CA2242206C - Biometric interface device for upgrading existing access control units - Google Patents
Biometric interface device for upgrading existing access control units Download PDFInfo
- Publication number
- CA2242206C CA2242206C CA002242206A CA2242206A CA2242206C CA 2242206 C CA2242206 C CA 2242206C CA 002242206 A CA002242206 A CA 002242206A CA 2242206 A CA2242206 A CA 2242206A CA 2242206 C CA2242206 C CA 2242206C
- Authority
- CA
- Canada
- Prior art keywords
- access
- control system
- match
- individual
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Abstract
A method and an apparatus for upgrading an existing personal control system. The upgrade is achieved by replacing the personnel data input unit of an existing personal control system with a biometric interface device capable of reading physical characteristic and an access control signal in the format of the existing personnel control system.
Description
BIOMETRIC INTERFACE DEVICE FOR UPGRADING
EXISTING ACCESS CONTROL UNITS
BACKGROUND OF THE INVENTION
Field of the Invention The present invention relates to a method and apparatus for upgrading existing personnel control systems. More particularly, the present invention relates to replacing the interface units of existing personnel control units with a biometric interface capable of outputting a signal compatible with the format of the currently installed personnel control system.
Description of the Prior Art Increasingly, security problems are becoming a more noticeable part of modern life. Security was once primarily the preserve of classified government installations, but increasing losses and calamity have forced the review of security equipment and procedures for government and industry.
Cargo losses and the theft of corporate secrets cost industry billions of dollars annually. Public safety is endangered by the ability of intruders to access secured places, such as aircraft and airport buildings.
Personnel control and personal identification are daily problems, and continue to be the object of significant expenditures by organizations needing to identify employees, vendors, etc., who are to be allowed access to the secured areas. Typical personnel control applications include:
computer center; radioactive or biological danger areas;
controlled experiments; information storage areas; airport maintenance and freight areas; hospital closed areas and drug storage areas; apartment houses and office buildings;
manufacturing facilities and construction sites; safety deposit boxes and vaults; and computer terminal entry and access to information.
Obtaining an individual's identity is a common problem in any access control application. Many existing personnel control applications establish a person's identity using a personal identification code or a card having encoded identification information. More recently, in order to increase security, some organizations are installing biometric devices with personnel control capabilities. These devices electronically scan a personal physical characteristic of an individual, such as a portion of the epidermis or human eye.
After scanning a personal physical characteristic, these devices generate a pattern which is compared against a library of patterns that identifies the individuals permitted access to a controlled area.
For example, U.S. Patent No. 3,581,282 discloses a palm print identification system. In one example, a number code, encoded on an I.D. card, uniquely identifies a palm of an individual. The system reads the I.D. card and the actual palm of the individual. The number code is used as an index to retrieve a stored palm print pattern. Then, the stored palm print pattern is compared to the fresh palm print pattern to verify the identity of the individual.
U.S. Patent No. 4,210,899 discloses a fingerprint-based personnel control and identification apparatus. The apparatus reads a human fingerprint and transmits an electronic representation of the fingerprint to a centralized image processing unit. The centralized image processing unit determines access to certain areas, terminals or doors based on the specific fingerprint read.
U.S. Patent No. 5,337,043 discloses a personnel control system using data stored in the form of a barcode. A
fingerprint pattern of the keyholder is stored in the form of a barcode on the key. After tile key is placed on the keyway of a terminal at a personnel control point and read, the keyholder may then be prompted to place a finger against the fingerprint reader. The fingerprint is scanned and compared at the access control point terminal with the key encoded information. If a match is made, the personnel control point decision and the keyholder identifying code are sent to a remote central processor or host computer. The central processor determines whether a keyholder is permitted to access a particular area at the particular time that the card is read. A signal indicating that access is granted or denied is sent to the terminal.
U.S. Patent No. 5,195,145 provides an apparatus which scans a fingerprint and provides positive confirmation of an individual's identity at a particular location at a particular time. The terminal utilizes fingerprint scanners with magnetic cardreaders to reduce fraud in credit card transactions by sending the scanned card and fingerprint to a credit verification company.
EXISTING ACCESS CONTROL UNITS
BACKGROUND OF THE INVENTION
Field of the Invention The present invention relates to a method and apparatus for upgrading existing personnel control systems. More particularly, the present invention relates to replacing the interface units of existing personnel control units with a biometric interface capable of outputting a signal compatible with the format of the currently installed personnel control system.
Description of the Prior Art Increasingly, security problems are becoming a more noticeable part of modern life. Security was once primarily the preserve of classified government installations, but increasing losses and calamity have forced the review of security equipment and procedures for government and industry.
Cargo losses and the theft of corporate secrets cost industry billions of dollars annually. Public safety is endangered by the ability of intruders to access secured places, such as aircraft and airport buildings.
Personnel control and personal identification are daily problems, and continue to be the object of significant expenditures by organizations needing to identify employees, vendors, etc., who are to be allowed access to the secured areas. Typical personnel control applications include:
computer center; radioactive or biological danger areas;
controlled experiments; information storage areas; airport maintenance and freight areas; hospital closed areas and drug storage areas; apartment houses and office buildings;
manufacturing facilities and construction sites; safety deposit boxes and vaults; and computer terminal entry and access to information.
Obtaining an individual's identity is a common problem in any access control application. Many existing personnel control applications establish a person's identity using a personal identification code or a card having encoded identification information. More recently, in order to increase security, some organizations are installing biometric devices with personnel control capabilities. These devices electronically scan a personal physical characteristic of an individual, such as a portion of the epidermis or human eye.
After scanning a personal physical characteristic, these devices generate a pattern which is compared against a library of patterns that identifies the individuals permitted access to a controlled area.
For example, U.S. Patent No. 3,581,282 discloses a palm print identification system. In one example, a number code, encoded on an I.D. card, uniquely identifies a palm of an individual. The system reads the I.D. card and the actual palm of the individual. The number code is used as an index to retrieve a stored palm print pattern. Then, the stored palm print pattern is compared to the fresh palm print pattern to verify the identity of the individual.
U.S. Patent No. 4,210,899 discloses a fingerprint-based personnel control and identification apparatus. The apparatus reads a human fingerprint and transmits an electronic representation of the fingerprint to a centralized image processing unit. The centralized image processing unit determines access to certain areas, terminals or doors based on the specific fingerprint read.
U.S. Patent No. 5,337,043 discloses a personnel control system using data stored in the form of a barcode. A
fingerprint pattern of the keyholder is stored in the form of a barcode on the key. After tile key is placed on the keyway of a terminal at a personnel control point and read, the keyholder may then be prompted to place a finger against the fingerprint reader. The fingerprint is scanned and compared at the access control point terminal with the key encoded information. If a match is made, the personnel control point decision and the keyholder identifying code are sent to a remote central processor or host computer. The central processor determines whether a keyholder is permitted to access a particular area at the particular time that the card is read. A signal indicating that access is granted or denied is sent to the terminal.
U.S. Patent No. 5,195,145 provides an apparatus which scans a fingerprint and provides positive confirmation of an individual's identity at a particular location at a particular time. The terminal utilizes fingerprint scanners with magnetic cardreaders to reduce fraud in credit card transactions by sending the scanned card and fingerprint to a credit verification company.
All these new biometric devices are not compatible with the presently installed personnel control devices which establish a person's identity utilizing a personal identification code or encoded card. Often, presently installed devices must be deactivated or removed, which adds to the expense of installing a new control access system.
Therefore, there is a need for an inexpensive biometric interface device to upgrade existing personnel control units.
SZTN~lARY OF THE INVENTION
The present invention provides a biometric interface device for interfacing with an existing personnel control system of a type that utilize individualized stored data for the purpose of determining access authorization.
In one embodiment, the biometric interface device associates a library of personal physical characteristic topographical patterns, such as epidermal topographical patterns, with identification information stored in a memory.
When a topographical pattern is read by the biometric interface device, it is compared against the entries of associated identification information stored in a memory unit.
If there is a match, the identification information may be transmitted to a host computer in the format of the currently installed system. The host computer may use the identification information as an index to ascertain whether the individual is authorized to access a controlled area. For added security, the subject individual may also be required to input a personal code and present an identification document containing machine readable data to be scanned or read. If access is authorized, the host transmits an authorization signal in the format of the currently installed system.
Alternatively, the personal characteristic topographical pattern is stored on an identification document in a machine readable code. The terminal reads the document, scans the personal characteristic and performs a comparison. If there is a match, the identification information may be transmitted to a host computer in the format of the currently installed system. The host computer accesses the data base to obtain authorization information. If the individual is authorized, the host transmits an authorization signal.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a block diagram of an embodiment of the present invention;
Figure 2 is a block diagram of a front face of a first embodiment of a terminal of the present invention;
Figures 3A and 3B are diagrams of the steps of controlling access utilizing the terminal of the first embodiment of the present invention;
Figure 4 is a block diagram of a front face of a second embodiment of a terminal of the present invention;
Figures 5A and 5B are diagrams of the steps of controlling access utilizing the terminal of the second embodiment of the present invention;
Figure 6 is a block diagram of a typical card;
Therefore, there is a need for an inexpensive biometric interface device to upgrade existing personnel control units.
SZTN~lARY OF THE INVENTION
The present invention provides a biometric interface device for interfacing with an existing personnel control system of a type that utilize individualized stored data for the purpose of determining access authorization.
In one embodiment, the biometric interface device associates a library of personal physical characteristic topographical patterns, such as epidermal topographical patterns, with identification information stored in a memory.
When a topographical pattern is read by the biometric interface device, it is compared against the entries of associated identification information stored in a memory unit.
If there is a match, the identification information may be transmitted to a host computer in the format of the currently installed system. The host computer may use the identification information as an index to ascertain whether the individual is authorized to access a controlled area. For added security, the subject individual may also be required to input a personal code and present an identification document containing machine readable data to be scanned or read. If access is authorized, the host transmits an authorization signal in the format of the currently installed system.
Alternatively, the personal characteristic topographical pattern is stored on an identification document in a machine readable code. The terminal reads the document, scans the personal characteristic and performs a comparison. If there is a match, the identification information may be transmitted to a host computer in the format of the currently installed system. The host computer accesses the data base to obtain authorization information. If the individual is authorized, the host transmits an authorization signal.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a block diagram of an embodiment of the present invention;
Figure 2 is a block diagram of a front face of a first embodiment of a terminal of the present invention;
Figures 3A and 3B are diagrams of the steps of controlling access utilizing the terminal of the first embodiment of the present invention;
Figure 4 is a block diagram of a front face of a second embodiment of a terminal of the present invention;
Figures 5A and 5B are diagrams of the steps of controlling access utilizing the terminal of the second embodiment of the present invention;
Figure 6 is a block diagram of a typical card;
Figure 7 is a block diagram of the rear face of the typical card;
Figure 8 is a block diagram of a front face of a third embodiment of a terminal of the present invention;
Figures 9A through 9C are diagrams of the steps of controlling access utilizing the terminal of the third embodiment of the present invention; and Figures 10A and lOB are diagrams of alternative steps of controlling access utilizing the terminal of the third embodiment of the present invention.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
The preferred embodiments are described with reference to drawing figures wherein like numerals represent like elements throughout.
Figure 1 shows a plurality of terminals 10 having a local processor 20 and memory unit 30. Each terminal 10 is.
substituted for an existing terminal and is preferably connected to an existing personnel control unit 40. The personnel control unit 40 controls access based upon a signal from the terminal 10. Each terminal 10 is also preferably connected to an existing host 50 which includes a processor 52, RAM 54 and a ROM 56. The host 50 is preferably programmed to permit access, entry and/or egress, for certain personnel based upon authorization information. Authorization information preferably includes a list of personnel controlled areas and times during which an individual is to be permitted access. For example, an individual may be permitted access only during a specified work shift. The authorization information would include the permitted areas) and the permitted times) for that individual. Since the authorization information is under the employer's control, the permitted access areas) and times) can be changed easily without the need for the issuance of a new individual identification card or a manual check of updated access information by security personnel. The host 50 has a database 60 for storing the authorization information and is connected to an input unit 70, such as a keyboard, and an output unit 80, such as a liquid crystal display.
Figure 2 is a diagram of a first embodiment of the terminal of the present invention. The terminal 10 includes a display 12 and a personal characteristic scanner 14 as well as the local processor 20 and memory unit 30. Examples of the personal characteristic scanner 14 include an epidermal topographical scanner and an eye scanner. Examples of epidermal topographical scanners include fingerprint scanners, knuckleprint scanners, handprint scanners and palmprint scanners. Examples of eye scanners include iris scanners and retina scanners. The personal characteristic scanner reads an individual's personal characteristic and generates a personal characteristic pattern which is compared to stored personal characteristic patterns.
The operational flow of a first embodiment of the terminal 10 is shown in Figure 3. After the terminal 10 is activated, the program is started (S1) and the system is initialized, preferably automatically (52). When a personal characteristic is detected (S3), the personal characteristic scanner 14 scans the personal characteristic (S4) and a personal characteristic topographical pattern is generated (S5). The local processor 20 compares the generated pattern to a library of patterns stored in memory unit 30 (S6). If there is no match, access is denied (S6A). The terminal 10 may transmit the time of attempted access and the generated personal characteristic topographical pattern to the host 50 for storage in the database 60 (S6B). Alternatively, the terminal 10 may store the time of attempted access and the generated personal characteristic topographical pattern in the memory unit 30. The host 50 or terminal 10 may generate a report of the attempted access(S6C). Thereafter, the system returns to step S3.
If there is a match, identification information associated with the stored personal characteristic topographical pattern is transmitted to the host 50 (S7). The host 50 accesses the database 60 to obtain authorization information regarding the individual seeking access (S8). If the authorization information associated with the identification information in the database 60 permits access (S9), the host 50 transmits a signal to the terminal 10 and stores the access time (S10). The terminal 10 instructs the personal control unit 40 to grant access (S11) and the host 50 generates a report (S12), and the system returns to step S3.
If the authorization information does not permit access (S9A), the host 50 stores the time of attempted access with _g_ the generated physical characteristic topographical pattern in the data base 60 (S9B). The host 50 may also generate a report of the attempted access (S9C). Thereafter, the system returns to step S3.
It will be recognized that a principal advantage of the present invention is the ability to replace an existing access control device, such as a barcode scanner, with a personal characteristic identification control apparatus without the need for modifying the existing system. Since the present invention provides an output that is compatible with the existing system, the change will appear seamless to the current host. The ability to avoid the need for changes in software or hardware provides an economic advantage that greatly enhances the added feature of a physical characteristic identification system.
Figure 4 is a diagram of a second embodiment of a terminal of the present invention. The terminal 100 preferably includes the same apparatus as terminal 10. In addition to the local processor 20, memory unit 30, display 12 and personal physical characteristic topographical scanner 14, the terminal 100 also includes a keypad 16 for receiving a personalized code, such as a PIN, which is required to gain access.
The operational flow of a second embodiment of the present invention utilizing terminal 100, is shown in Figures 5A-5B. After the terminal 100 is activated, the program is started (S1) and the system is initialized, preferably automatically (S2). When a personal code is detected (S3), _g_ the terminal 100 requests a personal characteristic (S4).
When a personal characteristic is detected (S5), the personal characteristic is scanned (S6) by the scanner 14 and a personal characteristic pattern is generated (S7). The local processor 20 compares the newly generated personal characteristic pattern and personal code with the library of corresponding data stored in memory unit 30 (S8).
If there is no match, access is denied (S8A) , and the host 50 or terminal 100 stores the time of attempted access with the generated physical characteristic topographical pattern in the data base 60 or memory unit 30 (S8B). The host 50 or terminal 100 may also generate a report of the attempted access (S8C). Preferably, the terminal 100 stores the information and generates the report. Thereafter, the system returns to step S3.
If there is a match, the identification information associated with the stored personal characteristic topographical pattern is transmitted to the host 50 in a format compatible with the existing system (S9). The host 50 accesses database 60 to obtain authorization information regarding the individual seeking access (S10). If the authorization information does not permit entry or exit, access is denied (S11A) and the host 50 stores the time of attempted access with the identification information (S11B).
Subsequently, the host 50 generates a report (S11C) and the system returns to step S3.
If there is a match, the host 50 transmits a signal to the terminal 100 in the existing format and stores the time access is granted. The terminal 100 instructs the personal control unit 40 in the existing format to grant access (S13) and the host 50 generates a report (S14) . Thereafter, the system returns to step S3.
Figures 6 and 7 show an example of an identification document 90, which is read by a terminal 200 (Figure 8) in a third embodiment of the present invention. In order to gain access, an individual is required to present an identification document 90 having at least one machine readable medium.
Figure 6 shows the front face of an identification document 90 having a photograph 92 and a visible machine readable code 94. The identification document 90 may also contain personal identification information such as the bearer's name, eye color, personal characteristic information, etc. The same personal identification information may be encoded in a visible machine readable code 94. Figure 5 shows the rear face of the identification document 90 which includes a magnetic stripe 96. Personal identification information from a front face of the identification document 90 and personal characteristic information are preferably encoded on the magnetic stripe 96.
Referring to Figure 8, a block diagram of a third embodiment of the present invention is shown. The terminal 200 is substituted for the terminal 10 in Figure 1. In addition to the local processor 20, memory unit 30, display 12, and personal topographical scanner 14, the terminal 200 further includes a keypad 16 for receiving a personal code, such as a PIN, and a card reader 210 for reading either visible machine readable code 94 or encoded data on a magnetic stripe 96. The reader 210 may be configured to read both 94 and 96. The personal characteristic topographical scanner 14 reads a personal characteristic and generates a personal characteristic pattern.
Operation of the third embodiment of the present invention is shown in the flowchart in Figure 9. After the terminal 200 is activated, the program is started (S1) and the system is initialized, preferably automatically (S2). Once the identification document 90 is detected (S3), the identification document 90 is read to obtain encoded identification information (S4). A personal code is requested (S5). If a code is not entered, the system returns to step S3. If a code is detected, the system requests a personal characteristic (S7). If a personal characteristic is not detected by scanner 14, the system returns to step S3. If a personal characteristic is detected, it is scanned (S9) by scanner 14 and a personal characteristic pattern (S10) is generated.
If the encoded identification information, personal code, and generated personal characteristic pattern does not match the identification information, code, and personal characteristic information retrieved from memory unit 30, access is denied. The host 50 or terminal 200 stores the newly presented encoded identification information, code and generated personal characteristic information in database 60 or memory unit 30. The host 50 or terminal 200 generates a report (S11A-S11C), and the system returns to S3.
If the encoded identification information, code and generated personal characteristic pattern matches stored identification information, code and personal characteristic pattern retrieved from the memory unit 30, an identification information signal is transmitted to the host 50 (S12).
Once the host 50 receives the identification information signal, the host 50 accesses the database 60 to obtain authorization information (S13). If the authorization information does not permit entry, access is denied (S14A) and the host 50 stores time of attempted access with the identification information (S14B) . The host 50 generates a report (S14C) and returns to step S3. If the authorization information permits entry, the host 50 transmits a signal in the existing format to the terminal 200 and stores the time access is granted. The terminal 200 instructs the personal control unit 40 in the existing format to grant access (S16).
The host 50 generates a report (S17), and the system returns to step S3.
Alternatively, the same terminal 200 may be programmed to provide a fourth embodiment of the present invention.
Operation of the fourth embodiment of the present invention is shown in Figure 10. After the terminal 200 is activated, the program is started (S1) and the system is initialized, preferably automatically (S2). After the card is detected, the machine readable code is read or scanned to obtain the encoded personal characteristic information (S4). A personal code is requested (S5) . If a code is detected, a personal characteristic is requested (S7). If the personal characteristic is detected (S8), a personal characteristic pattern is generated by scanner 14 (S10).
If there is no match, access is denied (S11A), and the host 50 or terminal 200 stores the time of attempted access with the generated physical characteristic topographical pattern in the data base 60 (S11B). The host 50 or terminal 200 may also generate a report of the attempted access (S11C).
Thereafter, the system returns to step S3.
If the generated personal characteristic pattern matches the encoded information and personal identification number (S11), the identification information associated with the stored personal characteristic topographical pattern is transmitted to the host 50 (S8). The host 50 accesses the database 60 to obtain authorization information (S12). If the authorization information permits entry then the host 50 transmits a signal in the existing format to-a terminal 200 and stores the time access is granted (S13-S14). The terminal 200 instructs the personnel control unit 40 to grant access (S15) in the existing format and the host 50 generates a report (S16). If authorization is not permitted, access is denied, the host 50 stores the time of attempted access and the host 50 generates a report (13A-13C). The system then returns to step S3.
Figure 8 is a block diagram of a front face of a third embodiment of a terminal of the present invention;
Figures 9A through 9C are diagrams of the steps of controlling access utilizing the terminal of the third embodiment of the present invention; and Figures 10A and lOB are diagrams of alternative steps of controlling access utilizing the terminal of the third embodiment of the present invention.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
The preferred embodiments are described with reference to drawing figures wherein like numerals represent like elements throughout.
Figure 1 shows a plurality of terminals 10 having a local processor 20 and memory unit 30. Each terminal 10 is.
substituted for an existing terminal and is preferably connected to an existing personnel control unit 40. The personnel control unit 40 controls access based upon a signal from the terminal 10. Each terminal 10 is also preferably connected to an existing host 50 which includes a processor 52, RAM 54 and a ROM 56. The host 50 is preferably programmed to permit access, entry and/or egress, for certain personnel based upon authorization information. Authorization information preferably includes a list of personnel controlled areas and times during which an individual is to be permitted access. For example, an individual may be permitted access only during a specified work shift. The authorization information would include the permitted areas) and the permitted times) for that individual. Since the authorization information is under the employer's control, the permitted access areas) and times) can be changed easily without the need for the issuance of a new individual identification card or a manual check of updated access information by security personnel. The host 50 has a database 60 for storing the authorization information and is connected to an input unit 70, such as a keyboard, and an output unit 80, such as a liquid crystal display.
Figure 2 is a diagram of a first embodiment of the terminal of the present invention. The terminal 10 includes a display 12 and a personal characteristic scanner 14 as well as the local processor 20 and memory unit 30. Examples of the personal characteristic scanner 14 include an epidermal topographical scanner and an eye scanner. Examples of epidermal topographical scanners include fingerprint scanners, knuckleprint scanners, handprint scanners and palmprint scanners. Examples of eye scanners include iris scanners and retina scanners. The personal characteristic scanner reads an individual's personal characteristic and generates a personal characteristic pattern which is compared to stored personal characteristic patterns.
The operational flow of a first embodiment of the terminal 10 is shown in Figure 3. After the terminal 10 is activated, the program is started (S1) and the system is initialized, preferably automatically (52). When a personal characteristic is detected (S3), the personal characteristic scanner 14 scans the personal characteristic (S4) and a personal characteristic topographical pattern is generated (S5). The local processor 20 compares the generated pattern to a library of patterns stored in memory unit 30 (S6). If there is no match, access is denied (S6A). The terminal 10 may transmit the time of attempted access and the generated personal characteristic topographical pattern to the host 50 for storage in the database 60 (S6B). Alternatively, the terminal 10 may store the time of attempted access and the generated personal characteristic topographical pattern in the memory unit 30. The host 50 or terminal 10 may generate a report of the attempted access(S6C). Thereafter, the system returns to step S3.
If there is a match, identification information associated with the stored personal characteristic topographical pattern is transmitted to the host 50 (S7). The host 50 accesses the database 60 to obtain authorization information regarding the individual seeking access (S8). If the authorization information associated with the identification information in the database 60 permits access (S9), the host 50 transmits a signal to the terminal 10 and stores the access time (S10). The terminal 10 instructs the personal control unit 40 to grant access (S11) and the host 50 generates a report (S12), and the system returns to step S3.
If the authorization information does not permit access (S9A), the host 50 stores the time of attempted access with _g_ the generated physical characteristic topographical pattern in the data base 60 (S9B). The host 50 may also generate a report of the attempted access (S9C). Thereafter, the system returns to step S3.
It will be recognized that a principal advantage of the present invention is the ability to replace an existing access control device, such as a barcode scanner, with a personal characteristic identification control apparatus without the need for modifying the existing system. Since the present invention provides an output that is compatible with the existing system, the change will appear seamless to the current host. The ability to avoid the need for changes in software or hardware provides an economic advantage that greatly enhances the added feature of a physical characteristic identification system.
Figure 4 is a diagram of a second embodiment of a terminal of the present invention. The terminal 100 preferably includes the same apparatus as terminal 10. In addition to the local processor 20, memory unit 30, display 12 and personal physical characteristic topographical scanner 14, the terminal 100 also includes a keypad 16 for receiving a personalized code, such as a PIN, which is required to gain access.
The operational flow of a second embodiment of the present invention utilizing terminal 100, is shown in Figures 5A-5B. After the terminal 100 is activated, the program is started (S1) and the system is initialized, preferably automatically (S2). When a personal code is detected (S3), _g_ the terminal 100 requests a personal characteristic (S4).
When a personal characteristic is detected (S5), the personal characteristic is scanned (S6) by the scanner 14 and a personal characteristic pattern is generated (S7). The local processor 20 compares the newly generated personal characteristic pattern and personal code with the library of corresponding data stored in memory unit 30 (S8).
If there is no match, access is denied (S8A) , and the host 50 or terminal 100 stores the time of attempted access with the generated physical characteristic topographical pattern in the data base 60 or memory unit 30 (S8B). The host 50 or terminal 100 may also generate a report of the attempted access (S8C). Preferably, the terminal 100 stores the information and generates the report. Thereafter, the system returns to step S3.
If there is a match, the identification information associated with the stored personal characteristic topographical pattern is transmitted to the host 50 in a format compatible with the existing system (S9). The host 50 accesses database 60 to obtain authorization information regarding the individual seeking access (S10). If the authorization information does not permit entry or exit, access is denied (S11A) and the host 50 stores the time of attempted access with the identification information (S11B).
Subsequently, the host 50 generates a report (S11C) and the system returns to step S3.
If there is a match, the host 50 transmits a signal to the terminal 100 in the existing format and stores the time access is granted. The terminal 100 instructs the personal control unit 40 in the existing format to grant access (S13) and the host 50 generates a report (S14) . Thereafter, the system returns to step S3.
Figures 6 and 7 show an example of an identification document 90, which is read by a terminal 200 (Figure 8) in a third embodiment of the present invention. In order to gain access, an individual is required to present an identification document 90 having at least one machine readable medium.
Figure 6 shows the front face of an identification document 90 having a photograph 92 and a visible machine readable code 94. The identification document 90 may also contain personal identification information such as the bearer's name, eye color, personal characteristic information, etc. The same personal identification information may be encoded in a visible machine readable code 94. Figure 5 shows the rear face of the identification document 90 which includes a magnetic stripe 96. Personal identification information from a front face of the identification document 90 and personal characteristic information are preferably encoded on the magnetic stripe 96.
Referring to Figure 8, a block diagram of a third embodiment of the present invention is shown. The terminal 200 is substituted for the terminal 10 in Figure 1. In addition to the local processor 20, memory unit 30, display 12, and personal topographical scanner 14, the terminal 200 further includes a keypad 16 for receiving a personal code, such as a PIN, and a card reader 210 for reading either visible machine readable code 94 or encoded data on a magnetic stripe 96. The reader 210 may be configured to read both 94 and 96. The personal characteristic topographical scanner 14 reads a personal characteristic and generates a personal characteristic pattern.
Operation of the third embodiment of the present invention is shown in the flowchart in Figure 9. After the terminal 200 is activated, the program is started (S1) and the system is initialized, preferably automatically (S2). Once the identification document 90 is detected (S3), the identification document 90 is read to obtain encoded identification information (S4). A personal code is requested (S5). If a code is not entered, the system returns to step S3. If a code is detected, the system requests a personal characteristic (S7). If a personal characteristic is not detected by scanner 14, the system returns to step S3. If a personal characteristic is detected, it is scanned (S9) by scanner 14 and a personal characteristic pattern (S10) is generated.
If the encoded identification information, personal code, and generated personal characteristic pattern does not match the identification information, code, and personal characteristic information retrieved from memory unit 30, access is denied. The host 50 or terminal 200 stores the newly presented encoded identification information, code and generated personal characteristic information in database 60 or memory unit 30. The host 50 or terminal 200 generates a report (S11A-S11C), and the system returns to S3.
If the encoded identification information, code and generated personal characteristic pattern matches stored identification information, code and personal characteristic pattern retrieved from the memory unit 30, an identification information signal is transmitted to the host 50 (S12).
Once the host 50 receives the identification information signal, the host 50 accesses the database 60 to obtain authorization information (S13). If the authorization information does not permit entry, access is denied (S14A) and the host 50 stores time of attempted access with the identification information (S14B) . The host 50 generates a report (S14C) and returns to step S3. If the authorization information permits entry, the host 50 transmits a signal in the existing format to the terminal 200 and stores the time access is granted. The terminal 200 instructs the personal control unit 40 in the existing format to grant access (S16).
The host 50 generates a report (S17), and the system returns to step S3.
Alternatively, the same terminal 200 may be programmed to provide a fourth embodiment of the present invention.
Operation of the fourth embodiment of the present invention is shown in Figure 10. After the terminal 200 is activated, the program is started (S1) and the system is initialized, preferably automatically (S2). After the card is detected, the machine readable code is read or scanned to obtain the encoded personal characteristic information (S4). A personal code is requested (S5) . If a code is detected, a personal characteristic is requested (S7). If the personal characteristic is detected (S8), a personal characteristic pattern is generated by scanner 14 (S10).
If there is no match, access is denied (S11A), and the host 50 or terminal 200 stores the time of attempted access with the generated physical characteristic topographical pattern in the data base 60 (S11B). The host 50 or terminal 200 may also generate a report of the attempted access (S11C).
Thereafter, the system returns to step S3.
If the generated personal characteristic pattern matches the encoded information and personal identification number (S11), the identification information associated with the stored personal characteristic topographical pattern is transmitted to the host 50 (S8). The host 50 accesses the database 60 to obtain authorization information (S12). If the authorization information permits entry then the host 50 transmits a signal in the existing format to-a terminal 200 and stores the time access is granted (S13-S14). The terminal 200 instructs the personnel control unit 40 to grant access (S15) in the existing format and the host 50 generates a report (S16). If authorization is not permitted, access is denied, the host 50 stores the time of attempted access and the host 50 generates a report (13A-13C). The system then returns to step S3.
Claims (8)
1. An apparatus for interfacing with an existing personnel control system that utilizes stored data in a predetermined format for the purpose of determining whether a presented individual is authorized to have access to a controlled area, the apparatus comprising:
means for storing physical characteristic information for a plurality of individuals;
means for storing for each individual, an access signal associated with the existing personnel control system;
means for scanning a physical characteristic of a presented individual;
means for generating a scanned physical characteristic signal for the presented individual;
means for comparing the stored physical characteristics information to the scanned physical characteristic signal to determine if a match is found;
means for outputting the access signal associated with the presented individual when a match is found; and means for communicating the outputted access signal to the existing control system in a format that is compatible with the predetermined format of the stored data so that the existing personnel control system will recognize the outputted access signal as a match for the presented individual stored data and authorize access to the controlled area.
means for storing physical characteristic information for a plurality of individuals;
means for storing for each individual, an access signal associated with the existing personnel control system;
means for scanning a physical characteristic of a presented individual;
means for generating a scanned physical characteristic signal for the presented individual;
means for comparing the stored physical characteristics information to the scanned physical characteristic signal to determine if a match is found;
means for outputting the access signal associated with the presented individual when a match is found; and means for communicating the outputted access signal to the existing control system in a format that is compatible with the predetermined format of the stored data so that the existing personnel control system will recognize the outputted access signal as a match for the presented individual stored data and authorize access to the controlled area.
2. The apparatus of claim 1 wherein the predetermined format of the existing personnel control system is compatible with information stored on a card.
3. The apparatus of claim 2 wherein the card has a magnetic stripe and the stored information is encoded thereon.
4. The apparatus of claim 2 wherein the stored information is encoded on the card in machine readable code.
5. The apparatus of claim 1 wherein the predetermined format of the existing personnel control system is compatible with a PIN.
6. The apparatus of claim 1 further comprising means for denying access when a match is not found.
7. The apparatus of claim 1 further comprising means for storing a time of attempted access and the scanned physical characteristic when a match is not found.
8. A biometric apparatus for interfacing with an existing personnel control system that utilizes stored data, in addition to biometric data, for the purpose of determining whether a presented individual is authorized to have access to a controlled area, the apparatus comprising:
means for storing biometric information for a plurality of individuals;
means for obtaining biometric information on a presented individual;
means for storing for each individual, an access signal associated with the existing personnel control system;
means for generating an obtained biometric information signal for the presented individual;
means for comparing the stored biometric information to the obtained signal to determine if a match is found;
means for outputting the access signal associated with the presented individual when a match is found; and means for communicating the outputted access signal to the existing control system in a format that is compatible with the stored data so that the existing personnel control system will recognize the outputted access signal as a match for the presented individual stored data and authorize access to the controlled area.
means for storing biometric information for a plurality of individuals;
means for obtaining biometric information on a presented individual;
means for storing for each individual, an access signal associated with the existing personnel control system;
means for generating an obtained biometric information signal for the presented individual;
means for comparing the stored biometric information to the obtained signal to determine if a match is found;
means for outputting the access signal associated with the presented individual when a match is found; and means for communicating the outputted access signal to the existing control system in a format that is compatible with the stored data so that the existing personnel control system will recognize the outputted access signal as a match for the presented individual stored data and authorize access to the controlled area.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/000,624 | 1997-12-30 | ||
US09/000,624 US5995014A (en) | 1997-12-30 | 1997-12-30 | Biometric interface device for upgrading existing access control units |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2242206A1 CA2242206A1 (en) | 1999-06-30 |
CA2242206C true CA2242206C (en) | 2001-09-04 |
Family
ID=21692314
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002242206A Expired - Fee Related CA2242206C (en) | 1997-12-30 | 1998-06-30 | Biometric interface device for upgrading existing access control units |
Country Status (3)
Country | Link |
---|---|
US (1) | US5995014A (en) |
CA (1) | CA2242206C (en) |
GB (1) | GB2332973B (en) |
Families Citing this family (92)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6463416B1 (en) | 1996-07-15 | 2002-10-08 | Intelli-Check, Inc. | Authentication system for identification documents |
US6148094A (en) * | 1996-09-30 | 2000-11-14 | David J. Kinsella | Pointing device with biometric sensor |
US6947580B1 (en) | 1996-09-30 | 2005-09-20 | Dalton Patrick Enterprises, Inc. | Pointing device with biometric sensor |
US6523741B1 (en) | 1997-09-05 | 2003-02-25 | Dimaria Peter C. | Apparatus for controlling the rental and sale of age-controlled merchandise and for controlling access to age-controlled services |
US6178255B1 (en) | 1998-04-28 | 2001-01-23 | Cross Match Technologies, Inc. | Individualized fingerprint scanner |
DE19844360A1 (en) * | 1998-09-28 | 2000-04-13 | Anatoli Stobbe | Access control system |
JP2000200353A (en) * | 1998-12-29 | 2000-07-18 | Omron Corp | Fingerprint recognizing device |
US7305562B1 (en) | 1999-03-09 | 2007-12-04 | Citibank, N.A. | System, method and computer program product for an authentication management infrastructure |
US6256737B1 (en) * | 1999-03-09 | 2001-07-03 | Bionetrix Systems Corporation | System, method and computer program product for allowing access to enterprise resources using biometric devices |
US6272562B1 (en) * | 1999-05-28 | 2001-08-07 | Cross Match Technologies, Inc. | Access control unit interface |
US6744910B1 (en) | 1999-06-25 | 2004-06-01 | Cross Match Technologies, Inc. | Hand-held fingerprint scanner with on-board image normalization data storage |
US6886104B1 (en) | 1999-06-25 | 2005-04-26 | Cross Match Technologies | Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface |
US7162060B1 (en) | 1999-08-09 | 2007-01-09 | Cross Match Technologies | Method, system, and computer program product for control of platen movement during a live scan |
WO2001011544A1 (en) | 1999-08-09 | 2001-02-15 | Cross Match Technologies, Inc. | System and method for sending a packet with position address and line scan data over an interface cable |
AU1939300A (en) * | 1999-08-09 | 2001-03-05 | Cross Match Technologies, Inc. | Method, system, and computer program product for a gui to fingerprint scanner interface |
US6658164B1 (en) | 1999-08-09 | 2003-12-02 | Cross Match Technologies, Inc. | Calibration and correction in a fingerprint scanner |
US6483932B1 (en) * | 1999-08-19 | 2002-11-19 | Cross Match Technologies, Inc. | Method and apparatus for rolled fingerprint capture |
US7343351B1 (en) | 1999-08-31 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US7505941B2 (en) * | 1999-08-31 | 2009-03-17 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions using biometrics |
US7953671B2 (en) * | 1999-08-31 | 2011-05-31 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US7889052B2 (en) | 2001-07-10 | 2011-02-15 | Xatra Fund Mx, Llc | Authorizing payment subsequent to RF transactions |
JP2003512873A (en) | 1999-10-22 | 2003-04-08 | クロス マッチ テクノロジーズ, インコーポレイテッド | Adjustable rotary finger guide in a tenprint scanner with a movable prism platen |
US7441263B1 (en) | 2000-03-23 | 2008-10-21 | Citibank, N.A. | System, method and computer program product for providing unified authentication services for online applications |
GB2362743A (en) * | 2000-05-23 | 2001-11-28 | John Ward | Inhibiting fraudulent transactions |
US20020118096A1 (en) * | 2000-05-26 | 2002-08-29 | Hector Hoyos | Building security system |
US6806807B2 (en) * | 2000-06-30 | 2004-10-19 | Jordan Cayne | Intelligent locking system |
AT410489B (en) * | 2000-07-10 | 2003-05-26 | Voest Alpine Stahl | ARRANGEMENT FOR CHECKING THE USER AUTHORIZATION FOR DEVICES SECURED BY USER IDS |
US6819219B1 (en) * | 2000-10-13 | 2004-11-16 | International Business Machines Corporation | Method for biometric-based authentication in wireless communication for access control |
US6727800B1 (en) | 2000-11-01 | 2004-04-27 | Iulius Vivant Dutu | Keyless system for entry and operation of a vehicle |
US7224822B2 (en) * | 2000-11-02 | 2007-05-29 | Retinal Technologies, L.L.C. | System for capturing an image of the retina for identification |
US6453057B1 (en) | 2000-11-02 | 2002-09-17 | Retinal Technologies, L.L.C. | Method for generating a unique consistent signal pattern for identification of an individual |
US7031502B1 (en) * | 2001-01-29 | 2006-04-18 | University Of Massachusetts Lowell | Adjustable guide for viewing biometric surface patterns |
US7365672B2 (en) * | 2001-03-16 | 2008-04-29 | Battelle Memorial Institute | Detection of a concealed object |
US6507309B2 (en) | 2001-03-16 | 2003-01-14 | Battelle Memorial Institute | Interrogation of an object for dimensional and topographical information |
US7405692B2 (en) * | 2001-03-16 | 2008-07-29 | Battelle Memorial Institute | Detecting concealed objects at a checkpoint |
US6914517B2 (en) * | 2001-04-17 | 2005-07-05 | Dalton Patrick Enterprises, Inc. | Fingerprint sensor with feature authentication |
US7725427B2 (en) | 2001-05-25 | 2010-05-25 | Fred Bishop | Recurrent billing maintenance with radio frequency payment devices |
US7303120B2 (en) | 2001-07-10 | 2007-12-04 | American Express Travel Related Services Company, Inc. | System for biometric security using a FOB |
US7668750B2 (en) | 2001-07-10 | 2010-02-23 | David S Bonalle | Securing RF transactions using a transactions counter |
US9031880B2 (en) | 2001-07-10 | 2015-05-12 | Iii Holdings 1, Llc | Systems and methods for non-traditional payment using biometric data |
US9024719B1 (en) | 2001-07-10 | 2015-05-05 | Xatra Fund Mx, Llc | RF transaction system and method for storing user personal data |
US7705732B2 (en) | 2001-07-10 | 2010-04-27 | Fred Bishop | Authenticating an RF transaction using a transaction counter |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US7735725B1 (en) | 2001-07-10 | 2010-06-15 | Fred Bishop | Processing an RF transaction using a routing number |
US7249112B2 (en) | 2002-07-09 | 2007-07-24 | American Express Travel Related Services Company, Inc. | System and method for assigning a funding source for a radio frequency identification device |
US8284025B2 (en) | 2001-07-10 | 2012-10-09 | Xatra Fund Mx, Llc | Method and system for auditory recognition biometrics on a FOB |
US9454752B2 (en) | 2001-07-10 | 2016-09-27 | Chartoleaux Kg Limited Liability Company | Reload protocol at a transaction processing entity |
US20040236699A1 (en) | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method and system for hand geometry recognition biometrics on a fob |
US8548927B2 (en) | 2001-07-10 | 2013-10-01 | Xatra Fund Mx, Llc | Biometric registration for facilitating an RF transaction |
US7154375B2 (en) * | 2001-07-10 | 2006-12-26 | American Express Travel Related Services Company, Inc. | Biometric safeguard method with a fob |
US7360689B2 (en) | 2001-07-10 | 2008-04-22 | American Express Travel Related Services Company, Inc. | Method and system for proffering multiple biometrics for use with a FOB |
US8294552B2 (en) | 2001-07-10 | 2012-10-23 | Xatra Fund Mx, Llc | Facial scan biometrics on a payment device |
US9038962B2 (en) * | 2001-09-17 | 2015-05-26 | David J. Akers | System and method for aircraft incident mitigation |
CA2411335A1 (en) * | 2001-11-08 | 2003-05-08 | Accu-Time Systems, Inc. | Biometric based airport access control |
AU2003207563A1 (en) | 2002-01-17 | 2003-09-02 | Cross Match Technologies, Inc. | Fingerprint workstation and methods |
US6954260B2 (en) * | 2002-01-17 | 2005-10-11 | Cross Match Technologies, Inc. | Systems and methods for illuminating a platen in a print scanner |
US6972660B1 (en) * | 2002-05-15 | 2005-12-06 | Lifecardid, Inc. | System and method for using biometric data for providing identification, security, access and access records |
US7708189B1 (en) | 2002-05-17 | 2010-05-04 | Cipriano Joseph J | Identification verification system and method |
WO2004006542A1 (en) * | 2002-07-02 | 2004-01-15 | Nokia Corporation | Electronic personal device |
US6715674B2 (en) * | 2002-08-27 | 2004-04-06 | Ultra-Scan Corporation | Biometric factor augmentation method for identification systems |
US6805287B2 (en) | 2002-09-12 | 2004-10-19 | American Express Travel Related Services Company, Inc. | System and method for converting a stored value card to a credit card |
US7130452B2 (en) * | 2002-12-03 | 2006-10-31 | International Business Machines Corporation | System and method for multi-party validation, authentication and/or authorization via biometrics |
US6985070B1 (en) * | 2002-12-09 | 2006-01-10 | Sprint Communications Company L.P. | Biometric authentication of hospitality-site customers |
US7447911B2 (en) * | 2003-11-28 | 2008-11-04 | Lightuning Tech. Inc. | Electronic identification key with portable application programs and identified by biometrics authentication |
US7711159B1 (en) * | 2004-02-11 | 2010-05-04 | Intermec Ip Corp. | Multi-technology information capture system and method |
US7314164B2 (en) | 2004-07-01 | 2008-01-01 | American Express Travel Related Services Company, Inc. | System for biometric security using a smartcard |
US7341181B2 (en) | 2004-07-01 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Method for biometric security using a smartcard |
US7363504B2 (en) | 2004-07-01 | 2008-04-22 | American Express Travel Related Services Company, Inc. | Method and system for keystroke scan recognition biometrics on a smartcard |
US7318550B2 (en) | 2004-07-01 | 2008-01-15 | American Express Travel Related Services Company, Inc. | Biometric safeguard method for use with a smartcard |
US7314165B2 (en) | 2004-07-01 | 2008-01-01 | American Express Travel Related Services Company, Inc. | Method and system for smellprint recognition biometrics on a smartcard |
US7325724B2 (en) | 2004-07-01 | 2008-02-05 | American Express Travel Related Services Company, Inc. | Method for registering a biometric for use with a smartcard |
CN1332631C (en) * | 2004-07-28 | 2007-08-22 | 北京大学 | Method and device for picking-up palm print |
US7253766B2 (en) * | 2004-09-24 | 2007-08-07 | Battelle Memorial Institute | Three-dimensional surface/contour processing based on electromagnetic radiation interrogation |
US7248720B2 (en) * | 2004-10-21 | 2007-07-24 | Retica Systems, Inc. | Method and system for generating a combined retina/iris pattern biometric |
US7860318B2 (en) | 2004-11-09 | 2010-12-28 | Intelli-Check, Inc | System and method for comparing documents |
US20060147095A1 (en) * | 2005-01-03 | 2006-07-06 | Usher David B | Method and system for automatically capturing an image of a retina |
TWI296787B (en) * | 2005-01-19 | 2008-05-11 | Lightuning Tech Inc | Storage device and method for protecting data stored therein |
US20090108988A1 (en) * | 2005-01-27 | 2009-04-30 | Cleveland Terri P | System and method for administering access to an interior compartment of an enclosure |
TWI262696B (en) * | 2005-06-17 | 2006-09-21 | Lightuning Tech Inc | Storage device and method for protecting data stored therein |
GB0512729D0 (en) * | 2005-06-22 | 2005-07-27 | Ecebs Group Ltd | Smartcard indexed pupil response test |
US20070036395A1 (en) * | 2005-08-15 | 2007-02-15 | Okun Sheri L | Reverse identity profiling system with alert function |
US7792522B1 (en) | 2006-01-13 | 2010-09-07 | Positive Access Corporation | Software key control for mobile devices |
US7844081B2 (en) * | 2006-05-15 | 2010-11-30 | Battelle Memorial Institute | Imaging systems and methods for obtaining and using biometric information |
WO2008004843A1 (en) * | 2006-07-07 | 2008-01-10 | Doo Man Im | Electric door lock device |
WO2009061855A2 (en) * | 2007-11-05 | 2009-05-14 | Intelli-Check--Mobilisa, Inc. | Dynamic access control in response to flexible rules |
US8952781B2 (en) * | 2010-02-19 | 2015-02-10 | The Domain Standard, Inc. | Method and apparatus for access control using dual biometric authentication |
US8840020B2 (en) * | 2010-12-01 | 2014-09-23 | Lumidigm, Inc. | Biometric terminals |
JPWO2012121167A1 (en) | 2011-03-04 | 2014-07-17 | 日本電気株式会社 | Individual identification system, individual identification method, apparatus used therefor, and program |
US10373409B2 (en) | 2014-10-31 | 2019-08-06 | Intellicheck, Inc. | Identification scan in compliance with jurisdictional or other rules |
US9607189B2 (en) | 2015-01-14 | 2017-03-28 | Tactilis Sdn Bhd | Smart card system comprising a card and a carrier |
US10395227B2 (en) | 2015-01-14 | 2019-08-27 | Tactilis Pte. Limited | System and method for reconciling electronic transaction records for enhanced security |
US10037528B2 (en) | 2015-01-14 | 2018-07-31 | Tactilis Sdn Bhd | Biometric device utilizing finger sequence for authentication |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3581282A (en) * | 1968-12-03 | 1971-05-25 | Norman G Altman | Palm print identification system |
US4210899A (en) * | 1975-06-23 | 1980-07-01 | Fingermatrix, Inc. | Fingerprint-based access control and identification apparatus |
US4151512A (en) * | 1976-09-10 | 1979-04-24 | Rockwell International Corporation | Automatic pattern processing system |
US4525859A (en) * | 1982-09-03 | 1985-06-25 | Bowles Romald E | Pattern recognition system |
GB8525161D0 (en) * | 1985-10-11 | 1985-11-13 | Blackwell V C | Personalised identification device |
WO1987007058A1 (en) * | 1986-05-07 | 1987-11-19 | Brendan David Costello | Method and apparatus for verifying identity |
US5055658A (en) * | 1988-07-25 | 1991-10-08 | Cockburn John B | Security system employing digitized personal physical characteristics |
US5337043A (en) * | 1989-04-27 | 1994-08-09 | Security People, Inc. | Access control system with mechanical keys which store data |
US5195145A (en) * | 1989-11-13 | 1993-03-16 | Identity Technologies Incorporated | Apparatus to record epidermal topography |
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
US5467403A (en) * | 1991-11-19 | 1995-11-14 | Digital Biometrics, Inc. | Portable fingerprint scanning apparatus for identification verification |
US5335288A (en) * | 1992-02-10 | 1994-08-02 | Faulkner Keith W | Apparatus and method for biometric identification |
CA2105926A1 (en) * | 1992-09-11 | 1994-03-12 | George J. Tomko | Fingerprint verification system |
US5559504A (en) * | 1993-01-08 | 1996-09-24 | Kabushiki Kaisha Toshiba | Surface shape sensor, identification device using this sensor, and protected system using this device |
US5552766A (en) * | 1994-02-17 | 1996-09-03 | Lee; Jung K. | Anti-crime security system |
US5594806A (en) * | 1994-06-20 | 1997-01-14 | Personnel Identification & Entry Access Control, Inc. | Knuckle profile indentity verification system |
-
1997
- 1997-12-30 US US09/000,624 patent/US5995014A/en not_active Expired - Lifetime
-
1998
- 1998-06-30 CA CA002242206A patent/CA2242206C/en not_active Expired - Fee Related
- 1998-12-23 GB GB9828569A patent/GB2332973B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
GB2332973A (en) | 1999-07-07 |
CA2242206A1 (en) | 1999-06-30 |
US5995014A (en) | 1999-11-30 |
GB2332973B (en) | 2001-10-31 |
GB9828569D0 (en) | 1999-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2242206C (en) | Biometric interface device for upgrading existing access control units | |
US6075455A (en) | Biometric time and attendance system with epidermal topographical updating capability | |
US7475812B1 (en) | Security system for access control using smart cards | |
KR100292547B1 (en) | Personal Identification Device and Access Control System | |
CN1322446C (en) | Authentication card system | |
US7762456B2 (en) | Systems and methods for reading a security clearance card | |
CA2184540C (en) | Biometric identification process and system | |
US9262876B2 (en) | Method for controlling fraud and enhancing security and privacy by using personal hybrid card | |
JPH11280317A (en) | Access control system and access control method | |
US20050264398A1 (en) | Systems and methods utilizing biometric data | |
US8443437B2 (en) | Method and apparatus for enforcing logical access security policies using physical access control systems | |
EP2261839A1 (en) | Biometric matching system and biometric matching method | |
MXPA03010049A (en) | Smart card access control system. | |
GB2394341A (en) | Access control system | |
EP1512113A2 (en) | Identity verification system | |
US9035746B2 (en) | System for screening people and method for carrying out a screening process | |
JP2018124622A (en) | Admission reception terminal, admission reception method, admission reception program, and admission reception system | |
KR20160076724A (en) | Building within the dangerous area visitor management and monitoring system | |
JPH09319877A (en) | Method and device for personal identification and room entry/leaving management system | |
JP4333842B2 (en) | Entrance / exit management system, ID card, control unit, system management device. | |
JP2006059161A5 (en) | ||
WO1997017674A1 (en) | Iris data collation system | |
Ayomide et al. | Optimization Of An Identity Access control System Using Biometric Techniques | |
WO2023234907A1 (en) | Smart lock system | |
Pałka et al. | Mobile border verification of travellers based on fingerprints: experimental studies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20180703 |