WO2001013217A1 - A computer-based personal access system - Google Patents

A computer-based personal access system Download PDF

Info

Publication number
WO2001013217A1
WO2001013217A1 PCT/US2000/022625 US0022625W WO0113217A1 WO 2001013217 A1 WO2001013217 A1 WO 2001013217A1 US 0022625 W US0022625 W US 0022625W WO 0113217 A1 WO0113217 A1 WO 0113217A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
personal
control system
access
access control
Prior art date
Application number
PCT/US2000/022625
Other languages
French (fr)
Inventor
Richard Fredkin
Original Assignee
Richard Fredkin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Richard Fredkin filed Critical Richard Fredkin
Priority to AU67825/00A priority Critical patent/AU6782500A/en
Publication of WO2001013217A1 publication Critical patent/WO2001013217A1/en

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41AFUNCTIONAL FEATURES OR DETAILS COMMON TO BOTH SMALLARMS AND ORDNANCE, e.g. CANNONS; MOUNTINGS FOR SMALLARMS OR ORDNANCE
    • F41A17/00Safety arrangements, e.g. safeties
    • F41A17/06Electric or electromechanical safeties
    • F41A17/063Electric or electromechanical safeties comprising a transponder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Definitions

  • the present invention is a personal access control (PAC) system.
  • the PAC system includes a personal access module residing with a user and a separate functional system to which access is sought.
  • the personal access module is small enough to be easily carried by the user, and is preferably small enough to be embedded in or affixed to commonly worn personal artifacts, such as a watch, a ring, or a bracelet.
  • the personal access module may be subcutaneously located on the user.
  • the functional system may be any system having controlled access.
  • the PAC system may be made such that the personal access module only transmits data and the access controller only receives data.
  • the personal access module only transmits data
  • the access controller only receives data.
  • advanced, known cryptographic techniques may be used to mitigate the chances of unauthorized use and loss of user or system codes to unauthorized users.
  • Each personal access module 100 may have a number of safeguards to prevent unauthorized use.
  • One safeguard is a method of detecting that the functional system has been removed from contact with its host (i.e., an authorized user). If it is removed from contact with its host (even momentarily), then it enters a dormant state wherein it is unable to perform any further weapon authorizations until and unless it is reauthorized to do so.
  • the personal access module 100 is embedded in a piece of jewelry (e.g., anklet, watch, or bracelet 300), it cannot be released from the person without opening a circuit that turns off its ability to authorize use of a weapon.

Abstract

A personal access control system (Fig. 3) includes a personal access module (100) and a functional system. The personal access module is placed with or on a user and identifies that user to the functional system. The personal access module may be embedded in a piece of commonly worn jewelry (300) (e.g., a watch or bracelet) or placed subcutaneously on a user. The functional system (200) may be any system operated by an individual and to which user accessed is controlled. As part of the functional system, an access controller (200) interacts with the personal access module via a near-field communication link. Each of the personal access module and access controller includes a receiver, a transmitter, a processor, and memory. Embodied within the processor and memory of the functional system is an authorization system.

Description

A COMPUTER-BASED PERSONAL ACCESS SYSTEM
Field of the Invention The invention relates to systems that include user access controls. More specifically, the present invention relates to systems wherein an access control device is resident on or very near the user.
Background of the Invention There is a modern trend for increased personal reliance on electronic devices and particularly on electronic devices which are easily transportable. Such devices include cellular phones, electronic pagers, portable radios, portable CD players, watches, electronic organizers and so on. Some of these devices provide improved convenience with respect to person-to- person or person-to-system communications (e.g., cellular phones) in a lightweight, compact form which does not unreasonably burden the user physically. Others of these types of devices (e.g., portable CD players) provide convenient entertainment for a user. However, while these devices are convenient, many typically offer no significant access control for security. That is, if someone steals a cellular phone, that person has immediate access for its use. As another example, if someone steals a portable CD player, that person has unlimited access for its use. Access control could provide a significant deterrent to theft.
Meanwhile, another modern trend is for increased reliance on devices which control user access to a system. Traditionally, such devices include magnetized cards for access (i.e., entrance) to a secure building or room or to automated teller machines, as examples. In computer systems, access is controlled with the use of passwords to be input by the user. For the most part, these devices play a roll in the security of the system through access control. The degree of security provided by such devices and systems is related to the relationship of that device to a specific user. For example, in some building access systems, any user holding a properly magnetized card can gain access. However, in more secure systems, the user may also be prompted to enter a user specific password to gain access. Once again, the access devices (e.g., magnetized cards) are made with user convenience in mind, and are typically small enough to fit into a wallet while passwords are typically committed to memory. While the size and weight of a magnetized card provide a certain degree of convenience, such devices remain cumbersome for individuals temporarily burdened with packages or with physical limitations, either temporary (e.g., crutches) or permanent (e.g., wheelchair bound). Therefore, there are practical limitations to the convenience of such access control devices. Also, while passwords are committed to memory they still require at least a free hand to be input, typically.
Some portable systems, by their dangerous nature, may benefit from user specific access control, but typically have no such controls. For example, guns typically only employ mechanical locking mechanisms in the form of a safety which simply inhibits the ability to fire the gun. However, such a safety is easily disengaged and access to fire the gun is achieved. It has been proposed that handguns be constructed with a finger-scanning device which requires identification of the fingerprint of the user as "authorized" before enabling the handgun. Such a system could be effective, but is costly. As another example, in medical environments, certain dangerous medical equipment or systems may allow relatively uncontrolled access. In yet another example, in industrial or construction settings, certain dangerous equipment may also be void of any significant built-in access controls. This traditional shortcoming may pose significant danger when such equipment requires specialized training for its proper operation. In these types of situations, injury to the user or others or destruction of property may result. Additionally, the nature of such systems (e.g., a gun) may not allow for these types of relatively time intensive access control systems to be used practically.
Generally, these types of electronic devices, guns, and medical and construction equipment may be characterized as functional systems, and typically single-user functional systems. In these types of functional systems where controlled access is desired, if not required, it would be advantageous for a functional system to include a miniature access control system which is easily concealed and which does not require any affirmative action or manipulation on the part of a user to gain access to the functional system. In some systems it is further advantageous for the access control system to allow access in a very short time, perhaps on the order of milliseconds, so as not to impact the effective use of the functional system. Additionally, if important to do so, it would be further advantageous to make the communication between the miniature access control device and the functional system with which it communicates relatively secure.
Summary of the Invention The present invention is a personal access control (PAC) system. The PAC system includes a personal access module residing with a user and a separate functional system to which access is sought. The personal access module is small enough to be easily carried by the user, and is preferably small enough to be embedded in or affixed to commonly worn personal artifacts, such as a watch, a ring, or a bracelet. In other embodiments, the personal access module may be subcutaneously located on the user. The functional system may be any system having controlled access.
Preferably, the personal access module is a user specific device that includes a receiver, a transmitter, memory, a processor, and a long-life (e.g., lithium) battery. The functional system includes an access controller which is preferably comprised of a corresponding receiver, transmitter, memory, processor, and power source. In the preferred embodiment, user specific access codes (or user codes) are stored in the memory of the personal access module. Transmission of the user codes by the personal access module to the receiver of the access controller enables the functional system for use by that user, i.e., provides user access to the system. The personal access module may be adapted to periodically transmit its user codes or may be adapted to transmit its user codes upon being queried by a transmission from the access controller.
The access controller of the functional system includes a built-in authorization system that has system codes stored in memory indicating the person or group of persons authorized to use the system. Preferably, each use of the functional system requires new authorization. For example, if the functional system is a gun, each attempt to fire a bullet would require authorization. In such a case, the gun would include the access controller and, therefor, the authorization system. However, the authorization scheme employed could vary depending on the specifics of the functional system.
The PAC system includes a communication system to link the personal access module to the access controller of the functional system. Preferably, the communication system is a near- field communication system that allows communication between at least two points on the body of the user. Therefore, the user must be substantially in physical contact with the functional system for authorization and subsequent use to take place. When physical contact between the user and the functional system is terminated, the functional system preferably enters a dormant or inoperative state. The present invention allows for PAC systems where the access control device only transmits and the functional system only receives messages. However, for the most part, better security may be obtained when both transmit and receive capabilities are included with each of the personal access module and the access controller. Additionally, cryptographic techniques may be employed to further enhance the security of the system. In the preferred form, the personal access module transmits user codes and the authorization system of the functional system determines whether access is granted as a function of those user codes. As an example, where a gun is the functional system, the user codes in the personal access module relate to the gun or guns or types of guns which that user may access. Furthermore, system codes are included in the authorization system and relate to the user or groups of users that may operate that gun. In one embodiment, a matching of a user code to a system code by the authorization system allows access to the functional system.
The PAC system may also include mechanisms to record data relating to the use of the functional system. Again using the gun example, the PAC system may record a user identification, a date, and a time for each use. The PAC system may also include a mechanism (e.g., a flashing light, a tone, or a mechanical button) which provides an indication to the user that authorization for use of the functional system has been granted.
Deactivation of the functional system may occur for many reasons, beyond the breaking of the physical contact by the authorized user. For example, a gun may be deactivated after a predetermined number of firings or after a predetermined amount of time. Reactivation may occur automatically after a predetermined amount of time, or by an affirmative act by a third party, or according to some other algorithm.
Brief Description of the Drawings The foregoing and other objects of this invention, the various features thereof, as well as the invention itself, may be more fully understood from the following description, when read together with the accompanying drawings, described:
Figure 1 is simplified block diagram of the preferred embodiment of a personal access module in accordance with the present invention;
Figure 2 is a simplified block diagram of the preferred embodiment of an access controller of the present invention;
Figure 3 is a perspective view of a personal access control system in accordance with the present invention; and
Figure 4 is a perspective view of a human user outfitted with the personal access control system of Figure 3. For the most part, and as will be apparent when referring to the figures, when an item is used unchanged in more than one figure, it is identified by the same alphanumeric reference indicator in all figures. Detailed Description of the Preferred Embodiments The present invention is a personal access controller (PAC) system. The PAC system includes a personal access module and a functional system. The personal access module is resident on or very near the user and allows user access to those individuals authorized to use the functional system. In the preferred form, the PAC system provides controlled user access to a functional system having at least a portion thereof being substantially in direct physical contact with a user. The PAC system may serve as a theft deterrent in some cases, for example, where the functional system is a portable CD player or a laptop computer. In other cases, the PAC system may serve as a safety device, for example, where the functional system is a hand gun or a dangerous piece of medical or construction equipment. More generally, the PAC system may be any system where controlled access is desired. In the preferred form, the PAC system is adapted to incorporate a hand gun as the functional system. In the case of a hand gun, such a system may be used by law enforcement agencies or the military, as examples, to control the use thereof. The preferred embodiment of the personal access module is shown in Figure 1. The personal access module 100 includes a receiver 110, a transmitter 120, a microprocessor 130, and a memory device 140. Microprocessor 130 processes received messages from the functional system and controls the generation and transmission of messages from the personal access module. The personal access module is preferably powered by a small, lightweight lithium battery. The total volume of the personal access module is preferably from about a few cubic millimeters to about a few milliliters. Preferably, user specific access codes (or user codes) are stored in memory 140. The user codes are transmitted to the functional system to identify the potential user to that system. The user codes may also indicate which weapon or weapons that user may access. Such access may be a function of the type of weapon (i.e., a certain type of hand gun) or a specific weapon (i.e., the gun issued to that individual), as examples. The preferred embodiment of the access controller of the functional system is shown in
Figure 2. Like the personal access module, the access controller 200 includes a receiver 210, a transmitter 220, a microprocessor 230, and a memory device 240. Embodied within microprocessor 230 and memory 240 is a built-in authorization system. As part of the authorization system, stored within memory 240 are system codes which relate to the user or users for which access may be granted to the functional system. In a simple form, the system codes are a listing of user codes stored in memory 240 and the microprocessor 230 performs a comparison of a received user code with the stored list of system codes. The authorization system grants access to the functional system if there is a match between the received user code and a system code. Other, more complicated, algorithms and coding may also be implemented. Authorization is preferably required on a per use basis, for example, prior to each shot fired from the gun. Authorization may also be required based on other factors. For example, the PAC system may conduct on-going periodic authorizations, rather than on a per use basis.
In some embodiments, the PAC system may be made such that the personal access module only transmits data and the access controller only receives data. However, better security is achieved when each device can transmit and receive data. In such cases, advanced, known cryptographic techniques may be used to mitigate the chances of unauthorized use and loss of user or system codes to unauthorized users.
A near-field communication system links the personal access module 100 to the access controller. Preferably, the communication link is a wireless system that allows communication between any two points on the body, similar to the Personal Area Network (PAN) described by T.G. Zimmerman in Personal Area Networks: Near-field intrabody communication, published in the IBM Systems Journal 0018-8670, 1996, Appendix I herein. In a personal area network (PAN), electronic devices on or near the body exchange digital information by capacitively coupling small pico-amp currents through the body. In the present invention, the personal access module 100 and access controller 200 are coupled using a PAN. Preferably, a low frequency carrier signal (i.e., less than 1 megahertz) is used to transmit the information (e.g., user codes) so that substantially no energy is propagated, which minimizes the likelihood of remote eavesdropping and interference with other PANs. In a PAN, communication takes place across the surface of the body, using the body as a "wet wire." Such a link can operate on several milliwatts of power. Use of a PAN communication link requires that, for the most part, the user be in contact with the functional system to use it. That is, physical contact with the functional system and the personal access module enables a communication path exists between the two.
Figure 3 shows the preferred form of a PAC system 500, incorporating a hand gun 400 as the functional system (the communication link is not shown). As is shown, the personal access module 100 is embedded in a bracelet and access controller 200 is embedded in gun 400. Figure 4 shows a perspective view of a user 600 outfitted with the PAC system of Figure 3. Dashed line A in Figure 4 represents the communication between personal access module 100 and hand gun 400 via a personal area network which includes the user's body 600 as a transmission medium. In a typical example of use, the authorized user 600 takes possession of weapon 400 and disengages the safety. The access controller 200 of PAC system 500 then transmits a coded interrogatory signal containing the weapon (or weapon group) identity. This message may be preceded by a high power signal to "wake up" the personal access module (or to even provide the power for the operation of the personal access module). This interrogatory message is received and decoded by personal access module 100, which replies with a coded authorization signal appropriate to the particular weapon. Upon receiving the authorization signal, weapon 400 becomes enabled for use. Preferably, the process from start to finish should take no more than about 10 milliseconds, so as not to interrupt operation of the weapon. However, this time may vary so long as operation of the functional system of concern is not adversely affected. For example, if the functional system is a laptop computer, the process need not be constrained to about 10 milliseconds.
In one embodiment, when the weapon is used, the weapon retains information indicative of the date, time, and person that used the weapon and the personal access module retains information as to the date, time and weapon that was used. This information is collected for each and every use of the weapon. The information may be retained in encrypted form, read out, and then decoded by elements of the Justice system upon obtaining a warrant or other permission, as an example. Of course, this type of data collection may also be used with other types of functional systems. When the access controller 200 of the PAC system 500 releases weapon 400 for use, there is an optional silent indication to the user (such as, the trigger can be moved slightly as opposed to being locked, or a small button in contact with the users hand gets retracted). Such devices allow the user to know that the weapon is ready for use without giving any overt clue to that fact. Regardless of the functional system, other audio, visual, or mechanical signals may be used to indicate to the user that the functional system is enabled.
Each personal access module 100 may have a number of safeguards to prevent unauthorized use. One safeguard is a method of detecting that the functional system has been removed from contact with its host (i.e., an authorized user). If it is removed from contact with its host (even momentarily), then it enters a dormant state wherein it is unable to perform any further weapon authorizations until and unless it is reauthorized to do so. Where the personal access module 100 is embedded in a piece of jewelry (e.g., anklet, watch, or bracelet 300), it cannot be released from the person without opening a circuit that turns off its ability to authorize use of a weapon. In various embodiments, the personal access module 100 may also make use of bio-information (such as monitoring pulse) to guard against removal from a severed limb. The PAC system can further use methods of detecting that its structure (e.g., a watchband) is always encircling a limb which is attached to a normal, living body. The object is to make it substantially impossible for someone to find any means of subverting the access controller by taking and attempting to use someone else's personal access module.
There can be other reasons for deactivation. These reasons can be based on the number of uses, the number of hours after a last use, or on any other algorithm. There can be different methods of reactivation, such as bringing, in the case of a weapon, the personal access module to a reactivation device in a Police Station. However, preferably, there should be no way possible for the user of a particular personal access module to reauthorize its use after removal from his/her body. This constraint substantially eliminates the possibility that a legitimate user might be forced by a criminal to both remove the personal access module and then tell the criminal how to activate it. The invention may be embodied in other specific forms without departing from the spirit or central characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by appending claims rather than by the foregoing description, and all changes that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.

Claims

1. A user-based access control system comprising: a near-field communication link; a personal access module located on a user, wherein said personal access module is adapted to transmit an authorization signal; and a functional system including an access controller in operative communication with said personal access module via said communication link, wherein said access controller grants access to said functional system as a function of said authorization signal.
2. The user-based access control system of claim 1 wherein said personal access module is not greater in volume than about 3 milliliters.
3. The user-based access control system of claim 1 wherein said personal access module is embedded in a piece of jewelry.
4. The user-based access control system of claim 1 wherein said personal access module is embedded subcutaneously on said user.
5. The user-based access control system of claim 1 wherein said authorization signal is indicative of said user's identity and said personal access module includes: a first processor; a first memory, accessible by said first processor to generate said authorization signal; a first transmitter under operative control of said second processor; a first power source.
6. The user-based access control system of claim 5 wherein said first power source is a lithium battery.
7. The user-based access control system of claim 5 wherein said personal access module further includes a first receiver under operative control of said processor.
8. The user-based access control system of claim 1 wherein said access controller includes: 2 a second receiver;
3 a second memory, adapted to store user information related to said authorization signal;
4 a second processor, adapted to enable said functional system for use as a function of said
5 user information; and
6 a second power source.
1 9. The user-based access control system of claim 8 wherein said second memory includes
2 stored therein at least one system code corresponding to at least one user for which access to the
3 functional system may be granted.
1 10. The user-based access control system of claim 1 wherein said functional system is
2 deactivated upon physical separation of said user from said functional system.
1 1. The user-based access control system of claim 1 wherein said functional system is
9 deactivated upon physical separation of said user from said personal access module.
1 12. The user-based access control system of claim 1 wherein said functional system is a
2 weapon.
1 13. The user-based access control system of claim 1 wherein said weapon is a gun.
1 14. The user-based access control system of claim 1 wherein said functional system is a
-> chosen from the group comprised of portable computers, hand-held electronic communication
3 devices, and portable entertainment devices.
1 15. The user-based access control system of claim 1 wherein said near-field communication
2 link is a personal area network.
1 16. A user-based access control system comprising:
2 a near-field personal area network communication link;
3 a personal access module located on a user, wherein said personal access module is
4 adapted to transmit an authorization signal, said personal area module including:
5 a first processor; a first memory, accessible by said first processor to generate said authorization signal; a first transmitter under operative control of said second processor; a power source; and a functional system including an access controller in operative communication with said personal access module via said communication link, wherein said access controller grants access to said functional system as a function of said authorization signal, said access controller including : a second receiver; a second memory, adapted to store user information related to said authorization signal; a second processor, adapted to enable said functional system for use as a function of said user information; and a second power source.
PCT/US2000/022625 1999-08-17 2000-08-17 A computer-based personal access system WO2001013217A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU67825/00A AU6782500A (en) 1999-08-17 2000-08-17 A computer-based personal access system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US37565399A 1999-08-17 1999-08-17
US09/375,653 1999-08-17

Publications (1)

Publication Number Publication Date
WO2001013217A1 true WO2001013217A1 (en) 2001-02-22

Family

ID=23481757

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/022625 WO2001013217A1 (en) 1999-08-17 2000-08-17 A computer-based personal access system

Country Status (2)

Country Link
AU (1) AU6782500A (en)
WO (1) WO2001013217A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002048632A1 (en) * 2000-12-14 2002-06-20 Heckler & Koch Gmbh Handgun with individual identification
FR2844623A1 (en) * 2002-09-16 2004-03-19 Anjou Etude Site surveillance fixed/mobile installation having detector coupled energy feed and individual carrying badges detector recognising and where recognised within zone switching off energy feed
WO2006016253A2 (en) * 2004-08-10 2006-02-16 Nokia Corporation Short-range authentication
DE102007002305A1 (en) * 2007-01-16 2008-07-17 Siemens Ag Medicinal device has releasing unit for releasing control interface for user, in which releasing unit contains wireless near filed communication system for communication in close field range
WO2009022031A1 (en) * 2007-08-07 2009-02-19 Delgado Acarreta Raul Authentification and authorization device
US8020481B1 (en) * 2008-05-09 2011-09-20 Taser International, Inc. Systems and methods for modular area denial
US8166693B2 (en) 2006-05-23 2012-05-01 Taser International, Inc. Systems and methods for conditional use of a product
US9666056B2 (en) 2014-09-23 2017-05-30 Motorola Solutions, Inc. Apparatus and method for detecting a firearm in a communication system
CN107566005A (en) * 2017-07-25 2018-01-09 深圳市盛路物联通讯技术有限公司 The method for safety monitoring and intelligent gun of a kind of firearms

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5461812A (en) * 1994-11-16 1995-10-31 Bennett; Emeric S. Method and apparatus for a weapon firing safety system
US5481262A (en) * 1990-08-03 1996-01-02 Bio Medic Data Systems, Inc. System monitoring programmable implanatable transponder
US5533058A (en) * 1994-03-10 1996-07-02 Delco Electronics Corporation Method and apparatus for low current RF signal detection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5481262A (en) * 1990-08-03 1996-01-02 Bio Medic Data Systems, Inc. System monitoring programmable implanatable transponder
US5533058A (en) * 1994-03-10 1996-07-02 Delco Electronics Corporation Method and apparatus for low current RF signal detection
US5461812A (en) * 1994-11-16 1995-10-31 Bennett; Emeric S. Method and apparatus for a weapon firing safety system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002048632A1 (en) * 2000-12-14 2002-06-20 Heckler & Koch Gmbh Handgun with individual identification
US8171665B2 (en) 2000-12-14 2012-05-08 Heckler & Koch, Gmbh Portable firearms having identification marks
FR2844623A1 (en) * 2002-09-16 2004-03-19 Anjou Etude Site surveillance fixed/mobile installation having detector coupled energy feed and individual carrying badges detector recognising and where recognised within zone switching off energy feed
WO2006016253A3 (en) * 2004-08-10 2006-04-27 Nokia Corp Short-range authentication
WO2006016253A2 (en) * 2004-08-10 2006-02-16 Nokia Corporation Short-range authentication
US8166693B2 (en) 2006-05-23 2012-05-01 Taser International, Inc. Systems and methods for conditional use of a product
DE102007002305A1 (en) * 2007-01-16 2008-07-17 Siemens Ag Medicinal device has releasing unit for releasing control interface for user, in which releasing unit contains wireless near filed communication system for communication in close field range
WO2009022031A1 (en) * 2007-08-07 2009-02-19 Delgado Acarreta Raul Authentification and authorization device
EP2175225A1 (en) * 2007-08-07 2010-04-14 Raul Delgado Acarreta Authentification and authorization device
EP2175225A4 (en) * 2007-08-07 2012-10-17 Acarreta Raul Delgado Authentification and authorization device
US8020481B1 (en) * 2008-05-09 2011-09-20 Taser International, Inc. Systems and methods for modular area denial
US9666056B2 (en) 2014-09-23 2017-05-30 Motorola Solutions, Inc. Apparatus and method for detecting a firearm in a communication system
CN107566005A (en) * 2017-07-25 2018-01-09 深圳市盛路物联通讯技术有限公司 The method for safety monitoring and intelligent gun of a kind of firearms

Also Published As

Publication number Publication date
AU6782500A (en) 2001-03-13

Similar Documents

Publication Publication Date Title
EP1685358B1 (en) Safety device for weapons and method for securing weapons provided with a safety device
US7356706B2 (en) Personal authentication method and apparatus sensing user vicinity
US7886471B2 (en) Method for activating a weapon with an identification mechanism
US5189395A (en) Electronic house arrest system having officer safety reporting feature
KR100483293B1 (en) Security system for preventing a personal computer from being stolen or used by unauthorized people
JP4996175B2 (en) Entrance management system and entrance management method
US6301815B1 (en) Firearms and docking station system for limiting use of firearm
US6861944B1 (en) Authorization control system
US20080244699A1 (en) Identification means and method for the logical and/or physical access to a target means
US20040123106A1 (en) Apparatus and methods for motion and proximity enhanced remote identity broadcast with biometric authentication
EP1485882B1 (en) Dynamic security system
US6481140B1 (en) Firearm safety system with implanted computer chip
WO2001013217A1 (en) A computer-based personal access system
EP1782149A1 (en) Wireless lock
GB2387975B (en) Security cabinet system for controlling with user's id data
EP1404083B1 (en) Removable cryptographic ignition key system and method
US20030098774A1 (en) Security apparatus
WO2002048485A1 (en) Fingerprint recognition key, lock, and control method
JP3884800B2 (en) IC card unauthorized use prevention device
WO2007011311A2 (en) Biometric transponder system
JP3651247B2 (en) Information device and input device for personal authentication system
JPH11134302A (en) Access controller for terminal, and authentication card
US10893415B2 (en) Preventing unauthorized use of devices
JP2003528400A (en) Security equipment
US7497371B1 (en) Secure commercial transactions system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP