`
`[191
`
`[11] Patent Number:
`
`5,629,981
`
`Nerlikar
`
`[45] Date of Patent:
`
`May 13, 1997
`
`US00562998 IA
`
`[54]
`
`INFORMATION MANAGEMENT AND
`SECURITY SYSTEM
`
`[75]
`
`Inventor: Vlrupax M. Nerlikar. Plano. Tex.
`
`[73] Assignee: Texas Instruments Incorporated,
`Dallas. Tex.
`
`[21] Appl. No.: 283,081
`
`[22] Filed:
`
`Jul. 29, 1994
`
`Wall StreetJournal. WilliamM Bulkeley, “Get ready for the
`‘smart cards’ in health care”, May 1993, one page.
`Wall Street Journal, John .1. Keller, “Bells and whistles turn
`beepers into data receivers”, Sep. 1993 two pages.
`Wall Street Journal, William M. Bulkeley, “Someday, Cards
`May Make Coins Obsolete (smart cards may replace coin
`usage)”, May 1993, one page.
`
`Standard Register, Advertisement—High Tech Document
`Security Video. Jul.—Aug. 1993.
`
`HML 9/00
`Int. Cl.‘
`[51]
`380/25; 380/23; 340/825.34
`[52] US. Cl.
`[58] Field ofsearch .................... 380/23-25; 340/825.34
`
`Primary Examiner—Salvatore Cangialosi
`Attome); Agent, orFirm—Ira S. Matsi1;lames C. Kesterson;
`Richard L. Donaldson
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3/1986 Dieifns ....................... 380/23
`4,575,621
`9/1987 Wirstmmet al. ......................... 380/23
`4,691,355
`11/1988 Ldbholz et al. .......................... 380/25
`4,783,798
`4/1989 Cargileetal.
`.................... 380/23
`4,819,267
`5,053,774 10/1991
`342/44
`
` 5,153,918 10/1992
`
`5,310,999
`5,319,711
`5,339,073
`5,508,692
`
`5/1994
`6/1994
`8/1994
`4/1996
`
`OTHER PUBLICATIONS
`
`“Software GiantAiming atthe Oflice,” New York Times, Jun.
`8, 1993, p. C1.
`Hardcopy Observer; Published by Lyra Research, ‘Microsoft
`at Work’, vol. III, No. 7, Jul, 1993, pp. 31-39.
`Hanicopy Observer; “Microsoft at Work to go Home?'', vol.
`IV, No. 3, Mar., 1994, p. 9.
`Hanicopy Observer; “Microsoft Gears Up to Supply at Work
`Print Software to OEM", vol. N, No. 2. pp. 30-32.
`Fite, Jr., Franklin. ‘The PC Adopts an Embedded Positio ”,
`Electronic Ehgineering Times, Apr. 25, 1994, p. 46.
`
`[57]
`
`ABSTRACT
`
`A closed loop, (networked) information management and
`security system which provides a secure, end-to—end fully
`automated solution for controlling access,
`transmission,
`manipulation, and auditability of high value information
`comprising an RFID transponder badge 302 and an RF
`reader transceiver 315 which is associated with a host
`
`peripheral or a network. The RF reader transceiver 315
`automatically identifies and verifies authorization of the
`RFID transponder badge holder via a “handshake” pior to
`allowing access to the host pen'pheraL The energy generated
`by the transmission of the interrogation signal from the RF
`reader means 315 provides a pow: source which is accu-
`mulated and then used to activate a transponder 304
`response from the RFID transponder badge 302. The RF
`readu/transceiver 315 writes the access transaction on either
`the RFID transponder badge 302 and/or the host peripheral
`database or the network controller. Alternatively, the RF
`reader means 315 may be associated via network server with
`a LAN, WAN. or MAN. Optionally, an RFID badge 302::
`may be powered by an independent power source such as a
`flatpak battery 314.
`
`42 Claims, 7 Drawing Sheets
`
`MA/couu nus
`
`
`
`'nmm£n' HOST ml/sw
`ADD-011 AND/OR RESIDENI If/I/SW (SOIE ll001Fl(‘ATION)
`
`PLUG-IN BOARDS AND/OR
`PCHCIA CARDS (RFID REAKR. KIM?)
`
`PAGE 1
`
`SECURUS EXHIBIT 1004
`
`PAGE 1
`
`SECURUS EXHIBIT 1004
`
`
`
`U.S. Patent
`
`May 13, 199“?
`
`Sheet 1 of 7
`
`5,629,981
`
`fi_._._oEz8kwmuuunu
`
`
`xm_o,.$._.m_zE28:t.1.o_oo._+n“.“.
`
`.$>Em232:8EmmsoE.%:
`
`
`
`...I_:.__8mmaam
`
`K\\\\\\\\\\\\\
`
`\.\\\N_\\\\\\
`
`\\\\\\\\\\\
`
`'\\\\\\'\'\'s'\\'\\\
`
`m_..,2_._wa25..
`
`\\‘q\\\\\\\\\\\‘
`\\\\\\\\\\\\\\
`\\\\\\\\\\\\\\
`\\’\\'\\'\\\\.\\\
`\\\\x\\\\\\\
`\\\\\\\'\\.\\\
`.I.lJ
`\\\\\\\\\\\\
`uxxi»
`\\~.\u_|
`c2\\\\\\\\\x5x
`\\\\\\\\\\\\
`\\\\\\\\\\\\
`\\\\\k\\\\\\
`\\\\\\\\\\\\\
`\’\\\.\\\\\\\\.\
`\\\\\\\\\\\\\
`\\\\\\\\\\\\\\
`
`.._.u\\\.\
`$\\:
`
`\\\u1\\\\\\
`
`\\\\\\\\\\\\
`
`zo=5_;:_E.<33..a§_.,“uwwfifi”2.525_.,E_a.38+“..mmmmmmmwmM...
`
`
`
`
`A25;.3“;~_ommuo$-._.._M§_,__<%aH
`
`
`
`
`.\\\\\\x\\\\\\\..\\\\\\\\x\\\
`
`
`
`Innuunuuu
`
`uz_mB8EzoE<mz._EIIzoEmo._ma-
`
`
`
`
`n__._v_m_o......E.._\m_._.ozwm..zo_B<m_,_<E..§o._>mo_._>m..._zz:m\w.=<EozE.5<mz<m._.mmowmmmzmmwmqmmaz_mmooE
`
`
`
`
`
`
`
`
`
`%>__,_<mezom233;
`
`
`
`
`
`am}:so:.8oBmE.
`
`
`
`£5332.._eo__8.m~_.m.._m._-
`
`
`
`mg255%mzoEozoma-§mEEa_,_.__xpa-
`
`PAGE 2
`
`
`
`U.S. Patent
`
`May 13,1997
`
`Sheet 2 of’?
`
`5,629,981
`
`emmEfizmm
`
`BEH._>_uHEea..E§a..
`
`:2:2.22
`
`
`
`
`
`o_.._.._<~=m§_u<..._..¢._.<n_..
`
`%
`
`
`
`réagLm§§m_.
`
`
`
`;E_n_s8u>_§m.
`
`E<zo:.:mMa25mam:._.~_um_m=:.5Hmm.H_..L_
`
`..m_.__mo._._..mo.._@2853_
`
`1'|Il'lIJ
`
`
`
`aEa_n__..m_~_@m._e,mmEm:
`
`2.2.52...?
`
`253mass
`
`
`
`22.3\-II--Illili-\m.E.n__._¢>zoE_§Ez_
`
`
`
`
`H<e._<>..um._:s_mz<Ezo_E,_~.Ez_m_N_._<Ez_1%
`,_u..h_.%__.._._Eaaozé.$0.5.§%m\wfifi@
`
`
`
`
`m_m§5§._
`
`PAGE 3
`
`
`
`
`U.S. Patent
`
`
`
`May 13, 1997
`
`
`
`
`
`Sheet 3 of 7
`
`
`
`
`5,629,981
`
`
`
`
`
`
`
`
`
`M2
`
`
`
`
`
`
`FIG. 3B \/314
`PACK15BATTERY
`‘-\‘~L:R
`
`BADGE
`
`
`
`
`
`
`
`
`
`PAGE4
`
`PAGE 4
`
`
`
`U.S. Patent
`
`5,629,981
`
`AUTHORIZED USER
`ID, DESTINATION(S)
`on RECIPIENT(S)
`IDs
`
`MAX SECURITY
`CLASSIFICATION CODE
`
`TRANSACTION DATE/
`TIME/LOCATION STAMP
`
`AUTHORIZED BROADCAST
`MSG IDs
`
`SECONDARY ID CODE/BIO
`SIGNATURE ADDRESS IN
`SERVER DATABASE
`
`OTHER SENSOR INPUTS
`
`PAYLOAD
`(ACTUAL INFO CONTENT)
`
`CONFIG CONTROL
`
`REVISION CONTROL
`
`ERROR BITS
`
`PRIORITY BITS
`
`ACKNOWLEDGE
`
`omen NEIVIORK CONTROL
`(DBMS UPLINK/DOWNLINK)
`
`FIG. 4
`
`PAGE 5
`
`
`
`U.S. Patent
`
`MULT-USER
`
`NETWORK SERVER
`'
`502
`
`5,629,981
`
`HOST
`PERIPHERAL
`505
`
`READER
`MODULE
`
`508
`
`EP INTELLIGENT
`CASSETTE
`51 0
`
`REFURBISH EQUIPMENT
`
`EP INTELLIGENT
`CASSETTE
`510
`
`PAGE 6
`
`
`
`U.S. Patent
`
`May 13, 1997
`
`Sheet 5 of 7
`
`5,629,981
`
`
`
`
`
`
`
`
`
`83....55>..mzo_.a>_53._H<e_8.mafia.
`
`
`
`39..m=,_.=m_mm...E55._<z_o....m_n_.mm$9;
`
`mamas:28dzomfia.
`E3823m.az=._~Eéa._mo.
`
`
`
`=2:§.aE.,_8.
`
`
`
`ui1a|8aE:5...Efiemm
`
` mafia¢_a__f_:_a_an_m__am_muazamx2...ll EaEoémom__,_oE
`
`
`
`
`
`flu
`
`E52o=_m&
`2.53.:
`
`6%.
`
`~-_QMbrim.
`
`oz_a§m\mE____§
`
`Examéosmz
`
`8uV:2_amQm5uuBEo
`
`
`
`zefim.W_.mEbm<m
`
`seamo5m§E
`3_.m_,__.=ao3¢.§_=._l.|lmflqI8us.
`
`wfizzem8.9Ea...55%..
`
`
`5225m_m§..§_zo_§az._.E_.
`%EEE_.__§_>m.Eozmm.
`
`
`aE9..Ezox&E
`
`PAGE 7
`
`
`
`%§_mm_=%.._
`
`m_._2_5=n_n_<
`
`U.S. Patent
`
`May 13, 1997
`
`Sheet 7 of 7
`
`aim92.3%.veg...255....2
`
`E
`
`
`
`ms:zo=5:&..
`
`m§.mm_.._8.2.
`
`mz2E:&___
`
`
`
`wE_..._.m_a$.E___.§=5.17
`E552.25%
`
`$8_.___..,
`
`m_.,=_.,__E"8
`
`mzo:....u_._n_n_<ms:zo=5=&.__mama:as...9...._s:s_§.__\
`
`
`
`
`
`
`
`ma___.525ms:_s:5:n_n_,__$953:5.9..\mzo___§a&//\<;.mm_m_m_fi~,__.&_m_m_.m_z<u=_a%.§_E
`
`
`
`§_e§m.,._s._..,.Ez_32.“...rE:zo_=a:&¢e:3ass.E52...
`m5..,_%~_mmH_W._W_,__.h__mwmn_585$m$.,_~_h_R.E:z¢._.=a_:%
`
`
`
`K:3E3%>_z.._
`=55%_§_n_owezo:3:&.__\1=5.2
`
`
`
`
`
`
`
`mzo=._o:&.__Ema2__§E¢m_s=§§__
`
`
`
`o:aw_m-%n__,E..Tm_._:_§_5E%u_w__wWmu_%m%§
`
`
`
`u_h__a._m-x8_.Evia;.5.m_m¢mm_:aim2E§%u_..__H.Em1mogzu>mu_o>J...
`
`
`
`
`
`PAGE 8
`
`
`
`5,629,981
`
`
`
`
`
`
`1
`INFORMATION MANAGEMENT AND
`
`
`
`SECURITY SYSTEM
`
`
`BACKGROUND OF THE INVENTION
`
`
`
`1. Field of the Invention
`
`
`
`
`
`The present invention relates to a complete, end-to-end,
`
`
`
`
`
`
`
`
`automatic transaction control/monitoring method for
`
`
`
`
`
`transmitting. under variable and high levels of security,
`
`
`
`
`
`
`
`
`high-value business, personal, or Federal/military
`
`
`
`
`
`information, on a real or near real-time basis.
`
`
`
`
`
`
`
`
`2. Related Art
`
`
`
`A “secure document” or “secure information” is any
`
`
`
`
`
`
`
`
`document media (paper, disc, Voice, video, etc.) containing
`
`
`
`
`
`
`
`
`U.S. classified documents or information (i.e. “confidential,”
`
`
`
`
`
`
`
`“secret,” “top secret.” etc.), business-sensitive, proprietary
`
`
`
`
`
`
`documents or information. highly personal documents or
`
`
`
`
`
`
`
`information, and any document or infonnation where lirn-
`
`
`
`
`
`
`
`ited and fully controlled/auditable access is desired.
`
`
`
`
`
`
`
`If an individual wishes to send a secure document via
`
`
`
`
`
`
`
`
`
`
`telefacsimile, for example, the current method of sending
`
`
`
`
`
`
`
`
`such a secure document is to call the receiving end and
`
`
`
`
`
`
`
`
`
`
`
`somehow make sure by voice communication that the
`
`
`
`
`
`
`
`
`intended, authorized recipient is standing at the other end at
`
`
`
`
`
`
`
`
`
`
`the receiving telefacsimile. Once the identity and proximity
`
`
`
`
`
`
`
`
`to the receiving telefacsirnile of the intended recipient
`
`
`
`
`
`
`
`
`(mainly, via voice familiarity) is verified, the sending indi-
`
`
`
`
`
`
`
`
`vidual sends the document. After sending,
`the intended
`
`
`
`
`
`
`
`
`recipient provides confirmation to the sending individuals
`
`
`
`
`
`
`
`that the document was printed and received.
`
`
`
`
`
`
`
`The same limited security procedure is followed when
`
`
`
`
`
`
`
`printing information from an electronic database to a remote
`
`
`
`
`
`
`
`conventional printer or other terminal device.
`
`
`
`
`
`
`Thus, current hardware and systems involve limited or no
`
`
`
`
`
`
`
`
`automation in handling such secure documents or informa-
`
`
`
`
`
`
`
`tion on both a local and network basis. The systems and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`procedures currently available are mainly “person(s)-in—the-
`loop” systems which require certain labor-intensive actions
`
`
`
`
`
`
`
`and a high degree of manual coordination to achieve a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`limited “secure” operation. The labor-intensive aspect of this
`coordination procedure greatly increases the duration and
`
`
`
`
`
`
`
`
`costs of transmission while it decreases productivity.
`
`
`
`
`
`
`Therefore. there is a need in the art to provide a method of
`
`
`
`
`
`
`
`
`
`
`
`
`
`transmitting secure documents in a way which does not
`
`
`
`
`
`
`
`
`
`require such labor-intensive manual assistance.
`
`
`
`
`
`It is noted that some islands of automation are available,
`
`
`
`
`
`
`
`
`
`
`but no end-to-end automation, with full auditability and
`
`
`
`
`
`
`
`
`real-time or near real-time control. Current systems such as
`
`
`
`
`
`
`
`
`
`a secure telephone unit (“STU”) or STU facsimile machines
`
`
`
`
`
`
`
`
`
`assure no illegal
`tapping or eavesdropping but do not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`guarantee that the caller, recipient, or group is positively
`identified or is an authorized user or recipient. The positive
`
`
`
`
`
`
`
`
`
`
`identification and verification of authorization is always
`
`
`
`
`
`
`
`performed manually. Thus, there is a need for end-to-end
`
`
`
`
`
`
`
`
`
`automation, with full auditability and real-time or near
`
`
`
`
`
`
`
`
`real-time control of the transmission of secure documents
`
`
`
`
`
`
`
`
`and information.
`
`
`A similar problem occurs in handling secure documents
`
`
`
`
`
`
`
`
`and secure information relating to work for various Federal
`
`
`
`
`
`
`
`
`
`agencies, including, U.S. Department of Defense (DOD).
`
`
`
`
`
`
`
`Secure documents and information are often located in a
`
`
`
`
`
`
`
`
`
`special file cabinet fitted with a piece of securing hardware,
`
`
`
`
`
`
`
`
`
`e.g., a number lock or combination lock, which is approved
`
`
`
`
`
`
`
`
`
`by the DOD. Every time the file cabinet is entered, the
`
`
`
`
`
`
`
`
`
`
`
`entering individual must manually enter a myriad of infor-
`
`
`
`
`
`
`
`mation into a log such as: which document was used; who
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 9
`
`
`
`
`
`
`
`
`
`
`2
`handled it; date; time; and what was done with the document
`
`
`
`
`
`
`
`
`
`
`
`(i.e. document was copied; document was sent to another
`
`
`
`
`
`
`
`
`
`individual at another site). The DOD requires auditing and
`
`
`
`
`
`
`
`
`
`notification at the end of each month of all the people who
`
`
`
`
`
`
`
`
`
`
`
`
`handled each secure document. At the very least, the DOD
`
`
`
`
`
`
`
`
`
`
`requirements compel manual compilation of all the logs
`
`
`
`
`
`
`
`
`which is extremely tedious and costly.
`
`
`
`
`
`
`Therefore, there is a need in the art to provide a cost-
`
`
`
`
`
`
`
`
`
`
`
`effective automatic auditing and monitoring capability
`
`
`
`
`
`
`which also provides electronic time, date and place identi-
`
`
`
`
`
`
`
`
`fication stamps.
`
`
`Further, these specially secured file cabinets are often
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`grouped in secure rooms that have doors secured by special
`locks. Upon entry into the room, an additional log must be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`maintained to provide notification and accounting to the
`DOD. This additional step also creates additional delay in
`
`
`
`
`
`
`
`
`effective work time and greatly increases costs.
`
`
`
`
`
`
`
`Therefore. there is a need in the art to provide a cost-
`
`
`
`
`
`
`
`
`
`
`
`efl’ective automatic room security which mechanizes the
`
`
`
`
`
`
`room access logs and thereby decreasing costs and increas-
`
`
`
`
`
`
`
`
`ing productivity.
`
`
`Exacerbating the foregoing problems. in order to copy
`
`
`
`
`
`
`
`
`certain secret government documents, only certain “secure”
`
`
`
`
`
`
`
`or tempest class copiers may be used so that the copier OPC
`
`
`
`
`
`
`
`
`
`
`
`
`drum may be cleared after copying and cartridges may be
`
`
`
`
`
`
`
`
`
`
`disposed of by only authorized personnel. Before these
`
`
`
`
`
`
`
`
`copies are made, a log sheet must be completed providing
`
`
`
`
`
`
`
`
`
`
`the details of the copying of the document. This creates yet
`
`
`
`
`
`
`
`
`
`
`
`another labor-consurning delay that increases costs and
`
`
`
`
`
`
`
`decreases productivity. In fact, access logs and usage data
`
`
`
`
`
`
`
`
`
`are generally maintained manually for secure facilities,
`
`
`
`
`
`
`
`information handling equipment, and users.
`
`
`
`
`
`to provide an
`Therefore,
`there is a need in the art
`
`
`
`
`
`
`
`
`
`
`
`automatic information management and security system
`
`
`
`
`
`
`which eliminates the time inefiiciencies and waste associ-
`
`
`
`
`
`
`
`ated With manual logging and tracldng of copies of high-
`
`
`
`
`
`
`
`
`
`value, secret documents.
`
`
`
`Underlying the entire system is the fact that it is up to the
`
`
`
`
`
`
`
`
`
`
`
`
`employees and security personnel to verify whether a par-
`
`
`
`
`
`
`
`ticular individual has a secret clearance, badge code number,
`
`
`
`
`
`
`
`
`or some other indicia of authorization and identification.
`
`
`
`
`
`
`
`
`Therefore, to prevent improper access, manual or personal
`
`
`
`
`
`
`
`
`direct intervention is required to verify both authorization
`
`
`
`
`
`
`
`
`and need to know in order to prevent improper and unau-
`
`
`
`
`
`
`
`
`
`
`thorized transfer of secure documents. The verification by
`
`
`
`
`
`
`
`employees diverts resources from productive activity. The
`
`
`
`
`
`
`verification by security personnel results in additional salary
`
`
`
`
`
`
`
`or expense overhead.
`
`
`
`Therefore, there is a need in the art to provide a system
`
`
`
`
`
`
`
`
`
`
`
`which greatly reduces the need for manual intervention to
`
`
`
`
`
`
`
`
`prevent unauthorized transfer of secure, proprietary and
`
`
`
`
`
`
`personal documents.
`
`
`On a related matter, when an individual’ s authorization is
`
`
`
`
`
`
`
`
`revoked and the individual gains unauthorized access to
`
`
`
`
`
`
`
`
`secure documents a security breach occurs. When this
`
`
`
`
`
`
`
`
`security breach is manually detected, it is impossible to
`
`
`
`
`
`
`
`
`
`infonn all the employees and/or security personnel of the
`
`
`
`
`
`
`
`
`
`breach in a timely fashion in order to insure manual inter-
`
`
`
`
`
`
`
`
`
`
`vention. In a large company, timely notification and com-
`
`
`
`
`
`
`
`
`munication of the changing authorizations of employees is
`
`
`
`
`
`
`
`
`relatively impossible. This is because authorization has
`
`
`
`
`
`
`
`traditionally been carried in the form of a color—coded badge
`
`
`
`
`
`
`
`
`
`or the like. As a result, if the security of a document has been
`
`
`
`
`
`
`
`
`
`
`
`
`breached by use of an authorization which has been termi-
`
`
`
`
`
`
`
`
`
`nated or forged, an entire month or more could pass before
`
`
`
`
`
`
`
`
`
`
`the monthly DOD audit discovers the security breach.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 9
`
`
`
`5,629,981
`
`
`
`4
`
`
`location and revision stamp), creation of a transaction sum-
`
`
`
`
`
`
`
`marizing “communication data stream” (e.g., ATM cell,
`
`
`
`
`
`
`
`frame) packet, destination ID, additional authentication
`
`
`
`
`
`
`(e.g., voice signature, biographical identification), send and
`
`
`
`
`
`
`
`
`receive date/time, location stamp, etc. The host computer,
`
`
`
`
`
`
`
`
`network server or network controller maintains this “trans-
`
`
`
`
`
`
`
`action” log automatically and dynamically maintains infor-
`
`
`
`
`
`
`mation authorization, usage, movement, and an upgrade]
`
`
`
`
`
`
`
`change log and foils any unauthorized access or tampering
`
`
`
`
`
`
`
`
`
`and does any real-time reclassification or declassification as
`
`
`
`
`
`
`
`
`required. As such, this is a “transaction” based system that
`
`
`
`
`
`
`
`
`
`can be enhanced to add fault
`tolerance, redundancy,
`
`
`
`
`
`
`
`
`software-based access control algorithm creation, etc.
`to
`
`
`
`
`
`
`
`provide a flexible system.
`
`
`
`
`Briefly, in its most generic sense, the present invention
`
`
`
`
`
`
`
`
`
`comprises a read/write type radio frequency identification
`
`
`
`
`
`
`
`
`(‘‘RFID’’ Radio Frequency, InfraRed or optical) means
`
`
`
`
`
`
`(transponder) and a radio frequency (transceiver) reader
`
`
`
`
`
`
`
`
`(“RF reader”) means which is associated with a host periph-
`
`
`
`
`
`
`
`eral or terminal device wherein the RF reader means pas-
`
`
`
`
`
`
`
`
`
`sively and automatically identifies and verifies authorization
`
`
`
`
`
`
`
`of the RFID means via a “handshake” prior to allowing
`
`
`
`
`
`
`
`
`
`
`access to the host peripheral or terminal device or an
`
`
`
`
`
`
`
`
`
`
`information network. Preferably, the RF reader means writes
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the complete transaction via a unique “packet”) on the RFID
`means, and/or the host peripheral or terminal or a network
`
`
`
`
`
`
`
`
`
`server device. In this fashion, the history of all transactions
`
`
`
`
`
`
`
`
`
`
`
`may be stored on the RFID means and/or host peripheral or
`
`
`
`
`
`
`
`
`
`
`terminal device. The present invention may be provided
`
`
`
`
`
`
`
`
`commercially in a “securitization kit” to upgrade existing
`
`
`
`
`
`
`
`
`
`
`
`
`equipment and information-handling facilities.
`
`In a second aspect of the present invention, the RF reader
`
`
`
`
`
`
`
`
`means is embedded, plugged-in, connected or associated
`
`
`
`
`
`
`with the host peripheral or terminal device. Once a trans-
`
`
`
`
`
`
`
`
`
`action is completed the RF reader means may record and
`
`
`
`
`
`
`
`
`
`
`write the transaction on the RF'l]) means, and/or the host
`
`
`
`
`
`
`
`
`
`
`peripheral or terminal device, and/or a server database
`
`
`
`
`
`
`
`
`connected or associated with the terminal device.
`
`
`
`
`
`
`
`Optionally, the RFID means may flnther include stored
`
`
`
`
`
`
`
`
`biological data in ROM such as digitized voice signature,
`
`
`
`
`
`
`
`
`
`retina scan, fingerprints, etc. and other analog sensors
`
`
`
`
`
`
`
`
`(temperature, humidity, pressure, etc.) as well as commer-
`
`
`
`
`
`
`
`cially available physical “position” sensors such as Global
`
`
`
`
`
`
`
`
`Positioning System (“GPS”), coastal navigation system
`
`
`
`
`
`
`(LORAN), or other satellite/magnetic based positioning
`
`
`
`
`
`
`
`system. As an added security feature the RFID means may
`
`
`
`
`
`
`
`
`
`include electronic hardware and/or software encryption
`
`
`
`
`
`
`means to statically and dynamically “encrypt” the autho-
`
`
`
`
`
`
`
`rized user identification code, information destination, trans-
`
`
`
`
`
`
`action location, time/date, configuration control, and sec-
`
`
`
`
`
`
`ondary biological user(s) identification.
`
`
`
`
`In a third aspect of the invention the RFID means may be
`
`
`
`
`
`
`
`
`
`
`
`coupled with an independent power source such as a battery.
`
`
`
`
`
`
`
`
`
`The RFID means may comprise an integrated ID, memory
`
`
`
`
`
`
`
`
`
`storage, and a communications device such as a Personal
`
`
`
`
`
`
`
`
`
`Computer card (“PC card”) which conforms to standards
`
`
`
`
`
`
`
`
`promulgated by the Personal Computer Memory Card Inter-
`
`
`
`
`
`
`
`
`national Association (“PCMCIA”) having an RF
`
`
`
`
`
`transponder, mass memory, 2-way communication port(s)
`
`
`
`
`
`
`and input/output data means. Optionally, the RFII) means
`
`
`
`
`
`
`
`
`has encryption device (Integrated Circuit) means to encrypt
`
`
`
`
`
`
`
`
`the output data. In addition, the RFID has unique biographi-
`
`
`
`
`
`
`
`
`
`cal information patterns in Read Only Memory (ROM) for
`
`
`
`
`
`
`
`
`
`“static” information and “dynamic” position, time, place,
`
`
`
`
`
`
`
`date information.
`
`
`In one preferred embodiment, the RFID means is elec-
`
`
`
`
`
`
`
`
`tronically similar to the “bullet” or flat-pack card disclosed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Therefore,
`there is a need in the art to provide an
`automated system for continuously updating comprehensive
`
`
`
`
`
`
`information about the authorizations of individuals, and to
`
`
`
`
`
`
`
`
`prevent unauthorized access to secure documents at the time
`
`
`
`
`
`
`
`
`
`access is attempted (real-time control).
`
`
`
`
`
`Transmission of secure information (documents, data,
`
`
`
`
`
`
`
`video, etc.) is even more of a concern, given flre planned
`
`
`
`
`
`
`
`
`
`
`office integration/automation Systems and Architectures
`
`
`
`
`
`(SW/HW) of the future; a la the ones announced by the
`
`
`
`
`
`
`
`
`
`
`
`Microsoft Corporation (“Microsoft-At-Work”, see FIG. 7),
`
`
`
`
`
`
`
`
`
`
`
`
`
`Adobe (‘‘Acrobat’’ for Print Documents). Apple Computer
`(“OCE”), General Magic (“Magic Cap”) etc. covering the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`emerging multi-media information management systems for
`
`
`
`
`
`
`
`
`
`oflice and home. For example, the Microsoft Corporation is
`working on a new project currently called “Microsoft at
`
`
`
`
`
`
`
`
`
`Wor ” which would allow a worker to Write a report and, by
`
`
`
`
`
`
`
`
`
`
`tapping a key, have 20 copies of the report printed, copied,
`
`
`
`
`
`
`
`
`
`
`
`and collated on one machine, thereby eliminating the step of
`
`
`
`
`
`
`
`
`
`
`having an individual take the report from the printer and take
`
`
`
`
`
`
`
`
`
`
`
`it to a photocopy machine where 20 copies are made. See
`
`
`
`
`
`
`
`
`
`
`
`“Software GiantAiming at the Oflice,” New York Times, Jun.
`
`
`
`
`
`
`
`
`
`
`8, 1993, p. Cl. See also, Hardcopy Observer, published by
`
`
`
`
`
`
`
`
`
`
`Lyra Research: Vol. 111, Number 7, “Microsoft at Work
`
`
`
`
`
`
`
`
`
`Oflice,” pp. 31-39 (July 1993); Vol.
`IV, Number 2,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`“Microsoft-at-Work Software,” p. 30 (February 1994); Vol.
`IV, Number 3, “Microsoft-at-Work For Home Entertainment
`
`
`
`
`
`
`
`(SEGA games)”, p. 9 (March 1994). In essence, the systems
`
`
`
`
`
`
`
`
`
`
`of the future integrate paper and electronic mediums.
`
`
`
`
`
`
`
`
`Therefore,
`there is a need in the art to provide an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`automated information management and sectnity system
`which would be compatible with the present office
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`technology, yet would be compatible with potential inte-
`grated oflice equipment, networks, and architectures of the
`
`
`
`
`
`
`
`future.
`
`
`
`The present invention provides an information manage-
`
`
`
`
`
`ment and security system which overcomes the shortcom-
`
`
`
`
`
`
`
`ings of the known systems providing various advantages
`
`
`
`
`
`
`
`
`such as instantaneous, multiple secure access(es) and mini-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`mizing the total “life-cycle” costs of managing “secure”
`information (from inception to destruction) utilizing present
`
`
`
`
`
`
`
`technology while being also compatible with new technol-
`
`
`
`
`
`
`
`ogy contemplated for the future. Also provides for transac-
`
`
`
`
`
`
`
`
`tion database services such as archiving, historic usage
`
`
`
`
`
`
`
`trends, transaction reporting/abstracting (user-definable) ser-
`
`
`
`
`vices.
`
`
`
`
`SUMMARY OF THE INVENTION
`
`
`
`
`It is in View of the above problems that the present
`
`
`
`
`
`
`
`
`
`
`
`invention was developed. The invention is a closed loop
`
`
`
`
`
`
`
`
`
`information management and security system which pro-
`
`
`
`
`
`
`vides a secure end-to-end and automated solution for con-
`
`
`
`
`
`
`
`
`trolling access, transmission, manipulation, auditability con-
`
`
`
`
`
`trol of classified, mission-critical, high-value information
`
`
`
`
`
`managed by DOD, National Security Agency, other Federal
`
`
`
`
`
`
`
`
`
`
`
`
`Agencies, businesses, and individuals respectively.
`The invention has both a generic core or kernel applicable
`
`
`
`
`
`
`
`
`
`to broad application domains, and a customization scheme
`
`
`
`
`
`
`
`
`(e.g., software, firmware) to support unique user-specific
`
`
`
`
`
`
`
`needs. In addition, the basic generic solution kernel of the
`
`
`
`
`
`
`
`
`
`
`present invention can be mapped onto existing MIS solu-
`
`
`
`
`
`
`
`
`tions for ease of upgrade or retrofit.
`
`
`
`
`
`
`
`The present invention allows information management to
`
`
`
`
`
`
`be “transaction based.” Each automatic information trans-
`
`
`
`
`
`
`action is built around a sequence such as a positive caller and
`
`
`
`
`
`
`
`
`
`
`recipient handshake and identification (“ID”), information
`
`
`
`
`
`
`upgrade (write) record, configuration control (date, time,
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 10
`
`3
`
`
`
`PAGE 10
`
`
`
`5,629,981
`
`
`
`
`
`
`
`10
`
`
`
`
`
`
`
`20
`
`
`
`25
`
`
`30
`
`
`
`
`35
`
`
`
`5
`
`in U.S. Pat. No. 5,053,774 to Schuermann et al., which is
`
`
`
`
`
`
`
`
`
`
`
`hereby incorporated by reference in its entirety.
`
`
`
`
`
`
`
`The RF reader means is preferably an RFID reader
`
`
`
`
`
`
`
`
`module which comprises a plug—in PC card having a com-
`
`
`
`
`
`
`
`
`
`munication antenna. an RF module, a control module, and 5
`
`
`
`
`
`
`
`
`
`input/out data means. Optionally, the RFID reader means
`
`
`
`
`
`
`
`
`comprise data packetization means, encryption means and
`
`
`
`
`
`
`
`bus control means.
`
`
`
`The invention provides an advantage by minimizing over-
`
`
`
`
`
`
`
`all life-cycle-cost to manage high value information from its
`
`
`
`
`
`
`
`
`
`inception to the end of its usefulness. The invention also
`
`
`
`
`
`
`
`
`
`
`provides an advantage by allowing real-time, dynamic clas-
`
`
`
`
`
`
`
`sification of information in case of a security breach or
`
`
`
`
`
`
`
`
`
`authorization changes (levels, users. time, place, etc.).
`
`
`
`
`
`
`
`Because the present invention is transaction-based, the
`
`
`
`
`
`
`
`invention also has important applications in “pay-per—use”,
`
`
`
`
`
`
`
`intelligent electrophotographic toner/development printer
`
`
`
`
`cartridges, and ink-jet and thermal transfer cassettes suitable
`
`
`
`
`
`
`
`
`for use in existing and emerging monochrome and color hard
`
`
`
`
`
`
`
`
`
`
`copy printing devices such as printers and copiers as well as
`
`
`
`
`
`
`
`
`
`
`
`information transmission/input devices such as telephones,
`
`
`
`
`
`
`pagers, facsimile machines or telecopiers, modems,
`
`
`
`
`
`
`scanners, etc.
`
`
`The unique system elements required to facilitate a pay-
`
`
`
`
`
`
`
`
`per-use type transaction record are a transponder, or reader,
`
`
`
`
`
`
`
`
`and external mass memory for transaction data storage in a
`
`
`
`
`
`
`
`
`
`peripheral network server and/or “ luggable” Integrated
`
`
`
`
`
`
`Circuit (“IC”) cards commonly referred to in the industry as
`
`
`
`
`
`
`
`
`
`
`flash cards or Personal Computer cards (“PC cards”) which
`
`
`
`
`
`
`
`
`
`conform to standards promulgated by the Personal Com-
`
`
`
`
`
`
`
`puter Memory Card International Association (“PCMCIA”).
`
`
`
`
`
`
`Further features and advantages of the present invention,
`
`
`
`
`
`
`
`
`as well as the structure and operation of various embodi-
`
`
`
`
`
`
`
`
`
`ments of the present invention, are described in detail below
`
`
`
`
`
`
`
`
`
`with reference to the accompanying drawings.
`
`
`
`
`
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`
`
`The accompanying drawings, which are incorporated in
`
`
`
`
`
`
`and form a part of the specification, illustrate the embodi-
`
`
`
`
`
`
`
`
`
`ments of the present invention and together with the
`
`
`
`
`
`
`
`
`
`description. serve to explain the principles of the invention.
`
`
`
`
`
`
`
`
`
`In the drawings:
`
`
`
`FIG. 1 illustrates a system architecture and partition block
`
`
`
`
`
`
`
`diagram of the present invention;
`
`
`
`
`
`
`FIG. 2 illustrates a typical secure transaction sequence in
`
`
`
`
`
`
`accordance with the present invention;
`
`
`
`
`
`FIG. 3a illustrates in greater detail a passive, user “read/
`
`
`
`
`
`
`
`
`write” type RFID badge suitable for the user segment of the
`
`
`
`
`
`
`
`
`
`
`information management and security system;
`
`
`
`
`
`FIG. 3b illustrates an “active” user RFID badge of FIG. 3a
`
`
`
`
`
`
`
`
`
`
`and a battery to enhance speed and range of the ID device
`
`
`
`
`
`
`
`
`
`
`
`and the transaction;
`
`
`
`FIG. 3c illustrates a reader “transceiver” module of the
`
`
`
`
`
`
`
`
`present invention;
`
`
`FIG. 4 illustrates one transaction packetization scheme
`
`
`
`
`
`
`suitable for use in said information management and secu-
`
`
`
`
`
`
`
`
`rity system; and
`
`
`
`FIGS. 5A and 5B illustrate a general hardware layout in
`
`
`
`
`
`
`
`
`
`a specific high-value printing cartridge refurbishment appli-
`
`
`
`
`
`
`cation of said information management and security system.
`
`
`
`
`
`
`
`
`
`FIG. 6 illustrates a specific application of said information
`
`
`
`
`
`
`
`management and security system utilizing technology from
`
`
`
`
`
`
`
`the cellular communications industry.
`
`
`
`
`FIG. 7 illustrates a planned computer based system which
`
`
`
`
`
`
`
`
`allows electronic signal interaction between various network
`
`
`
`
`
`
`
`devices.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`40
`
`45
`
`
`
`
`
`50
`
`55
`
`
`
`
`
`
`
`65
`
`
`PAGE 11
`
`
`6
`DETAILED DESCRIPTION OF THE
`
`
`
`PREFERRED EMBODIMENTS
`
`
`
`
`
`Referring to the accompanying drawings in which like
`
`
`
`
`
`
`
`
`reference numbers indicate like elements, FIG. 1 and FIG. 2
`
`
`
`
`
`
`
`
`
`
`illustrate one general system block diagram for the present
`
`
`
`
`
`
`
`
`
`invention while FIGS. 3a, 3b, and 3c depict certain hardware
`
`
`
`
`
`
`
`
`
`
`elements which may be used in the present invention.
`
`
`
`
`
`
`
`
`
`To provide an overview, in its most generic sense, the
`
`
`
`
`
`
`
`
`
`
`present invention comprises an RFID means and a radio
`
`
`
`
`
`
`
`
`
`frequency reader (“RF reader”) means which associated
`
`
`
`
`
`
`
`with a terminal device or other equipment such as a lock
`
`
`
`
`
`
`
`
`
`
`
`mechanism, wherein said RF reader means automatically
`
`
`
`
`
`
`
`
`interrogates said RFID means which responds by broadcast-
`
`
`
`
`
`
`ing identification so that said RF reader means identifies and
`
`
`
`
`
`
`
`
`
`
`verifies authorization of the RFID means and either stores a
`
`
`
`
`
`
`
`
`
`
`record of the transaction or communicates a record of the
`
`
`
`
`
`
`
`
`
`
`transaction to a server database prior to allowing access to
`
`
`
`
`
`
`
`
`
`
`the terminal device or other equipment.
`
`
`
`
`
`
`The present invention may be viewed from a transaction
`
`
`
`
`
`
`
`
`standpoint Each transaction is enabled by the hardware
`
`
`
`
`
`
`
`
`comprising an intelligent identification means, a reader
`
`
`
`
`
`
`
`means, and network host hardware. The transaction is also
`
`
`
`
`
`
`
`
`
`enabled by transaction management software that defines
`
`
`
`
`
`
`
`initial handshakes, sequences and packetization scheme(s)
`
`
`
`
`
`
`for identification and authentication. Further, each transac-
`
`
`
`
`
`
`tion will carry a date and time stamp and optionally carry a
`
`
`
`
`
`
`
`
`
`
`location stamp which provides auditability and traceability.
`
`
`
`
`
`
`
`These stamps may be dynamically and automatically created
`
`
`
`
`
`
`
`
`inside each reader module.
`
`
`
`
`Accordingly, the present invention comprises three seg-
`
`
`
`
`
`
`ments: a user segment, an equipment or facility segment,
`
`
`
`
`
`
`
`
`
`and a multi—user or site network segment
`
`
`
`
`
`
`
`The user segment is comprised of individuals wishing to
`
`
`
`
`
`
`
`
`
`send and receive information such as secure documents. For
`
`
`
`
`
`
`
`
`
`the user segment, the present invention requires intelligent
`
`
`
`
`
`
`
`
`identification means, preferably RFID means as stated
`
`
`
`
`
`
`
`above. The RFID means may be any device which allows
`
`
`
`
`
`
`
`
`
`
`positive identification of the wearer and which provides an
`
`
`
`
`
`
`
`
`
`ability to communicate with the single or multiple host!
`
`
`
`
`
`
`
`
`
`network equipment(s) or facility segrnent(s).
`
`
`
`
`
`The term “terminal device” is broadly defined as any type
`
`
`
`
`
`
`
`
`
`
`of electronic equipment or hardware, e.g. printer, copier,
`
`
`
`
`
`
`
`
`pager, pers