Managing content at a portable, content adjustable personal identification device

ABSTRACT

In one embodiment, at least one information control device manages the content displayed on multiple separate portable, content adjustable personal identification devices. The information control device automatically selects at least one content specification for transmission to any portable, content adjustable personal identification devices moving either into or out of a particular area delimited by a boundary secured by the information control device. The information control device then transmits the selected content specification for detection by portable, content adjustable personal identification devices, wherein the content specification directs display of identification content on each of the portable, content adjustable personal identification devices.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of commonly assigned U.S. patentapplication Ser. No. 11/466,169, filed Aug. 22, 2006, which is herebyincorporated herein by reference.

BACKGROUND OF THE INVENTION

1. Technical Field

The present invention relates in general to improved identificationsecurity. In particular, the present invention relates to managingcontent displayed on a portable, content adjustable personalidentification device based on a location of the portable, contentadjustable personal identification device.

2. Description of the Related Art

In many environments, having proper identification is important. Forexample, many businesses require that employees wear a badge while inthe workplace, where the badge includes a photo identifying the employeeand the employee's name and other identifying information. In anotherexample, students and teachers may be required to wear badges when oncampus grounds or in other areas where proper identification is requiredfor entry.

In addition, in many environments, having proper identification isimportant to gain access into particular areas. For example, badges mayalso include a bar code or radio-frequency identifier (RFID) chipencoded with identification information that is detectable by readerslocated at different security points. A business may place a badgereader at each employee entrance, where the reader detects each employeeidentification from the badge, determines whether the employee isauthorized to use the entrance, and controls access for that employee tothe entrance. In addition, a badge reader may detect each employee exita building so that the presence of a “badged” employee, within theworkplace, can be tracked.

When an employee or other person wearing identification leaves theenvironment where identification is required, that person or theemployer of that person may not want others seeing the identificationoutside the workplace. Further, many employers do not want employees tocall attention to their association to the employer in public. Thus,some employers will require employees to “debadge” when in public,however, many times, employees will forget to debadge or will decide toflip a badge over, in an effort to hide the identification printed onthe badge. Further, in other circumstances, an employee leaving asecured environment may not have a place to store the identification sothat it is not visible or accessible to others in the public arena.

Therefore, in view of the foregoing, it would be advantageous to providea method, system, and program for controlling the content output on aportable, content adjustable, personal identification device so that aperson's personal information is adjusted based on the area in which theperson is located with the identification device.

SUMMARY OF THE INVENTION

Therefore, the present invention provides improved identificationsecurity. In particular, the present invention provides for managingcontent displayed on a portable, content adjustable personalidentification device based on a location of the portable, contentadjustable personal identification device.

In one embodiment, at least one information control device manages thecontent displayed on multiple separate portable, content adjustablepersonal identification devices. The information control deviceautomatically selects at least one content specification fortransmission to any portable, content adjustable personal identificationdevices moving either into or out of a particular area delimited by aboundary secured by the information control device. The informationcontrol device then transmits the selected content specification fordetection by portable, content adjustable personal identificationdevices, wherein the content specification directs display ofidentification content on each of the portable, content adjustablepersonal identification devices.

In addition, the information control device may monitor at least onepoint along the boundary to detect a presence of a particular portable,content adjustable personal identification device, detect anidentification for a user associated with the particular portable,content adjustable personal identification device, and designate thecontent specification, based on the identification of the user, fortransmission to and controlling output of content displayed by theparticular portable, content adjustable personal identification device.In monitoring at least one point along the boundary, the informationcontrol device may monitor the boundary using a radio frequencyidentifier (RFID) reader that creates a radio frequency field anddetects the identification for the user from a radio frequencytransmission from the particular portable, content adjustable personalidentification device. In addition, in monitoring at least one pointalong the boundary, the information control device may monitor theboundary using a barcode scanner that reads the identification for theuser from a bar code affixed to the particular portable, contentadjustable personal identification device.

The information control device controls the size, shape, and location ofa boundary. In addition, the information control device may adjust theboundary based on a scheduled event within a particular area with aparticular selection of content specifications required for displaywithin the bounded area during the scheduled event.

A portable, content adjustable personal identification device receivinga content specification includes an input interface for receiving thecontent specification from at least one information control device, adisplay interface for displaying particular content as directed by theat least one content specification, and at least one processor forcontrolling the output of the selection of content according to the atleast one content specification on the display interface. In particular,the processor controls output of the selection of content according toat least one content specification by changing the displayed contentfrom a first selection of content to a second selection of content.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features believed characteristic of the invention are setforth in the appended claims. The invention itself however, as well as apreferred mode of use, further objects and advantages thereof, will bestbe understood by reference to the following detailed description of anillustrative embodiment when read in conjunction with the accompanyingdrawings, wherein:

FIG. 1 is a block diagram depicting one embodiment of an environment formanaging content at a portable, content adjustable personalidentification device;

FIG. 2 is a block diagram illustrating one embodiment of a networkenvironment for managing content at multiple portable, contentadjustable personal identification device;

FIG. 3 is a block diagram depicting an example of a computer system inwhich the present method, system, and program may be implemented;

FIG. 4, a block diagram illustrating one embodiment of a contentadjustable, portable identification device;

FIG. 5 is a block diagram depicting one embodiment of an ID securitydevice controller;

FIG. 6 is an illustrative diagram illustrating an interface throughwhich a user may adjust an identification selection rule;

FIG. 7 is a high level logic flowchart depicting a process and programfor controlling information output to an ID device at a boundary;

FIG. 8 is a high level logic flowchart illustrating a process andprogram for adjusting the content specifications for a boundary; and

FIG. 9 is a high level logic flowchart depicts a process and program forcontrolling information output at a boundary.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

Referring now to FIG. 1, a block diagram depicts one embodiment of anenvironment for managing content at a portable, content adjustablepersonal identification device. In the example, an identification (ID)device 120 is located within an area delineated by boundary 112 at afirst position 122. ID device 120 is a portable, content adjustableidentification device associated with a particular user, group of users,organization, or other entity, with a content adjustable interface 118.At first position 122, the content displayed within content adjustableinterface 118 includes a photo identification (ID) 130, a nameidentification (ID) 132, and a division (DIV) identification 134. Itwill be understood that additional or alternate types of content may bedisplayed within content adjustable interface 118 and thatidentification device 120 may include other content that is staticallydisplayed separate from content adjustable interface 118.

The area delineated by boundary 112 may be monitored by one or moreidentification security devices, such as identification (ID) securitydevice 110. In one example, ID security device 110 represents anidentification device checkpoint, at which a person must present anidentification device for entry and exit into the area delineated byboundary 112. In another example, ID security device 110 includes atleast one device reader for entry into the area delineated by boundary112 and a transmitter for transmitting a signal, detectable by valididentification devices, such as ID device 120, indicating the edge ofboundary 112 at one or more exit points from the area delineated byboundary 112. For example, ID security device 110 may includetransmitters at the exit points of a parking garage, such that theparking garage area is included within the area delineated by boundary112. In addition, ID security device 110 may provide a local networkconnectable by ID device 120, where the local network connectionincludes, but is not limited to, an infrared connection, a Bluetoothenabled connection, a wireless fidelity (Wi-Fi) connect, or a wiredlocal connection.

In addition, it is important to note, the area delineated by boundary112 may correspond with physical boundaries, such as doors, windows,walls, gates, and other physical structures, or may correspond withelectronically defined boundaries from the coverage area of atransmitter. Boundary 112 may include one or more entrance and exitpoints. In addition, it will be understood that while in the example,boundary 112 is represented by a circular area, in additional oralternate embodiments, boundary 112 may take on any shape, may includemultiple overlapping areas, may overlap with other boundaries, mayinclude breaks in coverage area.

In the example, as a person leaves the area delineated by boundary 112,ID device 120 detects from ID security device 110 that ID device 120 isleaving the area delineated by boundary 112 and ID device 120dynamically adjusts the content output within content adjustableinterface 118. For example, at a second position 124, outside boundary112, the content displayed within content adjustable interface 118includes photo identification 130, but the areas that previouslyincludes name identification 132 and division identifier 134, are nowblank. By removing name identification 132 and division identifier 134from content adjustable interface 118, the person carryingidentification device 120 can continue to carry identification device120, outside of the environment delineated by boundary 112, withoutproviding name and division information to persons outside the areadelineated by boundary 112. In an alternate example, instead of removingparticular types of content, identification device 120 may alter thedisplayed content to content including a fake identity or a covertidentity, for example.

Next, in the example, as the person reenters the area delineated byboundary 112, as represented by a third position 126, ID device 120detects from ID security device 110 that ID device 120 is entering thearea delineated by boundary 112 and ID device 120 dynamically adjuststhe content displayed on content adjustable interface 118 to includephoto identification 130, name identification 132 and divisionidentification 134. By adjusting the displayed content within contentadjustable interface 118 when a person reenters the area delineated byboundary 112, ID device 120 displays identifying information requiredfor a person carrying a badge within the area delineated by boundary112.

In one embodiment, ID device 120 stores the displayed content indiffering sets of identifying information to be displayed within contentadjustable interface 118 when ID device 120 detects that the device iswithin a particular type of boundary and detects that the device isleaving a particular type of boundary. In addition, differing sets ofidentifying information may be stored for differing types of boundaries,such that a person may use a single identification device that displaysdifferent types of identifying information in different environments.

In another embodiment, ID device 120 receives the content to bedisplayed within content adjustable interface 118 when ID securitydevice 110 detects ID device 120 entering or leaving the area delineatedby boundary 112. Alternative, ID device 120 receives an indicator of thetypes of identifying information required for the displayable contentfrom ID security device 110 when ID device 120 enters or exits the areadelineated by boundary 112.

It is important to note that while ID security device 110 is describedwith reference to a person carrying or wearing ID security device 110,it will be understood that ID security device 110 may be carried, worn,or otherwise affixed, temporarily or permanently, to a person or anyother identifiable, mobile entity.

With reference now to FIG. 2, a block diagram depicts one embodiment ofa network environment for managing content at multiple portable, contentadjustable personal identification device. In the example, a network 102communicatively connects multiple ID security devices 210, 220, and 230with a server 202. While in the embodiment server 202 is depicted as aseparate system from ID security devices 210, 220, and 230, it isimportant to note that server 202 may also be implemented as an IDsecurity device.

Server 202 includes an identification security device controller 204 fordirecting ID security devices 210, 220, and 230 what to communicate withcontent adjustable identification devices within different areas.Network 102 may include, but is not limited to, packet-switchingnetworks, such as the Internet or an intranet, and telephony networks.In particular, network 102 may include routers, switches, gateways, andother hardware to enable a communication channel between ID securitydevices 210, 220, and 230 and server 202.

In the example, ID security device 210 manages the security for IDdevices within an areas delineated by a boundary 212 and ID securitydevice 220 manages the security for ID devices within an area delineatedby boundary 222, where the area delineated by boundary 222 is a subsetof the area delineated by boundary 212. In addition, in the example, IDsecurity device 230 manages the security for ID devices within an areadelineated by boundary 232.

In one embodiment, ID security devices 210, 220 and 230, as directed byidentification security device controller 204, control output of datatransmissions indicating types of content to be displayed, which aredetectable by ID devices, wherein each ID device then selects fromlocally stored identification content for display within each separatecontent adjustable interface of each ID device. In addition, in anotherexample, as directed by identification security device controller 204,ID security devices 210, 220, and 230 may control output of datatransmissions that indicate the type of area being secured, wherein eachID device then selects from locally stored identification content fordisplay within the type of area identified.

In another embodiment, ID security devices 210, 220, and 230, asdirected by identification security device controller 204, detect anidentifier from an ID device entering or exiting a particular boundary,transmit the identifier to identification security device controller204, and receive the personalized identification content to be sent tothe ID device from identification security device controller 204. The IDsecurity device receiving personalized identification content transmitsthe personalized content to the respective ID device, wherein the IDdevice receiving personalized content controls display of thepersonalized content within the content adjustable interface of theidentification device.

In the example, a different selection of the total availableidentification content designated within each of boundaries 212, 222,and 232. For example, within the area delineated by boundary 212, asdirected by ID security device 210, ID devices 214, 216 and 218 includea photo and a name associated with each person entering the areadelineated by boundary 212. In addition, in the example, as the peoplewearing ID devices 216 and 218 enter the area delineated by boundary222, ID security device 220 directs identification devices 216 and 218to include a photo, name, and management level. In one example, aseparate color may be assigned to represent each management level andthe tinting of each identification device is adjusted to the colorrepresenting the management level of the device holder. Further, in theexample, as a person wearing ID device 214 travels between the areasdelineated by boundary 212 and boundary 232, ID security device 210directs ID device 214 to blank out any identification content within thecontent displayable interface, but as the person wearing ID device 210enters the area delineated by boundary 232, ID security device 230directs ID device 214 to display content including a photo identifyingthe device wearer.

As illustrated in the example, by enabling ID security devices toprovide data transmission directing identification devices to adjust thecontent displayed to identify a device holder, a business or otherentity may direct the adjustment of identification content on eachperson's ID device, via identification security device controller 204,at each individual checkpoint. In addition, by enabling ID securitydevices to transmit signals or information directing identificationdevices to adjust the content displayed to identify a device holder, abusiness or other entity may set rules to vary the content displayed ondifferent identification devices within a same bounded area. Forexample, identification security device controller 204 may specify moreinformation for display on the information devices of selected personsor groups of people.

In one example, the area delineated by boundaries 212 and 232 mayrepresent separate buildings, where employees must pass through a publicarea to go from building to building. In another example, a serviceprovider may issue an identification device that is controllable atmultiple locations, independent of the business or other entity thatprovides the area, such that the areas delineated by boundaries 212 and232 may represent areas in which the content displayed on ID devicesentering and exiting the areas is controlled by the service providerthrough communications between ID security devices 210 and 230 andidentification security device controller 204.

In another example, the area delineated by boundary 222 may be atemporary boundary, set up for a particular purpose, with particulartypes of content required within the temporary areas. For example, abuilding represented by boundary 212 may include a conference roomrepresented by boundary 222, where an employer may position ID securitydevice 220 and direct identification security device controller 204 totemporarily control the content of ID devices entering the conferenceroom.

In addition to directing ID security devices 210, 220, and 230 as to theinformation to include in data transmissions, identification securitydevice controller 204 may also direct ID security devices 210, 220, and230 as to the size, shape, and dimension of the areas delineated byboundaries 212, 222, and 232, respectively. In one example, where IDsecurity device 220 is a portable device with an RF field or wirelessfield for detecting the presence of ID devices within a particular fieldarea, identification security device controller 204 may direct IDsecurity device 220 as to the size, shape, and dimension of the field.

With reference now to FIG. 3, a block diagram illustrates an example ofa computer system in which the present invention may be implemented. Thepresent invention may be executed in a variety of systems andcombinations of systems, made up of functional components, such as thefunctional components described with reference to computer system 300and may be communicatively connected to a network, such as network 102.

Computer system 300 includes a bus 322 or other communication device forcommunicating information within computer system 300, and at least oneprocessing device such as processor 312, coupled to bus 322 forprocessing information. Bus 322 preferably includes low-latency andhigher latency paths that are connected by bridges and adapters andcontrolled within computer system 300 by multiple bus controllers. Whenimplemented as a server, computer system 300 may include multipleprocessors designed to improve network servicing power. Where multipleprocessors share bus 322, additional controllers (not depicted) formanaging bus access and locks may be implemented.

Processor 312 may be a general-purpose processor such as IBM's PowerPC(PowerPC is a registered trademark of International Business MachinesCorporation) processor that, during normal operation, processes dataunder the control of an operating system 360, application software 370,middleware (not depicted), and other code accessible from a dynamicstorage device such as random access memory (RAM) 314, a static storagedevice such as Read Only Memory (ROM) 316, a data storage device, suchas mass storage device 318, or other data storage medium. In oneembodiment, the operations performed by processor 312 may controlmanagement of content displayed on portable, content adjustableidentification devices as depicted in the operations of flowchart ofFIGS. 7-9 and other operations described herein. Operations performed byprocessor 312 may be requested by operating system 360, applicationsoftware 370, middleware or other code or the steps of the presentinvention might be performed by specific hardware components thatcontain hardwired logic for performing the steps, or by any combinationof programmed computer components and custom hardware components.

The present invention may be provided as a computer program product,included on a machine-readable medium having stored thereon the machineexecutable instructions used to program computer system 300 to perform aprocess according to the present invention. The term “machine-readablemedium” as used herein includes any medium that participates inproviding instructions to processor 312 or other components of computersystem 300 for execution. Such a medium may take many forms including,but not limited to, non-volatile media, volatile media, and transmissionmedia. Common forms of non-volatile media include, for example, a floppydisk, a flexible disk, a hard disk, magnetic tape or any other magneticmedium, a compact disc ROM (CD-ROM) or any other optical medium, punchcards or any other physical medium with patterns of holes, aprogrammable ROM (PROM), an erasable PROM (EPROM), electrically EPROM(EEPROM), a flash memory, any other memory chip or cartridge, or anyother medium from which computer system 300 can read and which issuitable for storing instructions. In the present embodiment, an exampleof a non-volatile medium is mass storage device 318 which as depicted isan internal component of computer system 300, but will be understood toalso be provided by an external device. Volatile media include dynamicmemory such as RAM 314. Transmission media include coaxial cables,copper wire or fiber optics, including the wires that comprise bus 322.Transmission media can also take the form of acoustic or light waves,such as those generated during radio frequency or infrared datacommunications.

Moreover, the present invention may be downloaded or distributed as acomputer program product, wherein the program instructions may betransferred from a remote computer such as a server 340 to requestingcomputer system 300 by way of data signals embodied in a carrier wave orother propagation medium via network 102 to a network link 334 (e.g. amodem or network connection) to a communications interface 332 coupledto bus 322. Communications interface 332 provides a two-way datacommunications coupling to network link 334 that may be connected, forexample, to a local area network (LAN), wide area network (WAN), ordirectly to an Internet Service Provider (ISP). In particular, networklink 334 may provide wired and/or wireless network communications to oneor more networks, such as network 102. Further, although not depicted,communication interface 332 may include software, such as devicedrivers, hardware, such as adapters, and other controllers that enablecommunication. When implemented as a server, computer system 300 mayinclude multiple communication interfaces accessible via multipleperipheral component interconnect (PCI) bus bridges connected to aninput/output controller, for example. In this manner, computer system300 allows connections to multiple clients via multiple separate portsand each port may also support multiple connections to multiple clients.

Network link 334 and network 102 both use electrical, electromagnetic,or optical signals that carry digital data streams. The signals throughthe various networks and the signals on network link 334 and throughcommunication interface 332, which carry the digital data to and fromcomputer system 300, may be forms of carrier waves transporting theinformation.

In addition, computer system 300 may include multiple peripheralcomponents that facilitate input and output. These peripheral componentsare connected to multiple controllers, adapters, and expansion slots,such as input/output (I/O) interface 326, coupled to one of the multiplelevels of bus 322. For example, input device 324 may include, forexample, a microphone, a video capture device, a body scanning system, akeyboard, a mouse, or other input peripheral device, communicativelyenabled on bus 322 via I/O interface 326 controlling inputs. Inaddition, for example, a display device 320 communicatively enabled onbus 322 via I/O interface 326 for controlling outputs may include, forexample, one or more graphical display devices, audio speakers, andtactile detectable output interfaces, but may also include other outputinterfaces. In alternate embodiments of the present invention,additional or alternate input and output peripheral components may beadded.

Those of ordinary skill in the art will appreciate that the hardwaredepicted in FIG. 3 may vary. Furthermore, those of ordinary skill in theart will appreciate that the depicted example is not meant to implyarchitectural limitations with respect to the present invention.

Referring now to FIG. 4, a block diagram illustrates one embodiment of acontent adjustable, portable identification device. In the example,identification (ID) device 400 includes a display interface 402, wheredisplay interface 402 includes at least one content-adjustable portion.In one example, display interface 402 includes an LCD or other displayscreen. In addition, display interface 402 may include other types ofadjustable display mediums.

In addition, ID device 400 includes an RFID chip 406 for passivelyenabling output of data to an RFID reader. Although not depicted, RFIDchip 406 may be implemented through a small memory module interfacingwith a passive RF antenna. The RF antenna is designed to read the RFIDdata from the memory module using energy generated by the RF field froman RF reader, such as an ID security device, transmitting the RF field.In one example, the data passively output from RFID 406 includesidentification information, such as an employee name, number, and otherindividually identifying information.

It will be understood that ID device 400 may include additional or othertypes of data storage media enabled to actively or passively transmitidentification information. In addition, it will be understood that IDdevice 400 may include additional or other types of data storage mediafrom which identification information may be read, such as a bar code orother scannable media.

Further, in the example, ID device 400 includes an information reader410 for detecting data from an ID security device. For example,information reader 410 may detect a data transmission from an IDsecurity device indicating an edge of a boundary. In another example,information reader 410 may detect a data transmission from an IDsecurity device that specifies the types of identification contentpermitted to be displayed on display interface 402 within a particularbounded area. In yet another example, information reader 410 may detecta signal transmitted from an ID security device that includes the actualidentification content to be displayed on display interface 402.

ID device 400 includes a battery 408 for providing power to thecomponents of ID device 400. It will be understood that battery 408 maybe implemented using multiple types of portable power sources. Inaddition, it will be understood that in alternate embodiments, battery408 may be integrated within one of the components of identificationdevice 400.

In addition, ID device 400 includes a device controller 404 of aprocessor, memory, and other components required for controlling thecomponents of ID device 400. Device controller 404 receives detecteddata transmissions from information reader 410 and controls the displayof information on display interface 402. It will be understood that IDdevice 400 may include additional or alternate display interfacecontrollers.

In one example, device controller 404 includes stored personalidentification content for a particular person, wherein upon detectionof a boundary and the type of identification content to be displayed atthat boundary, device controller 404 adjusts display interface 402 toonly display the specified types of identification content from thestored personal identification content for the particular person. Forexample, for each person issued an ID device, the personalidentification content for that person is transmitted to devicecontroller 404 for storage at the time of issuance.

In another example, device controller 404 receives the actual personalidentification content for display from information reader 410 andcontrols the display of the content at display interface 402. Forexample, for each person issued an ID device, an identifier for theperson is stored on RFID 406, such that ID security device detects theidentifier, determines a selection of personal identification contentfor display within a particular boundary and transmits the displayable,personal identification content for the identified person to ID device400 at each boundary, wherein device controller 404 receives the actualpersonal identification content and controls display of the contentwithin display interface 402.

It is important to note that while in the embodiment depicted, ID device400 includes device controller 404, RFID 406, and information reader410, in additional or alternate embodiments, ID device 400 may onlyinclude one or more of device controller 404, RFID 406, and informationreader 410. In addition, it is important to note that in additional oralternate embodiments, the components of ID device 400 may be integratedinto a computing system enabled to perform functions in addition toidentifying a device holder. For example, ID device 400 may beintegrated into a portable telephony device or other portable computingsystem carried by a person.

With reference now to FIG. 5, a block diagram illustrates one embodimentof an ID security device controller. In the example, ID security devicecontroller 500 includes multiple functional components and data storagesystems, which may be implemented in a single system or across multiplesystems interconnected via a network or other connection. It isimportant to note that ID security device controller 500 may beimplemented within an individual ID security device, such as ID securitydevices 210, 220, and 230 of FIG. 2 or may be implemented in server 202,as described in FIG. 2. In other embodiments, additional or alternatecomponents may be included within ID security device 500. In addition,in other embodiments, ID security device 500 may be integrated into orimplemented within other devices that provide for securing anenvironment.

In the example, ID security device controller 500 includes a boundarytransmitter 502. Boundary transmitter 502 transmits information about adelimited boundary to information devices. In transmitting informationabout a particular boundary, boundary transmitter 502 may directlytransmit information to a particular information device in a localnetwork or may broadcast a signal detectable by any information deviceswithin a particular range. The information or signal may indicate thetype of boundary entered into or exited out of.

In addition, in the example, ID security device controller 500 includesa display control transmitter 506. Display control transmitter 506transmits data specifying the content to be displayed on all devicesentering or exiting a boundary or about the content to be displayed on aparticular device entering or exiting a boundary. In specifying thecontent to be displayed, display control transmitter 506 may directlytransmit the content for display or the type of content to display to aparticular information device or broadcast a signal detectable by anyinformation device specifying the type of content to display.

Further, in the example, ID security device controller 500 includes anidentification detector 504. Identification detector 504 facilitatesdetection of the identification of a person carrying an ID device. Inone example, identification detector 504 detects the identification of aperson by detecting at least one user identifier from the device itself,such as from an RFID chip by creating an RF field and detecting thetransmission of the identifier, from a bar code scan of the identifier,or from other types of detectable information from the ID device. Inanother example, identification detector 504 facilitates detection ofthe identification of a person by requiring the person provide abiometric sample or enter a password. It will be understood thatidentification detector 504 may implement additional and alternate typesof identity detection and may access the identification information fromhardware specifically designed to detect a user identifying information.

Once identification detector 504 accesses some identifying informationfor a user, identification detector 504 looks up a user recordassociated with the accessed identifying information in identificationdatabase 512. Identification database 512, accessible to ID securitydevice 500, includes identifying personal information for a registereduser. In the example, for each registered user, identification database512 includes information fields such as, but not limited to, name 514,identification number 516, biometric identification 518, photoidentification 520, and level 522, such as a management or securitylevel, for example. Using one piece of identifying information, such asan identification number, identification detector 504 finds the userrecord within identification database 512 with the field ofidentification number 516 including a number matching the accessedidentification number.

By accessing the identification record for a particular user fromidentification database 512, display control transmitter 506 can accessparticular display content for a particular user and transmit thedisplay content to the ID device carried by that person. For example,the photo of a particular user in the field of photo identification 520may be accessed and transmitted by display control transmitter 506 to aparticular ID device. In another example, the management level of a usermay be accessed in the field of level 522 and transmitted by displaycontrol transmitter 506 to a particular identification device.

In addition, by accessing the identification record for a particularuser from identification database 512, additional information includedin the fields of an accessed record can be used in filtering throughidentification selection rules 524. In particular, identificationselection rules 524 includes rules for selecting the type of boundaryinformation or content for transmission to direct adjustment of thecontent visibly displayed on ID devices. Thus, in boundary transmitter502 selecting the boundary information to transmit or display controltransmitter 506 selecting the content to transmit, boundary transmitter502 and display control transmitter 506 process identification selectionrules 524.

Identification selection rules 524 may include different types ofvariables for selecting the data to transmit to ID devices. In oneexample, identification selection rules 524 includes identity-basedrules 526, which specify content selections based on a user. In anotherexample, identification selection rules 524 may include schedule basedrules 528, which specify content requirements for a particular boundarybased on a schedule or other circumstances associated with a boundaryand may be accessed from a master schedule or from multiple individualschedules. Further, in another example, identification selection rules524 may include level based rules 530, which specify contentrequirements based on the management or security level associated withone or more of a particular boundary and a particular management orsecurity level assigned to the identified individual associated with anID device. In addition, it will be understood that additional andalternate types of variables may be included in the rules used forselecting the data to transmit to each ID device to direct the contentfor display on each ID device.

It is important to note that while in the embodiment depicted, IDsecurity device controller 500 includes boundary transmitter 502 anddisplay control transmitter 506, in additional or alternate embodiments,ID security device controller 500 may only include one of boundarytransmitter 502 and display control transmitter 506, dependent upon thedata transmissions required by personal identification devices to adjustthe content of the ID devices when entering or exiting a bounded area.In addition, it is important to note that in additional alternateembodiments, the components of ID security device controller 500 may beintegrated into a computing system enabled to perform functions inaddition to personal identification device content control.

In addition, ID security device 500 may include an identificationselection controller 508 for controlling the selection of information toinclude in identification database 512 and identification selectionrules 524. In one example, identification selection controller 508includes an interface controller for controlling an interface throughwhich a user may select to add, adjust, or cancel information inidentification database 512 and identification selection rules 524. Inanother example, identification selection controller 508 may include asearching tool for accessing schedules for one or more users,determining from the schedules whether there are events that should beincluded within the schedule based rules 528 and whether to prompt auser to set the content for display on identification devices during thescheduled event within a particular boundary.

Further, ID security device 500 may include a data security controller510 for controlling the security of information transmitted to andaccessed from identification devices. In one example, data securitycontroller 510 may encrypt content selected to be transmitted by displaycontrol transmitter 506, such that only the identification devicedesignated to receive the encrypted content is enabled to decrypt thecontent for display.

Referring now to FIG. 6, an illustrative example depicts an interfacethrough which a user may adjust an identification selection rule. In theexample, a meeting scheduling interface 600 includes options for a usersetting a meeting to also specify the identification contentrequirements for the meeting. In the example, in scheduling a meeting,the user may select to specify the meeting by selecting options usingthe placement of cursor 614 or other selection inputs.

For purpose of example, it is illustrated that in response to a userselection of time requested option 602, the user selected a date andtime period of “Jan. 14, 2008” from “8:00-9:00 AM CST” and that inresponse to a user selection of meeting room reserved option 604, theuser selected a meeting room of “204, Building A”.

According to an advantage of the invention, the user is also providedwith an interface option to directly specify, with a scheduled meeting,the identification content required for the meeting, such that the IDsecurity device for the meeting room is directed to apply the selectedcontent to ID devices during the meeting period within the boundary ofthe selected meeting room. In the example, the user may select torequire a name as illustrated at reference numeral 606, a photo asillustrated at reference numeral 608, a level as illustrated atreference numeral 610, and a position as illustrated at referencenumeral 612. As indicated by the “X”, the user has selected to require aname and security level as content on ID devices during the meeting.

In addition to selecting the types of content for display on ID devicespresent within the meeting, the user may select how the content is to bedisplayed. For example, the user has further specified that the securitylevel is to be displayed as a color based representation with eachsecurity level illustrated by a different color, as illustrated atreference numeral 616.

With reference now to FIG. 7, a high level logic flowchart depicts aprocess and program for controlling information output to an ID deviceat a boundary. In the example, the process starts at block 700 andthereafter proceeds to block 702. Block 702 depicts a determinationwhether an ID device is detected at a boundary. If an identificationbadge is detected at a boundary, then the process passes to block 704.Block 704 illustrates accessing identifying information associated withthe ID device. Next, block 706 depicts filtering the identificationselection rules to determine the required identification content for theID device at the boundary. Thereafter, block 708 illustratestransmitting the required content from the identified user's record ortransmitting a specification of the type of required content to thedetected ID device, and the process ends.

Referring now to FIG. 8, a high level logic flowchart illustrates aprocess and program for adjusting the content specifications for aboundary. In the example, the process starts at block 800 and thereafterproceeds to block 802. Block 802 depicts a determination whether an IDsecurity device controller detects a user selection to modify thecontent specifications for a boundary. If there is a user selection tomodify the content specifications for a boundary, then the processpasses to block 804. Block 804 illustrates a determination whether auser is authorized to modify the content requirements for a boundary. Ifthe user is not authorized, then the process ends. If the user isauthorized, then the process passes to block 806. Block 806 depictsupdating the identification selection rules with the new contentrequirements for a boundary, and the process ends.

With reference now to FIG. 9, a high level logic flowchart depicts aprocess and program for controlling information output at a boundary. Inthe example, the process starts at block 900 and thereafter proceeds toblock 902. Block 902 depicts monitoring the current identificationselection rules for an ID security device. Next, block 904 illustrates adetermination whether any of the rules are triggered by a change incircumstances or the presence of a scheduled event. If the rules aretriggered, then the process passes to block 906. Block 906 illustratesupdating the ID security device with the required content or change inboundary size for the triggered rule, such that the boundary transmitterfor the ID security device adjusts the signal identifying the boundaryitself or identifying the required content changes when entering orexiting the boundary as required by the triggered rule, and the processends.

While the invention has been particularly shown and described withreference to a preferred embodiment, it will be understood by thoseskilled in the art that various changes in form and detail may be madetherein without departing from the spirit and scope of the invention.

1. A system for managing content for output at a plurality of separateportable, content adjustable personal identification devices,comprising: at least one information control device enabled to transmitdata to a plurality of separate portable, content adjustable personalidentification devices within a particular area delimited by a boundarysecured by said at least one information control device; a schedulinginterface enabled by a computer system communicatively connected to saidat least one information control device through a network; saidscheduling interface through which a user selects to schedule a meetingperiod for said particular area and through which said user specifies aparticular selection of content from among a plurality of types ofidentification content required to be displayed within said plurality ofseparate portable, content adjustable personal identification whenmoving into said particular area during said meeting period; said atleast one information control device, responsive to detecting said useris authorized to adjust a content specification for said particulararea, for automatically updating said content specification with saidparticular selection of content for said meeting period; said at leastone information control device, responsive to detecting a current timewithin said meeting period, for automatically selecting, fortransmission from said at least one information control device enabledto transmit data to said plurality of separate portable, contentadjustable personal identification devices, said content specificationfor directing display of a portion of said plurality of types ofidentification content on each of said plurality of separate portable,content adjustable personal identification devices; and said at leastone information control device for transmitting said at least onecontent specification for directing each of said plurality of separateportable, content adjustable personal identification devices moving intosaid particular area to adjust said display of said plurality of typesof identification content from a prior selection of content from amongsaid plurality of types of identification content to said contentspecification comprising said particular selection of content.
 2. Thesystem according to claim 1, wherein said at least one informationcontrol device further comprises: means for monitoring at least onepoint along said boundary to detect a presence of at least one of saidplurality of portable, content adjustable personal identificationdevices; means, responsive to detecting a particular portable, contentadjustable personal identification device at said at least one pointalong said boundary from among said plurality of separate portable,content adjustable personal identification devices: for detecting anidentification for a particular user associated with said particularportable, content adjustable personal identification device, and fordesignating, based on said identification of said particular user, saidcontent specification for transmission said particular portable, contentadjustable personal identification device.
 3. The system according toclaim 2, wherein said means for monitoring at least one point along saidboundary further comprises: a radio frequency reader for monitoring saidboundary by creating a radio frequency field and detecting saididentification for said particular user from a radio frequencytransmission from said particular portable, content adjustable personalidentification device.
 4. The system according to claim 2, wherein saidmeans for monitoring at least one point along said boundary furthercomprises: a bar code scanner for monitoring said boundary by readingsaid identification for said particular user from a bar code affixed tosaid particular portable, content adjustable personal identificationdevice.
 5. The system according to claim 2, said at least oneinformation control device further comprising: means for adjusting asize of said boundary.
 6. The system according to claim 2, said at leastone information control device further comprising: means for encryptingsaid at least one content specification for secured transmission to atleast one of said plurality of separate portable, content adjustablepersonal identification devices.
 7. The system according to claim 2,further comprising: means for receiving said at least one contentspecification at the at least one of said plurality of separateportable, content adjustable personal identification devices, whereinsaid at least one of said plurality of separate portable, contentadjustable personal identification devices comprises an input interfacefor receiving said content specification from said at least oneinformation control device, a display interface for displayingparticular content as directed by said at least one contentspecification, and at least one processor for controlling output of saidselection of content at said display interface.