Browse Prior Art Database

Unattended Computer Physical Security System

IP.com Disclosure Number: IPCOM000034376D
Original Publication Date: 1989-Feb-01
Included in the Prior Art Database: 2005-Jan-27
Document File: 1 page(s) / 11K

Publishing Venue

IBM

Related People

Wittmann, EG: AUTHOR [+2]

Abstract

Encoded cards are read by a proximity system to validate a potential user's authorization to use a protected computer system. To eliminate the vulnerability of a computer system to unauthorized use, a hidden proximity reader can be used to read encoded cards worn by potential system users. The reader has a defined operating range, approximately a five-foot radius, and cards within that range are read and signals are sent to a dedicated computer for user validation. Depending upon an accept or reject signal generated by the dedicated computer, enable or disable commands to either allow or block access to the protected system are transmitted. The security system is completely transparent to the user since the user never actively addresses the security system.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Unattended Computer Physical Security System

Encoded cards are read by a proximity system to validate a potential user's authorization to use a protected computer system. To eliminate the vulnerability of a computer system to unauthorized use, a hidden proximity reader can be used to read encoded cards worn by potential system users. The reader has a defined operating range, approximately a five-foot radius, and cards within that range are read and signals are sent to a dedicated computer for user validation. Depending upon an accept or reject signal generated by the dedicated computer, enable or disable commands to either allow or block access to the protected system are transmitted. The security system is completely transparent to the user since the user never actively addresses the security system. The encoded card can be integrated into a normal ID badge or worn separately, and when the user approaches the protected system (enters the operating range of the system), the reader reads the encoded badge, evaluates the input and either validates or invalidates the potential user's right to use the protected system. The hidden reader continuously reads and reevaluates the user's encoded card as long as it remains within the operating range. This allows the security system to provide additional protection by automatically disabling the protected system when the user leaves the operating range.

1