throbber
United States Patent
`
`[191
`
`[11] Patent Number:
`
`5,629,981
`
`Nerlikar
`
`[45] Date of Patent:
`
`May 13, 1997
`
`US00562998 IA
`
`[54]
`
`INFORMATION MANAGEMENT AND
`SECURITY SYSTEM
`
`[75]
`
`Inventor: Vlrupax M. Nerlikar. Plano. Tex.
`
`[73] Assignee: Texas Instruments Incorporated,
`Dallas. Tex.
`
`[21] Appl. No.: 283,081
`
`[22] Filed:
`
`Jul. 29, 1994
`
`Wall StreetJournal. WilliamM Bulkeley, “Get ready for the
`‘smart cards’ in health care”, May 1993, one page.
`Wall Street Journal, John .1. Keller, “Bells and whistles turn
`beepers into data receivers”, Sep. 1993 two pages.
`Wall Street Journal, William M. Bulkeley, “Someday, Cards
`May Make Coins Obsolete (smart cards may replace coin
`usage)”, May 1993, one page.
`
`Standard Register, Advertisement—High Tech Document
`Security Video. Jul.—Aug. 1993.
`
`HML 9/00
`Int. Cl.‘
`[51]
`380/25; 380/23; 340/825.34
`[52] US. Cl.
`[58] Field ofsearch .................... 380/23-25; 340/825.34
`
`Primary Examiner—Salvatore Cangialosi
`Attome); Agent, orFirm—Ira S. Matsi1;lames C. Kesterson;
`Richard L. Donaldson
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3/1986 Dieifns ....................... 380/23
`4,575,621
`9/1987 Wirstmmet al. ......................... 380/23
`4,691,355
`11/1988 Ldbholz et al. .......................... 380/25
`4,783,798
`4/1989 Cargileetal.
`.................... 380/23
`4,819,267
`5,053,774 10/1991
`342/44
`
` 5,153,918 10/1992
`
`5,310,999
`5,319,711
`5,339,073
`5,508,692
`
`5/1994
`6/1994
`8/1994
`4/1996
`
`OTHER PUBLICATIONS
`
`“Software GiantAiming atthe Oflice,” New York Times, Jun.
`8, 1993, p. C1.
`Hardcopy Observer; Published by Lyra Research, ‘Microsoft
`at Work’, vol. III, No. 7, Jul, 1993, pp. 31-39.
`Hanicopy Observer; “Microsoft at Work to go Home?'', vol.
`IV, No. 3, Mar., 1994, p. 9.
`Hanicopy Observer; “Microsoft Gears Up to Supply at Work
`Print Software to OEM", vol. N, No. 2. pp. 30-32.
`Fite, Jr., Franklin. ‘The PC Adopts an Embedded Positio ”,
`Electronic Ehgineering Times, Apr. 25, 1994, p. 46.
`
`[57]
`
`ABSTRACT
`
`A closed loop, (networked) information management and
`security system which provides a secure, end-to—end fully
`automated solution for controlling access,
`transmission,
`manipulation, and auditability of high value information
`comprising an RFID transponder badge 302 and an RF
`reader transceiver 315 which is associated with a host
`
`peripheral or a network. The RF reader transceiver 315
`automatically identifies and verifies authorization of the
`RFID transponder badge holder via a “handshake” pior to
`allowing access to the host pen'pheraL The energy generated
`by the transmission of the interrogation signal from the RF
`reader means 315 provides a pow: source which is accu-
`mulated and then used to activate a transponder 304
`response from the RFID transponder badge 302. The RF
`readu/transceiver 315 writes the access transaction on either
`the RFID transponder badge 302 and/or the host peripheral
`database or the network controller. Alternatively, the RF
`reader means 315 may be associated via network server with
`a LAN, WAN. or MAN. Optionally, an RFID badge 302::
`may be powered by an independent power source such as a
`flatpak battery 314.
`
`42 Claims, 7 Drawing Sheets
`
`MA/couu nus
`
`
`
`'nmm£n' HOST ml/sw
`ADD-011 AND/OR RESIDENI If/I/SW (SOIE ll001Fl(‘ATION)
`
`PLUG-IN BOARDS AND/OR
`PCHCIA CARDS (RFID REAKR. KIM?)
`
`PAGE 1
`
`SECURUS EXHIBIT 1004
`
`PAGE 1
`
`SECURUS EXHIBIT 1004
`
`

`
`U.S. Patent
`
`May 13, 199“?
`
`Sheet 1 of 7
`
`5,629,981
`
`fi_._._oEz8kwmuuunu
`
`
`xm_o,.$._.m_zE28:t.1.o_oo._+n“.“.
`
`.$>Em232:8EmmsoE.%:
`
`
`
`...I_:.__8mmaam
`
`K\\\\\\\\\\\\\
`
`\.\\\N_\\\\\\
`
`\\\\\\\\\\\
`
`'\\\\\\'\'\'s'\\'\\\
`
`m_..,2_._wa25..
`
`\\‘q\\\\\\\\\\\‘
`\\\\\\\\\\\\\\
`\\\\\\\\\\\\\\
`\\’\\'\\'\\\\.\\\
`\\\\x\\\\\\\
`\\\\\\\'\\.\\\
`.I.lJ
`\\\\\\\\\\\\
`uxxi»
`\\~.\u_|
`c2\\\\\\\\\x5x
`\\\\\\\\\\\\
`\\\\\\\\\\\\
`\\\\\k\\\\\\
`\\\\\\\\\\\\\
`\’\\\.\\\\\\\\.\
`\\\\\\\\\\\\\
`\\\\\\\\\\\\\\
`
`.._.u\\\.\
`$\\:
`
`\\\u1\\\\\\
`
`\\\\\\\\\\\\
`
`zo=5_;:_E.<33..a§_.,“uwwfifi”2.525_.,E_a.38+“..mmmmmmmwmM...
`
`
`
`
`A25;.3“;~_ommuo$-._.._M§_,__<%aH
`
`
`
`
`.\\\\\\x\\\\\\\..\\\\\\\\x\\\
`
`
`
`Innuunuuu
`
`uz_mB8EzoE<mz._EIIzoEmo._ma-
`
`
`
`
`n__._v_m_o......E.._\m_._.ozwm..zo_B<m_,_<E..§o._>mo_._>m..._zz:m\w.=<EozE.5<mz<m._.mmowmmmzmmwmqmmaz_mmooE
`
`
`
`
`
`
`
`
`
`%>__,_<mezom233;
`
`
`
`
`
`am}:so:.8oBmE.
`
`
`
`£5332.._eo__8.m~_.m.._m._-
`
`
`
`mg255%mzoEozoma-§mEEa_,_.__xpa-
`
`PAGE 2
`
`

`
`U.S. Patent
`
`May 13,1997
`
`Sheet 2 of’?
`
`5,629,981
`
`emmEfizmm
`
`BEH._>_uHEea..E§a..
`
`:2:2.22
`
`
`
`
`
`o_.._.._<~=m§_u<..._..¢._.<n_..
`
`%
`
`
`
`réagLm§§m_.
`
`
`
`;E_n_s8u>_§m.
`
`E<zo:.:mMa25mam:._.~_um_m=:.5Hmm.H_..L_
`
`..m_.__mo._._..mo.._@2853_
`
`1'|Il'lIJ
`
`
`
`aEa_n__..m_~_@m._e,mmEm:
`
`2.2.52...?
`
`253mass
`
`
`
`22.3\-II--Illili-\m.E.n__._¢>zoE_§Ez_
`
`
`
`
`H<e._<>..um._:s_mz<Ezo_E,_~.Ez_m_N_._<Ez_1%
`,_u..h_.%__.._._Eaaozé.$0.5.§%m\wfifi@
`
`
`
`
`m_m§5§._
`
`PAGE 3
`
`

`
`
`U.S. Patent
`
`
`
`May 13, 1997
`
`
`
`
`
`Sheet 3 of 7
`
`
`
`
`5,629,981
`
`
`
`
`
`
`
`
`
`M2
`
`
`
`
`
`
`FIG. 3B \/314
`PACK15BATTERY
`‘-\‘~L:R
`
`BADGE
`
`
`
`
`
`
`
`
`
`PAGE4
`
`PAGE 4
`
`

`
`U.S. Patent
`
`5,629,981
`
`AUTHORIZED USER
`ID, DESTINATION(S)
`on RECIPIENT(S)
`IDs
`
`MAX SECURITY
`CLASSIFICATION CODE
`
`TRANSACTION DATE/
`TIME/LOCATION STAMP
`
`AUTHORIZED BROADCAST
`MSG IDs
`
`SECONDARY ID CODE/BIO
`SIGNATURE ADDRESS IN
`SERVER DATABASE
`
`OTHER SENSOR INPUTS
`
`PAYLOAD
`(ACTUAL INFO CONTENT)
`
`CONFIG CONTROL
`
`REVISION CONTROL
`
`ERROR BITS
`
`PRIORITY BITS
`
`ACKNOWLEDGE
`
`omen NEIVIORK CONTROL
`(DBMS UPLINK/DOWNLINK)
`
`FIG. 4
`
`PAGE 5
`
`

`
`U.S. Patent
`
`MULT-USER
`
`NETWORK SERVER
`'
`502
`
`5,629,981
`
`HOST
`PERIPHERAL
`505
`
`READER
`MODULE
`
`508
`
`EP INTELLIGENT
`CASSETTE
`51 0
`
`REFURBISH EQUIPMENT
`
`EP INTELLIGENT
`CASSETTE
`510
`
`PAGE 6
`
`

`
`U.S. Patent
`
`May 13, 1997
`
`Sheet 5 of 7
`
`5,629,981
`
`
`
`
`
`
`
`
`
`83....55>..mzo_.a>_53._H<e_8.mafia.
`
`
`
`39..m=,_.=m_mm...E55._<z_o....m_n_.mm$9;
`
`mamas:28dzomfia.
`E3823m.az=._~Eéa._mo.
`
`
`
`=2:§.aE.,_8.
`
`
`
`ui1a|8aE:5...Efiemm
`
` mafia¢_a__f_:_a_an_m__am_muazamx2...ll EaEoémom__,_oE
`
`
`
`
`
`flu
`
`E52o=_m&
`2.53.:
`
`6%.
`
`~-_QMbrim.
`
`oz_a§m\mE____§
`
`Examéosmz
`
`8uV:2_amQm5uuBEo
`
`
`
`zefim.W_.mEbm<m
`
`seamo5m§E
`3_.m_,__.=ao3¢.§_=._l.|lmflqI8us.
`
`wfizzem8.9Ea...55%..
`
`
`5225m_m§..§_zo_§az._.E_.
`%EEE_.__§_>m.Eozmm.
`
`
`aE9..Ezox&E
`
`PAGE 7
`
`

`
`%§_mm_=%.._
`
`m_._2_5=n_n_<
`
`U.S. Patent
`
`May 13, 1997
`
`Sheet 7 of 7
`
`aim92.3%.veg...255....2
`
`E
`
`
`
`ms:zo=5:&..
`
`m§.mm_.._8.2.
`
`mz2E:&___
`
`
`
`wE_..._.m_a$.E___.§=5.17
`E552.25%
`
`$8_.___..,
`
`m_.,=_.,__E"8
`
`mzo:....u_._n_n_<ms:zo=5=&.__mama:as...9...._s:s_§.__\
`
`
`
`
`
`
`
`ma___.525ms:_s:5:n_n_,__$953:5.9..\mzo___§a&//\<;.mm_m_m_fi~,__.&_m_m_.m_z<u=_a%.§_E
`
`
`
`§_e§m.,._s._..,.Ez_32.“...rE:zo_=a:&¢e:3ass.E52...
`m5..,_%~_mmH_W._W_,__.h__mwmn_585$m$.,_~_h_R.E:z¢._.=a_:%
`
`
`
`K:3E3%>_z.._
`=55%_§_n_owezo:3:&.__\1=5.2
`
`
`
`
`
`
`
`mzo=._o:&.__Ema2__§E¢m_s=§§__
`
`
`
`o:aw_m-%n__,E..Tm_._:_§_5E%u_w__wWmu_%m%§
`
`
`
`u_h__a._m-x8_.Evia;.5.m_m¢mm_:aim2E§%u_..__H.Em1mogzu>mu_o>J...
`
`
`
`
`
`PAGE 8
`
`

`
`5,629,981
`
`
`
`
`
`
`1
`INFORMATION MANAGEMENT AND
`
`
`
`SECURITY SYSTEM
`
`
`BACKGROUND OF THE INVENTION
`
`
`
`1. Field of the Invention
`
`
`
`
`
`The present invention relates to a complete, end-to-end,
`
`
`
`
`
`
`
`
`automatic transaction control/monitoring method for
`
`
`
`
`
`transmitting. under variable and high levels of security,
`
`
`
`
`
`
`
`
`high-value business, personal, or Federal/military
`
`
`
`
`
`information, on a real or near real-time basis.
`
`
`
`
`
`
`
`
`2. Related Art
`
`
`
`A “secure document” or “secure information” is any
`
`
`
`
`
`
`
`
`document media (paper, disc, Voice, video, etc.) containing
`
`
`
`
`
`
`
`
`U.S. classified documents or information (i.e. “confidential,”
`
`
`
`
`
`
`
`“secret,” “top secret.” etc.), business-sensitive, proprietary
`
`
`
`
`
`
`documents or information. highly personal documents or
`
`
`
`
`
`
`
`information, and any document or infonnation where lirn-
`
`
`
`
`
`
`
`ited and fully controlled/auditable access is desired.
`
`
`
`
`
`
`
`If an individual wishes to send a secure document via
`
`
`
`
`
`
`
`
`
`
`telefacsimile, for example, the current method of sending
`
`
`
`
`
`
`
`
`such a secure document is to call the receiving end and
`
`
`
`
`
`
`
`
`
`
`
`somehow make sure by voice communication that the
`
`
`
`
`
`
`
`
`intended, authorized recipient is standing at the other end at
`
`
`
`
`
`
`
`
`
`
`the receiving telefacsimile. Once the identity and proximity
`
`
`
`
`
`
`
`
`to the receiving telefacsirnile of the intended recipient
`
`
`
`
`
`
`
`
`(mainly, via voice familiarity) is verified, the sending indi-
`
`
`
`
`
`
`
`
`vidual sends the document. After sending,
`the intended
`
`
`
`
`
`
`
`
`recipient provides confirmation to the sending individuals
`
`
`
`
`
`
`
`that the document was printed and received.
`
`
`
`
`
`
`
`The same limited security procedure is followed when
`
`
`
`
`
`
`
`printing information from an electronic database to a remote
`
`
`
`
`
`
`
`conventional printer or other terminal device.
`
`
`
`
`
`
`Thus, current hardware and systems involve limited or no
`
`
`
`
`
`
`
`
`automation in handling such secure documents or informa-
`
`
`
`
`
`
`
`tion on both a local and network basis. The systems and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`procedures currently available are mainly “person(s)-in—the-
`loop” systems which require certain labor-intensive actions
`
`
`
`
`
`
`
`and a high degree of manual coordination to achieve a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`limited “secure” operation. The labor-intensive aspect of this
`coordination procedure greatly increases the duration and
`
`
`
`
`
`
`
`
`costs of transmission while it decreases productivity.
`
`
`
`
`
`
`Therefore. there is a need in the art to provide a method of
`
`
`
`
`
`
`
`
`
`
`
`
`
`transmitting secure documents in a way which does not
`
`
`
`
`
`
`
`
`
`require such labor-intensive manual assistance.
`
`
`
`
`
`It is noted that some islands of automation are available,
`
`
`
`
`
`
`
`
`
`
`but no end-to-end automation, with full auditability and
`
`
`
`
`
`
`
`
`real-time or near real-time control. Current systems such as
`
`
`
`
`
`
`
`
`
`a secure telephone unit (“STU”) or STU facsimile machines
`
`
`
`
`
`
`
`
`
`assure no illegal
`tapping or eavesdropping but do not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`guarantee that the caller, recipient, or group is positively
`identified or is an authorized user or recipient. The positive
`
`
`
`
`
`
`
`
`
`
`identification and verification of authorization is always
`
`
`
`
`
`
`
`performed manually. Thus, there is a need for end-to-end
`
`
`
`
`
`
`
`
`
`automation, with full auditability and real-time or near
`
`
`
`
`
`
`
`
`real-time control of the transmission of secure documents
`
`
`
`
`
`
`
`
`and information.
`
`
`A similar problem occurs in handling secure documents
`
`
`
`
`
`
`
`
`and secure information relating to work for various Federal
`
`
`
`
`
`
`
`
`
`agencies, including, U.S. Department of Defense (DOD).
`
`
`
`
`
`
`
`Secure documents and information are often located in a
`
`
`
`
`
`
`
`
`
`special file cabinet fitted with a piece of securing hardware,
`
`
`
`
`
`
`
`
`
`e.g., a number lock or combination lock, which is approved
`
`
`
`
`
`
`
`
`
`by the DOD. Every time the file cabinet is entered, the
`
`
`
`
`
`
`
`
`
`
`
`entering individual must manually enter a myriad of infor-
`
`
`
`
`
`
`
`mation into a log such as: which document was used; who
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 9
`
`
`
`
`
`
`
`
`
`
`2
`handled it; date; time; and what was done with the document
`
`
`
`
`
`
`
`
`
`
`
`(i.e. document was copied; document was sent to another
`
`
`
`
`
`
`
`
`
`individual at another site). The DOD requires auditing and
`
`
`
`
`
`
`
`
`
`notification at the end of each month of all the people who
`
`
`
`
`
`
`
`
`
`
`
`
`handled each secure document. At the very least, the DOD
`
`
`
`
`
`
`
`
`
`
`requirements compel manual compilation of all the logs
`
`
`
`
`
`
`
`
`which is extremely tedious and costly.
`
`
`
`
`
`
`Therefore, there is a need in the art to provide a cost-
`
`
`
`
`
`
`
`
`
`
`
`effective automatic auditing and monitoring capability
`
`
`
`
`
`
`which also provides electronic time, date and place identi-
`
`
`
`
`
`
`
`
`fication stamps.
`
`
`Further, these specially secured file cabinets are often
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`grouped in secure rooms that have doors secured by special
`locks. Upon entry into the room, an additional log must be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`maintained to provide notification and accounting to the
`DOD. This additional step also creates additional delay in
`
`
`
`
`
`
`
`
`effective work time and greatly increases costs.
`
`
`
`
`
`
`
`Therefore. there is a need in the art to provide a cost-
`
`
`
`
`
`
`
`
`
`
`
`efl’ective automatic room security which mechanizes the
`
`
`
`
`
`
`room access logs and thereby decreasing costs and increas-
`
`
`
`
`
`
`
`
`ing productivity.
`
`
`Exacerbating the foregoing problems. in order to copy
`
`
`
`
`
`
`
`
`certain secret government documents, only certain “secure”
`
`
`
`
`
`
`
`or tempest class copiers may be used so that the copier OPC
`
`
`
`
`
`
`
`
`
`
`
`
`drum may be cleared after copying and cartridges may be
`
`
`
`
`
`
`
`
`
`
`disposed of by only authorized personnel. Before these
`
`
`
`
`
`
`
`
`copies are made, a log sheet must be completed providing
`
`
`
`
`
`
`
`
`
`
`the details of the copying of the document. This creates yet
`
`
`
`
`
`
`
`
`
`
`
`another labor-consurning delay that increases costs and
`
`
`
`
`
`
`
`decreases productivity. In fact, access logs and usage data
`
`
`
`
`
`
`
`
`
`are generally maintained manually for secure facilities,
`
`
`
`
`
`
`
`information handling equipment, and users.
`
`
`
`
`
`to provide an
`Therefore,
`there is a need in the art
`
`
`
`
`
`
`
`
`
`
`
`automatic information management and security system
`
`
`
`
`
`
`which eliminates the time inefiiciencies and waste associ-
`
`
`
`
`
`
`
`ated With manual logging and tracldng of copies of high-
`
`
`
`
`
`
`
`
`
`value, secret documents.
`
`
`
`Underlying the entire system is the fact that it is up to the
`
`
`
`
`
`
`
`
`
`
`
`
`employees and security personnel to verify whether a par-
`
`
`
`
`
`
`
`ticular individual has a secret clearance, badge code number,
`
`
`
`
`
`
`
`
`or some other indicia of authorization and identification.
`
`
`
`
`
`
`
`
`Therefore, to prevent improper access, manual or personal
`
`
`
`
`
`
`
`
`direct intervention is required to verify both authorization
`
`
`
`
`
`
`
`
`and need to know in order to prevent improper and unau-
`
`
`
`
`
`
`
`
`
`
`thorized transfer of secure documents. The verification by
`
`
`
`
`
`
`
`employees diverts resources from productive activity. The
`
`
`
`
`
`
`verification by security personnel results in additional salary
`
`
`
`
`
`
`
`or expense overhead.
`
`
`
`Therefore, there is a need in the art to provide a system
`
`
`
`
`
`
`
`
`
`
`
`which greatly reduces the need for manual intervention to
`
`
`
`
`
`
`
`
`prevent unauthorized transfer of secure, proprietary and
`
`
`
`
`
`
`personal documents.
`
`
`On a related matter, when an individual’ s authorization is
`
`
`
`
`
`
`
`
`revoked and the individual gains unauthorized access to
`
`
`
`
`
`
`
`
`secure documents a security breach occurs. When this
`
`
`
`
`
`
`
`
`security breach is manually detected, it is impossible to
`
`
`
`
`
`
`
`
`
`infonn all the employees and/or security personnel of the
`
`
`
`
`
`
`
`
`
`breach in a timely fashion in order to insure manual inter-
`
`
`
`
`
`
`
`
`
`
`vention. In a large company, timely notification and com-
`
`
`
`
`
`
`
`
`munication of the changing authorizations of employees is
`
`
`
`
`
`
`
`
`relatively impossible. This is because authorization has
`
`
`
`
`
`
`
`traditionally been carried in the form of a color—coded badge
`
`
`
`
`
`
`
`
`
`or the like. As a result, if the security of a document has been
`
`
`
`
`
`
`
`
`
`
`
`
`breached by use of an authorization which has been termi-
`
`
`
`
`
`
`
`
`
`nated or forged, an entire month or more could pass before
`
`
`
`
`
`
`
`
`
`
`the monthly DOD audit discovers the security breach.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 9
`
`

`
`5,629,981
`
`
`
`4
`
`
`location and revision stamp), creation of a transaction sum-
`
`
`
`
`
`
`
`marizing “communication data stream” (e.g., ATM cell,
`
`
`
`
`
`
`
`frame) packet, destination ID, additional authentication
`
`
`
`
`
`
`(e.g., voice signature, biographical identification), send and
`
`
`
`
`
`
`
`
`receive date/time, location stamp, etc. The host computer,
`
`
`
`
`
`
`
`
`network server or network controller maintains this “trans-
`
`
`
`
`
`
`
`action” log automatically and dynamically maintains infor-
`
`
`
`
`
`
`mation authorization, usage, movement, and an upgrade]
`
`
`
`
`
`
`
`change log and foils any unauthorized access or tampering
`
`
`
`
`
`
`
`
`
`and does any real-time reclassification or declassification as
`
`
`
`
`
`
`
`
`required. As such, this is a “transaction” based system that
`
`
`
`
`
`
`
`
`
`can be enhanced to add fault
`tolerance, redundancy,
`
`
`
`
`
`
`
`
`software-based access control algorithm creation, etc.
`to
`
`
`
`
`
`
`
`provide a flexible system.
`
`
`
`
`Briefly, in its most generic sense, the present invention
`
`
`
`
`
`
`
`
`
`comprises a read/write type radio frequency identification
`
`
`
`
`
`
`
`
`(‘‘RFID’’ Radio Frequency, InfraRed or optical) means
`
`
`
`
`
`
`(transponder) and a radio frequency (transceiver) reader
`
`
`
`
`
`
`
`
`(“RF reader”) means which is associated with a host periph-
`
`
`
`
`
`
`
`eral or terminal device wherein the RF reader means pas-
`
`
`
`
`
`
`
`
`
`sively and automatically identifies and verifies authorization
`
`
`
`
`
`
`
`of the RFID means via a “handshake” prior to allowing
`
`
`
`
`
`
`
`
`
`
`access to the host peripheral or terminal device or an
`
`
`
`
`
`
`
`
`
`
`information network. Preferably, the RF reader means writes
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the complete transaction via a unique “packet”) on the RFID
`means, and/or the host peripheral or terminal or a network
`
`
`
`
`
`
`
`
`
`server device. In this fashion, the history of all transactions
`
`
`
`
`
`
`
`
`
`
`
`may be stored on the RFID means and/or host peripheral or
`
`
`
`
`
`
`
`
`
`
`terminal device. The present invention may be provided
`
`
`
`
`
`
`
`
`commercially in a “securitization kit” to upgrade existing
`
`
`
`
`
`
`
`
`
`
`
`
`equipment and information-handling facilities.
`
`In a second aspect of the present invention, the RF reader
`
`
`
`
`
`
`
`
`means is embedded, plugged-in, connected or associated
`
`
`
`
`
`
`with the host peripheral or terminal device. Once a trans-
`
`
`
`
`
`
`
`
`
`action is completed the RF reader means may record and
`
`
`
`
`
`
`
`
`
`
`write the transaction on the RF'l]) means, and/or the host
`
`
`
`
`
`
`
`
`
`
`peripheral or terminal device, and/or a server database
`
`
`
`
`
`
`
`
`connected or associated with the terminal device.
`
`
`
`
`
`
`
`Optionally, the RFID means may flnther include stored
`
`
`
`
`
`
`
`
`biological data in ROM such as digitized voice signature,
`
`
`
`
`
`
`
`
`
`retina scan, fingerprints, etc. and other analog sensors
`
`
`
`
`
`
`
`
`(temperature, humidity, pressure, etc.) as well as commer-
`
`
`
`
`
`
`
`cially available physical “position” sensors such as Global
`
`
`
`
`
`
`
`
`Positioning System (“GPS”), coastal navigation system
`
`
`
`
`
`
`(LORAN), or other satellite/magnetic based positioning
`
`
`
`
`
`
`
`system. As an added security feature the RFID means may
`
`
`
`
`
`
`
`
`
`include electronic hardware and/or software encryption
`
`
`
`
`
`
`means to statically and dynamically “encrypt” the autho-
`
`
`
`
`
`
`
`rized user identification code, information destination, trans-
`
`
`
`
`
`
`action location, time/date, configuration control, and sec-
`
`
`
`
`
`
`ondary biological user(s) identification.
`
`
`
`
`In a third aspect of the invention the RFID means may be
`
`
`
`
`
`
`
`
`
`
`
`coupled with an independent power source such as a battery.
`
`
`
`
`
`
`
`
`
`The RFID means may comprise an integrated ID, memory
`
`
`
`
`
`
`
`
`
`storage, and a communications device such as a Personal
`
`
`
`
`
`
`
`
`
`Computer card (“PC card”) which conforms to standards
`
`
`
`
`
`
`
`
`promulgated by the Personal Computer Memory Card Inter-
`
`
`
`
`
`
`
`
`national Association (“PCMCIA”) having an RF
`
`
`
`
`
`transponder, mass memory, 2-way communication port(s)
`
`
`
`
`
`
`and input/output data means. Optionally, the RFII) means
`
`
`
`
`
`
`
`
`has encryption device (Integrated Circuit) means to encrypt
`
`
`
`
`
`
`
`
`the output data. In addition, the RFID has unique biographi-
`
`
`
`
`
`
`
`
`
`cal information patterns in Read Only Memory (ROM) for
`
`
`
`
`
`
`
`
`
`“static” information and “dynamic” position, time, place,
`
`
`
`
`
`
`
`date information.
`
`
`In one preferred embodiment, the RFID means is elec-
`
`
`
`
`
`
`
`
`tronically similar to the “bullet” or flat-pack card disclosed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Therefore,
`there is a need in the art to provide an
`automated system for continuously updating comprehensive
`
`
`
`
`
`
`information about the authorizations of individuals, and to
`
`
`
`
`
`
`
`
`prevent unauthorized access to secure documents at the time
`
`
`
`
`
`
`
`
`
`access is attempted (real-time control).
`
`
`
`
`
`Transmission of secure information (documents, data,
`
`
`
`
`
`
`
`video, etc.) is even more of a concern, given flre planned
`
`
`
`
`
`
`
`
`
`
`office integration/automation Systems and Architectures
`
`
`
`
`
`(SW/HW) of the future; a la the ones announced by the
`
`
`
`
`
`
`
`
`
`
`
`Microsoft Corporation (“Microsoft-At-Work”, see FIG. 7),
`
`
`
`
`
`
`
`
`
`
`
`
`
`Adobe (‘‘Acrobat’’ for Print Documents). Apple Computer
`(“OCE”), General Magic (“Magic Cap”) etc. covering the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`emerging multi-media information management systems for
`
`
`
`
`
`
`
`
`
`oflice and home. For example, the Microsoft Corporation is
`working on a new project currently called “Microsoft at
`
`
`
`
`
`
`
`
`
`Wor ” which would allow a worker to Write a report and, by
`
`
`
`
`
`
`
`
`
`
`tapping a key, have 20 copies of the report printed, copied,
`
`
`
`
`
`
`
`
`
`
`
`and collated on one machine, thereby eliminating the step of
`
`
`
`
`
`
`
`
`
`
`having an individual take the report from the printer and take
`
`
`
`
`
`
`
`
`
`
`
`it to a photocopy machine where 20 copies are made. See
`
`
`
`
`
`
`
`
`
`
`
`“Software GiantAiming at the Oflice,” New York Times, Jun.
`
`
`
`
`
`
`
`
`
`
`8, 1993, p. Cl. See also, Hardcopy Observer, published by
`
`
`
`
`
`
`
`
`
`
`Lyra Research: Vol. 111, Number 7, “Microsoft at Work
`
`
`
`
`
`
`
`
`
`Oflice,” pp. 31-39 (July 1993); Vol.
`IV, Number 2,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`“Microsoft-at-Work Software,” p. 30 (February 1994); Vol.
`IV, Number 3, “Microsoft-at-Work For Home Entertainment
`
`
`
`
`
`
`
`(SEGA games)”, p. 9 (March 1994). In essence, the systems
`
`
`
`
`
`
`
`
`
`
`of the future integrate paper and electronic mediums.
`
`
`
`
`
`
`
`
`Therefore,
`there is a need in the art to provide an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`automated information management and sectnity system
`which would be compatible with the present office
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`technology, yet would be compatible with potential inte-
`grated oflice equipment, networks, and architectures of the
`
`
`
`
`
`
`
`future.
`
`
`
`The present invention provides an information manage-
`
`
`
`
`
`ment and security system which overcomes the shortcom-
`
`
`
`
`
`
`
`ings of the known systems providing various advantages
`
`
`
`
`
`
`
`
`such as instantaneous, multiple secure access(es) and mini-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`mizing the total “life-cycle” costs of managing “secure”
`information (from inception to destruction) utilizing present
`
`
`
`
`
`
`
`technology while being also compatible with new technol-
`
`
`
`
`
`
`
`ogy contemplated for the future. Also provides for transac-
`
`
`
`
`
`
`
`
`tion database services such as archiving, historic usage
`
`
`
`
`
`
`
`trends, transaction reporting/abstracting (user-definable) ser-
`
`
`
`
`vices.
`
`
`
`
`SUMMARY OF THE INVENTION
`
`
`
`
`It is in View of the above problems that the present
`
`
`
`
`
`
`
`
`
`
`
`invention was developed. The invention is a closed loop
`
`
`
`
`
`
`
`
`
`information management and security system which pro-
`
`
`
`
`
`
`vides a secure end-to-end and automated solution for con-
`
`
`
`
`
`
`
`
`trolling access, transmission, manipulation, auditability con-
`
`
`
`
`
`trol of classified, mission-critical, high-value information
`
`
`
`
`
`managed by DOD, National Security Agency, other Federal
`
`
`
`
`
`
`
`
`
`
`
`
`Agencies, businesses, and individuals respectively.
`The invention has both a generic core or kernel applicable
`
`
`
`
`
`
`
`
`
`to broad application domains, and a customization scheme
`
`
`
`
`
`
`
`
`(e.g., software, firmware) to support unique user-specific
`
`
`
`
`
`
`
`needs. In addition, the basic generic solution kernel of the
`
`
`
`
`
`
`
`
`
`
`present invention can be mapped onto existing MIS solu-
`
`
`
`
`
`
`
`
`tions for ease of upgrade or retrofit.
`
`
`
`
`
`
`
`The present invention allows information management to
`
`
`
`
`
`
`be “transaction based.” Each automatic information trans-
`
`
`
`
`
`
`action is built around a sequence such as a positive caller and
`
`
`
`
`
`
`
`
`
`
`recipient handshake and identification (“ID”), information
`
`
`
`
`
`
`upgrade (write) record, configuration control (date, time,
`
`
`
`
`
`
`
`
`
`
`
`
`
`PAGE 10
`
`3
`
`
`
`PAGE 10
`
`

`
`5,629,981
`
`
`
`
`
`
`
`10
`
`
`
`
`
`
`
`20
`
`
`
`25
`
`
`30
`
`
`
`
`35
`
`
`
`5
`
`in U.S. Pat. No. 5,053,774 to Schuermann et al., which is
`
`
`
`
`
`
`
`
`
`
`
`hereby incorporated by reference in its entirety.
`
`
`
`
`
`
`
`The RF reader means is preferably an RFID reader
`
`
`
`
`
`
`
`
`module which comprises a plug—in PC card having a com-
`
`
`
`
`
`
`
`
`
`munication antenna. an RF module, a control module, and 5
`
`
`
`
`
`
`
`
`
`input/out data means. Optionally, the RFID reader means
`
`
`
`
`
`
`
`
`comprise data packetization means, encryption means and
`
`
`
`
`
`
`
`bus control means.
`
`
`
`The invention provides an advantage by minimizing over-
`
`
`
`
`
`
`
`all life-cycle-cost to manage high value information from its
`
`
`
`
`
`
`
`
`
`inception to the end of its usefulness. The invention also
`
`
`
`
`
`
`
`
`
`
`provides an advantage by allowing real-time, dynamic clas-
`
`
`
`
`
`
`
`sification of information in case of a security breach or
`
`
`
`
`
`
`
`
`
`authorization changes (levels, users. time, place, etc.).
`
`
`
`
`
`
`
`Because the present invention is transaction-based, the
`
`
`
`
`
`
`
`invention also has important applications in “pay-per—use”,
`
`
`
`
`
`
`
`intelligent electrophotographic toner/development printer
`
`
`
`
`cartridges, and ink-jet and thermal transfer cassettes suitable
`
`
`
`
`
`
`
`
`for use in existing and emerging monochrome and color hard
`
`
`
`
`
`
`
`
`
`
`copy printing devices such as printers and copiers as well as
`
`
`
`
`
`
`
`
`
`
`
`information transmission/input devices such as telephones,
`
`
`
`
`
`
`pagers, facsimile machines or telecopiers, modems,
`
`
`
`
`
`
`scanners, etc.
`
`
`The unique system elements required to facilitate a pay-
`
`
`
`
`
`
`
`
`per-use type transaction record are a transponder, or reader,
`
`
`
`
`
`
`
`
`and external mass memory for transaction data storage in a
`
`
`
`
`
`
`
`
`
`peripheral network server and/or “ luggable” Integrated
`
`
`
`
`
`
`Circuit (“IC”) cards commonly referred to in the industry as
`
`
`
`
`
`
`
`
`
`
`flash cards or Personal Computer cards (“PC cards”) which
`
`
`
`
`
`
`
`
`
`conform to standards promulgated by the Personal Com-
`
`
`
`
`
`
`
`puter Memory Card International Association (“PCMCIA”).
`
`
`
`
`
`
`Further features and advantages of the present invention,
`
`
`
`
`
`
`
`
`as well as the structure and operation of various embodi-
`
`
`
`
`
`
`
`
`
`ments of the present invention, are described in detail below
`
`
`
`
`
`
`
`
`
`with reference to the accompanying drawings.
`
`
`
`
`
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`
`
`The accompanying drawings, which are incorporated in
`
`
`
`
`
`
`and form a part of the specification, illustrate the embodi-
`
`
`
`
`
`
`
`
`
`ments of the present invention and together with the
`
`
`
`
`
`
`
`
`
`description. serve to explain the principles of the invention.
`
`
`
`
`
`
`
`
`
`In the drawings:
`
`
`
`FIG. 1 illustrates a system architecture and partition block
`
`
`
`
`
`
`
`diagram of the present invention;
`
`
`
`
`
`
`FIG. 2 illustrates a typical secure transaction sequence in
`
`
`
`
`
`
`accordance with the present invention;
`
`
`
`
`
`FIG. 3a illustrates in greater detail a passive, user “read/
`
`
`
`
`
`
`
`
`write” type RFID badge suitable for the user segment of the
`
`
`
`
`
`
`
`
`
`
`information management and security system;
`
`
`
`
`
`FIG. 3b illustrates an “active” user RFID badge of FIG. 3a
`
`
`
`
`
`
`
`
`
`
`and a battery to enhance speed and range of the ID device
`
`
`
`
`
`
`
`
`
`
`
`and the transaction;
`
`
`
`FIG. 3c illustrates a reader “transceiver” module of the
`
`
`
`
`
`
`
`
`present invention;
`
`
`FIG. 4 illustrates one transaction packetization scheme
`
`
`
`
`
`
`suitable for use in said information management and secu-
`
`
`
`
`
`
`
`
`rity system; and
`
`
`
`FIGS. 5A and 5B illustrate a general hardware layout in
`
`
`
`
`
`
`
`
`
`a specific high-value printing cartridge refurbishment appli-
`
`
`
`
`
`
`cation of said information management and security system.
`
`
`
`
`
`
`
`
`
`FIG. 6 illustrates a specific application of said information
`
`
`
`
`
`
`
`management and security system utilizing technology from
`
`
`
`
`
`
`
`the cellular communications industry.
`
`
`
`
`FIG. 7 illustrates a planned computer based system which
`
`
`
`
`
`
`
`
`allows electronic signal interaction between various network
`
`
`
`
`
`
`
`devices.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`40
`
`45
`
`
`
`
`
`50
`
`55
`
`
`
`
`
`
`
`65
`
`
`PAGE 11
`
`
`6
`DETAILED DESCRIPTION OF THE
`
`
`
`PREFERRED EMBODIMENTS
`
`
`
`
`
`Referring to the accompanying drawings in which like
`
`
`
`
`
`
`
`
`reference numbers indicate like elements, FIG. 1 and FIG. 2
`
`
`
`
`
`
`
`
`
`
`illustrate one general system block diagram for the present
`
`
`
`
`
`
`
`
`
`invention while FIGS. 3a, 3b, and 3c depict certain hardware
`
`
`
`
`
`
`
`
`
`
`elements which may be used in the present invention.
`
`
`
`
`
`
`
`
`
`To provide an overview, in its most generic sense, the
`
`
`
`
`
`
`
`
`
`
`present invention comprises an RFID means and a radio
`
`
`
`
`
`
`
`
`
`frequency reader (“RF reader”) means which associated
`
`
`
`
`
`
`
`with a terminal device or other equipment such as a lock
`
`
`
`
`
`
`
`
`
`
`
`mechanism, wherein said RF reader means automatically
`
`
`
`
`
`
`
`
`interrogates said RFID means which responds by broadcast-
`
`
`
`
`
`
`ing identification so that said RF reader means identifies and
`
`
`
`
`
`
`
`
`
`
`verifies authorization of the RFID means and either stores a
`
`
`
`
`
`
`
`
`
`
`record of the transaction or communicates a record of the
`
`
`
`
`
`
`
`
`
`
`transaction to a server database prior to allowing access to
`
`
`
`
`
`
`
`
`
`
`the terminal device or other equipment.
`
`
`
`
`
`
`The present invention may be viewed from a transaction
`
`
`
`
`
`
`
`
`standpoint Each transaction is enabled by the hardware
`
`
`
`
`
`
`
`
`comprising an intelligent identification means, a reader
`
`
`
`
`
`
`
`means, and network host hardware. The transaction is also
`
`
`
`
`
`
`
`
`
`enabled by transaction management software that defines
`
`
`
`
`
`
`
`initial handshakes, sequences and packetization scheme(s)
`
`
`
`
`
`
`for identification and authentication. Further, each transac-
`
`
`
`
`
`
`tion will carry a date and time stamp and optionally carry a
`
`
`
`
`
`
`
`
`
`
`location stamp which provides auditability and traceability.
`
`
`
`
`
`
`
`These stamps may be dynamically and automatically created
`
`
`
`
`
`
`
`
`inside each reader module.
`
`
`
`
`Accordingly, the present invention comprises three seg-
`
`
`
`
`
`
`ments: a user segment, an equipment or facility segment,
`
`
`
`
`
`
`
`
`
`and a multi—user or site network segment
`
`
`
`
`
`
`
`The user segment is comprised of individuals wishing to
`
`
`
`
`
`
`
`
`
`send and receive information such as secure documents. For
`
`
`
`
`
`
`
`
`
`the user segment, the present invention requires intelligent
`
`
`
`
`
`
`
`
`identification means, preferably RFID means as stated
`
`
`
`
`
`
`
`above. The RFID means may be any device which allows
`
`
`
`
`
`
`
`
`
`
`positive identification of the wearer and which provides an
`
`
`
`
`
`
`
`
`
`ability to communicate with the single or multiple host!
`
`
`
`
`
`
`
`
`
`network equipment(s) or facility segrnent(s).
`
`
`
`
`
`The term “terminal device” is broadly defined as any type
`
`
`
`
`
`
`
`
`
`
`of electronic equipment or hardware, e.g. printer, copier,
`
`
`
`
`
`
`
`
`pager, pers

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket