throbber
1111111111111111 IIIIII IIIII 1111111111 11111 11111 111111111111111 1111111111 1111111111 11111111
`US 20130057385Al
`
`c19) United States
`c12) Patent Application Publication
`Murakami et al.
`
`c10) Pub. No.: US 2013/0057385 Al
`Mar. 7, 2013
`(43) Pub. Date:
`
`(54) SYSTEMS AND METHODS FOR SECURELY
`MONITORING AN INDIVIDUAL
`
`(75)
`
`Inventors: Rick V. Murakami, North Ogden, UT
`(US); David Miller, Morgan, UT (US);
`Matthew W. Pettit, Mountain Green,
`UT (US); Larry V. Lunt, Holladay, UT
`(US)
`
`(73) Assignee: Ensign Holdings. LLC, Salt Lake City,
`UT (US)
`
`(21) Appl. No.:
`
`13/497,123
`
`(22) PCT Filed:
`
`Sep.14,2010
`
`(86) PCT No.:
`
`PCT /USl 0/48696
`
`§ 371 (c)(l),
`(2), ( 4) Date:
`
`Sep.5,2012
`
`(30)
`
`Foreign Application Priority Data
`
`Sep. 21, 2009
`
`(US) .................................. 12/563,933
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`G06F 7104
`(2006.01)
`(52) U.S. Cl. ...................................................... 340/5.82
`
`(57)
`
`ABSTRACT
`
`A biometric sensor may be coupled to a portable communi(cid:173)
`cations device, such as a cellular telephone. The biometric
`sensor may be configured to acquire one or more measure(cid:173)
`ments of biological characteristics of an individual. One or
`more of the measurements may relate to internal, sub-epider(cid:173)
`mal characteristics of the individual, such as non-volitional
`processes occurring within the individual, sub-epidermal
`structures within the individual, or the like. A biometric
`marker may be derived from one or more of the measure(cid:173)
`ments. The portable communications device may be activated
`responsive to deriving the biometric marker. The activation
`may include transmitting the measurements and/or biometric
`markers derived therefrom to a receiver using the portable
`communications device.
`
`d2
`1 l
`
`!
`!
`!
`!
`I
`l
`* t
`l
`l
`
`.... ,,,,,,~,~~
`
`I
`
`L--------------------------
`
`:
`
`Apple and Samsung Ex. 1142
`Apple Inc., Samsung Electronics Co., Ltd.,
`and Samsung Electronics America, Inc. v. Firstface Co., Ltd.
`IPR2019-00612
`Page 00001
`
`

`

`Patent Application Publication Mar. 7, 2013 Sheet 1 of 6
`
`US 2013/0057385 Al
`
`FIG. 1
`
`IPR2019-00612 Page 00002
`
`

`

`Patent Application Publication
`
`Mar. 7, 2013 Sheet 2 of 6
`
`US 2013/0057385 Al
`
`\
`
`l
`
`116-~?/
`FIG. 3
`
`IPR2019-00612 Page 00003
`
`

`

`Patent Application Publication Mar. 7, 2013 Sheet 3 of 6
`
`US 2013/0057385 Al
`
`YOUR BANK
`CREDIT CARD
`
`FIG. 4
`
`FIG. 5
`
`IPR2019-00612 Page 00004
`
`

`

`Patent Application Publication
`
`Mar. 7, 2013 Sheet 4 of 6
`
`US 2013/0057385 Al
`
`~
`:;::::;
`C
`llJ
`
`~ 01
`ro -.;:f"
`0 c:.o
`.....
`..c
`ro
`(]}
`I
`
`C)
`LL
`
`r 0
`
`0
`c:.o
`
`Cl
`c -
`·.::: ~ 0:,1
`.8 (.) 0
`·c ca w
`0 0...
`~
`
`N
`0 c:.o
`
`'tj"
`
`,._
`u
`:s@o
`(]}c:C:.O
`E (]}
`.Q (f)
`aJ
`
`...--
`0
`c:.o
`
`.
`~~
`
`•
`
`IPR2019-00612 Page 00005
`
`

`

`Patent Application Publication Mar. 7, 2013 Sheet 5 of 6
`
`US 2013/0057385 Al
`
`602--.._
`
`-
`
`Biometric Se nsor
`604~
`
`EO Emitter(s)
`605
`
`(
`EO Rece iver(s)
`606
`
`
`
`---->
`L)
`>]
`
`Display
`lnput(s)
`603
`
`Communication
`Interface
`622
`
`Processing Module
`607
`
`Memory
`608
`
`I
`
`I
`
`FIG. 6B
`
`IPR2019-00612 Page 00006
`
`

`

`Patent Application Publication Mar. 7, 2013 Sheet 6 of 6
`
`US 2013/0057385 Al
`
`70~
`
`710
`
`720
`
`730
`
`740
`
`Obtain Measurements of
`Biological Characteristics
`
`Derive Biometric Marker(s)
`from Measurements
`
`Activate Communication
`Device - Transmit Monitoring
`Packet: Biometric Marker(s)
`and Measurement(s)
`
`Receive Monitoring Packet
`
`No
`
`Yes
`
`755
`
`Return Monitoring Failure
`Message
`
`770
`
`Perform Monitoring Function
`using Measurement(s)
`
`Update Individual Profile
`
`790
`\.J
`
`Terminate
`
`FIG.7
`
`IPR2019-00612 Page 00007
`
`

`

`US 2013/0057385 Al
`
`Mar. 7, 2013
`
`1
`
`SYSTEMS AND METHODS FOR SECURELY
`MONITORING AN INDIVIDUAL
`
`BACKGROUND OF THE INVENTION
`
`[0001] The present invention relates generally to a bio(cid:173)
`metrically activated device. More specifically, the invention
`relates to a biometrically activated device capable of authen(cid:173)
`ticating or verifying a user's identity based on a unique inter(cid:173)
`nal biometric marker, or combination of unique internal bio(cid:173)
`metric markers, of a user, thereby allowing or denying access
`to and/or control over an electronic component.
`[0002] Security devices have been around for ages. From
`draw-bridges to locks on doors and furniture, people have
`attempted to secure their well-being and personal belongings
`from harms way. As technological advances were made, new
`means of security were created. Door locks require codes to
`disengage the lock, car doors are equipped with number pads,
`vehicle ignition keys include microchips encoded to commu(cid:173)
`nicate with the vehicle so as to prevent theft. Financial trans(cid:173)
`actions have also become more secure. Currency is more
`sophisticated in order to thwart copying, credit cards require
`authentication signatures, bank account access requires
`account numbers, and personal identification numbers are
`issued for everything from calling cards to internet access to
`stock market trading accounts.
`[0003] As technology continues to advance at a rapid rate,
`the search for more sophisticated, unbreakable, security mea(cid:173)
`sures continues. The key to an effective security system is the
`identification of the individual or entity attempting to access
`that which is protected by the security system, be it a home,
`financial information, or communications. Mechanical keys
`can be copied, personal identification numbers stolen, and
`credit cards misused without much trouble. The level of theft
`is evident from the billions of dollars in fraudulent financial
`transactions taking place each year, stolen vehicles, and home
`break-ins. Of particular concern is the relatively new crime
`wherein a persons 'identity' is stolen. In this day and age, a
`person's identity is closely tied to a bank account number, a
`phone number, an identification number, a social security
`number, or other such information which is easily stolen and
`then used to access the owner's information or property.
`When such a crime occurs, the victim suffers financial deci(cid:173)
`mation, credit destruction, and countless hours of agony in
`attempting to 'rebuild' their 'identity'.
`[0004] One form of fraud involves electronic transaction
`fraud, such as fraudulent credit and debit card transactions.
`Typically, a magnetic strip on one surface of such cards car(cid:173)
`ries an electronic form of a series of numbers, which identifies
`the account to be credited or debited. To execute a financial
`transaction using such a card, all that is needed is the series of
`numbers and authentication that the card is being used by the
`authorized user. Such authorization typically consists of
`photo identification or verification of a signature if the card is
`being used in a person to person transaction. Transactions
`conducted through other media, such as the telephone or over
`the internet, are often authenticated using some other form of
`identification, such as the billing address or phone number of
`the authorized user of the card. Because this information is
`often readily available to the public, such authentication pro(cid:173)
`cesses are not very secure.
`In the electronic transaction market, efficient iden(cid:173)
`[0005]
`tification of people is not only very critical, but very difficult,
`due to the rapid nature of monetary exchanges. In cases of
`pure electronic transactions, there is no physical document
`
`that acts as a transaction mechanism. In addition to this, most
`electronic transactions are performed from a location that is
`remote relative to the funds involved. The identification of the
`holder of the transaction device, such as a credit card, is the
`responsibility of the merchant or third party willing to accept
`an electronic transaction. Accurate identification and authen(cid:173)
`tication of the validity of the transaction device is not always
`possible and, even when obtained, is not always accurate.
`[0006] The advent of the internet has added an entirely new
`dimension to the problems associated with electronic trans(cid:173)
`action fraud. The internet provides a medium wherein the user
`of a transaction device and a third party willing to accept an
`electronic transfer of funds never have any actual contact.
`This creates further authentication problems for the third
`party because the transfer device is not physically present, the
`identification of the user is not visually apparent, and a tele(cid:173)
`phone number cannot be authenticated. As a result of the
`increased use of e-commerce, and ensuing authentication
`difficulties therewith, the incidence of electronic transaction
`fraud has been on the increase. In the immediate future, the
`opportunity and incidence of fraud will increase correspond(cid:173)
`ingly unless sufficient security measures capable of positively
`identifying an individual are implemented.
`[0007] The market has responded to the difficulties of
`authenticating electronic transfer devices, and positively
`identifying individuals, by searching for a viable biometric
`solution to the problems. Biometric technology generally
`involves the electronic identification of an individual using
`physiological traits which are unique to that same individual.
`Fingerprints are an excellent example of a biometric marker
`used for years to provide the unique identification of indi(cid:173)
`viduals. Because a fingerprint is unique to an individual, the
`identity of that individual may be determined through an
`analysis of the fingerprint. Thus, the identity of the individual,
`determined from a fingerprint, may act as a 'key' to unlock
`data or allow access through a door.
`In particular, fingerprints have been used to secure
`[0008]
`some transactions and have been proposed for use in other
`areas. Many banks require that a finger print or thumb print of
`a person cashing a check be placed on the check. This allows
`the bank to later verify or identify anyone passing fraudulent
`checks. Along a similar line, it has been proposed that Auto(cid:173)
`mated Teller Machines (ATM) be equipped with fingerprint
`pads to provide further security to ATM transactions. AnATM
`having a fingerprint pad would require the user to validate
`their ATM card byway of their fingerprint. This could be
`accomplished by inserting the ATM card into the machine,
`entering a Personal Identification Number (PIN), and then
`requiring the user to place their thumb or finger on the pad so
`that the ATM machine can analyze the fingerprint and confirm
`the identity of the individual using the card. Such a system
`would necessarily rely on a database built into the ATM or
`connected to the ATM, to provide a list of users and corre(cid:173)
`sponding fingerprint information. The fingerprint of the user
`could be compared to the data in the database to confirm that
`the ATM card being used did in fact belong to the person
`associated with the fingerprint placed on the fingerprint pad
`of the ATM.
`[0009] Other known biometric markers include palm
`prints, iris scans, proportional comparison of physical traits,
`and voice recognition. For the most part, these biometric
`markers, like the fingerprint, are external physiological traits
`or characteristics. Information unique to an individual is gath(cid:173)
`ered through various scanning processes which scan a exter-
`
`IPR2019-00612 Page 00008
`
`

`

`US 2013/0057385 Al
`
`Mar. 7, 2013
`
`2
`
`nal biometric marker of an individual. A number of United
`States Patents discuss biometric devices which may be used
`to help identify a person. Examples of external biometric
`devices include those described in U.S. Pat. Nos. 4,537,484;
`4,544,267; 4,699,149; 4,728,186; 4,784,484; 5,073,950;
`5,077,803; 5,088,817; 5,103,486; 5,230,025; and 5,335,288
`Internal biometric data has also been used to verify that a
`subject is alive. Such verifications have been accomplished
`by passively verifying physiological process, such as regis(cid:173)
`tering electrical impulses (EKG), or actively verifying physi(cid:173)
`ological norms by introducing and capturing a modified sig(cid:173)
`nal, such as introducing light energy to determine blood gas
`content (pulse oximeter). Examples of such biometric read(cid:173)
`ings are describe in U.S. Pat. Nos. 5,719,950; and 5,737,439.
`The disclosures of each of the patents listed above are hereby
`incorporated by reference.
`[0010] One of the downfalls ofusing the devices which are
`currently available in the market for analyzing external bio(cid:173)
`metric markers is the cost of installing the necessary scanning
`devices to provide the required security. For each different
`trait to be tested, whether it is a fingerprint, retinal scan, voice
`print, or the like, a different piece of expensive scanning
`equipment is necessary. Installation of such equipment into
`machines such as ATMs is economically impractical because
`each ATM would require the installation of the expensive
`scanning device.
`[0011] Another downfall of the biometric scanning devices
`currently available is their size. The necessary scanning
`equipment is bulky, making it impractical to attach the scan(cid:173)
`ning equipment to portable devices such as cell phones, credit
`cards, personal data assistants, portable computers, and the
`like.
`[0012] Further, incompatibility across multiple systems
`renders the deployment of standard biometric identification
`on a wide scale very challenging, if not impossible. In addi(cid:173)
`tion, large databases storing the vast amount of data necessary
`to authenticate biometrically activated transactions or
`authentications result in further costs which have heretofore
`made biometric identification a poor candidate as a security
`device for low level or mass produced systems.
`[0013] The downfalls of the current biometrically activated
`security systems can be overcome through the use of portable
`biometrically activated devices which only store the biomet(cid:173)
`ric profile of a single individual or a small group of individu(cid:173)
`als. The use of unique internal biometric markers, rather than
`external biometric markers, provides advantages which over(cid:173)
`come the downfalls of the present biometric scanning devices
`used for security and the identification of individuals.
`
`BRIEF SUMMARY OF THE INVENTION
`
`[0014] The present invention provides an apparatus and
`process which utilizes unique internal human biometric
`markers to verify the identity of the user of the biometrically
`activated device or provide access or control over an elec(cid:173)
`tronic component. More specifically, the biometrically acti(cid:173)
`vated device of the present invention allows non-invasive
`access to a unique internal biometric marker, or some com(cid:173)
`bination of unique internal biometric markers, and compares
`the scanned biometric marker to a biometric marker or profile
`stored within the biometrically activated device, thereby
`attempting to verify the identity of an individual using the
`biometrically activated device. A biometric marker, for the
`purposes of this invention, is a human internal physiological
`characteristic, or biologically active feature, which, prefer-
`
`ably, is unique to each individual member of the human race.
`The biometric markers of the present invention are not merely
`measurements of superficial anatomical structure, but instead
`utilize or alternatively include measurements of physiologi(cid:173)
`cal traits of the various systems of the human body and/or are
`histological traits associated with tissues of the human body.
`In addition, a unique biometric marker is one which does not
`significantly vary over time such that the biometric marker is
`always unique to the individual. The device scans a selected
`body part or biological feature of the user, taking an internal
`biometric measurement or recording internal biometric data
`from the same.
`[0015] A biometric profile of the subject attempting to acti(cid:173)
`vate the biometrically activated device may be electronically
`constructed from the data or measurement obtained. The pro(cid:173)
`file, measurement, or data is then analyzed and compared to a
`stored biometric profile, or profiles, to determine whether or
`not the user is authorized to use the device or access the
`information that the biometrically activated device is protect(cid:173)
`ing. As with a conventional door key, the authorization or
`verification of a valid user triggers the biometrically activated
`device to unlock certain information or activate or provide
`access to that which the device is protecting.
`[0016]
`In its simplest form, the biometrically activated
`device comprises a biometric sensor and a memory module.
`The biometric sensor obtains the requisite internal biometric
`measurements or data from a user and compares the measure(cid:173)
`ments or data to a biometric profile stored within the memory
`module. If the biometric profile stored in the memory module
`matches the measurements or data obtained from the user of
`the biometrically activated device, the biometrically activated
`device provides access to the data stored within a memory
`module, triggers the disengagement of a locking mechanism,
`or performs a function on a mechanical device.
`[0017] The biometrically activated device transmits or
`emits energy towards a human user. A portion of the emitted
`energy is reflected back to the biometrically activated device
`where it is received. The received signal is then transformed
`into an electric signal which represents a unique biometric
`profile of the user. The profile may then be compared to a
`biometric profile stored in the memory module of the bio(cid:173)
`metrically activated device. If the user's profile matches a
`profile stored within the memory module, the biometrically
`activated device is activated or is permitted to function in the
`manner in which it is programmed to function.
`[0018] The biometrically activated device can provide a
`means to control access, secure information, initiate electrical
`components, or provide a general security system. The inter(cid:173)
`nal biometric marker or combination of markers scanned is
`unique to each individual and, thus, difficult or impossible to
`otherwise reproduce. Likewise, the biometric profile stored
`within a biometrically activated device is unique to the
`device. Without knowledge of the specific internal biometric
`marker or markers scanned by the biometrically activated
`device, a biometric profile cannot be reverse engineered or
`reconstructed so as to activate the biometrically activated
`device. In other words, the biometrically activated device
`may scan a user for numerous unique biometric markers,
`however, without knowing which marker is compared within
`the memory module, reverse engineering is virtually impos(cid:173)
`sible. In this fashion, the biometrically activated device pro(cid:173)
`vides superior security features over present day security
`systems.
`
`IPR2019-00612 Page 00009
`
`

`

`US 2013/0057385 Al
`
`Mar. 7, 2013
`
`3
`
`[0019] The biometrically activated device of the present
`invention focuses on internal biometric markers unique to a
`specific individual, instead of external biometric markers,
`such as fingerprints, or non-unique biometric markers, such
`as blood pulse readings, and overcomes the problems associ(cid:173)
`ated with traditional security systems to provide a more viable
`alternative to the external biometric sensors currently avail(cid:173)
`able.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0020] While the specification concludes with claims par(cid:173)
`ticularly pointing out and distinctly claiming that which is
`regarded as the present invention, the advantages of this
`invention can be more readily ascertained from the following
`description of the invention when read in conjunction with the
`accompanying drawings in which:
`[0021] FIG. 1 is a schematic of a preferred embodiment of
`a biometrically activated device;
`[0022] FIG. 2 is a plan view of one embodiment of the
`biometric device of the present invention;
`[0023] FIG. 3 is a cut-away plan view of the biometric
`device of FIG. 2;
`[0024] FIG. 4 is a plan view of the biometric device of FIG.
`2 in an activated state;
`[0025] FIG. 5 is a plan view of the back side of the biomet(cid:173)
`ric device of FIG. 2;
`[0026] FIG. 6A is a block diagram of a system for securely
`monitoring an individual;
`[0027] FIG. 6B is a block diagram of a portable communi(cid:173)
`cations device comprising a biometric sensor; and
`[0028] FIG. 7 is a flow diagram of a method for securely
`monitoring an individual.
`
`DESCRIPTION OF THE ILLUSTRATED
`EMBODIMENTS
`
`[0029] Generally, the biometrically activated device of the
`present invention comprises a sensor for sensing or determin(cid:173)
`ing certain internal biometric markers of a user in communi(cid:173)
`cation with a memory module for storing biometric data or
`biometric profiles of a user or users corresponding to the
`internal biometric markers obtained by the sensor. When a
`user attempts to activate the biometrically activated device,
`the biometric sensor creates a biometric profile of the user and
`compares that profile with the stored biometric profile of an
`authorized user. If the user's profile does not match the profile
`of an authorized user, the data or information stored within
`the biometrically activated device is unretrievable. However,
`if the user's profile matches that of an authorized user, the
`biometrically activated device becomes activated for a set
`duration of time, thereby providing access to the data or
`information stored within the biometrically activated device
`or allowing the user to operate an apparatus which the bio(cid:173)
`metrically activated device protects.
`[0030] The biometric sensor is configured to determine
`specific unique internal biometric markers of a user. In a
`preferred embodiment of the invention, the sensor includes an
`emitter and a receiver. The emitter emits light or another form
`of energy which is partially absorbed and partially reflected
`by a portion of flesh of a user. Such light or energy may
`include, but is not limited to, ultrasonic energy, infra red light,
`near infra red light, ultra violet light, specific wavelength(cid:173)
`visible or nonvisible light, white light, or electrical signals.
`The receiver collects those portions oflight or energy that are
`
`reflected from the user. Based upon the light or energy
`reflected, data relating to internal biometric markers may be
`determined and a biometric profile of the user may be con(cid:173)
`structed. Some of the internal biometric markers which may
`be measured or determined from the biometric sensor
`include, but are not limited to, bone density, electromagnetic
`waves, cardiac rhythms, diacrotic notch readings, blood oxy(cid:173)
`gen levels, capillary density, glucose levels, hematocrit lev(cid:173)
`els, or sub-dermal layer analysis. Other biometric markers,
`such as bio-electric signals, resistance, impedance, capaci(cid:173)
`tance, or other detectable electrical signals emanating from
`the body may also be detected by the sensor and used or
`combined with the feedback to the receiver to create a bio(cid:173)
`metric profile of the user.
`
`[0031] The biometric sensor may also include an activation
`device for activating the biometric sensor so that the biomet(cid:173)
`ric sensor is not always activated. Examples of the biometric
`sensor portion of the biometrically activated device of the
`present invention are more fully explained in the examples
`described below.
`
`[0032] The memory module of the biometrically activated
`device is capable of receiving and storing data. The memory
`module is also capable of performing functions on the stored
`or received data to effectuate the creation of a biometric
`profile for a user. A biometric profile is based upon an internal
`biometric marker or markers of the user. Energy signals
`obtained from the biometric sensor may be converted into
`electrical signals which in turn may be converted to a biomet(cid:173)
`ric profile based upon a mathematical algorithm or transfor(cid:173)
`mation. The memory module may also store the commands or
`programming which will allow access to the apparatus being
`protected, or stored data such as phone numbers, account
`codes, or other information which a user wishes to keep
`private. Examples of the memory module of the present
`invention are further explained below.
`
`[0033] Because the biometrically activated device is based
`upon a user's profile, the biometrically activated device is at
`least capable of accepting an initial biometric profile corre(cid:173)
`sponding to the desired authorized user. The profile may be
`determined from the first use of the biometrically activated
`device or, alternatively, programmed before the first use in
`accordance with predefined biometric profiles.
`
`[0034] FIG. 1 illustrates a schematic of the preferred
`embodiment of the biometrically activated device of the
`present invention. The device 50 includes a biometric sensor
`60 and a memory module 70. The biometrically activated
`device is activated by the contact of a user 80 with the bio(cid:173)
`metric sensor 60 of the device 50. Preferably, the user 80 will
`activate the device 50 by placing a finger on the biometric
`sensor 60 for a period of time sufficient for the biometric
`sensor 60 to perform a scan of at least one unique internal
`biometric marker of the user 80. It is also understood that the
`device 50 may be remotely activated or may be maintained in
`an activated state.
`
`[0035] Activation of the device 50 triggers the emission of
`energy 65 from an emission device 61. The energy 65 is
`directed towards a user 80 where it is both absorbed and
`reflected. The portion of energy 65 reflected back at the
`device 50 is measured by a receiving device 62. The receiving
`device 62 interprets the amount of energy 65 received and
`converts the energy into an electrical signal 66 which is com(cid:173)
`municated to the memory module 70 of the device 50. In
`
`IPR2019-00612 Page 00010
`
`

`

`US 2013/0057385 Al
`
`Mar. 7, 2013
`
`4
`
`alternate embodiments, the energy received by the receiving
`device 62 is converted to an electrical signal 66 by a translator
`(not shown).
`[0036] The memory module 70 receives the electrical sig(cid:173)
`nal 66 and begins an authentication process of comparing an
`internal biometric marker, or markers, of the user 80 with the
`biometric marker, or markers, of the authorized users stored
`in the memory module 70. The characteristics of the electrical
`signal 66 represent the internal biometric marker, or markers,
`which the biometric sensor 60 obtains from the user 80. The
`memory module 70 compares the electrical signal 66 to a
`known biometric profile 76 stored within the memory module
`70. If the electrical signal 66 is identical to the known bio(cid:173)
`metric profile 76, the biometrically activated device has
`authenticated the user 80 and allows access to the data 72
`stored within the memory module 70. If the electrical signal
`66, is not authenticated, the biometric device 50 denies access
`to the data 72 stored within the memory module 70. Prefer(cid:173)
`ably, when access to the data 72 is denied, the biometric
`device 50 automatically turns off.
`[0037] Although the electrical signal 66 may be directly
`compared to the known biometric profile 76, the electrical
`signal 66 may also be transformed within the memory module
`70 prior to comparison with the known biometric profile 76.
`The electrical signal 66 may be transformed into a math(cid:173)
`ematical representation or value based on algorithms pro(cid:173)
`grammed into the memory module 70. The algorithms typi(cid:173)
`cally represent the necessary transforms needed to interpret
`the internal biometric marker represented by the electrical
`signal 66. The mathematical representation or value, which
`represents the biometric profile of the user 80, is compared to
`a known biometric profile 76 stored within the memory mod(cid:173)
`ule 70. If the mathematical representation or value is authen(cid:173)
`ticated, access to the data 72 stored in the memory module is
`allowed.
`[0038] Once accessed, the data 72 stored within the bio(cid:173)
`metric device 50 may be displayed in some manner or used to
`perform an act on another device. For example, the data 72
`may be displayed on an output device. Likewise, the data 72
`may trigger the execution of a program within the memory
`module 70 such that the memory module 70 causes the actua(cid:173)
`tion of a device, such as a door lock, in communication with
`the memory module. Further examples are described herein.
`[0039] FIG. 2 illustrates another preferred embodiment ofa
`biometrically activated device: a credit card. A biometrically
`activated device is an integral portion of a biometric device
`100, which in this case has the same shape, size and dimen(cid:173)
`sions as a typical credit card. It is understood, however, that
`the shape, size, and dimensions of the credit card are not
`limiting to the invention.
`[0040] As illustrated, the biometric device 100 includes a
`biometric sensor having a light emitter 112 and a light accep(cid:173)
`tor 114. The biometric sensor 110 may additionally include
`an activation device 116 as shown in FIG. 2. Activation of the
`biometric sensor 110 triggers the light emitter 112 to emit a
`light 113. An example of a suitable light emitter 112 is a light
`emitting diode (LED). Various types of LED's or alternative
`light sources may be substituted as the light emitter 112
`depending upon the desired wavelength and characteristics of
`light 113 emanating therefrom. The light acceptor 114 can be
`any device capable of absorbing reflected light 113.
`[0041]
`In normal use, an individual wishing to use the bio(cid:173)
`metric device 100 places a body part, such as a thumb or
`finger, over the biometric sensor 110 such that light 113
`
`emitted from light emitter 112 is directed toward the body
`part and is reflected back towards the light acceptor 114.
`Typically, the biometric sensor 110 will include an activation
`switch 116 which activates the biometric sensor 110 when a
`body part is placed over the biometric sensor 110, and causes
`light 113 to be emitted from the light emitter 112 for a fixed
`duration of time. Light 113 is partially absorbed and partially
`reflected by the body part covering the biometric sensor 110.
`Reflected light 113 is monitored by the light acceptor 114.
`[0042] A preferred embodiment of the invention utilizes an
`infra red LED, which emits sufficient infra red light to pen(cid:173)
`etrate the epidermal layer of skin of a user. A portion of the
`infra red light is reflected back to the light acceptor 114 while
`the remainder of the light is absorbed or lost. Based upon the
`amount oflight reflected back to the light acceptor 114 over a
`period of time, a biometric profile may be established. The
`portion of the light signal received by the light acceptor 114 is
`compared to biometric data or a biometric profile stored
`within the biometric device 100. If the light signal is identical
`to the biometric profile stored within the biometric device
`100, the biometric device is activated. Where the light signal
`does not correspond to the stored biometric data or profile, the
`biometric device is not activated and the biometric sensor 110
`is temporarily turned off.
`[0043] Activation of the biometric device 100 requires
`proper identification of the user of the biometric device 100.
`FIG. 3 depicts a cut-away plan view of the biometric device
`100 exposing a memory module 120 in communication with
`the light acceptor 114 of the biometric sensor 110. The bio(cid:173)
`metric profile of the authorized user is stored within the
`memory module 120. Other data, such as account codes,
`names, addresses, pass codes, or graphics, may also be stored
`within the memory module 120. Once a biometric profile of
`the user is constructed by the biometric sensor 110, the user's
`biometric profile is compared to the biometric profile stored
`within memory module 120. If the user's biometric profile
`matches that of the biometric profile of the authorized user
`stored in the memory module 120, the memory module
`allows access to at least a portion of the additional data or
`information stored within the memory module 120.
`[0044] The biometric sensor 110 may also include a trans(cid:173)
`lator (not shown) which interprets the level oflight or energy
`received by the light acc

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket