`US 20130057385Al
`
`c19) United States
`c12) Patent Application Publication
`Murakami et al.
`
`c10) Pub. No.: US 2013/0057385 Al
`Mar. 7, 2013
`(43) Pub. Date:
`
`(54) SYSTEMS AND METHODS FOR SECURELY
`MONITORING AN INDIVIDUAL
`
`(75)
`
`Inventors: Rick V. Murakami, North Ogden, UT
`(US); David Miller, Morgan, UT (US);
`Matthew W. Pettit, Mountain Green,
`UT (US); Larry V. Lunt, Holladay, UT
`(US)
`
`(73) Assignee: Ensign Holdings. LLC, Salt Lake City,
`UT (US)
`
`(21) Appl. No.:
`
`13/497,123
`
`(22) PCT Filed:
`
`Sep.14,2010
`
`(86) PCT No.:
`
`PCT /USl 0/48696
`
`§ 371 (c)(l),
`(2), ( 4) Date:
`
`Sep.5,2012
`
`(30)
`
`Foreign Application Priority Data
`
`Sep. 21, 2009
`
`(US) .................................. 12/563,933
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`G06F 7104
`(2006.01)
`(52) U.S. Cl. ...................................................... 340/5.82
`
`(57)
`
`ABSTRACT
`
`A biometric sensor may be coupled to a portable communi(cid:173)
`cations device, such as a cellular telephone. The biometric
`sensor may be configured to acquire one or more measure(cid:173)
`ments of biological characteristics of an individual. One or
`more of the measurements may relate to internal, sub-epider(cid:173)
`mal characteristics of the individual, such as non-volitional
`processes occurring within the individual, sub-epidermal
`structures within the individual, or the like. A biometric
`marker may be derived from one or more of the measure(cid:173)
`ments. The portable communications device may be activated
`responsive to deriving the biometric marker. The activation
`may include transmitting the measurements and/or biometric
`markers derived therefrom to a receiver using the portable
`communications device.
`
`d2
`1 l
`
`!
`!
`!
`!
`I
`l
`* t
`l
`l
`
`.... ,,,,,,~,~~
`
`I
`
`L--------------------------
`
`:
`
`Apple and Samsung Ex. 1142
`Apple Inc., Samsung Electronics Co., Ltd.,
`and Samsung Electronics America, Inc. v. Firstface Co., Ltd.
`IPR2019-00612
`Page 00001
`
`
`
`Patent Application Publication Mar. 7, 2013 Sheet 1 of 6
`
`US 2013/0057385 Al
`
`FIG. 1
`
`IPR2019-00612 Page 00002
`
`
`
`Patent Application Publication
`
`Mar. 7, 2013 Sheet 2 of 6
`
`US 2013/0057385 Al
`
`\
`
`l
`
`116-~?/
`FIG. 3
`
`IPR2019-00612 Page 00003
`
`
`
`Patent Application Publication Mar. 7, 2013 Sheet 3 of 6
`
`US 2013/0057385 Al
`
`YOUR BANK
`CREDIT CARD
`
`FIG. 4
`
`FIG. 5
`
`IPR2019-00612 Page 00004
`
`
`
`Patent Application Publication
`
`Mar. 7, 2013 Sheet 4 of 6
`
`US 2013/0057385 Al
`
`~
`:;::::;
`C
`llJ
`
`~ 01
`ro -.;:f"
`0 c:.o
`.....
`..c
`ro
`(]}
`I
`
`C)
`LL
`
`r 0
`
`0
`c:.o
`
`Cl
`c -
`·.::: ~ 0:,1
`.8 (.) 0
`·c ca w
`0 0...
`~
`
`N
`0 c:.o
`
`'tj"
`
`,._
`u
`:s@o
`(]}c:C:.O
`E (]}
`.Q (f)
`aJ
`
`...--
`0
`c:.o
`
`.
`~~
`
`•
`
`IPR2019-00612 Page 00005
`
`
`
`Patent Application Publication Mar. 7, 2013 Sheet 5 of 6
`
`US 2013/0057385 Al
`
`602--.._
`
`-
`
`Biometric Se nsor
`604~
`
`EO Emitter(s)
`605
`
`(
`EO Rece iver(s)
`606
`
`
`
`---->
`L)
`>]
`
`Display
`lnput(s)
`603
`
`Communication
`Interface
`622
`
`Processing Module
`607
`
`Memory
`608
`
`I
`
`I
`
`FIG. 6B
`
`IPR2019-00612 Page 00006
`
`
`
`Patent Application Publication Mar. 7, 2013 Sheet 6 of 6
`
`US 2013/0057385 Al
`
`70~
`
`710
`
`720
`
`730
`
`740
`
`Obtain Measurements of
`Biological Characteristics
`
`Derive Biometric Marker(s)
`from Measurements
`
`Activate Communication
`Device - Transmit Monitoring
`Packet: Biometric Marker(s)
`and Measurement(s)
`
`Receive Monitoring Packet
`
`No
`
`Yes
`
`755
`
`Return Monitoring Failure
`Message
`
`770
`
`Perform Monitoring Function
`using Measurement(s)
`
`Update Individual Profile
`
`790
`\.J
`
`Terminate
`
`FIG.7
`
`IPR2019-00612 Page 00007
`
`
`
`US 2013/0057385 Al
`
`Mar. 7, 2013
`
`1
`
`SYSTEMS AND METHODS FOR SECURELY
`MONITORING AN INDIVIDUAL
`
`BACKGROUND OF THE INVENTION
`
`[0001] The present invention relates generally to a bio(cid:173)
`metrically activated device. More specifically, the invention
`relates to a biometrically activated device capable of authen(cid:173)
`ticating or verifying a user's identity based on a unique inter(cid:173)
`nal biometric marker, or combination of unique internal bio(cid:173)
`metric markers, of a user, thereby allowing or denying access
`to and/or control over an electronic component.
`[0002] Security devices have been around for ages. From
`draw-bridges to locks on doors and furniture, people have
`attempted to secure their well-being and personal belongings
`from harms way. As technological advances were made, new
`means of security were created. Door locks require codes to
`disengage the lock, car doors are equipped with number pads,
`vehicle ignition keys include microchips encoded to commu(cid:173)
`nicate with the vehicle so as to prevent theft. Financial trans(cid:173)
`actions have also become more secure. Currency is more
`sophisticated in order to thwart copying, credit cards require
`authentication signatures, bank account access requires
`account numbers, and personal identification numbers are
`issued for everything from calling cards to internet access to
`stock market trading accounts.
`[0003] As technology continues to advance at a rapid rate,
`the search for more sophisticated, unbreakable, security mea(cid:173)
`sures continues. The key to an effective security system is the
`identification of the individual or entity attempting to access
`that which is protected by the security system, be it a home,
`financial information, or communications. Mechanical keys
`can be copied, personal identification numbers stolen, and
`credit cards misused without much trouble. The level of theft
`is evident from the billions of dollars in fraudulent financial
`transactions taking place each year, stolen vehicles, and home
`break-ins. Of particular concern is the relatively new crime
`wherein a persons 'identity' is stolen. In this day and age, a
`person's identity is closely tied to a bank account number, a
`phone number, an identification number, a social security
`number, or other such information which is easily stolen and
`then used to access the owner's information or property.
`When such a crime occurs, the victim suffers financial deci(cid:173)
`mation, credit destruction, and countless hours of agony in
`attempting to 'rebuild' their 'identity'.
`[0004] One form of fraud involves electronic transaction
`fraud, such as fraudulent credit and debit card transactions.
`Typically, a magnetic strip on one surface of such cards car(cid:173)
`ries an electronic form of a series of numbers, which identifies
`the account to be credited or debited. To execute a financial
`transaction using such a card, all that is needed is the series of
`numbers and authentication that the card is being used by the
`authorized user. Such authorization typically consists of
`photo identification or verification of a signature if the card is
`being used in a person to person transaction. Transactions
`conducted through other media, such as the telephone or over
`the internet, are often authenticated using some other form of
`identification, such as the billing address or phone number of
`the authorized user of the card. Because this information is
`often readily available to the public, such authentication pro(cid:173)
`cesses are not very secure.
`In the electronic transaction market, efficient iden(cid:173)
`[0005]
`tification of people is not only very critical, but very difficult,
`due to the rapid nature of monetary exchanges. In cases of
`pure electronic transactions, there is no physical document
`
`that acts as a transaction mechanism. In addition to this, most
`electronic transactions are performed from a location that is
`remote relative to the funds involved. The identification of the
`holder of the transaction device, such as a credit card, is the
`responsibility of the merchant or third party willing to accept
`an electronic transaction. Accurate identification and authen(cid:173)
`tication of the validity of the transaction device is not always
`possible and, even when obtained, is not always accurate.
`[0006] The advent of the internet has added an entirely new
`dimension to the problems associated with electronic trans(cid:173)
`action fraud. The internet provides a medium wherein the user
`of a transaction device and a third party willing to accept an
`electronic transfer of funds never have any actual contact.
`This creates further authentication problems for the third
`party because the transfer device is not physically present, the
`identification of the user is not visually apparent, and a tele(cid:173)
`phone number cannot be authenticated. As a result of the
`increased use of e-commerce, and ensuing authentication
`difficulties therewith, the incidence of electronic transaction
`fraud has been on the increase. In the immediate future, the
`opportunity and incidence of fraud will increase correspond(cid:173)
`ingly unless sufficient security measures capable of positively
`identifying an individual are implemented.
`[0007] The market has responded to the difficulties of
`authenticating electronic transfer devices, and positively
`identifying individuals, by searching for a viable biometric
`solution to the problems. Biometric technology generally
`involves the electronic identification of an individual using
`physiological traits which are unique to that same individual.
`Fingerprints are an excellent example of a biometric marker
`used for years to provide the unique identification of indi(cid:173)
`viduals. Because a fingerprint is unique to an individual, the
`identity of that individual may be determined through an
`analysis of the fingerprint. Thus, the identity of the individual,
`determined from a fingerprint, may act as a 'key' to unlock
`data or allow access through a door.
`In particular, fingerprints have been used to secure
`[0008]
`some transactions and have been proposed for use in other
`areas. Many banks require that a finger print or thumb print of
`a person cashing a check be placed on the check. This allows
`the bank to later verify or identify anyone passing fraudulent
`checks. Along a similar line, it has been proposed that Auto(cid:173)
`mated Teller Machines (ATM) be equipped with fingerprint
`pads to provide further security to ATM transactions. AnATM
`having a fingerprint pad would require the user to validate
`their ATM card byway of their fingerprint. This could be
`accomplished by inserting the ATM card into the machine,
`entering a Personal Identification Number (PIN), and then
`requiring the user to place their thumb or finger on the pad so
`that the ATM machine can analyze the fingerprint and confirm
`the identity of the individual using the card. Such a system
`would necessarily rely on a database built into the ATM or
`connected to the ATM, to provide a list of users and corre(cid:173)
`sponding fingerprint information. The fingerprint of the user
`could be compared to the data in the database to confirm that
`the ATM card being used did in fact belong to the person
`associated with the fingerprint placed on the fingerprint pad
`of the ATM.
`[0009] Other known biometric markers include palm
`prints, iris scans, proportional comparison of physical traits,
`and voice recognition. For the most part, these biometric
`markers, like the fingerprint, are external physiological traits
`or characteristics. Information unique to an individual is gath(cid:173)
`ered through various scanning processes which scan a exter-
`
`IPR2019-00612 Page 00008
`
`
`
`US 2013/0057385 Al
`
`Mar. 7, 2013
`
`2
`
`nal biometric marker of an individual. A number of United
`States Patents discuss biometric devices which may be used
`to help identify a person. Examples of external biometric
`devices include those described in U.S. Pat. Nos. 4,537,484;
`4,544,267; 4,699,149; 4,728,186; 4,784,484; 5,073,950;
`5,077,803; 5,088,817; 5,103,486; 5,230,025; and 5,335,288
`Internal biometric data has also been used to verify that a
`subject is alive. Such verifications have been accomplished
`by passively verifying physiological process, such as regis(cid:173)
`tering electrical impulses (EKG), or actively verifying physi(cid:173)
`ological norms by introducing and capturing a modified sig(cid:173)
`nal, such as introducing light energy to determine blood gas
`content (pulse oximeter). Examples of such biometric read(cid:173)
`ings are describe in U.S. Pat. Nos. 5,719,950; and 5,737,439.
`The disclosures of each of the patents listed above are hereby
`incorporated by reference.
`[0010] One of the downfalls ofusing the devices which are
`currently available in the market for analyzing external bio(cid:173)
`metric markers is the cost of installing the necessary scanning
`devices to provide the required security. For each different
`trait to be tested, whether it is a fingerprint, retinal scan, voice
`print, or the like, a different piece of expensive scanning
`equipment is necessary. Installation of such equipment into
`machines such as ATMs is economically impractical because
`each ATM would require the installation of the expensive
`scanning device.
`[0011] Another downfall of the biometric scanning devices
`currently available is their size. The necessary scanning
`equipment is bulky, making it impractical to attach the scan(cid:173)
`ning equipment to portable devices such as cell phones, credit
`cards, personal data assistants, portable computers, and the
`like.
`[0012] Further, incompatibility across multiple systems
`renders the deployment of standard biometric identification
`on a wide scale very challenging, if not impossible. In addi(cid:173)
`tion, large databases storing the vast amount of data necessary
`to authenticate biometrically activated transactions or
`authentications result in further costs which have heretofore
`made biometric identification a poor candidate as a security
`device for low level or mass produced systems.
`[0013] The downfalls of the current biometrically activated
`security systems can be overcome through the use of portable
`biometrically activated devices which only store the biomet(cid:173)
`ric profile of a single individual or a small group of individu(cid:173)
`als. The use of unique internal biometric markers, rather than
`external biometric markers, provides advantages which over(cid:173)
`come the downfalls of the present biometric scanning devices
`used for security and the identification of individuals.
`
`BRIEF SUMMARY OF THE INVENTION
`
`[0014] The present invention provides an apparatus and
`process which utilizes unique internal human biometric
`markers to verify the identity of the user of the biometrically
`activated device or provide access or control over an elec(cid:173)
`tronic component. More specifically, the biometrically acti(cid:173)
`vated device of the present invention allows non-invasive
`access to a unique internal biometric marker, or some com(cid:173)
`bination of unique internal biometric markers, and compares
`the scanned biometric marker to a biometric marker or profile
`stored within the biometrically activated device, thereby
`attempting to verify the identity of an individual using the
`biometrically activated device. A biometric marker, for the
`purposes of this invention, is a human internal physiological
`characteristic, or biologically active feature, which, prefer-
`
`ably, is unique to each individual member of the human race.
`The biometric markers of the present invention are not merely
`measurements of superficial anatomical structure, but instead
`utilize or alternatively include measurements of physiologi(cid:173)
`cal traits of the various systems of the human body and/or are
`histological traits associated with tissues of the human body.
`In addition, a unique biometric marker is one which does not
`significantly vary over time such that the biometric marker is
`always unique to the individual. The device scans a selected
`body part or biological feature of the user, taking an internal
`biometric measurement or recording internal biometric data
`from the same.
`[0015] A biometric profile of the subject attempting to acti(cid:173)
`vate the biometrically activated device may be electronically
`constructed from the data or measurement obtained. The pro(cid:173)
`file, measurement, or data is then analyzed and compared to a
`stored biometric profile, or profiles, to determine whether or
`not the user is authorized to use the device or access the
`information that the biometrically activated device is protect(cid:173)
`ing. As with a conventional door key, the authorization or
`verification of a valid user triggers the biometrically activated
`device to unlock certain information or activate or provide
`access to that which the device is protecting.
`[0016]
`In its simplest form, the biometrically activated
`device comprises a biometric sensor and a memory module.
`The biometric sensor obtains the requisite internal biometric
`measurements or data from a user and compares the measure(cid:173)
`ments or data to a biometric profile stored within the memory
`module. If the biometric profile stored in the memory module
`matches the measurements or data obtained from the user of
`the biometrically activated device, the biometrically activated
`device provides access to the data stored within a memory
`module, triggers the disengagement of a locking mechanism,
`or performs a function on a mechanical device.
`[0017] The biometrically activated device transmits or
`emits energy towards a human user. A portion of the emitted
`energy is reflected back to the biometrically activated device
`where it is received. The received signal is then transformed
`into an electric signal which represents a unique biometric
`profile of the user. The profile may then be compared to a
`biometric profile stored in the memory module of the bio(cid:173)
`metrically activated device. If the user's profile matches a
`profile stored within the memory module, the biometrically
`activated device is activated or is permitted to function in the
`manner in which it is programmed to function.
`[0018] The biometrically activated device can provide a
`means to control access, secure information, initiate electrical
`components, or provide a general security system. The inter(cid:173)
`nal biometric marker or combination of markers scanned is
`unique to each individual and, thus, difficult or impossible to
`otherwise reproduce. Likewise, the biometric profile stored
`within a biometrically activated device is unique to the
`device. Without knowledge of the specific internal biometric
`marker or markers scanned by the biometrically activated
`device, a biometric profile cannot be reverse engineered or
`reconstructed so as to activate the biometrically activated
`device. In other words, the biometrically activated device
`may scan a user for numerous unique biometric markers,
`however, without knowing which marker is compared within
`the memory module, reverse engineering is virtually impos(cid:173)
`sible. In this fashion, the biometrically activated device pro(cid:173)
`vides superior security features over present day security
`systems.
`
`IPR2019-00612 Page 00009
`
`
`
`US 2013/0057385 Al
`
`Mar. 7, 2013
`
`3
`
`[0019] The biometrically activated device of the present
`invention focuses on internal biometric markers unique to a
`specific individual, instead of external biometric markers,
`such as fingerprints, or non-unique biometric markers, such
`as blood pulse readings, and overcomes the problems associ(cid:173)
`ated with traditional security systems to provide a more viable
`alternative to the external biometric sensors currently avail(cid:173)
`able.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0020] While the specification concludes with claims par(cid:173)
`ticularly pointing out and distinctly claiming that which is
`regarded as the present invention, the advantages of this
`invention can be more readily ascertained from the following
`description of the invention when read in conjunction with the
`accompanying drawings in which:
`[0021] FIG. 1 is a schematic of a preferred embodiment of
`a biometrically activated device;
`[0022] FIG. 2 is a plan view of one embodiment of the
`biometric device of the present invention;
`[0023] FIG. 3 is a cut-away plan view of the biometric
`device of FIG. 2;
`[0024] FIG. 4 is a plan view of the biometric device of FIG.
`2 in an activated state;
`[0025] FIG. 5 is a plan view of the back side of the biomet(cid:173)
`ric device of FIG. 2;
`[0026] FIG. 6A is a block diagram of a system for securely
`monitoring an individual;
`[0027] FIG. 6B is a block diagram of a portable communi(cid:173)
`cations device comprising a biometric sensor; and
`[0028] FIG. 7 is a flow diagram of a method for securely
`monitoring an individual.
`
`DESCRIPTION OF THE ILLUSTRATED
`EMBODIMENTS
`
`[0029] Generally, the biometrically activated device of the
`present invention comprises a sensor for sensing or determin(cid:173)
`ing certain internal biometric markers of a user in communi(cid:173)
`cation with a memory module for storing biometric data or
`biometric profiles of a user or users corresponding to the
`internal biometric markers obtained by the sensor. When a
`user attempts to activate the biometrically activated device,
`the biometric sensor creates a biometric profile of the user and
`compares that profile with the stored biometric profile of an
`authorized user. If the user's profile does not match the profile
`of an authorized user, the data or information stored within
`the biometrically activated device is unretrievable. However,
`if the user's profile matches that of an authorized user, the
`biometrically activated device becomes activated for a set
`duration of time, thereby providing access to the data or
`information stored within the biometrically activated device
`or allowing the user to operate an apparatus which the bio(cid:173)
`metrically activated device protects.
`[0030] The biometric sensor is configured to determine
`specific unique internal biometric markers of a user. In a
`preferred embodiment of the invention, the sensor includes an
`emitter and a receiver. The emitter emits light or another form
`of energy which is partially absorbed and partially reflected
`by a portion of flesh of a user. Such light or energy may
`include, but is not limited to, ultrasonic energy, infra red light,
`near infra red light, ultra violet light, specific wavelength(cid:173)
`visible or nonvisible light, white light, or electrical signals.
`The receiver collects those portions oflight or energy that are
`
`reflected from the user. Based upon the light or energy
`reflected, data relating to internal biometric markers may be
`determined and a biometric profile of the user may be con(cid:173)
`structed. Some of the internal biometric markers which may
`be measured or determined from the biometric sensor
`include, but are not limited to, bone density, electromagnetic
`waves, cardiac rhythms, diacrotic notch readings, blood oxy(cid:173)
`gen levels, capillary density, glucose levels, hematocrit lev(cid:173)
`els, or sub-dermal layer analysis. Other biometric markers,
`such as bio-electric signals, resistance, impedance, capaci(cid:173)
`tance, or other detectable electrical signals emanating from
`the body may also be detected by the sensor and used or
`combined with the feedback to the receiver to create a bio(cid:173)
`metric profile of the user.
`
`[0031] The biometric sensor may also include an activation
`device for activating the biometric sensor so that the biomet(cid:173)
`ric sensor is not always activated. Examples of the biometric
`sensor portion of the biometrically activated device of the
`present invention are more fully explained in the examples
`described below.
`
`[0032] The memory module of the biometrically activated
`device is capable of receiving and storing data. The memory
`module is also capable of performing functions on the stored
`or received data to effectuate the creation of a biometric
`profile for a user. A biometric profile is based upon an internal
`biometric marker or markers of the user. Energy signals
`obtained from the biometric sensor may be converted into
`electrical signals which in turn may be converted to a biomet(cid:173)
`ric profile based upon a mathematical algorithm or transfor(cid:173)
`mation. The memory module may also store the commands or
`programming which will allow access to the apparatus being
`protected, or stored data such as phone numbers, account
`codes, or other information which a user wishes to keep
`private. Examples of the memory module of the present
`invention are further explained below.
`
`[0033] Because the biometrically activated device is based
`upon a user's profile, the biometrically activated device is at
`least capable of accepting an initial biometric profile corre(cid:173)
`sponding to the desired authorized user. The profile may be
`determined from the first use of the biometrically activated
`device or, alternatively, programmed before the first use in
`accordance with predefined biometric profiles.
`
`[0034] FIG. 1 illustrates a schematic of the preferred
`embodiment of the biometrically activated device of the
`present invention. The device 50 includes a biometric sensor
`60 and a memory module 70. The biometrically activated
`device is activated by the contact of a user 80 with the bio(cid:173)
`metric sensor 60 of the device 50. Preferably, the user 80 will
`activate the device 50 by placing a finger on the biometric
`sensor 60 for a period of time sufficient for the biometric
`sensor 60 to perform a scan of at least one unique internal
`biometric marker of the user 80. It is also understood that the
`device 50 may be remotely activated or may be maintained in
`an activated state.
`
`[0035] Activation of the device 50 triggers the emission of
`energy 65 from an emission device 61. The energy 65 is
`directed towards a user 80 where it is both absorbed and
`reflected. The portion of energy 65 reflected back at the
`device 50 is measured by a receiving device 62. The receiving
`device 62 interprets the amount of energy 65 received and
`converts the energy into an electrical signal 66 which is com(cid:173)
`municated to the memory module 70 of the device 50. In
`
`IPR2019-00612 Page 00010
`
`
`
`US 2013/0057385 Al
`
`Mar. 7, 2013
`
`4
`
`alternate embodiments, the energy received by the receiving
`device 62 is converted to an electrical signal 66 by a translator
`(not shown).
`[0036] The memory module 70 receives the electrical sig(cid:173)
`nal 66 and begins an authentication process of comparing an
`internal biometric marker, or markers, of the user 80 with the
`biometric marker, or markers, of the authorized users stored
`in the memory module 70. The characteristics of the electrical
`signal 66 represent the internal biometric marker, or markers,
`which the biometric sensor 60 obtains from the user 80. The
`memory module 70 compares the electrical signal 66 to a
`known biometric profile 76 stored within the memory module
`70. If the electrical signal 66 is identical to the known bio(cid:173)
`metric profile 76, the biometrically activated device has
`authenticated the user 80 and allows access to the data 72
`stored within the memory module 70. If the electrical signal
`66, is not authenticated, the biometric device 50 denies access
`to the data 72 stored within the memory module 70. Prefer(cid:173)
`ably, when access to the data 72 is denied, the biometric
`device 50 automatically turns off.
`[0037] Although the electrical signal 66 may be directly
`compared to the known biometric profile 76, the electrical
`signal 66 may also be transformed within the memory module
`70 prior to comparison with the known biometric profile 76.
`The electrical signal 66 may be transformed into a math(cid:173)
`ematical representation or value based on algorithms pro(cid:173)
`grammed into the memory module 70. The algorithms typi(cid:173)
`cally represent the necessary transforms needed to interpret
`the internal biometric marker represented by the electrical
`signal 66. The mathematical representation or value, which
`represents the biometric profile of the user 80, is compared to
`a known biometric profile 76 stored within the memory mod(cid:173)
`ule 70. If the mathematical representation or value is authen(cid:173)
`ticated, access to the data 72 stored in the memory module is
`allowed.
`[0038] Once accessed, the data 72 stored within the bio(cid:173)
`metric device 50 may be displayed in some manner or used to
`perform an act on another device. For example, the data 72
`may be displayed on an output device. Likewise, the data 72
`may trigger the execution of a program within the memory
`module 70 such that the memory module 70 causes the actua(cid:173)
`tion of a device, such as a door lock, in communication with
`the memory module. Further examples are described herein.
`[0039] FIG. 2 illustrates another preferred embodiment ofa
`biometrically activated device: a credit card. A biometrically
`activated device is an integral portion of a biometric device
`100, which in this case has the same shape, size and dimen(cid:173)
`sions as a typical credit card. It is understood, however, that
`the shape, size, and dimensions of the credit card are not
`limiting to the invention.
`[0040] As illustrated, the biometric device 100 includes a
`biometric sensor having a light emitter 112 and a light accep(cid:173)
`tor 114. The biometric sensor 110 may additionally include
`an activation device 116 as shown in FIG. 2. Activation of the
`biometric sensor 110 triggers the light emitter 112 to emit a
`light 113. An example of a suitable light emitter 112 is a light
`emitting diode (LED). Various types of LED's or alternative
`light sources may be substituted as the light emitter 112
`depending upon the desired wavelength and characteristics of
`light 113 emanating therefrom. The light acceptor 114 can be
`any device capable of absorbing reflected light 113.
`[0041]
`In normal use, an individual wishing to use the bio(cid:173)
`metric device 100 places a body part, such as a thumb or
`finger, over the biometric sensor 110 such that light 113
`
`emitted from light emitter 112 is directed toward the body
`part and is reflected back towards the light acceptor 114.
`Typically, the biometric sensor 110 will include an activation
`switch 116 which activates the biometric sensor 110 when a
`body part is placed over the biometric sensor 110, and causes
`light 113 to be emitted from the light emitter 112 for a fixed
`duration of time. Light 113 is partially absorbed and partially
`reflected by the body part covering the biometric sensor 110.
`Reflected light 113 is monitored by the light acceptor 114.
`[0042] A preferred embodiment of the invention utilizes an
`infra red LED, which emits sufficient infra red light to pen(cid:173)
`etrate the epidermal layer of skin of a user. A portion of the
`infra red light is reflected back to the light acceptor 114 while
`the remainder of the light is absorbed or lost. Based upon the
`amount oflight reflected back to the light acceptor 114 over a
`period of time, a biometric profile may be established. The
`portion of the light signal received by the light acceptor 114 is
`compared to biometric data or a biometric profile stored
`within the biometric device 100. If the light signal is identical
`to the biometric profile stored within the biometric device
`100, the biometric device is activated. Where the light signal
`does not correspond to the stored biometric data or profile, the
`biometric device is not activated and the biometric sensor 110
`is temporarily turned off.
`[0043] Activation of the biometric device 100 requires
`proper identification of the user of the biometric device 100.
`FIG. 3 depicts a cut-away plan view of the biometric device
`100 exposing a memory module 120 in communication with
`the light acceptor 114 of the biometric sensor 110. The bio(cid:173)
`metric profile of the authorized user is stored within the
`memory module 120. Other data, such as account codes,
`names, addresses, pass codes, or graphics, may also be stored
`within the memory module 120. Once a biometric profile of
`the user is constructed by the biometric sensor 110, the user's
`biometric profile is compared to the biometric profile stored
`within memory module 120. If the user's biometric profile
`matches that of the biometric profile of the authorized user
`stored in the memory module 120, the memory module
`allows access to at least a portion of the additional data or
`information stored within the memory module 120.
`[0044] The biometric sensor 110 may also include a trans(cid:173)
`lator (not shown) which interprets the level oflight or energy
`received by the light acc