whose authorization will not be in question over the course of several display-change periods. In one example, displays may change every five minutes, but one or more subscribers may have pre-paid for two hours of parking. In such an embodiment, the authorization module need not re-check the status of these subscribers every five minutes, but instead may continue to provide indicator messages over the course of those two hours. The processing demands on the authorization module may be reduced by checking the authorization status of the subscribers only when it is in question. For example, the authorization module may check the status of a subscriber only at the end of a pre-paid period, for example, to determine whether the subscriber has paid for an additional period.
Other alternatives may be implemented when the authorization module does not check the authorization status of a subscriber in each display-change period. The authorization module may, for example, select a series of visual displays in advance. An indicator message identifying this series of visual displays may be sent to the subscriber's display module. For example, if a subscriber pre-pays for two hours of parking, the authorization module may send to the subscriber's display module an indicator message identifying the next two hours worth of valid visual displays.
Although references to preferred embodiments have been used as a means of illustrating the invention, the invention should not be understood as being limited only to those embodiments.
This is a continuation of U.S. patent application Ser. No. 11/335,491, filed Jan. 19, 2006 (and now issued as U.S. Pat. No. 7,636,029), the entirety of which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
7176849 | Mooney et al. | Feb 2007 | B1 |
7636029 | Zhou et al. | Dec 2009 | B1 |
Number | Date | Country | |
---|---|---|---|
Parent | 11335491 | Jan 2006 | US |
Child | 12607624 | US |