The present invention relates to access management and control for personal computing devices such as desktop computers, notebook computers, tablet PCs, servers, Personal Digital Assistants (PDA), and PocketPCs.
Ever since documents, be it financial data, confidential information, or other personal files, were generated and stored on personal computers (PCs), there has been a need to protect these document from falling in to the “wrong hands”. The computer industry has addressed this problem in a variety of ways, beginning with protecting PC system access with a simple password. The encryption of the data stored on the system's hard drive was the next step. The physical lockup of the system with hardware keys that have to be connected to a PC's serial port was another method.
There are remote control methods for access management. For example, U.S. Pat. No. 6,675,300 discloses a remote controller that can perform remote control of a personal computer. The remote controller has a unique identifier and the PC to be controlled also has the same identifier stored therein. The remote controller and the computer may communicate by infrared (IR) or radio frequency (RF) signals. The identifier is provided for a security function. The computer checks whether the remote controller's identifier matches its own. If there is a match, the remote controller can be used to issue remote control commands to the computer. Signals from other remote controllers are ignored.
U.S. 2002/0056046 A1 discloses a method of switching a computer to a password protected mode when a computer user leaves the proximity of the computer. The system is provided with a proximity sensor, such as ultrasound, infrared, or electromagnetic proximity sensor. In one example, an ultrasound proximity sensor operates as follows: 1) a signal generator generates an electrical signal of a particular frequency; 2) a transducer converts the electrical signal to an ultrasound signal; 3) the ultrasound signal is reflected by the body of the user; 4) the reflected wave strikes the transducer and the transducer converts the reflected ultrasound signal to an electrical signal; 5) a relatively low frequency signal given by the difference in frequency between the signal provided by the signal generator and the signal from the transducer is generated; and 6) the difference signal is used to determine the presence of a person proximate the computer. An alternative proximity sensor detects the weight of a user as an indication of presence of the user in a chair the user sits in to use the computer. Note that this system merely detects the presence of a person and can not distinguish authorized and unauthorized users. Furthermore, it just detects the presence of a person and is not be able to distinguish between authorized and unauthorized users. In addition all necessary hardware seems to be integrated into the keyboard.
Methods for access management have been developed that include wireless or contactless badges. These work like solutions for building access that use badges that do not have batteries and therefore are defined as passive badges. These wireless solutions use radio frequencies mostly in unlicensed frequency spectrums and require the use and installation of a specific transponder called interrogator or reader that works in those frequencies by sending out timed read commands to which the passive, wireless/contactless key responds by sending back its ID number.
U.S. Pat. No. 6,374,145 also discloses the use of a proximity sensor to detect the presence of a person in the vicinity of a computer. This patent also provides for the use of a multidimensional proximity sensor, which is made up of two or more proximity sensors. For example, a multidimensional proximity sensor may comprise a reflectance sensor of the type discussed above with reference to U.S. 2002/0056046 A1 and a RF sensor which identifies RF ID tags that are worn by authorized users.
U.S. Pat. No. 6,070,240 provides methods for computer access control. In these methods, a computer has a database of authorized users and a RF transceiver. Each authorized user of the computer carries a portable RF transponder (badge with built-in RFID chip) which has an authorized user code. The computer's RF transceiver continuously scans the operating space of the computer for the presence of authorized users by sending out read command in defined intervals. The operating space is the space near the computer in which a user would be located while using the computer. The space is defined by the specific technology used for these solutions. Scanning comprises the following steps: 1) the RF transceiver emits a signal; 2) a user places a portable transponder in the operating space of the computer (close to the RF transceiver); 3) the transponder is energized by the signal from the RF transceiver, and responds by sending a signal containing the authorized user code and/or ID number; 4) the computer compares the authorized code from the transponder to the database of authorized users; and 5) if there is a match, the computer is unlocked for the user to use. Note that this method requires continuous scanning (the periodic and continuous transmission of identifiers). Furthermore, the method requires that a database of authorized users be maintained at the computer.
Similarly, U.S. Pat. No. 6,189,105 discloses systems and methods that include continuous scanning of the operating space of a computer for the presence of an authorized user code, such as a proximity badge worn on a person. The interrogating signal may be RF or infrared (IR). Furthermore, these systems and methods include continuous detection of the presence of a person, such as by detection of keystrokes on the keyboard, reading the barcode on the badge a person is wearing by means of an infrared signal to an infrared detector by the body of a person, or the interference with a transmitted RF signal.
U.S. 2003/0030542 A1 discloses security systems for portable electronic devices such as personal digital assistants (PDAs) and laptop computers. The portable electronic device has a RF transmitter that emits an interrogation signal; in response to this interrogation signal, a portable electronic key worn by a person, which contains a password, emits a signal containing the password; and upon receipt of the password, the portable electronic device is unlocked. In order to make this security system work, the RF transmitter must transmit an interrogation signal periodically, such as once per minute. This ensures that the portable electronic device will be disabled when the portable electronic key is no longer within the range of the portable electronic device.
U.S. 2003/0034877 discloses devices and methods for providing access control for electronic systems based on proximity detection. Examples of electronic systems include a computer, a kiosk, a set-top box, a teller machine, a cash register, and control equipment. An electronic system includes a transceiver for transmitting and receiving wireless messages (e.g. RF, infrared). Authorized users of the electronic system carry an identifier (e.g. badge, key fob, magnetic card, belt buckle, watch). Wireless communication between the transceiver and the portable identifier is accomplished using protocols such as Bluetooth, IEEE 802.11b (WiFi), and Digital Enhanced Cordless Telecommunications (DECT). Furthermore, the electronic system is equipped with a distance determination agent, which determines the distance between the transceiver and the portable identifier. In the case of Bluetooth, which is a low power communications protocol, a message from the identifier may be received by the electronic system only when the identifier is in close proximity (30 feet line of sight defined by the protocol specifications) to the electronic system. In the case of higher power protocols, such as Home RF, the distance determination agent may determine the distance by monitoring the time between the transmission of a message from the electronic system to the receipt of a reply or reflected signal from the identifier. The distance can also be measured with alternative methods such as global positioning satellite (GPS) signals, triangulation, or infrared signaling. An important drawback to these methods is that there is a need for periodic and continuous scanning of the operating space to determine the distance between the electronic system and the identifier.
In summary, prior art access control systems and methods, while providing varying levels of security, are generally inconvenient to the user and expensive to implement. If a computer could be remote controlled by a remote controller, the user must explicitly issue commands from the remote controller. Systems and methods that rely on proximity sensors can generally identify the presence of a person or an object in the operating space of the computer, but cannot distinguish authorized and unauthorized users. Systems and methods that rely on RFID technology can identify authorized users, but require continuous and periodic scanning of the operating space including transmission of messages that contain the unique identifier or password.
The present invention relates to access control management for computing devices such as a notebook computer, a desktop computer, a server, or a tablet PC. It takes a new, convenient and secure approach to protecting data from prying eyes and theft by locking the above listed devices into a secure mode and rendering them useless for users that are not unauthorized to use the devices. Only when a wireless identifier key, carried by the authorized user is brought into the space of the protected computing device, the device will unlock and allows access to functions and files for this user. Other key elements of the invention are: a) simple implementation of the system into the computing device, b) use of standard electronic components for the identifier key, c) readily available wireless communication ports already built into the computing devices, and d) employing integral functions that are built into the standard communications protocol(s) used for the invention.
One of the important limitations of prior art methods is that significant investment in additional hardware, such as identification badges, proximity sensors, remote controllers, RF transceivers, and GPS systems, is required. Therefore, an objective of the present invention is to minimize investment in additional hardware. The present invention uses Bluetooth to establish a secure link between a personal computing device and a mobile electronic device (used as identifier key). Mobile electronic devices such as cellular telephones and personal digital assistants (PDAs) have recently proliferated to the extent that many computer users already own and carry mobile electronic devices. In general, users of such mobile electronic devices become accustomed to carrying them around at all times. Furthermore, mobile electronic devices that are Bluetooth-enabled are becoming more widely available. Personal computing devices (e.g. notebook computers, desktop computers, servers, tablet PCs, PDAs) that are Bluetooth-enabled are also becoming more widely available. In cases where a computing device is not yet Bluetooth-enabled, it is relatively inexpensive and straightforward to install a Bluetooth dongle in the USB port of the computing device. Such a Bluetooth dongle is relatively inexpensive because Bluetooth is a standard communication protocol that has become widely available as a replacement for physical cable connections.
Another limitation of some prior art systems and methods is that identification means to identify an authorized user are not provided. Each Bluetooth device is identified by a unique identifier, called the Bluetooth address. With the present invention, selected Bluetooth-enabled mobile devices can be employed as personal locking devices. It is highly likely that users will remember to carry their mobile devices on them at all times, and it is also highly likely that they will notice immediately if such mobile devices are lost or stolen. In effect, these Bluetooth-enabled mobile devices can function as unique identifiers of authorized users.
Yet another limitation of some prior art systems and methods is that there is a need for periodic and continuous scanning of the operating space of the computing device to determine the presence of an authorized user. This holds true for RFID, proximity sensors, and infrared scanning technologies. Using these scanning methods also comprises continuous and periodic transmission of an identifier or password. In contrast, the present invention eliminates the need for continuous and periodic scanning. In the systems and methods of the present invention, a wireless communications link is established using the Bluetooth protocol. In one embodiment, the link is maintained for as long the quality-of-service of the link is above a predetermined threshold. The quality of service may fall below the threshold, for example, if the Bluetooth-enabled mobile device is moved to a location that is not proximate to the computing device. Even in this case a virtual connection between the two devices still exists and is maintained by the Bluetooth protocol until the mobile device is brought back within physical range and the quality-of-service threshold is crossed again. While all of this is going on, the unique identifier number is only transmitted once during the initial establishment of the communication between the two devices.
Yet another limitation of some prior art systems and methods is that the computing device must maintain a list of authorized users. In the present invention, no databases are necessary. In the present invention, the computing device is introduced to a personal locking device, and a wireless link between them is established. The computing device does not concurrently maintain wireless links with other personal locking devices.
Yet another advantage of the present invention is that personal locking devices may be used to lock/unlock multiple devices, such as computers in the office and computers at home. Furthermore, protected devices need not be limited to computers. Bluetooth-enabled devices that are capable of running the access control software can be similarly protected or controlled. Protected devices may include household appliances such as garage door openers, gates and doors, refrigerators, home entertainment systems, media servers, and television receivers.
In one aspect, the present invention provides an access control system comprising: a protected device, a personal locking device, and an intelligent access control key software residing on the protected device. The protected device and personal locking device are both Bluetooth-enabled. Other possible communication protocols include but are not limited to ZigBee (IEEE 802.15.4) and Ultra Wide Band (IEEE 802.15.3). These can also be used as they become available for mass market applications.
In another aspect, the present invention provides an access control software which is installed on a device to be protected. The access control software establishes a wireless link between a protected device and a personal locking device. The software monitors the quality of service of the link; whenever the quality of service falls below a predetermined threshold, the software instructs the computer to take a protective action, such as putting the computer in a locked mode. If the quality of service was below a predetermined threshold and then improves above the threshold, the software instructs the computer to switch from the locked state to an unlocked state.
In yet another aspect, the present invention provides a personal locking device that is, at this time, using Bluetooth as communications vehicle. The device also has a user input to allow the user to manually place the computer in a locked state.
In yet another aspect, the present invention provides a method of access control, comprising the steps of: providing a device to be protected; enabling Bluetooth in the to-be-protected device; providing a personal locking device; enabling Bluetooth in the personal locking device; positioning the personal locking device in the operating space of the device to be protected; installing an access control software on the device to be protected; establishing a Bluetooth link between the device to be protected and the personal locking device using the unique hardware Bluetooth identifiers of the 2 devices; and taking a protective action on the protected device whenever the quality of service of the Bluetooth link falls below a predetermined threshold.
Other advantages and features of the present invention will become apparent in the detailed discussion below.
The present invention is described in detail with reference to the following Figures.
An advantage of using the standard Bluetooth protocol is that many of today's PCs, PDAs, Pocket PCs, Smartphones, and cell phones are already equipped with Bluetooth radio hardware. Devices with USB ports such as PCs can easily be retrofitted with a Bluetooth radio by attaching a USB Bluetooth dongle, hence eliminating the need for a special transponder. Devices such as PDAs and cell phones can also be retrofitted with Bluetooth add-on cards.
Examples of devices that can function as a personal locking device are personal digital assistants (PDAs), Pocket PC handheld computers, Smartphones, and cellular telephones. A PDA may use the Palm Operating System. A Pocket PC handheld computer may use the Microsoft Windows operating system for these classes of devices. Another example is a Bluetooth-enabled key chain. As discussed above, it is also possible to use dedicated personal locking devices (
Additional embodiments of the present invention include those in which the device to be protected is an electronic device that is not a personal computing device. For example, it may be desirable to control access to cars, garages, houses, and buildings. In the case of a garage, the device to be protected could be the garage door opener instead of a personal computing device. The garage door opener must also be equipped to establish a Bluetooth link with a personal locking device. For example, the garage door opener may be connected to a Bluetooth-enabled PC in the house.
An important component of the invention is a software program, called Intelligent Access Control Key (abbreviated IACK) that is installed and runs on a personal computing device. In its mode of operation, the IACK program either prohibits or permits access to files and programs on the personal computing device depending upon the quality of service of the wireless link between the personal computing device and the personal locking device (PLD) that is associated with the personal computing device.
When the IACK software is properly configured, the protected personal computing device will allow access to its files and programs when a wireless link between the personal computing device and the respective Bluetooth-enabled personal locking device has a quality of service greater than a predetermined threshold. Otherwise the personal computing device is in a lock-down mode that appears to the unauthorized user as being a password-protected system. In other words, the PLD is used as a hardware locking and unlocking device for the personal computing device.
The personal computing device may become accessible or unlocked if a wireless link has been established between the two devices and the quality of service of that link is greater than a predetermined threshold. In general, the quality of service depends upon the distance between the Bluetooth-enabled devices. The maximum distance that the PLD can be away from the personal computing device without causing the personal computing device to become locked is determined by the RF radio range and lies within the parameters pursuant to the Bluetooth communications protocol standards specification.
The personal computing device comprises hardware, an operating system, Intelligent Access Control Key (IACK) software, and a Bluetooth-enabled radio transceiver that is either integrated into the unit or attached to it via a standard USB connector (USB Bluetooth dongle). The authorized user of the computing device can configure his system access method (type of personal locking device) and protection level (automatic or manual) by using the IACK software.
We now describe a method of introducing a personal locking device (PLD) to a host personal computing device. First, the user installs the IACK software on the personal computing device. The user also places a PLD in the operating space of the personal computing device. The operating space is the general space where the user and the user's PLD would be located while using the personal computing device. The user then runs the IACK program and starts a search for the PLD. When a PLD is found it is displayed by its name in the window of the IACK software. The user can select this device with a button click and from that point those two devices (the personal computing device and the PLD) are linked to each other by their unique Bluetooth identification numbers. The management of this connection is all done in the Bluetooth radio chipsets and is defined by the Bluetooth protocol specification.
It should be noted that in accordance with the present invention, the Bluetooth addresses (equivalent to the Ethernet MAC numbers) are transferred only once when the devices are introduced to each other at the time configuration. Therefore, there is no need to continuously broadcast identifiers as in prior art devices.
In a 2nd part of the configuration process, the user selects locking options. The computing device may present the options on the computer monitor as shown in
In a 3rd part of the configuration process, the user selects unlocking options. The user may be asked to choose from among 3 unlocking options: 1) unlock when the quality of service of the link returns to above a predetermined threshold (automatic unlocking option); 2) prepare to unlock when the quality of service of the link returns to above a predetermined threshold and unlock when there is an input from an input device, such as movement of the mouse (user input unlocking option); and 3) prepare to unlock when the quality of service of the link returns to above a predetermined threshold, present a window requesting a user to input a personal access code (PAC), and unlock when the code that is input in response that request matches the correct PAC (PAC unlocking option). If the user has chosen the manual locking option, then it is also possible to unlock when the user presses a predetermined button on the personal locking device. The manual unlocking option may be available in dedicated personal locking devices, in which a button may be provided for manual unlocking. This button may be the same as the manual locking button, in which case the button acts as a toggle switch. The user may also be asked to approve or modify a predetermined quality of service threshold. Additionally, at the time of initial configuration of the IACK software, the user determines a personal access code (PAC) that is to be used for the PAC unlocking option described above.
In the automatic locking mode, the personal computing device remains unlocked for the user as long as the quality of service of the Bluetooth communication link is above a predetermined threshold. The Bluetooth radio continuously measures the quality of service (signal strength) and compares it to the quality of service parameters that had been set during the user configuration. No action from the host personal computing device is needed.
In summary, there are 2 methods of locking a personal computing device:
In step 324, the PLD is carried away from the operating space. As a result, in step 326, the quality of service falls below a predetermined threshold. In response, the Bluetooth radio sends a message to the IACK program reporting this change. In step 328, the IACK program receives this message and executes a screen saver program to lock the personal computing device.
In step 330, the PLD is carried back toward the operating space. When the IACK software-equipped personal computing device is in lock-down mode it is set to expect a message from the Bluetooth radio controller. The Bluetooth radio controller controls and manages the radio connection to external Bluetooth devices. If the Bluetooth radio controller detects a PLD-specific radio signal and that signal is within the set specifications for signal strength and quality of service, it checks whether it had initialized a link with that device before. If it had initialized a link before, it reestablishes the radio link with the device. These actions are part of the Bluetooth communications link management that is controlled by the Bluetooth chip (set). A message is then sent to the IACK program reporting that the link has been reestablished (step 332). Note that if an unauthorized PLD were placed in the operating space, it and the personal computing device would not be able to establish a wireless link.
Upon receiving this message, the IACK program selects from among 3 options based on the user configuration (step 334). There are 3 options: a PAC unlocking option, a user input unlocking option, and an automatic unlocking option. In the automatic unlocking option (step 344), the personal computing device will automatically unlock and display the user's desktop screen. In the user input unlocking option (step 342), the personal computing device unlocks automatically when a user input (e.g. mouse movement) is detected. In the PAC unlocking option (step 336), the personal computing device will display a Personal Access Code window in which the user can enter his personal access code (step 338). If the code matches the data saved in the user configuration of the IACK software, the personal computing device will unlock and display the user's desktop.
Alternatively, the PAC window may be displayed on the computer monitor whenever the PLD is out of range and a keyboard action or mouse movement has been detected. Therefore, the authorized user may enter the correct PAC and gain access to the personal computing device without having the PLD.
It should be understood that security can be enhanced further within the scope of this invention by installing additional hardware or software. Software applications can be installed on personal locking devices (e.g. PDAs, Pocket PCs, cell phones, Smartphones) that link the devices to the IACK software in the personal computing device. Additional code or a plug-in may be installed in the operating systems (e.g. Palm Operating System, Microsoft) of these devices. Additional hardware may be provided in these devices to link them to IACK software.
The present application claims the benefit of U.S. Provisional Application No. 60/508,132, filed on Oct. 1, 2003.
| Number | Date | Country | |
|---|---|---|---|
| 60508132 | Oct 2003 | US |