Sign In

or
Don't have an account? 

Access Control: From Railway Block Tokens to Cybersecurity Sessions

cybersecurity
access control
session management
IT best practice
digital security
railway history
historic lessons
heritage railways
risk management
technology leadership
When it comes to keeping trains — and technology — safe, the principles have not changed all that much over the centuries. In fact, some of the smartest practices in modern cybersecurity have their roots in the very earliest days of the railway.
Share:
X

A Truncheon, a Train, and the Birth of Access Control

In the earliest days of railways, particularly on single-line tracks, collisions were a terrifying risk. With no electronic signalling, how could railway companies stop two trains from heading toward each other on the same stretch of track?

The responsibility originally lay with the railway police, who were tasked with ensuring the safety of train movements. Drawing on their experience with policing and the authority symbolised by truncheons, they developed a system where possession of a physical object signified the right to proceed. This practice evolved into the use of a block token: a physical item that granted exclusive access to a section of track. If a train driver had the token, they were the only train allowed on that stretch. No token? No movement. It was a clear, unmistakable form of control.

Later, block tokens evolved into complex systems of electrically locked instruments, but the principle stayed the same: only one train could have the right of way at a time.

Fun fact: even today, railway signalmen are sometimes affectionately known as Bobbies — a nod to those original railway police. The nickname itself traces back to Sir Robert Peel, founder of modern policing in Britain.

As someone who is proud to serve as a director of a heritage railway, I see daily how these traditions are still respected and preserved. It is a reminder that good systems — whether on the track or in technology — are built on clear authority, trust, and well-managed control.

What This Means for IT Today

Fast forward to our connected digital world, and the concept of the single token of authority still underpins some of the most critical parts of cybersecurity:

  • Access Control: When users log into a system, they are issued a secure session token. This token confirms their right to access the system — just as a driver’s block token confirmed their right to the track.
  • Session Management: Tokens are time-limited and controlled. If someone tries to use an old, copied, or stolen token, the system will reject it — just like a driver could not duplicate a block token to access multiple sections at once.
  • Preventing Collisions: Without proper session control, two users might access the same resource simultaneously, leading to data conflicts, corruption, or worse. Token-based access ensures orderly, safe operations.

Just as the railways knew they could not trust every driver to simply "check the line was clear," modern systems know they cannot just trust every user request. Authority must be granted, verified, and tightly controlled.

What We Can Learn

Whether managing trains or technology, the lesson is the same: clear, well-managed authority prevents accidents. Systems work best when it is obvious who has the right to do what — and when that authority cannot be faked or guessed.

For anyone responsible for systems, data, or even day-to-day processes in schools and organisations, the takeaway is simple:

  • Make sure access to sensitive systems is properly controlled and documented.
  • Use secure login methods like two-factor authentication wherever possible.
  • Regularly review who has access to important systems and remove unnecessary permissions.

Good security is not about trusting everyone to 'check the line is clear' — it is about having clear signals, clear authority, and clear processes. Just as it was on the railways all those years ago.

Share:
X

Other Blog Posts
Why did the Senior Leadership Team cross the road?
by Neil Limbrick
18 days ago 213 views
IT Procurement
Network Infrastructure
School Leadership
Digital Strategy
Cost Saving
Infrastructure Planning
From Cabinets of Curiosity to Chromebooks: Why Your IT Asset Register Matters
by Neil Limbrick
32 days ago 241 views
ChatGPT said: IT Asset Register
School IT Management
Digital Strategy
EdFITS
Budget Planning
Device Refresh
Safeguarding Compliance
IT Inventory
School Business Management
Infrastructure Planning
From Asterisks to AI: Reflections, Chocolate, and the Latest on Generative AI in Education
by Neil Limbrick
33 days ago 145 views
AI
DfE Guidance
Training
The Walled Garden That's Lovely Until It Isn't: Avoiding Vendor Lock-In in School IT
by Neil Limbrick
39 days ago 165 views
Vendor Lock-In
Procurement
Managed Service Providers
IT Strategy
EdFITS
Digital Maturity
School IT Contracts
Exit Planning
Infrastructure Flexibility
School Partnerships
Planting Orchards, Not Just Picking Apples: What Apple Farmers Can Teach Us About IT Strategy
by Neil Limbrick
53 days ago 234 views
IT Strategy
EdFITS
School Leadership
Safeguarding
Long-Term Planning
Sustainable IT
Digital Maturity
Technology Planning
Curriculum Support
Device Refresh
Don't Get Caught by the Auto-Renewal Trap: Why Every School Needs a Contracts Register
by Neil Limbrick
59 days ago 258 views
contract management
digital governance
DfE standards
school leadership
how to
templates
risk management
school business management
EdFITS
planning
What Shopkeepers and 99p Pricing Can Teach Us About Zero Trust Security
by Neil Limbrick
67 days ago 420 views
Cyber Security
Zero Trust
Digital Confidence
School IT
Network Security
Why Do We Keep Fixing the Same IT Issues? - The Case for Problem Management in Schools
by Neil Limbrick
72 days ago 304 views
Problem Management
EdFITS
Continuous Improvement
IT Efficiency
What Does Operational Excellence Look Like in School IT?
by Neil Limbrick
80 days ago 274 views
IT Strategy
Operational Excellence
School IT
Self Audit
Cyber Essentials: The Policy Checklist Every School Needs
by Neil Limbrick
87 days ago 270 views
Cyber Security
Checklist
Cyber Essentials
When the Wi-Fi Goes Down... Then What?
by Neil Limbrick
93 days ago 241 views
Service Continuity
EdFITS
Blog
Digital Oversight for Governors: What to Ask and Why It Matters
by Neil Limbrick
100 days ago 397 views
Governance
IT Strategy
Getting to grips with leadership and governance of IT
by Neil Limbrick
104 days ago 315 views
Leadership
Governance
A Simple Guide to Cyber Security
by Neil Limbrick
111 days ago 526 views
Cyber security
How to evaluate your IT provision
by Neil Limbrick
201 days ago 247 views
Strategy
The questions you should be asking when implementing an IT strategy
by Neil Limbrick
231 days ago 241 views
Strategy
Governance
Breaking down your IT Strategy
by Neil Limbrick
1 year ago 291 views
The SBM guide to IT strategy
by Neil Limbrick
2 years ago 262 views
Strategy
Leadership
Governance
Separate the wheat from the chaff
by Neil Limbrick
4 years ago 223 views
Strategy
Improving your ICT game: The benefit of CPD programmes
by Neil Limbrick
8 years ago 272 views
CPD
School Closures - The Simple Guide to Clear Communication
by Neil Limbrick
10 years ago 277 views
Communication
Strategy
Access Control: From Railway Block Tokens to Cybersecurity Sessions on Digital Confidence for Education