CA2156236C - Biometrically secured control system for preventing the unauthorized use of a vehicle - Google Patents
Biometrically secured control system for preventing the unauthorized use of a vehicleInfo
- Publication number
- CA2156236C CA2156236C CA002156236A CA2156236A CA2156236C CA 2156236 C CA2156236 C CA 2156236C CA 002156236 A CA002156236 A CA 002156236A CA 2156236 A CA2156236 A CA 2156236A CA 2156236 C CA2156236 C CA 2156236C
- Authority
- CA
- Canada
- Prior art keywords
- user
- biometrically
- vehicle
- control system
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/26—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Abstract
A method and system are provided for restricting the use of a vehicle such as anautomobile to a person or persons whose fingerprints match biometric data stored within a memory in the vehicle's control system. A user's digitized fingerprints are stored in a non-volatile permanent ROM in the BIOS of a microcontroller on in a ROM accessed by a microprocessor. The microprocessor's primary task is that of executing instructions related to the operation of the vehicle, such as regulating the fuel flow rate, and performing other such tasks. Before the microprocessor can execute its instructions related to its primary task it must complete and exit a conditional loop of instructions that relate to validating a user's "real-input" biometric data. Real scanned fingerprints must be compared with fingerprint(s) stored in ROM. If the result of the compare is a true, i.e. is a match, then the conditional loop is satisfied and the microprocessor can execute its instructions relating to operating the vehicle.
Description
BIOMETRICALLY SECURED CONTROL SYSTEM FOR PREVENTING THE
UNAUTHORIZED USE OF A VEHICLE
Field of the Invention This invention relates to secure control systems and more particularly to a system and method for acquiring use of a device dependent upon biometric related input.
Background of the Invention The use of security systems is generally well known. There use is becoming even greater with increased availability of digital electronic components at a relatively low cost.
Such systems are known for securing buildings, banks, automobiles, computers and many other devices. For example, U.S. Pat. No. 4,951,249 discloses a computer security system ~ 5 which protects computer software from unauthorized access by requiring the user to supply a name and a password during the operating system loading procedure ("boot-up") of a personal computer (PC). This is accomplished by the insertion of a special card into an input/output expansion slot of the PC. During the loading of the operating system of the PC, the basic input/output system (BIOS) scans memory addresses of the card for an 2o identification code, consisting of a 55AA hex code. When this hex code is located, the BIOS instructions are vectored to the address where the target hex code resides and instructions at the following address are executed as part of the initialization routines of the system boot-up procedure.
25 This PC security system, utilizing a password board, is typical of many systems that are currently available. Password boards require a user's name and a password associated with that user's name. Only once a password board detects a valid user's name and password does it allow the PC to complete the boot-up routine. Though password boards may be useful in some instances, they are inadequate in many respects.
~1~~~~~
For example, an unauthorized skilled user with a correct password in hand, can gain entry to such a processor based system. Yet another undesirable feature of the foregoing system is that passwords on occasion are forgotten; and furthermore, and more importantly, passwords have been known to be decrypted.
As of late one of the most ubiquitous electronic components is the digital processor. Multi-purpose and dedicated processors of various types control devices ranging from bank machines, to cash registers and automobiles. With ever increasing use of these processor based devices, there is greater concern that unauthorized use will become more prevalent. Thus, the verification and/or authentication of authorized users of processor based systems is a burgeoning industry.
Alarms and security systems to warn of unauthorized use of automobiles and other processor controlled systems are available, however, these security systems have been known to be circumvented. Furthermore, automobile alarms that sound, are often ignored by passers-by. Unfortunately, many commercially available solutions aimed at preventing theft or unauthorized use of automobiles have also been circumvented.
2o Thus, it is an object of this invention to provide a method and relatively inexpensive system for preventing unauthorized use of a vehicle controlled by a processor based control system.
Summary of the Invention The foregoing problems are solved by a method and apparatus for controlling access to a processor controlled device in which memory-resident software logic cooperates with an input device providing "real-input" biometric data to the processor's 2156~3~
input port disabling the controlled device unless authorized user biometric data that corresponds to data stored in the processor's memory is provided to the processor.
According to a departure in the art, memory resident software logic is executed by the device processor; the execution of a user verification loop is repeated until an authorized user biometric key is provided, thereby preventing the device processor from executing its normal functions unless the result of a compare operation of "real-input"
biometric data with stored biometric data is true. The processor normally controlling vital functions of the automobile, such as fizel delivery is internally halted unless "real-data"
from an authorized user is provided.
1o Operation of the memory-resident software logic is transparent to the user and to the control programs that normally control the processor controlled device because it is installed as a boot-up routine when the device is switched-on. At this time, the logic continuously monitors a biometric input device, for example in the form of a fingerprint 15 scanner, for "real" input data.
Operation of the device remains suspended until the memory-resident logic detects authorized fingerprint data that compares positively with fingerprint data stored in the memory.
Another advantage achieved with the invention is ready adaptability of the system to commercially available processor controlled vehicles.
In accordance with the invention, a biometrically secured control system is provided, for preventing an unauthorized use of a vehicle comprising:
processor means for controlling fixnctions normally associated with the operation of a device;
memory means for storing biometrically related data and for storing instructions related to controlling at least some normal operations of the device;
A562 ~~
biometric data input means for providing "real-input" biometrically related data to one of the memory means and the processor; and means for preventing the processor from, or allowing the process to, execute instructions related to controlling at least the functions normally associated with the operation of the device in dependence upon the state of a compare operation, after a comparison has been performed between "real-input"
and previously stored biometrically related data.
Yet in accordance with another aspect of the invention a method is provided of validating a user of a vehicle and for allowing a control system of the device to be operable after validation. The method comprises the steps of receiving a user's biometrically related data from an input device; comparing at least an aspect of the received biometrically related data with stored biometrically related data;
preventing a processor from executing instructions normally related to the operation of the device when the compared data mis-matches within predetermined limits; and, allowing the processor to execute instructions normally related to the operation of the device after the compared data matches, within predetermined limits.
Brief Description of the Drawings 2o Exemplary embodiments of the invention will now be described in conjunction with the drawings in which:
Fig. 1 a block diagram of a security system in accordance with the invention shown having a microprocessor coupled to a fingerprint scanning device;
Fig. 2 of a block diagram of an alternative embodiment of a security system having a microcontroller coupled to a fingerprint scanning device in accordance with this invention;
~1~~2~~
Fig. 3 is an illustration depicting the basic system operation, showing program segmentation;
Fig. 4 is a block diagram of an alternative embodiment of a security system having user programmable features; and, Fig. 5 is a high-level flowchart depicting a part of a routine for validating a user and for operating a vehicle.
to Detailed Description Fig. 1 illustrates a processor based system (PBS) 8 which is modified in accordance with the invention to prevent unauthorized usage of one or more devices 18 related to the operation of a vehicle. For example block 18 shown in Fig. 1 may represent 15 the fuel delivery system and/or the ABS braking system of a vehicle. The reference numeral 9 designates generally a system of the present invention for providing these controlled access and monitoring functions. The system 9 includes biometric data input means in the form of a fingerprint scanning device 10 and associated, electronic-processing circuitry 12 shown coupled to a microprocessor 14; memory means in the 2o form of a read-only memory (ROlVn 16 is conveniently logically segmented into a first and second logical blocks 16a and 16b respectively, the first of which is for storing BIOS and program instructions implementing logic routines that in certain instances prevent a processor 14 from executing instructions normally associated with controlling the one or more devices 18. A second logical memory block 16b contains instructions that relate to 25 the control and operation of the one or more devices 18.
In the instance where this system is used to control operations related to a vehicle, in a normal, authorized, mode of operation, the processor 14 controls the vehicle's ~~~s~~s ignition system, braking system, and fuel delivery system. A key-operated ignition switch 17 is coupled to the processor to provide a signal for providing power to the processor 14 and for invoking the BIOS start-up sequence of instructions stored in boot-up portion 16a of the ROM 16.
Referring now to Fig. 2, an alternative embodiment is shown wherein a scanning device 10 and associated circuitry 12 is coupled to a microcontroller 14b having the BIOS
stored within the microcontroller's internal memory 14c. External ROM 16c is coupled to the processor and is stored with instructions related to the control of one or more devices 18. In this embodiment, the BIOS essentially comprises input/output routines, sanity checks, and more importantly, the set of program instructions implementing logic routines that in certain instances prevent the microcontroller 14b from executing instructions normally associated with controlling the one or more devices 18.
In practice, if the processor execution remains in a loop, in its verification sequence of instructions Is stored in the BIOS, fi~el is not supplied to the vehicle. Since the fi~el injectors are electronically controlled by the processor, the vehicle is immobilized until the processor receives and verifies biometric input data that corresponds to stored authorized user's data.
2o Turning now to Fig. 3, a block diagram is shown of a portion of the basic pseudo code control program that is stored in ROM 16a for determining whether or not associated instructions that control the one or more devices 18 will be executed. It should be noted in this example, that the instructions are merely exemplary and each pseudo-code instruction may comprise several micro-instructions. Of course, the technical aspects of 25 programming of such instructions is well known and within the capability of those skilled in the programming arts. In this example a first pseudo-code instruction, GET
FINGERPRINT, requires several micro-instructions to be performed in order to accomplish this task. However, the explanation of the invention becomes more clear using 21~fi2~6 these high level pseudo-code instructions. In this embodiment, a first (pseudo code) instruction at memory address 0001, GET FINGERPRINT is fetched and executed by the processor or microcontroller. As a result of executing this instruction, the fingerprint device is polled for input. Whether or not a fingerprint is available, input is received from the scanning device 10 and its associated circuitry 12. A next instruction, COMPARE
TEMPLATE, at memory address 0002 is fetched from memory and executed.
Essentially this pseudo-code instruction directs the processor to compare "real-input"
data that has been electronically formatted into a standard digital representation, with an electronically stored fingerprint represented in a same format. If the result of the compare instruction is Io true, that is if the "real-input" data is determined to be the same, within a predetermined margin of error, as the stored fingerprint data, the processor begins fetching instructions from the block of memory 16b associated with the normal operation of device 18. In the instance that the compare result is false, the processor 14 sets its instruction counter to 0001, and loops to fetch instructions starting at address 0001; the processor remains in this loop comprising instructions at address 000l through 0003 until the compare result is true. The optional key-switch 17 shown in Fig. 1 is provided to switch the processor and overall system on and off.
In the embodiments shown heretofore, read only memory is provided. Thus, the 2o electronically stored ( compare template ) fingerprint, is permanently stored in the ROM
16a, 16b, or in the BIOS portion of the memory as may be the case.
However, in an alternative embodiment shown in Fig. 4, non-volatile read/write memory 16d is present to provide a more flexible and user programmable system 49. The system 49 is similar to that of 9 in Fig. 1 however includes an input/output device 42, in the form of a display terminal coupled to the processor 14. In operation, once the verification loop comprising the instructions GET FINGERPRINT, COMPARE
TEMPLATE, is exited and verification has been made authenticating a user, the display ~~.5s~~~
terminal 42 becomes enabled. Instructions associated with the use of the display terminal in the form of a menu, are stored in the memory 16b and are presented to a user on the display terminal. Non-volatile read/write memory 16d is provided to store input information such as temporary users biometric input data. When the system is switched off and powered down by the switch 17, biometric data stored in the memory 16d will remain.
A menu (a portion of which is shown in Fig. 5) is provided on the display terminal 42 to allow a temporary user to be logged into the system for a predetermined period of time, thereby allowing a temporary user to use the vehicle. Upon selecting this option, the temporary user is prompted to place a finger on the scanner 10 within x seconds so that "real-input" data can be acquired. The data is then stored in the memory 16d for a predetermined period of time. However, temporary users can only provide their "real-input data to the system after a permanent user has successfully passed the verification loop of instructions. A real time clock 46 coupled to the processor presents the time of day to the processor 14a so that temporary user's biometric data can be erased after the expiration of its allotted time period. Alternatively, the menu provides an option for a temporary user to be deleted from the system. This embodiment can more readily be understood in conjunction with the flow chart of Fig. 5. Upon power-up, the processor 14a first checks the time of day and erases those entries from memory that have expired;
(this is not shown in Fig. 5.) The processor then executes GET FINGERPRINT at 50 and 2o compares at 52 the real-input data with all of its stored fingerprint data.
Upon passing the verification loop, a menu is provided at 54; furthermore, the vehicle control functions are enabled at 56. The menu has a plurality of functions, only a few of which are illustrated at 54. Menu option 1 for example invokes a routine to get a fingerprint of a temporary user and store it in 16d; (see 54.1 and 54.1 b in Fig. Sa. ) Other options may also be provided at 54. For example, instructions can be selected by a permanent user after authentication has taken place, to limit or restrict a temporary user's access to particular functions. For instance a permanent user may limit the fuel flow rate to a predetermined maximum, thus essentially preventing the vehicle from exceeding a maximum speed. This option may be s ~~~s~~~
selected, for example when a valet is given temporary use of the vehicle.
Furthermore, instructions may be selected that prevent temporary users from utilizing the radio or other features and options.
Alternatively, a permanent user may disable the system for a predetermined period of time to allow any users to utilize the system without regard to input data as long as the ignition key switch 17 is enabled.
The system defined heretofore ensures that the processor 14 will be prevented 1o from executing instructions related to controlling devices associated with a system, unless a block of instructions related to verification and authentication of one or more users has been successfi~lly executed and all required conditions are met. Expressed in a different way, the processor locks itself in a verification loop, rejecting the execution of its normal routines, until a correct biometric key in the form of biometric data is presented to it.
In the examples shown heretofore, in accordance with the invention, a scheme having sequential instructions is shown for simplicity, however, pointers, flags, and semaphores can be utilized in a similar system wherein branching and jumping to non-sequential blocks of memory is performed. Thus, the verification loop need not be the first 2o block of instructions executed, and similarly the control block of instructions need not be the second block of instructions executed, however the verification loop of instructions should be executed prior to executing the vehicle control instructions as an authorization check to ensure that the vehicle control instructions should be executed.
Advantageously, having a same processor control access to a vehicle and the operation of the vehicle, provides a highly secure system. If in an unauthorized attempt to tamper with and use the vehicle the processor becomes damaged, it will then not provide its required fixnctions, for example, controlling the fuel supply to the vehicle. If in an authorized attempt to use the vehicle the processor and memory were replaced with another processor and memory, the replacement memory would have to be compatible with the processor and control devices and suitably programmed to control the required functions relating to the operation of a vehicle; this scenario is highly unlikely.
Of course, numerous other features and embodiments may be envisaged without departing from the spirit and scope of the invention.
to
UNAUTHORIZED USE OF A VEHICLE
Field of the Invention This invention relates to secure control systems and more particularly to a system and method for acquiring use of a device dependent upon biometric related input.
Background of the Invention The use of security systems is generally well known. There use is becoming even greater with increased availability of digital electronic components at a relatively low cost.
Such systems are known for securing buildings, banks, automobiles, computers and many other devices. For example, U.S. Pat. No. 4,951,249 discloses a computer security system ~ 5 which protects computer software from unauthorized access by requiring the user to supply a name and a password during the operating system loading procedure ("boot-up") of a personal computer (PC). This is accomplished by the insertion of a special card into an input/output expansion slot of the PC. During the loading of the operating system of the PC, the basic input/output system (BIOS) scans memory addresses of the card for an 2o identification code, consisting of a 55AA hex code. When this hex code is located, the BIOS instructions are vectored to the address where the target hex code resides and instructions at the following address are executed as part of the initialization routines of the system boot-up procedure.
25 This PC security system, utilizing a password board, is typical of many systems that are currently available. Password boards require a user's name and a password associated with that user's name. Only once a password board detects a valid user's name and password does it allow the PC to complete the boot-up routine. Though password boards may be useful in some instances, they are inadequate in many respects.
~1~~~~~
For example, an unauthorized skilled user with a correct password in hand, can gain entry to such a processor based system. Yet another undesirable feature of the foregoing system is that passwords on occasion are forgotten; and furthermore, and more importantly, passwords have been known to be decrypted.
As of late one of the most ubiquitous electronic components is the digital processor. Multi-purpose and dedicated processors of various types control devices ranging from bank machines, to cash registers and automobiles. With ever increasing use of these processor based devices, there is greater concern that unauthorized use will become more prevalent. Thus, the verification and/or authentication of authorized users of processor based systems is a burgeoning industry.
Alarms and security systems to warn of unauthorized use of automobiles and other processor controlled systems are available, however, these security systems have been known to be circumvented. Furthermore, automobile alarms that sound, are often ignored by passers-by. Unfortunately, many commercially available solutions aimed at preventing theft or unauthorized use of automobiles have also been circumvented.
2o Thus, it is an object of this invention to provide a method and relatively inexpensive system for preventing unauthorized use of a vehicle controlled by a processor based control system.
Summary of the Invention The foregoing problems are solved by a method and apparatus for controlling access to a processor controlled device in which memory-resident software logic cooperates with an input device providing "real-input" biometric data to the processor's 2156~3~
input port disabling the controlled device unless authorized user biometric data that corresponds to data stored in the processor's memory is provided to the processor.
According to a departure in the art, memory resident software logic is executed by the device processor; the execution of a user verification loop is repeated until an authorized user biometric key is provided, thereby preventing the device processor from executing its normal functions unless the result of a compare operation of "real-input"
biometric data with stored biometric data is true. The processor normally controlling vital functions of the automobile, such as fizel delivery is internally halted unless "real-data"
from an authorized user is provided.
1o Operation of the memory-resident software logic is transparent to the user and to the control programs that normally control the processor controlled device because it is installed as a boot-up routine when the device is switched-on. At this time, the logic continuously monitors a biometric input device, for example in the form of a fingerprint 15 scanner, for "real" input data.
Operation of the device remains suspended until the memory-resident logic detects authorized fingerprint data that compares positively with fingerprint data stored in the memory.
Another advantage achieved with the invention is ready adaptability of the system to commercially available processor controlled vehicles.
In accordance with the invention, a biometrically secured control system is provided, for preventing an unauthorized use of a vehicle comprising:
processor means for controlling fixnctions normally associated with the operation of a device;
memory means for storing biometrically related data and for storing instructions related to controlling at least some normal operations of the device;
A562 ~~
biometric data input means for providing "real-input" biometrically related data to one of the memory means and the processor; and means for preventing the processor from, or allowing the process to, execute instructions related to controlling at least the functions normally associated with the operation of the device in dependence upon the state of a compare operation, after a comparison has been performed between "real-input"
and previously stored biometrically related data.
Yet in accordance with another aspect of the invention a method is provided of validating a user of a vehicle and for allowing a control system of the device to be operable after validation. The method comprises the steps of receiving a user's biometrically related data from an input device; comparing at least an aspect of the received biometrically related data with stored biometrically related data;
preventing a processor from executing instructions normally related to the operation of the device when the compared data mis-matches within predetermined limits; and, allowing the processor to execute instructions normally related to the operation of the device after the compared data matches, within predetermined limits.
Brief Description of the Drawings 2o Exemplary embodiments of the invention will now be described in conjunction with the drawings in which:
Fig. 1 a block diagram of a security system in accordance with the invention shown having a microprocessor coupled to a fingerprint scanning device;
Fig. 2 of a block diagram of an alternative embodiment of a security system having a microcontroller coupled to a fingerprint scanning device in accordance with this invention;
~1~~2~~
Fig. 3 is an illustration depicting the basic system operation, showing program segmentation;
Fig. 4 is a block diagram of an alternative embodiment of a security system having user programmable features; and, Fig. 5 is a high-level flowchart depicting a part of a routine for validating a user and for operating a vehicle.
to Detailed Description Fig. 1 illustrates a processor based system (PBS) 8 which is modified in accordance with the invention to prevent unauthorized usage of one or more devices 18 related to the operation of a vehicle. For example block 18 shown in Fig. 1 may represent 15 the fuel delivery system and/or the ABS braking system of a vehicle. The reference numeral 9 designates generally a system of the present invention for providing these controlled access and monitoring functions. The system 9 includes biometric data input means in the form of a fingerprint scanning device 10 and associated, electronic-processing circuitry 12 shown coupled to a microprocessor 14; memory means in the 2o form of a read-only memory (ROlVn 16 is conveniently logically segmented into a first and second logical blocks 16a and 16b respectively, the first of which is for storing BIOS and program instructions implementing logic routines that in certain instances prevent a processor 14 from executing instructions normally associated with controlling the one or more devices 18. A second logical memory block 16b contains instructions that relate to 25 the control and operation of the one or more devices 18.
In the instance where this system is used to control operations related to a vehicle, in a normal, authorized, mode of operation, the processor 14 controls the vehicle's ~~~s~~s ignition system, braking system, and fuel delivery system. A key-operated ignition switch 17 is coupled to the processor to provide a signal for providing power to the processor 14 and for invoking the BIOS start-up sequence of instructions stored in boot-up portion 16a of the ROM 16.
Referring now to Fig. 2, an alternative embodiment is shown wherein a scanning device 10 and associated circuitry 12 is coupled to a microcontroller 14b having the BIOS
stored within the microcontroller's internal memory 14c. External ROM 16c is coupled to the processor and is stored with instructions related to the control of one or more devices 18. In this embodiment, the BIOS essentially comprises input/output routines, sanity checks, and more importantly, the set of program instructions implementing logic routines that in certain instances prevent the microcontroller 14b from executing instructions normally associated with controlling the one or more devices 18.
In practice, if the processor execution remains in a loop, in its verification sequence of instructions Is stored in the BIOS, fi~el is not supplied to the vehicle. Since the fi~el injectors are electronically controlled by the processor, the vehicle is immobilized until the processor receives and verifies biometric input data that corresponds to stored authorized user's data.
2o Turning now to Fig. 3, a block diagram is shown of a portion of the basic pseudo code control program that is stored in ROM 16a for determining whether or not associated instructions that control the one or more devices 18 will be executed. It should be noted in this example, that the instructions are merely exemplary and each pseudo-code instruction may comprise several micro-instructions. Of course, the technical aspects of 25 programming of such instructions is well known and within the capability of those skilled in the programming arts. In this example a first pseudo-code instruction, GET
FINGERPRINT, requires several micro-instructions to be performed in order to accomplish this task. However, the explanation of the invention becomes more clear using 21~fi2~6 these high level pseudo-code instructions. In this embodiment, a first (pseudo code) instruction at memory address 0001, GET FINGERPRINT is fetched and executed by the processor or microcontroller. As a result of executing this instruction, the fingerprint device is polled for input. Whether or not a fingerprint is available, input is received from the scanning device 10 and its associated circuitry 12. A next instruction, COMPARE
TEMPLATE, at memory address 0002 is fetched from memory and executed.
Essentially this pseudo-code instruction directs the processor to compare "real-input"
data that has been electronically formatted into a standard digital representation, with an electronically stored fingerprint represented in a same format. If the result of the compare instruction is Io true, that is if the "real-input" data is determined to be the same, within a predetermined margin of error, as the stored fingerprint data, the processor begins fetching instructions from the block of memory 16b associated with the normal operation of device 18. In the instance that the compare result is false, the processor 14 sets its instruction counter to 0001, and loops to fetch instructions starting at address 0001; the processor remains in this loop comprising instructions at address 000l through 0003 until the compare result is true. The optional key-switch 17 shown in Fig. 1 is provided to switch the processor and overall system on and off.
In the embodiments shown heretofore, read only memory is provided. Thus, the 2o electronically stored ( compare template ) fingerprint, is permanently stored in the ROM
16a, 16b, or in the BIOS portion of the memory as may be the case.
However, in an alternative embodiment shown in Fig. 4, non-volatile read/write memory 16d is present to provide a more flexible and user programmable system 49. The system 49 is similar to that of 9 in Fig. 1 however includes an input/output device 42, in the form of a display terminal coupled to the processor 14. In operation, once the verification loop comprising the instructions GET FINGERPRINT, COMPARE
TEMPLATE, is exited and verification has been made authenticating a user, the display ~~.5s~~~
terminal 42 becomes enabled. Instructions associated with the use of the display terminal in the form of a menu, are stored in the memory 16b and are presented to a user on the display terminal. Non-volatile read/write memory 16d is provided to store input information such as temporary users biometric input data. When the system is switched off and powered down by the switch 17, biometric data stored in the memory 16d will remain.
A menu (a portion of which is shown in Fig. 5) is provided on the display terminal 42 to allow a temporary user to be logged into the system for a predetermined period of time, thereby allowing a temporary user to use the vehicle. Upon selecting this option, the temporary user is prompted to place a finger on the scanner 10 within x seconds so that "real-input" data can be acquired. The data is then stored in the memory 16d for a predetermined period of time. However, temporary users can only provide their "real-input data to the system after a permanent user has successfully passed the verification loop of instructions. A real time clock 46 coupled to the processor presents the time of day to the processor 14a so that temporary user's biometric data can be erased after the expiration of its allotted time period. Alternatively, the menu provides an option for a temporary user to be deleted from the system. This embodiment can more readily be understood in conjunction with the flow chart of Fig. 5. Upon power-up, the processor 14a first checks the time of day and erases those entries from memory that have expired;
(this is not shown in Fig. 5.) The processor then executes GET FINGERPRINT at 50 and 2o compares at 52 the real-input data with all of its stored fingerprint data.
Upon passing the verification loop, a menu is provided at 54; furthermore, the vehicle control functions are enabled at 56. The menu has a plurality of functions, only a few of which are illustrated at 54. Menu option 1 for example invokes a routine to get a fingerprint of a temporary user and store it in 16d; (see 54.1 and 54.1 b in Fig. Sa. ) Other options may also be provided at 54. For example, instructions can be selected by a permanent user after authentication has taken place, to limit or restrict a temporary user's access to particular functions. For instance a permanent user may limit the fuel flow rate to a predetermined maximum, thus essentially preventing the vehicle from exceeding a maximum speed. This option may be s ~~~s~~~
selected, for example when a valet is given temporary use of the vehicle.
Furthermore, instructions may be selected that prevent temporary users from utilizing the radio or other features and options.
Alternatively, a permanent user may disable the system for a predetermined period of time to allow any users to utilize the system without regard to input data as long as the ignition key switch 17 is enabled.
The system defined heretofore ensures that the processor 14 will be prevented 1o from executing instructions related to controlling devices associated with a system, unless a block of instructions related to verification and authentication of one or more users has been successfi~lly executed and all required conditions are met. Expressed in a different way, the processor locks itself in a verification loop, rejecting the execution of its normal routines, until a correct biometric key in the form of biometric data is presented to it.
In the examples shown heretofore, in accordance with the invention, a scheme having sequential instructions is shown for simplicity, however, pointers, flags, and semaphores can be utilized in a similar system wherein branching and jumping to non-sequential blocks of memory is performed. Thus, the verification loop need not be the first 2o block of instructions executed, and similarly the control block of instructions need not be the second block of instructions executed, however the verification loop of instructions should be executed prior to executing the vehicle control instructions as an authorization check to ensure that the vehicle control instructions should be executed.
Advantageously, having a same processor control access to a vehicle and the operation of the vehicle, provides a highly secure system. If in an unauthorized attempt to tamper with and use the vehicle the processor becomes damaged, it will then not provide its required fixnctions, for example, controlling the fuel supply to the vehicle. If in an authorized attempt to use the vehicle the processor and memory were replaced with another processor and memory, the replacement memory would have to be compatible with the processor and control devices and suitably programmed to control the required functions relating to the operation of a vehicle; this scenario is highly unlikely.
Of course, numerous other features and embodiments may be envisaged without departing from the spirit and scope of the invention.
to
Claims (16)
1. A biometrically secured control system for preventing an unauthorized use of a vehicle comprising:
processor means for controlling functions normally associated with the operation of a device within a vehicle;
memory means for storing biometrically related data and for storing instructions related to controlling at least some normal operations of the device;
biometric data input means for providing "real-input" biometrically related data to one of the memory means and the processor;
input means for programming the control system and for providing data related to a time for operation of the vehicle by a temporary user;
timing means for providing a time signal to the processor, the time signal for comparison with time data corresponding to a temporary user; and, means for preventing the processor from, and allowing the process to, execute instructions related to controlling at least the functions normally associated with the operation of the vehicle in dependence upon the results of compare operations, after a comparison has been performed between "real" and previously stored biometrically related data and between the time signal and previously stored time data, wherein the operation of the vehicle is prevented until a suitable match occurs between acquired "real" biometric related data and stored biometric data.
processor means for controlling functions normally associated with the operation of a device within a vehicle;
memory means for storing biometrically related data and for storing instructions related to controlling at least some normal operations of the device;
biometric data input means for providing "real-input" biometrically related data to one of the memory means and the processor;
input means for programming the control system and for providing data related to a time for operation of the vehicle by a temporary user;
timing means for providing a time signal to the processor, the time signal for comparison with time data corresponding to a temporary user; and, means for preventing the processor from, and allowing the process to, execute instructions related to controlling at least the functions normally associated with the operation of the vehicle in dependence upon the results of compare operations, after a comparison has been performed between "real" and previously stored biometrically related data and between the time signal and previously stored time data, wherein the operation of the vehicle is prevented until a suitable match occurs between acquired "real" biometric related data and stored biometric data.
2. A biometrically secured control system as defined in claim 1, wherein said biometric data input means comprises a fingerprint scanning input device.
3. A biometrically secured control system as defined in claim 1, wherein the biometric data input means are provided to at least input biometric data of an authorized user to be stored in a memory for later comparison with "real" input data.
4. A biometrically secured control system as defined in claim 1, wherein input means comprises an input terminal.
5. A biometrically secured control system as defined in claim 4, wherein the input terminal includes a key-pad and display means.
6. A biometrically secured control system as defined in claim 5, wherein the normal operation of the input terminal is dependent upon a positive compare result after a comparison has been performed between "real-input" and stored biometrically related data.
7. A biometrically secured control system as defined in claim 1, wherein the timing means comprises a real time clock coupled to the processor.
8. A biometrically secured control system as defined in claim 1, wherein time data corresponding to a temporary user is indicative of an allotted time, the system comprising means for deleting the temporary user upon expiration of the allotted time.
9. A biometrically secured control system as defined in claim 1, wherein time data corresponding to a temporary user is indicative of an allotted time, the system comprising means for altering the authorisation of the temporary user upon expiration of the allotted time.
10. A method of validating a user of a vehicle and for allowing a control system of the vehicle to be operable after said validation, comprising the steps of:
providing a memory for storing a temporary authorised user's biometrically related data and a condition for affecting the temporary user's authorisation to operate the vehicle;
testing for the condition for affecting a user's authorisation;
when the condition is met, affecting the user's authorisation; and, receiving a user's biometrically related data from an input device;
comparing at least an aspect of the received biometrically related data with biometrically related data stored within the memory to determine a resulting user authorisation;
in dependence upon the resulting user authorisation, performing one of preventing and allowing a processor from executing instructions normally related to the operation of the vehicle.
providing a memory for storing a temporary authorised user's biometrically related data and a condition for affecting the temporary user's authorisation to operate the vehicle;
testing for the condition for affecting a user's authorisation;
when the condition is met, affecting the user's authorisation; and, receiving a user's biometrically related data from an input device;
comparing at least an aspect of the received biometrically related data with biometrically related data stored within the memory to determine a resulting user authorisation;
in dependence upon the resulting user authorisation, performing one of preventing and allowing a processor from executing instructions normally related to the operation of the vehicle.
11. A method as defined in claim 10 comprising the steps of:
in dependence upon the resulting user authorisation, performing the following steps:
providing to the memory for storage a temporary authorized user's biometrically related data and a condition for affecting the temporary user's authorisation to operate the vehicle;
in dependence upon the resulting user authorisation, performing the following steps:
providing to the memory for storage a temporary authorized user's biometrically related data and a condition for affecting the temporary user's authorisation to operate the vehicle;
12. A method as defined in claim 11 comprising the steps of:
preventing an input terminal from operating normally when the user authorisaiton is within predetermined limits; and, allowing the input terminal to operate normally when the user authorisation is within other predetermined limits, wherein the step of in dependence upon the resulting user authorisation, performing the following steps is performed using the terminal.
preventing an input terminal from operating normally when the user authorisaiton is within predetermined limits; and, allowing the input terminal to operate normally when the user authorisation is within other predetermined limits, wherein the step of in dependence upon the resulting user authorisation, performing the following steps is performed using the terminal.
13. A method as defined in claim 12, wherein the preventing and allowing steps are performed by the processor in dependence upon results of the comparing step.
14. A method as defined in claim 10, further comprising the step of automatically varying a temporary user's authorisation upon detection of the condition being met.
15. A method as defined in claim 10, further comprising the step of automatically deleting a temporary user's biometrically related data from the memory upon detection of the condition being met.
16. A method as defined in claim 10, wherein the condition is a time related condition.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002156236A CA2156236C (en) | 1995-08-16 | 1995-08-16 | Biometrically secured control system for preventing the unauthorized use of a vehicle |
US08/691,537 US5867802A (en) | 1995-08-16 | 1996-08-02 | Biometrically secured control system for preventing the unauthorized use of a vehicle |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002156236A CA2156236C (en) | 1995-08-16 | 1995-08-16 | Biometrically secured control system for preventing the unauthorized use of a vehicle |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2156236A1 CA2156236A1 (en) | 1997-02-17 |
CA2156236C true CA2156236C (en) | 1999-07-20 |
Family
ID=4156442
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002156236A Expired - Fee Related CA2156236C (en) | 1995-08-16 | 1995-08-16 | Biometrically secured control system for preventing the unauthorized use of a vehicle |
Country Status (2)
Country | Link |
---|---|
US (1) | US5867802A (en) |
CA (1) | CA2156236C (en) |
Families Citing this family (119)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US6140938A (en) * | 1995-04-14 | 2000-10-31 | Flick; Kenneth E. | Remote control system suitable for a vehicle and having remote transmitter verification |
US6111977A (en) * | 1997-04-17 | 2000-08-29 | Cross Match Technologies, Inc. | Hand-held fingerprint recognition and transmission device |
US6263090B1 (en) | 1997-05-19 | 2001-07-17 | Cross Match Technologies, Inc. | Code reader fingerprint scanner |
DE19747654A1 (en) * | 1997-10-29 | 1999-05-20 | Telefunken Microelectron | Procedure for operating a security system |
AU2996799A (en) * | 1998-03-17 | 1999-10-11 | Veridicom, Inc. | Integrated biometric authentication for access to computers |
US6031465A (en) | 1998-04-16 | 2000-02-29 | Burgess; James P. | Keyless entry system for vehicles in particular |
US7106171B1 (en) | 1998-04-16 | 2006-09-12 | Burgess James P | Keyless command system for vehicles and other applications |
US6178255B1 (en) | 1998-04-28 | 2001-01-23 | Cross Match Technologies, Inc. | Individualized fingerprint scanner |
DE19842545A1 (en) * | 1998-09-17 | 2000-03-23 | Bosch Gmbh Robert | Operating mode selector for motor vehicle security system uses biometric signal such as fingerprint signal and selects mode based on pattern matching |
DE59902367D1 (en) * | 1998-09-22 | 2002-09-19 | Siemens Ag | METHOD AND DEVICE FOR CHECKING THE AUTHORIZATION OF ACCESS TO A SYSTEM |
DE19845299B4 (en) * | 1998-10-01 | 2004-01-29 | Siemens Ag | Method for starting a motor vehicle and device for starting an internal combustion engine |
US6381347B1 (en) * | 1998-11-12 | 2002-04-30 | Secugen | High contrast, low distortion optical acquistion system for image capturing |
USD433413S (en) * | 1999-04-09 | 2000-11-07 | Biolink Technologies International, Inc. | Biometric scanning aperture for a computer input device |
US6282304B1 (en) | 1999-05-14 | 2001-08-28 | Biolink Technologies International, Inc. | Biometric system for biometric input, comparison, authentication and access control and method therefor |
US6272562B1 (en) | 1999-05-28 | 2001-08-07 | Cross Match Technologies, Inc. | Access control unit interface |
US6886104B1 (en) | 1999-06-25 | 2005-04-26 | Cross Match Technologies | Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface |
US6744910B1 (en) | 1999-06-25 | 2004-06-01 | Cross Match Technologies, Inc. | Hand-held fingerprint scanner with on-board image normalization data storage |
US7162060B1 (en) | 1999-08-09 | 2007-01-09 | Cross Match Technologies | Method, system, and computer program product for control of platen movement during a live scan |
US6658164B1 (en) * | 1999-08-09 | 2003-12-02 | Cross Match Technologies, Inc. | Calibration and correction in a fingerprint scanner |
EP1208523A1 (en) * | 1999-08-09 | 2002-05-29 | Cross Match Technologies, Inc. | System and method for sending a packet with position address and line scan data over an interface cable |
JP2003506799A (en) * | 1999-08-09 | 2003-02-18 | クロス マッチ テクノロジーズ, インコーポレイテッド | Method, system, and computer program product for interface between GUI and fingerprint scanner |
PL341930A1 (en) * | 1999-08-10 | 2001-02-12 | Payment Prot Systems | Method of enabling and disabling an equipment in time-depended manner |
US6195648B1 (en) | 1999-08-10 | 2001-02-27 | Frank Simon | Loan repay enforcement system |
US6483932B1 (en) * | 1999-08-19 | 2002-11-19 | Cross Match Technologies, Inc. | Method and apparatus for rolled fingerprint capture |
EP1224609A1 (en) | 1999-10-22 | 2002-07-24 | Cross Match Technologies, Inc. | Adjustable, rotatable finger guide in a tenprint scanner with movable prism platen |
US6738810B1 (en) | 1999-11-03 | 2004-05-18 | D. Michael Corporation | Method and apparatus for encouraging timely payments associated with a computer system |
US20020123964A1 (en) * | 1999-11-03 | 2002-09-05 | Gerald Arthur Kramer | Payment monitoring system |
US7642895B2 (en) * | 1999-12-20 | 2010-01-05 | The Chamberlain Group, Inc. | Garage door operator having thumbprint identification system |
US6695207B1 (en) * | 2000-02-04 | 2004-02-24 | Carroll Boyd Norris, Jr. | System for secure, identity authenticated, and immediate financial transactions as well as activation of varied instrumentalities |
CN1314031C (en) | 2000-02-21 | 2007-05-02 | 特科2000国际有限公司 | Portable data storage device |
CN1129867C (en) * | 2000-03-17 | 2003-12-03 | 杭州中正生物认证技术有限公司 | Finger print hard disc |
JP2001262899A (en) * | 2000-03-21 | 2001-09-26 | Mitsubishi Electric Corp | Vehicle key system |
JP2001262890A (en) * | 2000-03-21 | 2001-09-26 | Mitsubishi Electric Corp | Vehicle key system |
JP3868701B2 (en) * | 2000-03-21 | 2007-01-17 | 三菱電機株式会社 | Vehicle key system |
FR2807899B1 (en) * | 2000-04-18 | 2002-10-18 | Valeo Electronique | METHOD FOR SECURING A COMMUNICATION FOR A HANDS-FREE ACCESS SYSTEM |
AU757159C (en) * | 2000-05-16 | 2003-07-03 | Mu Hua Investments Limited | Biometric key |
EP1312040B1 (en) * | 2000-08-18 | 2006-04-05 | Cross Match Technologies, Inc. | Fingerprint scanner auto-capture system and method |
EP1328906A1 (en) * | 2000-10-25 | 2003-07-23 | Catalina Marketing International, Inc. | Method and system using biometrics to determine whether one is authorized to make a purchase |
US7218202B2 (en) * | 2000-11-16 | 2007-05-15 | Mu Hua Investment Limited | Biometric key |
US20020145535A1 (en) * | 2001-01-09 | 2002-10-10 | Flick Kenneth E. | Vehicle control system for a vehicle data communications bus and having verification features |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
WO2002088878A2 (en) * | 2001-04-26 | 2002-11-07 | Cross Match Technologies, Inc. | Silicone rubber surfaces for biometric print tir prisms |
KR20030097847A (en) * | 2001-05-02 | 2003-12-31 | 시큐젠 코포레이션 | Authenticating user on computer network for biometric information |
KR20020028754A (en) * | 2001-05-04 | 2002-04-17 | 안준영 | LCD panel also functioning as fingerprint acquisition |
CN1509895A (en) * | 2001-06-22 | 2004-07-07 | ��Τ����˹ | Color copying method |
WO2003003278A1 (en) * | 2001-06-28 | 2003-01-09 | Trek 2000 International Ltd. | A portable device having biometrics-based authentication capabilities |
AU2001298005B2 (en) * | 2001-06-28 | 2008-01-03 | Trek 2000 International Ltd | Method and devices for data transfer |
WO2003003295A1 (en) * | 2001-06-28 | 2003-01-09 | Trek 2000 International Ltd. | A portable device having biometrics-based authentication capabilities |
US20030012374A1 (en) * | 2001-07-16 | 2003-01-16 | Wu Jian Kang | Electronic signing of documents |
JP2003067731A (en) * | 2001-08-28 | 2003-03-07 | Nec Corp | Mobile radio terminal unit |
US6633090B2 (en) * | 2001-09-07 | 2003-10-14 | Delphi Technologies, Inc. | Starting system for an automotive vehicle using fingerprint recognition |
KR100432490B1 (en) * | 2001-09-17 | 2004-05-22 | (주)니트 젠 | Optical fingerprint acquisition apparatus |
US7237115B1 (en) * | 2001-09-26 | 2007-06-26 | Sandia Corporation | Authenticating concealed private data while maintaining concealment |
US7174463B2 (en) * | 2001-10-04 | 2007-02-06 | Lenovo (Singapore) Pte. Ltd. | Method and system for preboot user authentication |
EP1476841B1 (en) | 2002-01-17 | 2008-08-27 | Cross Match Technologies, Inc. | Fingerprint workstation and methods |
US6867850B2 (en) * | 2002-01-17 | 2005-03-15 | Cross Match Technologies, Inc. | Light wedge for illuminating a platen in a print scanner |
US6954260B2 (en) * | 2002-01-17 | 2005-10-11 | Cross Match Technologies, Inc. | Systems and methods for illuminating a platen in a print scanner |
AU2002233912B2 (en) * | 2002-02-07 | 2006-01-05 | Trek 2000 International Ltd | A portable data storage and image recording device capable of direct connection to a computer USB port |
US7073711B2 (en) * | 2002-04-19 | 2006-07-11 | Cross Match Technologies, Inc. | Mobile handheld code reader and print scanner system and method |
US7079007B2 (en) * | 2002-04-19 | 2006-07-18 | Cross Match Technologies, Inc. | Systems and methods utilizing biometric data |
CN1605069A (en) | 2002-05-13 | 2005-04-06 | 特科2000国际有限公司 | System and equipment for compressing and decompressing data in portable data storage device |
US10118576B2 (en) * | 2002-06-11 | 2018-11-06 | Intelligent Technologies International, Inc. | Shipping container information recordation techniques |
US7898385B2 (en) * | 2002-06-26 | 2011-03-01 | Robert William Kocher | Personnel and vehicle identification system using three factors of authentication |
US6757596B1 (en) * | 2002-06-28 | 2004-06-29 | David Moberg | Aircraft anti-theft system |
TW588243B (en) * | 2002-07-31 | 2004-05-21 | Trek 2000 Int Ltd | System and method for authentication |
AU2003254280A1 (en) * | 2002-08-02 | 2004-02-23 | Cross Match Technologies, Inc. | System and method for counting ridges in a captured print image |
WO2004019382A2 (en) * | 2002-08-21 | 2004-03-04 | Secugen Corporation | Tft sensor having improved imaging surface |
CZ2005209A3 (en) * | 2002-09-10 | 2005-12-14 | Ivi Smart Technologies, Inc. | Safe biometric verification of identity |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US7164440B2 (en) * | 2003-02-28 | 2007-01-16 | Cross Match Technologies, Inc. | Dynamic image adaptation method for adjusting the quality of digital prints |
US6923370B2 (en) * | 2003-05-20 | 2005-08-02 | Bradley L. Gotfried | Access system |
US6888445B2 (en) * | 2003-05-20 | 2005-05-03 | Bradley L. Gotfried | Vehicle identification system |
US20040232228A1 (en) * | 2003-05-20 | 2004-11-25 | Gotfried Bradley L. | Monitoring system |
DE10336199A1 (en) * | 2003-08-07 | 2005-03-10 | Daimler Chrysler Ag | Method, computer program and control unit for operating a vehicle in a restricted operating mode |
US7084734B2 (en) * | 2003-08-07 | 2006-08-01 | Georgia Tech Research Corporation | Secure authentication of a user to a system and secure operation thereafter |
US20050047631A1 (en) * | 2003-08-26 | 2005-03-03 | Cross Match Technologies, Inc. | Method and apparatus for rolled fingerprint image capture with variable blending |
US8918900B2 (en) * | 2004-04-26 | 2014-12-23 | Ivi Holdings Ltd. | Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport |
US20060293891A1 (en) * | 2005-06-22 | 2006-12-28 | Jan Pathuel | Biometric control systems and associated methods of use |
TWI326427B (en) * | 2005-06-22 | 2010-06-21 | Egis Technology Inc | Biometrics signal input device, computer system having the biometrics signal input device, and control method thereof |
JP2007065858A (en) * | 2005-08-30 | 2007-03-15 | Fujitsu Ltd | Authentication method, authentication device and program |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US20070150138A1 (en) | 2005-12-08 | 2007-06-28 | James Plante | Memory management in event recording systems |
US10878646B2 (en) | 2005-12-08 | 2020-12-29 | Smartdrive Systems, Inc. | Vehicle event recorder systems |
US9201842B2 (en) | 2006-03-16 | 2015-12-01 | Smartdrive Systems, Inc. | Vehicle event recorder systems and networks having integrated cellular wireless communications systems |
US8996240B2 (en) | 2006-03-16 | 2015-03-31 | Smartdrive Systems, Inc. | Vehicle event recorders with integrated web server |
US20070247279A1 (en) * | 2006-03-29 | 2007-10-25 | Vladimir Safonov | Method of unauthorized access prevention to a restricted object and a biometric security identification system |
US8649933B2 (en) | 2006-11-07 | 2014-02-11 | Smartdrive Systems Inc. | Power management systems for automotive video event recorders |
US8989959B2 (en) * | 2006-11-07 | 2015-03-24 | Smartdrive Systems, Inc. | Vehicle operator performance history recording, scoring and reporting systems |
US8868288B2 (en) | 2006-11-09 | 2014-10-21 | Smartdrive Systems, Inc. | Vehicle exception event management systems |
US20100131414A1 (en) * | 2007-03-14 | 2010-05-27 | Gavin Randall Tame | Personal identification device for secure transactions |
US8239092B2 (en) | 2007-05-08 | 2012-08-07 | Smartdrive Systems Inc. | Distributed vehicle event recorder systems having a portable memory data transfer system |
US20100235646A1 (en) * | 2009-03-13 | 2010-09-16 | Egis Technology Inc. | Verification method and system thereof |
US20120112879A1 (en) * | 2010-11-09 | 2012-05-10 | Ekchian Caroline M | Apparatus and method for improved vehicle safety |
US9043048B2 (en) | 2011-10-13 | 2015-05-26 | Panasonic Automotive Systems Company Of America, Division Of Panasonic Corporation Of North America | RF biometric ignition control system |
WO2013188827A1 (en) * | 2012-06-14 | 2013-12-19 | Fist Enterprises, Llc | Apparatus and method for vehicle operation using biometric fingerprint identification |
US9728228B2 (en) | 2012-08-10 | 2017-08-08 | Smartdrive Systems, Inc. | Vehicle event playback apparatus and methods |
AU2013312495B2 (en) | 2012-09-05 | 2019-03-21 | Element, Inc. | Biometric authentication in connection with camera-equipped devices |
US9002586B2 (en) | 2012-12-03 | 2015-04-07 | Honda Motor Co., Ltd. | Integrated biometric switch |
US9135420B2 (en) * | 2013-02-06 | 2015-09-15 | GM Global Technology Operations LLC | Biometric data-driven application of vehicle operation settings |
US9807196B2 (en) | 2013-09-17 | 2017-10-31 | Toyota Motor Sales, U.S.A. | Automated social network interaction system for a vehicle |
US9902266B2 (en) | 2013-09-17 | 2018-02-27 | Toyota Motor Engineering & Manufacturing North America, Inc. | Interactive vehicle window display system with personal convenience reminders |
US9760698B2 (en) | 2013-09-17 | 2017-09-12 | Toyota Motor Sales, U.S.A., Inc. | Integrated wearable article for interactive vehicle control system |
US9387824B2 (en) | 2013-09-17 | 2016-07-12 | Toyota Motor Engineering & Manufacturing North America, Inc. | Interactive vehicle window display system with user identification and image recording |
US9400564B2 (en) | 2013-09-17 | 2016-07-26 | Toyota Motor Engineering & Manufacturing North America, Inc. | Interactive vehicle window display system with a safe driving reminder system |
US9340155B2 (en) | 2013-09-17 | 2016-05-17 | Toyota Motor Sales, U.S.A., Inc. | Interactive vehicle window display system with user identification |
US9501878B2 (en) | 2013-10-16 | 2016-11-22 | Smartdrive Systems, Inc. | Vehicle event playback apparatus and methods |
US9610955B2 (en) | 2013-11-11 | 2017-04-04 | Smartdrive Systems, Inc. | Vehicle fuel consumption monitor and feedback systems |
US8892310B1 (en) | 2014-02-21 | 2014-11-18 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
JP6494119B2 (en) | 2014-05-13 | 2019-04-03 | エレメント,インク. | System and method for connecting to a mobile device to provide an electronic key and manage access |
CN106664207B (en) | 2014-06-03 | 2019-12-13 | 埃利蒙特公司 | Attendance verification and management in relation to mobile devices |
US9663127B2 (en) | 2014-10-28 | 2017-05-30 | Smartdrive Systems, Inc. | Rail vehicle event detection and recording system |
US11069257B2 (en) | 2014-11-13 | 2021-07-20 | Smartdrive Systems, Inc. | System and method for detecting a vehicle event and generating review criteria |
US9679420B2 (en) | 2015-04-01 | 2017-06-13 | Smartdrive Systems, Inc. | Vehicle event recording system and method |
US9749317B2 (en) * | 2015-08-28 | 2017-08-29 | At&T Intellectual Property I, L.P. | Nullifying biometrics |
US10896417B2 (en) * | 2016-04-06 | 2021-01-19 | Ford Global Technologies, Llc | Wireless payment transactions in a vehicle environment |
SG11202002399SA (en) | 2017-09-18 | 2020-04-29 | Element Inc | Methods, systems, and media for detecting spoofing in mobile authentication |
SG11202109983RA (en) | 2019-03-12 | 2021-10-28 | Element Inc | Detecting spoofing of facial recognition with mobile devices |
US11507248B2 (en) | 2019-12-16 | 2022-11-22 | Element Inc. | Methods, systems, and media for anti-spoofing using eye-tracking |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4353056A (en) * | 1980-06-05 | 1982-10-05 | Siemens Corporation | Capacitive fingerprint sensor |
GB2244164A (en) * | 1990-05-18 | 1991-11-20 | Philips Electronic Associated | Fingerprint sensing |
US5559504A (en) * | 1993-01-08 | 1996-09-24 | Kabushiki Kaisha Toshiba | Surface shape sensor, identification device using this sensor, and protected system using this device |
US5686765A (en) * | 1993-03-19 | 1997-11-11 | Driver Id Llc | Vehicle security system including fingerprint and eyeball part identification |
DE4332411A1 (en) * | 1993-09-23 | 1995-03-30 | Bayerische Motoren Werke Ag | Theft protection for motor vehicles with several control units for vehicle components |
US5630836A (en) * | 1995-01-19 | 1997-05-20 | Vascor, Inc. | Transcutaneous energy and information transmission apparatus |
-
1995
- 1995-08-16 CA CA002156236A patent/CA2156236C/en not_active Expired - Fee Related
-
1996
- 1996-08-02 US US08/691,537 patent/US5867802A/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
US5867802A (en) | 1999-02-02 |
CA2156236A1 (en) | 1997-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2156236C (en) | Biometrically secured control system for preventing the unauthorized use of a vehicle | |
EP0849657B1 (en) | Secure data processing method and system | |
US7174463B2 (en) | Method and system for preboot user authentication | |
US5892906A (en) | Apparatus and method for preventing theft of computer devices | |
US5892902A (en) | Intelligent token protected system with network authentication | |
US6453417B1 (en) | Microcontroller with secure signature extraction | |
US7107460B2 (en) | Method and system for securing enablement access to a data security device | |
US20090327678A1 (en) | Enhancing Security of a System Via Access by an Embedded Controller to A Secure Storage Device | |
US5214695A (en) | Apparatus and method for loading a system reference diskette image from a system partition in a personal computer system | |
US6223284B1 (en) | Method and apparatus for remote ROM flashing and security management for a computer system | |
AU2009202726B2 (en) | BIOS protection device | |
US5983352A (en) | Method of detaching a security device from a personal computer | |
US6823464B2 (en) | Method of providing enhanced security in a remotely managed computer system | |
US20010032319A1 (en) | Biometric security system for computers and related method | |
US6098171A (en) | Personal computer ROM scan startup protection | |
US5341422A (en) | Trusted personal computer system with identification | |
US5828831A (en) | System for preventing unauthorized use of a personal computer and a method therefore security function, and methods of installing and detaching a security device to/from a computer | |
US7962760B2 (en) | Method and apparatus for selectively enabling a microprocessor-based system | |
US20030149852A1 (en) | Method and apparatus for securing data | |
US6742129B1 (en) | Software security mechanism | |
JPS6122815B2 (en) | ||
US5878210A (en) | Personal computer having a security function, a method of implementing the security function, and methods of installing and detaching a security device to/from a computer | |
JP3658189B2 (en) | Method of preventing impersonation in computer apparatus | |
WO1999047989A1 (en) | Integrated biometric authentication for access to computers | |
US20200028683A1 (en) | Separate cryptographic keys for multiple modes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed | ||
MKLA | Lapsed |
Effective date: 20040816 |