US20020069030A1 - Method for allowing a user access to an electronic device having improved security - Google Patents
Method for allowing a user access to an electronic device having improved security Download PDFInfo
- Publication number
- US20020069030A1 US20020069030A1 US09/727,620 US72762000A US2002069030A1 US 20020069030 A1 US20020069030 A1 US 20020069030A1 US 72762000 A US72762000 A US 72762000A US 2002069030 A1 US2002069030 A1 US 2002069030A1
- Authority
- US
- United States
- Prior art keywords
- signal
- electronic device
- emitting
- set forth
- detecting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 230000005236 sound signal Effects 0.000 claims abstract description 51
- 238000001514 detection method Methods 0.000 claims description 15
- 238000005259 measurement Methods 0.000 claims description 9
- 230000000977 initiatory effect Effects 0.000 claims description 5
- 238000013459 approach Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H04B5/48—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Definitions
- the subject invention relates to a security apparatus for an electronic device and a method of determining the distance between a first electronic device and a second electronic device for allowing a user access to one of the first and the second electronic devices.
- the prior art includes various security apparatuses and methods of determining the distance or proximity between a first electronic device and a second electronic device.
- the methods include the steps of emitting a radio frequency (RF) signal and an audio signal simultaneously from the first electronic device, detecting the RF signal and the audio signal with the second electronic device, and measuring a time interval between the detection of the RF signal and detection of the audio signal by the second electronic device.
- RF radio frequency
- the subject invention provides a security apparatus and a method of determining the distance between a first electronic device and a second electronic device for allowing a user to access one of the first and the second electronic devices.
- the apparatus comprises a first electronic device and a second electronic device.
- the first electronic device includes a first transceiver connected to the first electronic device and having at least one antenna for emitting and detecting a radio frequency (RF) signal, a first detector connected to the first electronic device for detecting an audio signal, and a counter connected to the first electronic device for measuring a time interval between a transmitted RF signal and audio signal from the second electronic device.
- the second electronic device includes a second transceiver connected to the second device and having at least one antenna for emitting and detecting a RF signal, a transmitter connected to the second electronic device for emitting an audio signal.
- RF radio frequency
- the apparatus is characterized by a first processor connected to the first electronic device for comparing the measured time interval to a predetermined time range and enabling one of the first and second electronic devices in response to the time interval being within the predetermined time range and disabling one of the first and second electronic devices in response to the time interval being outside the predetermined time range.
- the method comprises the steps of emitting a radio frequency (RF) signal and an audio signal simultaneously from the second electronic device, detecting the RF signal and audio signal with the first electronic device, and measuring a time interval between the detection of the RF signal and detection of the audio signal by the second electronic device.
- RF radio frequency
- the method is characterized by comparing the measured time interval to a predetermined time range and enabling one of the first and the second electronic devices in response to the time interval being within the predetermined time range such that the user may have access to the enabled electronic device and disabling one of the first and the second electronic devices in response to the time interval being outside the predetermined time range such that the user cannot have access to the disabled electronic device.
- the subject invention provides for a more secure electronic system by determining the proximity of the user from the electronic device and disabling the electronic device to prevent information theft when the user is outside of a predetermined radius.
- FIG. 1 is a schematic view of a first electronic device being a computer and second electronic device being a token carried by a user and emitting signals from the token to the computer;
- FIG. 2 is a schematic view of a first electronic device being a token carried by a user and second electronic device being a computer and emitting signals from the computer to the token;
- FIG. 3 is a schematic view of a first electronic device being a computer and second electronic device being a token carried by a user and emitting sequential signals from the token to the computer and detecting the signals with multiple antennas;
- FIG. 4 is a schematic view of a first electronic device being a token carried by a user and second electronic device being a computer and emitting signals from the computer to the token;
- FIG. 5 is a schematic view of the first processor having an authorized user database with authorized user codes, a predetermined time range, and a predetermined radius and a measurement device for measuring a time interval.
- a security apparatus and a method for determining the distance between a first electronic device 12 and a second electronic device 14 for allowing a user 52 to access one of the first and the second electronic devices 12 , 14 is generally shown at 10 .
- the security apparatus comprises the first electronic device 12 and the second electronic device 14 .
- the first electronic device 12 is a computer 72 and the second electronic device 14 is a token 70 .
- the invention is described for use with a computer, it is equally applicable to a cellular phone, PDA, laptop computer, or printer.
- the computer 72 is connected to a first transceiver 16 , having at least one antenna 18 for emitting and detecting a radio frequency (RF) signal 20 , as is known in the art of emitting and detecting RF signals.
- a first detector 22 is connected to the computer 72 for detecting an audio signal 24 , which is preferably a microphone 76 being able to detect the audio signal 24 .
- the computer 72 is also connected to a counter 26 for measuring a time interval 28 between a transmitted RF signal 20 and audio signal 24 from the token 70 .
- the token 70 shown in FIG. 1, includes a second transceiver 30 having at least one antenna 32 for emitting and detecting the RF signal, as is known in the art of emitting and detecting RF signals.
- a transmitter 34 is connected to the token 70 for emitting an audio signal 24 , wherein the transmitter 34 is preferably a loudspeaker 74 for propagating the audio signal 24 .
- the token 70 is a card or badge that can be carried easily by the user 52 .
- the token 70 could also be incorporated into a pager or any other device which is issued exclusively to one user.
- the apparatus is characterized by a first processor 36 connected to the computer 72 for comparing the measured time interval 28 to a predetermined time range 38 . If the time interval 28 is within the predetermined time range 38 , as shown in FIG. 5, then the computer 72 is enabled. If the time interval 28 is outside the predetermined time range 38 , then the computer 72 is disabled. When the computer 72 is enabled, power is supplied to the computer 72 and the computer 72 is ready to be used or is ready to authorize the identity of the user 52 . When the computer 72 is disabled, power may still be supplied and showing a locked screen, therefore the computer 72 will not respond to the detection of the RF signals. Moreover, for increased security, when the computer 72 is disabled, the power supply could be discontinued and computer 72 will shut down.
- the computer 72 may be disabled and the token 70 emits an initiation signal 54 when approaching the computer 72 .
- the initiation signal 54 causes the computer 72 to wake up and respond to the token 70 with a request for the RF signal 20 and audio signal 24 .
- a second processor 40 is also connected to the token 70 to perform an identical function as the first processor 36 .
- the second processor 40 allows for bidirectional communication between the token 70 and the computer 72 .
- FIG. 3 Another features of the first embodiment, shown in FIG. 3, includes the token 70 including a first emitting antenna 42 and a second emitting antenna 44 for sequentially emitting the RF signal 20 .
- the first emitting antenna 42 and the second emitting antenna 44 are preferably spaced apart from and orthogonal to one another.
- the token 70 is able to emit the same signal from both of the emitting antennas 42 , 44 in the same direction towards the computer 72 .
- the computer 72 includes a first detecting antenna 46 and a second detecting antenna 48 for increasing the detection of the emitted RF signal 20 , shown in FIG. 3.
- the first detecting antenna 46 and the second detecting antenna 48 are positioned transverse to one another.
- the multiple detecting antennas 46 , 48 assist the computer 72 is detecting RF signal 20 which may be reflected off obstacles between the computer 72 and the token 70 .
- the apparatus of the first embodiment further includes a measurement device 50 connected to the computer 72 for measuring the strength of the RF signal 20 that was detected.
- the first processor 36 compares the signal strength to a predetermined threshold 54 for initiating the measurement of the time interval 28 . If the computer 72 has the first and the second detecting antenna 46 , 48 , the strength of the signal detected by each of the antennas 46 , 48 is compared to the predetermined threshold 54 . So long as the maximum signal strength detected at one of the antennas is above the predetermined threshold 54 , the measurement of the time interval 28 will begin at the detection of the RF signal 20 . This allows the audio signal 24 to only be utilized when detected RF signal 20 strength falls below the predetermined threshold 54 .
- both the RF signal 20 and the audio signal 24 are used for the initial verification and then the user's continued access is based upon the detected RF signal 20 strength.
- the computer 72 requests the token 70 to emit both the RF signal 20 and the audio signal 24 to verify the presence of the user 52 within the predetermined time range 38 .
- the first electronic device is the token 70 and the second electronic device is the computer 72 .
- the computer 72 emits the audio signal 24 from the loudspeaker 74 and the token 70 detects the audio signal 24 with the microphone 76 .
- the token 70 measures the time interval 28 and compares it to the predetermined time range 38 . If the time interval 28 is within the predetermined time range 38 , the token 70 sends a response signal to the computer 72 for enabling the computer 72 . If the time interval 28 is outside the predetermined time range 38 , the token 70 sends the response signal to disable the computer 72 . Additionally, the token 70 may not send the response signal if outside the predetermined time range 38 and the computer 72 may automatically disable in response to not detecting the response signal from the token 70 .
- the computer 72 includes a third emitting antenna 56 and a fourth emitting antenna 58 for sequentially emitting the RF signal 20 as discussed above and performs an identical function as the token 70 of the first embodiment.
- the token 70 includes a third detecting antenna 60 and a fourth detecting antenna 62 for increasing the detection of the emitted RF signal 20 as discussed above and performs an identical function as the computer 72 of the first embodiment.
- the apparatus of the second embodiment further includes the measurement device 50 connected to the token 70 for measuring the strength of the RF signal 20 that was detected.
- the first processor 36 compares the signal strength to a predetermined threshold 54 for initiating the measurement of the time interval 28 . If the token 70 has the third and the fourth detecting antenna 60 , 62 , the strength of the signal detected by each of the antennas is compared to the predetermined threshold 54 . So long as the maximum signal strength detected at one of the antennas is above the predetermined threshold 54 , the measurement of the time interval 28 will begin at the detection of the RF signal 20 .
- the method is described as being accomplished with the first embodiment discussed above. However, the method may be practiced with any of the aforementioned embodiments.
- the method comprises the steps of emitting the RF signal 20 and an audio signal 24 simultaneously from the token 70 , detecting the RF signal 20 and the audio signal 24 with the computer 72 , and measuring a time interval 28 between the detection of the RF signal 20 and detection of the audio signal 24 by the token 70 .
- the step of emitting the RF signal 20 and the audio signal 24 further includes emitting the RF signal 20 having a first velocity and the audio signal 24 having a second velocity, wherein the second velocity is the speed of sound.
- the method is characterized by comparing the measured time interval 28 to a predetermined time range 38 , shown in FIG. 5.
- the computer 72 is enabled in response to the time interval 28 being within the predetermined time range 38 such that the user 52 may have access to the enabled computer 72 .
- the user 52 may still be required to validate his identity by way of biometrics, keyword entry, or other means as is known in the art.
- the computer 72 is disabled in response to the time interval 28 being outside the predetermined time range 38 such that the user 52 cannot have access to the disabled computer 72 .
- the first processor 36 may also calculate a distance between the computer 72 and the token 70 . Once the time interval 28 is measured, the speed of sound is used to calculate the distance. The calculated distance is then compared to a predetermined radius 64 and the computer 72 is enabled if the token 70 is within the predetermined radius 64 and disabled if the token 70 is outside the predetermined radius 64 .
- the predetermined radius 64 is selected by the administrator to determine the maximum distance the user 52 may be apart from the computer 72 . If the information that the user 52 is working on is highly classified, the administrator may set a very small predetermined radius 64 to prevent information theft.
- the step of emitting the RF signal 20 also includes emitting a user code 66 and comparing the user code to an authorized user database 68 , as shown in FIG. 5.
- the authorized user database 68 has authorized user codes 78 and allowing the user 52 to access the previously enabled electronic device in response to the user code matching an authorized user code.
- the preferred embodiment allows the user 52 having the token 70 to approach his computer 72 and be authorized to access the computer 72 software.
- the token 70 emits the RF signal 20 and the audio signal 24 and the computer 72 detects the RF signal 20 .
- the computer 72 measures the strength of the signal and begins measuring the time interval 28 until the audio signal 24 is detected.
- the computer 72 compares the measured time interval 28 to the predetermined time range 38 and enables the computer 72 , if the time interval 28 is within the predetermined time range 38 .
- the computer 72 periodically emits a request for the token 70 to emit the RF signal 20 or for the token 70 to periodically emit the RF signal 20 as the administrator desires.
- the computer 72 continues to measure the strength of the RF signal 20 and compare it to the predetermined threshold 54 .
- the computer 72 requests the token 70 to transmit both the RF signal 20 and the audio signal 24 to verify the presence of the user 52 within the predetermined time range 38 . This prevents the computer 72 from prematurely disabling when the RF signal 20 drops below the predetermined threshold 54 .
Abstract
Description
- This application claims priority to provisional patent application Ser. No. 60/168,406 which was filed on Dec. 1, 1999.
- 1. Field of the Invention
- The subject invention relates to a security apparatus for an electronic device and a method of determining the distance between a first electronic device and a second electronic device for allowing a user access to one of the first and the second electronic devices.
- 2. Description of the Prior Art
- The prior art includes various security apparatuses and methods of determining the distance or proximity between a first electronic device and a second electronic device. The methods include the steps of emitting a radio frequency (RF) signal and an audio signal simultaneously from the first electronic device, detecting the RF signal and the audio signal with the second electronic device, and measuring a time interval between the detection of the RF signal and detection of the audio signal by the second electronic device.
- One such method is shown in U.S. Pat. No. 6,009,358 to Angott et al. The '358 Patent discloses using radio frequency (RF) signals and audio signals to determine the position of a lawnmower in a plot of land. The lawnmower position is determined and then the position is corrected to a memorized route which the lawnmower is programmed to follow. If the route was not preprogrammed into the lawnmower, the position of the lawnmower would not be corrected and no response would be taken.
- Another similar method is shown in U.S. Pat. No. 5,821,854 to Dorinski et al. The method utilizes radio frequency (RF) signals to determine the proximity of a user to a computer. When the strength of the RF signal falls below a predetermined threshold, an inaudible sound is emitted and the computer locks when it detects the inaudible sound.
- Note that none of the prior art references enable or disable the device in response to the position of the device. Accordingly, there is a need for an apparatus and a method which determines the proximity of the user within a predetermined time range or radius and enables and disables the device to protect valuable information that is increasingly being stored on electronic devices and decrease the likelihood of information theft.
- The subject invention provides a security apparatus and a method of determining the distance between a first electronic device and a second electronic device for allowing a user to access one of the first and the second electronic devices. The apparatus comprises a first electronic device and a second electronic device. The first electronic device includes a first transceiver connected to the first electronic device and having at least one antenna for emitting and detecting a radio frequency (RF) signal, a first detector connected to the first electronic device for detecting an audio signal, and a counter connected to the first electronic device for measuring a time interval between a transmitted RF signal and audio signal from the second electronic device. The second electronic device includes a second transceiver connected to the second device and having at least one antenna for emitting and detecting a RF signal, a transmitter connected to the second electronic device for emitting an audio signal.
- The apparatus is characterized by a first processor connected to the first electronic device for comparing the measured time interval to a predetermined time range and enabling one of the first and second electronic devices in response to the time interval being within the predetermined time range and disabling one of the first and second electronic devices in response to the time interval being outside the predetermined time range.
- The method comprises the steps of emitting a radio frequency (RF) signal and an audio signal simultaneously from the second electronic device, detecting the RF signal and audio signal with the first electronic device, and measuring a time interval between the detection of the RF signal and detection of the audio signal by the second electronic device.
- The method is characterized by comparing the measured time interval to a predetermined time range and enabling one of the first and the second electronic devices in response to the time interval being within the predetermined time range such that the user may have access to the enabled electronic device and disabling one of the first and the second electronic devices in response to the time interval being outside the predetermined time range such that the user cannot have access to the disabled electronic device.
- The subject invention provides for a more secure electronic system by determining the proximity of the user from the electronic device and disabling the electronic device to prevent information theft when the user is outside of a predetermined radius.
- Other advantages of the present invention will be readily appreciated as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings wherein:
- FIG. 1 is a schematic view of a first electronic device being a computer and second electronic device being a token carried by a user and emitting signals from the token to the computer;
- FIG. 2 is a schematic view of a first electronic device being a token carried by a user and second electronic device being a computer and emitting signals from the computer to the token;
- FIG. 3 is a schematic view of a first electronic device being a computer and second electronic device being a token carried by a user and emitting sequential signals from the token to the computer and detecting the signals with multiple antennas;
- FIG. 4 is a schematic view of a first electronic device being a token carried by a user and second electronic device being a computer and emitting signals from the computer to the token; and
- FIG. 5 is a schematic view of the first processor having an authorized user database with authorized user codes, a predetermined time range, and a predetermined radius and a measurement device for measuring a time interval.
- Referring to the Figures, wherein like numerals indicate like or corresponding parts throughout the several views, a security apparatus and a method for determining the distance between a first
electronic device 12 and a secondelectronic device 14 for allowing auser 52 to access one of the first and the secondelectronic devices - The security apparatus comprises the first
electronic device 12 and the secondelectronic device 14. In the preferred embodiment, FIG. 1, the firstelectronic device 12 is acomputer 72 and the secondelectronic device 14 is atoken 70. Although the invention is described for use with a computer, it is equally applicable to a cellular phone, PDA, laptop computer, or printer. - The
computer 72 is connected to afirst transceiver 16, having at least oneantenna 18 for emitting and detecting a radio frequency (RF)signal 20, as is known in the art of emitting and detecting RF signals. Afirst detector 22 is connected to thecomputer 72 for detecting anaudio signal 24, which is preferably amicrophone 76 being able to detect theaudio signal 24. Thecomputer 72 is also connected to acounter 26 for measuring atime interval 28 between a transmittedRF signal 20 andaudio signal 24 from thetoken 70. - The
token 70, shown in FIG. 1, includes asecond transceiver 30 having at least oneantenna 32 for emitting and detecting the RF signal, as is known in the art of emitting and detecting RF signals. Atransmitter 34 is connected to thetoken 70 for emitting anaudio signal 24, wherein thetransmitter 34 is preferably aloudspeaker 74 for propagating theaudio signal 24. Thetoken 70 is a card or badge that can be carried easily by theuser 52. Thetoken 70 could also be incorporated into a pager or any other device which is issued exclusively to one user. - The apparatus is characterized by a
first processor 36 connected to thecomputer 72 for comparing the measuredtime interval 28 to a predeterminedtime range 38. If thetime interval 28 is within thepredetermined time range 38, as shown in FIG. 5, then thecomputer 72 is enabled. If thetime interval 28 is outside thepredetermined time range 38, then thecomputer 72 is disabled. When thecomputer 72 is enabled, power is supplied to thecomputer 72 and thecomputer 72 is ready to be used or is ready to authorize the identity of theuser 52. When thecomputer 72 is disabled, power may still be supplied and showing a locked screen, therefore thecomputer 72 will not respond to the detection of the RF signals. Moreover, for increased security, when thecomputer 72 is disabled, the power supply could be discontinued andcomputer 72 will shut down. Initially, thecomputer 72 may be disabled and thetoken 70 emits aninitiation signal 54 when approaching thecomputer 72. For instance, when theuser 52 first starts work in the morning or when thecomputer 72 needs to be shut down. Theinitiation signal 54 causes thecomputer 72 to wake up and respond to thetoken 70 with a request for theRF signal 20 andaudio signal 24. - A
second processor 40 is also connected to thetoken 70 to perform an identical function as thefirst processor 36. Thesecond processor 40 allows for bidirectional communication between thetoken 70 and thecomputer 72. - Another features of the first embodiment, shown in FIG. 3, includes the
token 70 including afirst emitting antenna 42 and asecond emitting antenna 44 for sequentially emitting theRF signal 20. Thefirst emitting antenna 42 and thesecond emitting antenna 44 are preferably spaced apart from and orthogonal to one another. Thetoken 70 is able to emit the same signal from both of theemitting antennas computer 72. - The
computer 72 includes a first detectingantenna 46 and a second detectingantenna 48 for increasing the detection of the emittedRF signal 20, shown in FIG. 3. Preferably, the first detectingantenna 46 and the second detectingantenna 48 are positioned transverse to one another. The multiple detectingantennas computer 72 is detectingRF signal 20 which may be reflected off obstacles between thecomputer 72 and the token 70. - The apparatus of the first embodiment further includes a
measurement device 50 connected to thecomputer 72 for measuring the strength of theRF signal 20 that was detected. Thefirst processor 36 then compares the signal strength to apredetermined threshold 54 for initiating the measurement of thetime interval 28. If thecomputer 72 has the first and the second detectingantenna antennas predetermined threshold 54. So long as the maximum signal strength detected at one of the antennas is above thepredetermined threshold 54, the measurement of thetime interval 28 will begin at the detection of theRF signal 20. This allows theaudio signal 24 to only be utilized when detectedRF signal 20 strength falls below thepredetermined threshold 54. In other words, both theRF signal 20 and theaudio signal 24 are used for the initial verification and then the user's continued access is based upon the detectedRF signal 20 strength. When theRF signal 20 strength falls below thepredetermined threshold 54, thecomputer 72 requests the token 70 to emit both theRF signal 20 and theaudio signal 24 to verify the presence of theuser 52 within thepredetermined time range 38. - In a second embodiment, FIG. 2, the first electronic device is the token70 and the second electronic device is the
computer 72. As shown in FIG. 2, thecomputer 72 emits theaudio signal 24 from theloudspeaker 74 and the token 70 detects theaudio signal 24 with themicrophone 76. The token 70 then measures thetime interval 28 and compares it to thepredetermined time range 38. If thetime interval 28 is within thepredetermined time range 38, the token 70 sends a response signal to thecomputer 72 for enabling thecomputer 72. If thetime interval 28 is outside thepredetermined time range 38, the token 70 sends the response signal to disable thecomputer 72. Additionally, the token 70 may not send the response signal if outside thepredetermined time range 38 and thecomputer 72 may automatically disable in response to not detecting the response signal from the token 70. - In the second embodiment, shown in FIG. 4, the
computer 72 includes a third emittingantenna 56 and a fourth emittingantenna 58 for sequentially emitting theRF signal 20 as discussed above and performs an identical function as thetoken 70 of the first embodiment. The token 70 includes a third detectingantenna 60 and a fourth detectingantenna 62 for increasing the detection of the emittedRF signal 20 as discussed above and performs an identical function as thecomputer 72 of the first embodiment. - The apparatus of the second embodiment further includes the
measurement device 50 connected to the token 70 for measuring the strength of theRF signal 20 that was detected. Thefirst processor 36 then compares the signal strength to apredetermined threshold 54 for initiating the measurement of thetime interval 28. If the token 70 has the third and the fourth detectingantenna predetermined threshold 54. So long as the maximum signal strength detected at one of the antennas is above thepredetermined threshold 54, the measurement of thetime interval 28 will begin at the detection of theRF signal 20. - The method is described as being accomplished with the first embodiment discussed above. However, the method may be practiced with any of the aforementioned embodiments. The method comprises the steps of emitting the
RF signal 20 and anaudio signal 24 simultaneously from the token 70, detecting theRF signal 20 and theaudio signal 24 with thecomputer 72, and measuring atime interval 28 between the detection of theRF signal 20 and detection of theaudio signal 24 by the token 70. The step of emitting theRF signal 20 and theaudio signal 24 further includes emitting theRF signal 20 having a first velocity and theaudio signal 24 having a second velocity, wherein the second velocity is the speed of sound. - The method is characterized by comparing the measured
time interval 28 to apredetermined time range 38, shown in FIG. 5. As discussed above, thecomputer 72 is enabled in response to thetime interval 28 being within thepredetermined time range 38 such that theuser 52 may have access to the enabledcomputer 72. Theuser 52 may still be required to validate his identity by way of biometrics, keyword entry, or other means as is known in the art. Thecomputer 72 is disabled in response to thetime interval 28 being outside thepredetermined time range 38 such that theuser 52 cannot have access to thedisabled computer 72. - The
first processor 36 may also calculate a distance between thecomputer 72 and the token 70. Once thetime interval 28 is measured, the speed of sound is used to calculate the distance. The calculated distance is then compared to apredetermined radius 64 and thecomputer 72 is enabled if the token 70 is within thepredetermined radius 64 and disabled if the token 70 is outside thepredetermined radius 64. Thepredetermined radius 64 is selected by the administrator to determine the maximum distance theuser 52 may be apart from thecomputer 72. If the information that theuser 52 is working on is highly classified, the administrator may set a very smallpredetermined radius 64 to prevent information theft. - The step of emitting the
RF signal 20 also includes emitting auser code 66 and comparing the user code to an authorizeduser database 68, as shown in FIG. 5. The authorizeduser database 68 has authorizeduser codes 78 and allowing theuser 52 to access the previously enabled electronic device in response to the user code matching an authorized user code. - For example, the preferred embodiment allows the
user 52 having the token 70 to approach hiscomputer 72 and be authorized to access thecomputer 72 software. The token 70 emits theRF signal 20 and theaudio signal 24 and thecomputer 72 detects theRF signal 20. Thecomputer 72 measures the strength of the signal and begins measuring thetime interval 28 until theaudio signal 24 is detected. Thecomputer 72 then compares the measuredtime interval 28 to thepredetermined time range 38 and enables thecomputer 72, if thetime interval 28 is within thepredetermined time range 38. Once enabled, thecomputer 72 periodically emits a request for the token 70 to emit theRF signal 20 or for the token 70 to periodically emit theRF signal 20 as the administrator desires. Thecomputer 72 continues to measure the strength of theRF signal 20 and compare it to thepredetermined threshold 54. When theRF signal 20 drops below thepredetermined threshold 54, thecomputer 72 requests the token 70 to transmit both theRF signal 20 and theaudio signal 24 to verify the presence of theuser 52 within thepredetermined time range 38. This prevents thecomputer 72 from prematurely disabling when theRF signal 20 drops below thepredetermined threshold 54. - Obviously, many modifications and variations of the present invention are possible in light of the above teachings. The invention may be practiced otherwise than as specifically described within the scope of the appended claims, wherein that which is prior art is antecedent to the novelty set forth in the “characterized by” clause. The novelty is meant to be particularly and distinctly recited in the “characterized by” clause whereas the antecedent recitations merely set forth the old and well-known combination in which the invention resides. These antecedent recitations should be interpreted to cover any combination in which the incentive novelty exercises its utility. In addition, the reference numerals in the claims are merely for convenience and are not to be read in any way as limiting.
Claims (30)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/727,620 US6456958B1 (en) | 1999-12-01 | 2000-12-01 | Method for allowing a user access to an electronic device having improved security |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16840699P | 1999-12-01 | 1999-12-01 | |
US09/727,620 US6456958B1 (en) | 1999-12-01 | 2000-12-01 | Method for allowing a user access to an electronic device having improved security |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020069030A1 true US20020069030A1 (en) | 2002-06-06 |
US6456958B1 US6456958B1 (en) | 2002-09-24 |
Family
ID=22611373
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/715,686 Expired - Fee Related US6307471B1 (en) | 1999-12-01 | 2000-11-17 | Radio based proximity token with multiple antennas |
US09/727,620 Expired - Fee Related US6456958B1 (en) | 1999-12-01 | 2000-12-01 | Method for allowing a user access to an electronic device having improved security |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/715,686 Expired - Fee Related US6307471B1 (en) | 1999-12-01 | 2000-11-17 | Radio based proximity token with multiple antennas |
Country Status (9)
Country | Link |
---|---|
US (2) | US6307471B1 (en) |
EP (2) | EP1240580A4 (en) |
JP (3) | JP2003515839A (en) |
KR (1) | KR20020069200A (en) |
CN (2) | CN1402842A (en) |
AU (2) | AU2052901A (en) |
CA (2) | CA2392834C (en) |
MX (2) | MXPA02005405A (en) |
WO (2) | WO2001040928A1 (en) |
Cited By (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003049051A1 (en) * | 2001-11-29 | 2003-06-12 | Ensure Technologies, Inc. | Method of securing access to a user having an enhanced security proximity token |
US20040143730A1 (en) * | 2001-06-15 | 2004-07-22 | Wu Wen | Universal secure messaging for remote security tokens |
US20060080188A1 (en) * | 2004-09-30 | 2006-04-13 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Supply-chain side assistance |
US20060081695A1 (en) * | 2004-09-30 | 2006-04-20 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware. | Enhanced user assistance |
US20060086781A1 (en) * | 2004-10-27 | 2006-04-27 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Enhanced contextual user assistance |
US20060117001A1 (en) * | 2004-12-01 | 2006-06-01 | Jung Edward K | Enhanced user assistance |
US20060116979A1 (en) * | 2004-12-01 | 2006-06-01 | Jung Edward K | Enhanced user assistance |
US20060157550A1 (en) * | 2005-01-18 | 2006-07-20 | Searete Llc | Obtaining user assistance |
US20060173816A1 (en) * | 2004-09-30 | 2006-08-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Enhanced user assistance |
US20060184376A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to detect potentially supsicious motion or presence of equipment in a healthcare environment |
US20060183426A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to control radio frequency interference in a healthcare environment |
US20060181243A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to facilitate clinician-charger interaction in a healthcare environment |
US20060185005A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to transfer communications sessions between terminals in a healthcare environment |
US20060181424A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to request assistance for a medical event occurring in a healthcare environment |
US20060236373A1 (en) * | 2005-02-11 | 2006-10-19 | Nortel Networks Limited | Use of location awareness to establish and suspend communications sessions in a healthcare environment |
US20060240771A1 (en) * | 2005-02-11 | 2006-10-26 | Nortel Networks Limited | Use of location awareness ot establish communications with a target clinician in a healthcare environment |
US20060290519A1 (en) * | 2005-06-22 | 2006-12-28 | Boate Alan R | Two-way wireless monitoring system and method |
US20070004389A1 (en) * | 2005-02-11 | 2007-01-04 | Nortel Networks Limited | Method and system for enhancing collaboration |
US20080014867A1 (en) * | 2004-11-16 | 2008-01-17 | Advanced Microelectronic And Automation Technology Ltd. | Portable Identity Card Reader System For Physical and Logical Access |
US20080089521A1 (en) * | 2003-04-29 | 2008-04-17 | Eric Le Saint | Universal secure messaging for cryptographic modules |
US20080169927A1 (en) * | 2005-02-11 | 2008-07-17 | Alan Graves | Methods and systems for use in the provision of services in an institutional setting such as a healthcare facility |
US20080229198A1 (en) * | 2004-09-30 | 2008-09-18 | Searete Llc, A Limited Liability Corporaiton Of The State Of Delaware | Electronically providing user assistance |
US20090150762A1 (en) * | 2007-12-10 | 2009-06-11 | International Business Machines | Entering data into a webpage |
US7664736B2 (en) | 2005-01-18 | 2010-02-16 | Searete Llc | Obtaining user assistance |
US20100062743A1 (en) * | 2004-08-20 | 2010-03-11 | Telefonaktiebolaget Lm Ericsson | Wireless lock |
US20100146390A1 (en) * | 2004-09-30 | 2010-06-10 | Searete Llc, A Limited Liability Corporation | Obtaining user assestance |
US20100161525A1 (en) * | 2008-12-19 | 2010-06-24 | Sun Microsystems, Inc. | Analyzing a target electromagnetic signal radiating from a computer system |
US20100218095A1 (en) * | 2004-09-30 | 2010-08-26 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Obtaining user assistance |
US20100223065A1 (en) * | 2004-09-30 | 2010-09-02 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Supply-chain side assistance |
US20100223162A1 (en) * | 2004-09-30 | 2010-09-02 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Supply-chain side assistance |
US20100309011A1 (en) * | 2004-09-30 | 2010-12-09 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Obtaining user assistance |
US7922086B2 (en) | 2004-09-30 | 2011-04-12 | The Invention Science Fund I, Llc | Obtaining user assistance |
US8282003B2 (en) | 2004-09-30 | 2012-10-09 | The Invention Science Fund I, Llc | Supply-chain side assistance |
WO2015017219A1 (en) * | 2013-07-30 | 2015-02-05 | Google Inc. | Mobile computing device and wearable computing device having automatic access mode control |
US9038899B2 (en) | 2004-09-30 | 2015-05-26 | The Invention Science Fund I, Llc | Obtaining user assistance |
US9307577B2 (en) | 2005-01-21 | 2016-04-05 | The Invention Science Fund I, Llc | User assistance |
CN108230510A (en) * | 2018-01-16 | 2018-06-29 | 厦门中控智慧信息技术有限公司 | Method and relevant apparatus based on audio frequency control gate inhibition |
US10339474B2 (en) | 2014-05-06 | 2019-07-02 | Modern Geographia, Llc | Real-time carpooling coordinating system and methods |
US10445799B2 (en) | 2004-09-30 | 2019-10-15 | Uber Technologies, Inc. | Supply-chain side assistance |
US10458801B2 (en) | 2014-05-06 | 2019-10-29 | Uber Technologies, Inc. | Systems and methods for travel planning that calls for at least one transportation vehicle unit |
US10657468B2 (en) | 2014-05-06 | 2020-05-19 | Uber Technologies, Inc. | System and methods for verifying that one or more directives that direct transport of a second end user does not conflict with one or more obligations to transport a first end user |
US10681199B2 (en) | 2006-03-24 | 2020-06-09 | Uber Technologies, Inc. | Wireless device with an aggregate user interface for controlling other devices |
US20210125715A1 (en) * | 2005-10-25 | 2021-04-29 | Nxstage Medical, Inc. | Safety Features for Medical Devices Requiring Assistance and Supervision |
US11100434B2 (en) | 2014-05-06 | 2021-08-24 | Uber Technologies, Inc. | Real-time carpooling coordinating system and methods |
Families Citing this family (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6690681B1 (en) | 1997-05-19 | 2004-02-10 | Airbiquity Inc. | In-band signaling for data communications over digital wireless telecommunications network |
US6493338B1 (en) | 1997-05-19 | 2002-12-10 | Airbiquity Inc. | Multichannel in-band signaling for data communications over digital wireless telecommunications networks |
US6614349B1 (en) | 1999-12-03 | 2003-09-02 | Airbiquity Inc. | Facility and method for tracking physical assets |
JP2001184149A (en) * | 1999-12-27 | 2001-07-06 | Toshiba Corp | Information processor and method for controlling operation state |
EP1265521A2 (en) * | 2000-03-24 | 2002-12-18 | International Paper | Rfid tag for authentication and identification |
JP2002189703A (en) * | 2000-12-20 | 2002-07-05 | Nec Gumma Ltd | Security system |
SE521480C2 (en) * | 2001-04-18 | 2003-11-04 | Tagmaster Ab | Procedure and device for access control and access control |
US20020161454A1 (en) * | 2001-04-26 | 2002-10-31 | Masaki Mukai | Information processing system, information processing apparatus, information terminal, and method for control thereof |
US6774796B2 (en) * | 2001-08-01 | 2004-08-10 | Motorola, Inc. | Master authenticator |
US6944425B2 (en) * | 2001-09-12 | 2005-09-13 | International Business Machines Corporation | Method and apparatus for providing wireless diagnostics, authentication, and redundancy of wired circuitry |
DE10148830B4 (en) * | 2001-10-04 | 2005-10-06 | Texas Instruments Deutschland Gmbh | Method and system for authenticating a first transceiver to a remotely located second transceiver |
US7215965B2 (en) | 2001-11-01 | 2007-05-08 | Airbiquity Inc. | Facility and method for wireless transmission of location data in a voice channel of a digital wireless telecommunications network |
JP2003174521A (en) * | 2001-12-07 | 2003-06-20 | Ntt Docomo Inc | Communication module control system, communication module control method, application control system and application control method |
USRE45705E1 (en) * | 2001-12-17 | 2015-09-29 | Sony Corporation | Data communication system, data communication apparatus, and data communication method for generating or detecting an event |
WO2003053007A1 (en) * | 2001-12-17 | 2003-06-26 | Sony Corporation | Data communication system, data communication apparatus, and data communication method |
US7202783B2 (en) * | 2001-12-18 | 2007-04-10 | Intel Corporation | Method and system for identifying when a first device is within a physical range of a second device |
US7831278B2 (en) | 2001-12-18 | 2010-11-09 | Intel Corporation | Method and device for communicating data with a personal wireless storage device |
US20030115038A1 (en) * | 2001-12-18 | 2003-06-19 | Roy Want | Method and device for emulating electronic apparatus |
US7069444B2 (en) * | 2002-01-25 | 2006-06-27 | Brent A. Lowensohn | Portable wireless access to computer-based systems |
US7403773B2 (en) * | 2002-06-27 | 2008-07-22 | Avaya Technology Corp. | Location-based access control for wireless local area networks |
AU2003264928A1 (en) * | 2002-09-25 | 2004-04-19 | Marcus Coetzee | Security arrangement |
US7130582B2 (en) | 2002-11-19 | 2006-10-31 | Timothy Barilovits | Wireless communication system |
US7134015B2 (en) * | 2003-01-16 | 2006-11-07 | International Business Machines Corporation | Security enhancements for pervasive devices |
SE0300252D0 (en) * | 2003-02-03 | 2003-02-03 | Hamid Delalat | Blue Guards |
US20050065815A1 (en) * | 2003-09-19 | 2005-03-24 | Mazar Scott Thomas | Information management system and method for an implantable medical device |
US9020854B2 (en) | 2004-03-08 | 2015-04-28 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US20050204144A1 (en) * | 2004-03-10 | 2005-09-15 | Kabushiki Kaisha Toshiba | Image processing apparatus and personal information management program |
US7378939B2 (en) * | 2004-03-30 | 2008-05-27 | Sengupta Uttam K | Method and apparatus for providing proximity based authentication, security, and notification in a wireless system |
WO2005122483A1 (en) * | 2004-06-09 | 2005-12-22 | International Business Machines Corporation | Distance measurement system, distance measurement method, information processing device, program, and recording medium |
EP1779283A1 (en) * | 2004-08-10 | 2007-05-02 | Koninklijke Philips Electronics N.V. | Method and system for multi-authentication logon control |
US20060136997A1 (en) * | 2004-12-21 | 2006-06-22 | Eastman Kodak Company | Authentication system and method |
US8553885B2 (en) * | 2005-01-27 | 2013-10-08 | Blackberry Limited | Wireless personal area network having authentication and associated methods |
US7508810B2 (en) | 2005-01-31 | 2009-03-24 | Airbiquity Inc. | Voice channel control of wireless packet data communications |
JP4689388B2 (en) * | 2005-07-27 | 2011-05-25 | キヤノン株式会社 | COMMUNICATION DEVICE, ITS CONTROL METHOD, AND CONTROL PROGRAM |
DE102006029339A1 (en) * | 2005-11-03 | 2007-05-10 | Teratron Gmbh | Monitoring the release of a computer |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US8219129B2 (en) | 2006-01-06 | 2012-07-10 | Proxense, Llc | Dynamic real-time tiered client access |
US7924934B2 (en) | 2006-04-07 | 2011-04-12 | Airbiquity, Inc. | Time diversity voice channel data communications |
US7904718B2 (en) | 2006-05-05 | 2011-03-08 | Proxense, Llc | Personal digital key differentiation for secure transactions |
US7689325B2 (en) * | 2006-07-26 | 2010-03-30 | Delphi Technologies, Inc. | Communication control method for a vehicle |
US8065163B2 (en) * | 2007-09-11 | 2011-11-22 | General Electric Company | Methods and systems for providing patient registration information |
US7979095B2 (en) | 2007-10-20 | 2011-07-12 | Airbiquity, Inc. | Wireless in-band signaling with in-vehicle systems |
DE102007000972A1 (en) * | 2007-10-25 | 2009-04-30 | Siemens Ag | Method for operating a system and system |
WO2009062194A1 (en) * | 2007-11-09 | 2009-05-14 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US9251332B2 (en) | 2007-12-19 | 2016-02-02 | Proxense, Llc | Security system and method for controlling access to computing resources |
US8508336B2 (en) | 2008-02-14 | 2013-08-13 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
US20090260319A1 (en) * | 2008-04-18 | 2009-10-22 | Multivac Sepp Haggenmuller Gmbh & Co. Kg | Verpackungsmaschine mit wenigstens einer anmeldungsvorrichtung und datentraeger |
US7983310B2 (en) | 2008-09-15 | 2011-07-19 | Airbiquity Inc. | Methods for in-band signaling through enhanced variable-rate codecs |
US8594138B2 (en) | 2008-09-15 | 2013-11-26 | Airbiquity Inc. | Methods for in-band signaling through enhanced variable-rate codecs |
US20100081382A1 (en) * | 2008-09-26 | 2010-04-01 | Kabushiki Kaisha Toshiba | Wireless communication apparatus and wireless communication method |
JP5305288B2 (en) * | 2009-01-22 | 2013-10-02 | 株式会社エヌ・ティ・ティ・ドコモ | Away processing method, communication system, and control target device |
US8364389B2 (en) * | 2009-02-02 | 2013-01-29 | Apple Inc. | Systems and methods for integrating a portable electronic device with a bicycle |
US8036600B2 (en) | 2009-04-27 | 2011-10-11 | Airbiquity, Inc. | Using a bluetooth capable mobile phone to access a remote network |
US8418039B2 (en) | 2009-08-03 | 2013-04-09 | Airbiquity Inc. | Efficient error correction scheme for data transmission in a wireless in-band signaling system |
FR2950505B1 (en) * | 2009-09-22 | 2014-12-19 | Stephane Canet | METHOD FOR REMOTELY CONTROLLING THE EXECUTION OF AT LEAST ONE FUNCTION OF A COMPUTER SYSTEM. |
US8249865B2 (en) | 2009-11-23 | 2012-08-21 | Airbiquity Inc. | Adaptive data transmission for a digital in-band modem operating over a voice channel |
US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US9322974B1 (en) | 2010-07-15 | 2016-04-26 | Proxense, Llc. | Proximity-based system for object tracking |
US9265450B1 (en) | 2011-02-21 | 2016-02-23 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
JP2012216942A (en) * | 2011-03-31 | 2012-11-08 | Tokai Rika Co Ltd | In-vehicle wireless communication system |
CN102195689B (en) * | 2011-05-19 | 2014-07-30 | 惠州Tcl移动通信有限公司 | Near field communication terminal with power-saving function |
US8848825B2 (en) | 2011-09-22 | 2014-09-30 | Airbiquity Inc. | Echo cancellation in wireless inband signaling modem |
CN104113380B (en) * | 2013-04-17 | 2018-03-09 | 国民技术股份有限公司 | The means of communication and communication system of terminal are sent and received based on audio |
WO2014183106A2 (en) | 2013-05-10 | 2014-11-13 | Proxense, Llc | Secure element as a digital pocket |
GB2520025B (en) * | 2013-11-06 | 2021-04-14 | Arm Ip Ltd | Calibrating proximity detection for a wearable processing device |
DE112013007502B4 (en) * | 2013-11-11 | 2017-10-05 | Mitsubishi Electric Corporation | Access level control device |
WO2015094280A1 (en) * | 2013-12-19 | 2015-06-25 | Intel Corporation | Digital charms system and method |
FR3020027B1 (en) * | 2014-04-22 | 2016-05-13 | Continental Automotive France | METHOD FOR DETECTING A FIXED POSITION OF A VEHICLE PREDETERMINED REMOTE MEDIATING MEANS |
CN105205353B (en) * | 2014-06-27 | 2022-01-25 | 联想(北京)有限公司 | Information processing method and electronic equipment |
US10158547B2 (en) * | 2014-10-27 | 2018-12-18 | Qualcomm Incorporated | Method for a procedure for determining distance or angle between electronic devices connected wirelessly |
CN105303744B (en) * | 2015-11-24 | 2017-12-19 | 上海摩软通讯技术有限公司 | The theft preventing method and burglary-resisting system of mobile device |
US10732778B2 (en) * | 2017-03-20 | 2020-08-04 | Tactual Labs Co. | Biometric sensor |
WO2020080191A1 (en) * | 2018-10-16 | 2020-04-23 | 健一 石原 | Computer lock system and computer lock system operation method |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3732465A (en) * | 1971-09-20 | 1973-05-08 | Walton C | Electronic sensing and actuator system |
BE791039A (en) * | 1971-11-08 | 1973-05-07 | Lewis Security Syst Ltd | SECURITY SYSTEMS |
US3818472A (en) * | 1972-05-26 | 1974-06-18 | K Mauk | R.f. system for detecting unauthorized travel of articles through a selected zone |
US3914762A (en) * | 1973-12-27 | 1975-10-21 | Rca Corp | Electronic identification system |
US4055830A (en) * | 1976-07-14 | 1977-10-25 | The United States Of America As Represented By The Secretary Of The Interior | Sonic measuring system |
US4260982A (en) * | 1979-10-25 | 1981-04-07 | Debenedictis Angelo P | Pulse code modulation responsive alarm system |
GB2170907B (en) * | 1985-02-06 | 1988-08-24 | Sonic Tape Plc | Improvements relating to distance measuring devices |
NL8602033A (en) * | 1986-08-08 | 1988-03-01 | Nedap Nv | PRECISION FOCUS ON RECOGNITION SYSTEM. |
US4890266A (en) * | 1987-04-22 | 1989-12-26 | Federal Industries Industrial Group Inc. | Acoustic range finding system |
US5467082A (en) * | 1989-10-25 | 1995-11-14 | Sanderson; Glenn A. | Proximity actuator and reader for an electronic access system |
US5293160A (en) * | 1989-11-02 | 1994-03-08 | Nissan Motor Company, Ltd. | Keyless vehicle lock system with distance measuring |
US5131038A (en) * | 1990-11-07 | 1992-07-14 | Motorola, Inc. | Portable authentification system |
JPH0575506A (en) * | 1991-09-13 | 1993-03-26 | Nippon Telegr & Teleph Corp <Ntt> | Diversity communication system |
JPH0844833A (en) * | 1994-08-03 | 1996-02-16 | Mitsubishi Denki Semiconductor Software Kk | Reader/writer for non-contact ic card and reader/writer system for non-contact ic card |
JPH0884104A (en) * | 1994-09-09 | 1996-03-26 | Toshiba Corp | Radio communication equipment |
IL111550A (en) * | 1994-11-07 | 1998-04-05 | Visonic Ltd | Signaling network system |
JP3432335B2 (en) * | 1995-06-27 | 2003-08-04 | 株式会社東芝 | Mobile radio communication device |
SE513690C2 (en) * | 1995-08-16 | 2000-10-23 | Alfa Laval Agri Ab | Antenna system with transponder drive circuits |
US6088450A (en) * | 1996-04-17 | 2000-07-11 | Intel Corporation | Authentication system based on periodic challenge/response protocol |
US5708421A (en) * | 1996-08-19 | 1998-01-13 | Radio Systems Corp. | System for tracking an article or person |
US5958051A (en) | 1996-11-27 | 1999-09-28 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
US5842118A (en) * | 1996-12-18 | 1998-11-24 | Micron Communications, Inc. | Communication system including diversity antenna queuing |
US6137480A (en) * | 1996-12-27 | 2000-10-24 | Sony Corporation | Computer system using a portable card for managing security and power-saving features |
US5914671A (en) * | 1997-02-27 | 1999-06-22 | Micron Communications, Inc. | System and method for locating individuals and equipment, airline reservation system, communication system |
US5903225A (en) * | 1997-05-16 | 1999-05-11 | Harris Corporation | Access control system including fingerprint sensor enrollment and associated methods |
US5821854A (en) * | 1997-06-16 | 1998-10-13 | Motorola, Inc. | Security system for a personal computer |
US6009358A (en) | 1997-06-25 | 1999-12-28 | Thomas G. Xydis | Programmable lawn mower |
US6070240A (en) * | 1997-08-27 | 2000-05-30 | Ensure Technologies Incorporated | Computer access control |
US6078297A (en) | 1998-03-25 | 2000-06-20 | The Boeing Company | Compact dual circularly polarized waveguide radiating element |
US5969681A (en) | 1998-06-05 | 1999-10-19 | Ericsson Inc. | Extended bandwidth dual-band patch antenna systems and associated methods of broadband operation |
US6002370A (en) | 1998-08-11 | 1999-12-14 | Northern Telecom Limited | Antenna arrangement |
-
2000
- 2000-11-17 US US09/715,686 patent/US6307471B1/en not_active Expired - Fee Related
- 2000-11-30 MX MXPA02005405A patent/MXPA02005405A/en unknown
- 2000-11-30 CN CN00816526A patent/CN1402842A/en active Pending
- 2000-11-30 CA CA2392834A patent/CA2392834C/en not_active Expired - Fee Related
- 2000-11-30 EP EP00983820A patent/EP1240580A4/en not_active Withdrawn
- 2000-11-30 AU AU20529/01A patent/AU2052901A/en not_active Abandoned
- 2000-11-30 KR KR1020027007011A patent/KR20020069200A/en not_active Application Discontinuation
- 2000-11-30 JP JP2001541924A patent/JP2003515839A/en active Pending
- 2000-11-30 WO PCT/US2000/032579 patent/WO2001040928A1/en not_active Application Discontinuation
- 2000-12-01 CN CN00817590A patent/CN1413296A/en active Pending
- 2000-12-01 AU AU41388/01A patent/AU4138801A/en not_active Abandoned
- 2000-12-01 MX MXPA02005418A patent/MXPA02005418A/en unknown
- 2000-12-01 CA CA002393129A patent/CA2393129C/en not_active Expired - Fee Related
- 2000-12-01 WO PCT/US2000/042519 patent/WO2001040906A2/en not_active Application Discontinuation
- 2000-12-01 EP EP00992177A patent/EP1240572A4/en not_active Withdrawn
- 2000-12-01 US US09/727,620 patent/US6456958B1/en not_active Expired - Fee Related
- 2000-12-01 JP JP2001542308A patent/JP2003516077A/en active Pending
-
2006
- 2006-06-28 JP JP2006178662A patent/JP2006325232A/en active Pending
Cited By (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6763315B2 (en) | 2000-11-29 | 2004-07-13 | Ensure Technologies, Inc. | Method of securing access to a user having an enhanced security proximity token |
US20040143730A1 (en) * | 2001-06-15 | 2004-07-22 | Wu Wen | Universal secure messaging for remote security tokens |
US8209753B2 (en) * | 2001-06-15 | 2012-06-26 | Activcard, Inc. | Universal secure messaging for remote security tokens |
WO2003049051A1 (en) * | 2001-11-29 | 2003-06-12 | Ensure Technologies, Inc. | Method of securing access to a user having an enhanced security proximity token |
US10554393B2 (en) | 2003-04-29 | 2020-02-04 | Assa Abloy Ab | Universal secure messaging for cryptographic modules |
US20080089521A1 (en) * | 2003-04-29 | 2008-04-17 | Eric Le Saint | Universal secure messaging for cryptographic modules |
US8306228B2 (en) | 2003-04-29 | 2012-11-06 | Activcard Ireland, Limited | Universal secure messaging for cryptographic modules |
US20100062743A1 (en) * | 2004-08-20 | 2010-03-11 | Telefonaktiebolaget Lm Ericsson | Wireless lock |
US10687166B2 (en) | 2004-09-30 | 2020-06-16 | Uber Technologies, Inc. | Obtaining user assistance |
US10872365B2 (en) | 2004-09-30 | 2020-12-22 | Uber Technologies, Inc. | Supply-chain side assistance |
US10445799B2 (en) | 2004-09-30 | 2019-10-15 | Uber Technologies, Inc. | Supply-chain side assistance |
US9747579B2 (en) | 2004-09-30 | 2017-08-29 | The Invention Science Fund I, Llc | Enhanced user assistance |
US9098826B2 (en) | 2004-09-30 | 2015-08-04 | The Invention Science Fund I, Llc | Enhanced user assistance |
US9038899B2 (en) | 2004-09-30 | 2015-05-26 | The Invention Science Fund I, Llc | Obtaining user assistance |
US8762839B2 (en) | 2004-09-30 | 2014-06-24 | The Invention Science Fund I, Llc | Supply-chain side assistance |
US8704675B2 (en) | 2004-09-30 | 2014-04-22 | The Invention Science Fund I, Llc | Obtaining user assistance |
US20100218095A1 (en) * | 2004-09-30 | 2010-08-26 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Obtaining user assistance |
US20100146390A1 (en) * | 2004-09-30 | 2010-06-10 | Searete Llc, A Limited Liability Corporation | Obtaining user assestance |
US8282003B2 (en) | 2004-09-30 | 2012-10-09 | The Invention Science Fund I, Llc | Supply-chain side assistance |
US20060173816A1 (en) * | 2004-09-30 | 2006-08-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Enhanced user assistance |
US7694881B2 (en) | 2004-09-30 | 2010-04-13 | Searete Llc | Supply-chain side assistance |
US20060081695A1 (en) * | 2004-09-30 | 2006-04-20 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware. | Enhanced user assistance |
US20080229198A1 (en) * | 2004-09-30 | 2008-09-18 | Searete Llc, A Limited Liability Corporaiton Of The State Of Delaware | Electronically providing user assistance |
US7922086B2 (en) | 2004-09-30 | 2011-04-12 | The Invention Science Fund I, Llc | Obtaining user assistance |
US20100309011A1 (en) * | 2004-09-30 | 2010-12-09 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Obtaining user assistance |
US20100223162A1 (en) * | 2004-09-30 | 2010-09-02 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Supply-chain side assistance |
US20060080188A1 (en) * | 2004-09-30 | 2006-04-13 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Supply-chain side assistance |
US20100223065A1 (en) * | 2004-09-30 | 2010-09-02 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Supply-chain side assistance |
US20060086781A1 (en) * | 2004-10-27 | 2006-04-27 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Enhanced contextual user assistance |
US8341522B2 (en) | 2004-10-27 | 2012-12-25 | The Invention Science Fund I, Llc | Enhanced contextual user assistance |
US20080014867A1 (en) * | 2004-11-16 | 2008-01-17 | Advanced Microelectronic And Automation Technology Ltd. | Portable Identity Card Reader System For Physical and Logical Access |
US7748636B2 (en) | 2004-11-16 | 2010-07-06 | Dpd Patent Trust Ltd. | Portable identity card reader system for physical and logical access |
US20060117001A1 (en) * | 2004-12-01 | 2006-06-01 | Jung Edward K | Enhanced user assistance |
US20060116979A1 (en) * | 2004-12-01 | 2006-06-01 | Jung Edward K | Enhanced user assistance |
US10514816B2 (en) | 2004-12-01 | 2019-12-24 | Uber Technologies, Inc. | Enhanced user assistance |
US20060157550A1 (en) * | 2005-01-18 | 2006-07-20 | Searete Llc | Obtaining user assistance |
US7798401B2 (en) * | 2005-01-18 | 2010-09-21 | Invention Science Fund 1, Llc | Obtaining user assistance |
US7664736B2 (en) | 2005-01-18 | 2010-02-16 | Searete Llc | Obtaining user assistance |
US9307577B2 (en) | 2005-01-21 | 2016-04-05 | The Invention Science Fund I, Llc | User assistance |
US8180650B2 (en) | 2005-02-11 | 2012-05-15 | Avaya Inc. | Use of location awareness to request assistance for a medical event occurring in a healthcare environment |
US20060183426A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to control radio frequency interference in a healthcare environment |
US8050939B2 (en) | 2005-02-11 | 2011-11-01 | Avaya Inc. | Methods and systems for use in the provision of services in an institutional setting such as a healthcare facility |
US7707044B2 (en) | 2005-02-11 | 2010-04-27 | Avaya Inc. | Use of location awareness to transfer communications sessions between terminals in a healthcare environment |
US20080169927A1 (en) * | 2005-02-11 | 2008-07-17 | Alan Graves | Methods and systems for use in the provision of services in an institutional setting such as a healthcare facility |
GB2423177B (en) * | 2005-02-11 | 2010-03-24 | Nortel Networks Ltd | Use of location awareness to establish and suspend communications sessions in a healthcare environment |
US20070004389A1 (en) * | 2005-02-11 | 2007-01-04 | Nortel Networks Limited | Method and system for enhancing collaboration |
US7676380B2 (en) | 2005-02-11 | 2010-03-09 | Nortel Networks Limited | Use of location awareness to establish and suspend communications sessions in a healthcare environment |
US20060240771A1 (en) * | 2005-02-11 | 2006-10-26 | Nortel Networks Limited | Use of location awareness ot establish communications with a target clinician in a healthcare environment |
US7801743B2 (en) | 2005-02-11 | 2010-09-21 | Avaya Inc. | Use of location awareness of establish communications with a target clinician in a healthcare environment |
US20060236373A1 (en) * | 2005-02-11 | 2006-10-19 | Nortel Networks Limited | Use of location awareness to establish and suspend communications sessions in a healthcare environment |
US20060181424A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to request assistance for a medical event occurring in a healthcare environment |
US8929528B2 (en) | 2005-02-11 | 2015-01-06 | Rockstar Consortium Us Lp | Method and system for enhancing collaboration |
US20060184376A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to detect potentially supsicious motion or presence of equipment in a healthcare environment |
US7966008B2 (en) | 2005-02-11 | 2011-06-21 | Avaya Inc. | Use of location awareness to control radio frequency interference in a healthcare environment |
US20060185005A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to transfer communications sessions between terminals in a healthcare environment |
US20060181243A1 (en) * | 2005-02-11 | 2006-08-17 | Nortel Networks Limited | Use of location awareness to facilitate clinician-charger interaction in a healthcare environment |
US20060290519A1 (en) * | 2005-06-22 | 2006-12-28 | Boate Alan R | Two-way wireless monitoring system and method |
US11783939B2 (en) * | 2005-10-25 | 2023-10-10 | Nxstage Medical, Inc. | Safety features for medical devices requiring assistance and supervision |
US20210125715A1 (en) * | 2005-10-25 | 2021-04-29 | Nxstage Medical, Inc. | Safety Features for Medical Devices Requiring Assistance and Supervision |
US11012552B2 (en) | 2006-03-24 | 2021-05-18 | Uber Technologies, Inc. | Wireless device with an aggregate user interface for controlling other devices |
US10681199B2 (en) | 2006-03-24 | 2020-06-09 | Uber Technologies, Inc. | Wireless device with an aggregate user interface for controlling other devices |
US8539335B2 (en) * | 2007-12-10 | 2013-09-17 | International Business Machines Corporation | Entering data into a webpage |
US20090150762A1 (en) * | 2007-12-10 | 2009-06-11 | International Business Machines | Entering data into a webpage |
US20100161525A1 (en) * | 2008-12-19 | 2010-06-24 | Sun Microsystems, Inc. | Analyzing a target electromagnetic signal radiating from a computer system |
US8255341B2 (en) * | 2008-12-19 | 2012-08-28 | Oracle America, Inc. | Analyzing a target electromagnetic signal radiating from a computer system |
US8976965B2 (en) | 2013-07-30 | 2015-03-10 | Google Inc. | Mobile computing device and wearable computing device having automatic access mode control |
WO2015017219A1 (en) * | 2013-07-30 | 2015-02-05 | Google Inc. | Mobile computing device and wearable computing device having automatic access mode control |
EP3588343A1 (en) * | 2013-07-30 | 2020-01-01 | Google LLC | Mobile computing device and wearable computing device having automatic access mode control |
US10721589B2 (en) | 2013-07-30 | 2020-07-21 | Google Llc | Mobile computing device and wearable computing device having automatic access mode control |
US10194271B2 (en) | 2013-07-30 | 2019-01-29 | Google Llc | Mobile computing device and wearable computing device having automatic access mode control |
US9647887B2 (en) | 2013-07-30 | 2017-05-09 | Google Inc. | Mobile computing device and wearable computing device having automatic access mode control |
US10657468B2 (en) | 2014-05-06 | 2020-05-19 | Uber Technologies, Inc. | System and methods for verifying that one or more directives that direct transport of a second end user does not conflict with one or more obligations to transport a first end user |
US10339474B2 (en) | 2014-05-06 | 2019-07-02 | Modern Geographia, Llc | Real-time carpooling coordinating system and methods |
US10458801B2 (en) | 2014-05-06 | 2019-10-29 | Uber Technologies, Inc. | Systems and methods for travel planning that calls for at least one transportation vehicle unit |
US11100434B2 (en) | 2014-05-06 | 2021-08-24 | Uber Technologies, Inc. | Real-time carpooling coordinating system and methods |
US11466993B2 (en) | 2014-05-06 | 2022-10-11 | Uber Technologies, Inc. | Systems and methods for travel planning that calls for at least one transportation vehicle unit |
US11669785B2 (en) | 2014-05-06 | 2023-06-06 | Uber Technologies, Inc. | System and methods for verifying that one or more directives that direct transport of a second end user does not conflict with one or more obligations to transport a first end user |
CN108230510A (en) * | 2018-01-16 | 2018-06-29 | 厦门中控智慧信息技术有限公司 | Method and relevant apparatus based on audio frequency control gate inhibition |
Also Published As
Publication number | Publication date |
---|---|
EP1240572A2 (en) | 2002-09-18 |
JP2003515839A (en) | 2003-05-07 |
CA2392834C (en) | 2010-04-27 |
US6456958B1 (en) | 2002-09-24 |
EP1240580A1 (en) | 2002-09-18 |
AU2052901A (en) | 2001-06-12 |
AU4138801A (en) | 2001-06-12 |
WO2001040928A1 (en) | 2001-06-07 |
EP1240580A4 (en) | 2007-03-21 |
MXPA02005405A (en) | 2004-04-21 |
JP2003516077A (en) | 2003-05-07 |
CA2393129C (en) | 2008-11-18 |
CN1402842A (en) | 2003-03-12 |
JP2006325232A (en) | 2006-11-30 |
WO2001040906A2 (en) | 2001-06-07 |
KR20020069200A (en) | 2002-08-29 |
MXPA02005418A (en) | 2004-04-21 |
CA2393129A1 (en) | 2001-06-07 |
US6307471B1 (en) | 2001-10-23 |
WO2001040906A3 (en) | 2002-01-10 |
CN1413296A (en) | 2003-04-23 |
CA2392834A1 (en) | 2001-06-07 |
EP1240572A4 (en) | 2003-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6456958B1 (en) | Method for allowing a user access to an electronic device having improved security | |
US10293786B1 (en) | Method and system for secure access to a vehicle | |
US6937136B2 (en) | Security system | |
US6577238B1 (en) | RFID detection system | |
EP1982876B1 (en) | Keyless entry system | |
US20150302673A1 (en) | Relay attack prevention for passive entry/passive start systems | |
JP4758598B2 (en) | Zone-based radio frequency identification | |
US8130076B2 (en) | Keyless entry device | |
JP4232355B2 (en) | Service providing method in distributed system | |
US7545254B2 (en) | Method and device for protecting a motor vehicle | |
JP4727892B2 (en) | For example, a transmission / reception method for detecting an ID generator | |
US20060136997A1 (en) | Authentication system and method | |
US20140045531A1 (en) | Portable-device position determination system, portable-device position determination method, and portable-device position determination apparatus | |
JPH07296211A (en) | Keyless type access monitor | |
US20060176147A1 (en) | Vehicle security system | |
JP2000311024A (en) | Safety protection of mobile computer system in company environment | |
CA2540080A1 (en) | Method of allowing access to an electronic device | |
US20020104012A1 (en) | Security token and acess point networking | |
US7259673B2 (en) | Anti-theft arrangement, method and program | |
JPH11298640A (en) | Car security system | |
KR20220098860A (en) | Passive keyless entry device | |
JP2004272663A (en) | Crime prevention method and crime prevention device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ENSURE TECHNOLOGIES, INC., MICHIGAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:XYDIS, THOMAS G.;REEL/FRAME:011346/0833 Effective date: 20001130 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: PAT HOLDER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: LTOS); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20140924 |