throbber
(12) United States Patent
`Odle et al.
`
`USOO6927668B1
`(10) Patent No.:
`US 6,927,668 B1
`(45) Date of Patent:
`Aug. 9, 2005
`
`(54) PRINT ACCESS SECURITY SYSTEM
`
`(76) Inventors: Richard Odle, 53362" Rd., Lake
`Worth, FL (US) 33461; Gary Odle,
`14900 Stirrup La., West Palm Beach
`D
`s
`FL (US) 33414; Robert E. Henry,
`2461 Village Blvd., West Palm Beach,
`FL (US) 33409; David Coriaty, 144
`Cocoplum La., Royal Palm Beach, FL
`(US) 33411
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 218 dayS.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`5,325,442 A
`6/1994 Knapp ........................ 382/124
`5.448,659 A 9/1995 Tsutsui et al.
`5,523,746 A * 6/1996 Gallagher .............. 340/825.31
`5,598.474. A
`1/1997 Johnson ...................... 713/186
`5,633,947 A * 5/1997 Sibbald ...................... 382/124
`5686,765 A 11
`2Y-- a--/
`/1997 Washington
`6,100,811 A
`8/2000 Hsu et al. .............. 340/825.31
`* cited b
`cited by examiner
`Primary Examiner Michael Horabik
`ASSistant Examiner Vernal Brown
`(74) Attorney, Agent, or Firm McHale & Slavin PA
`(57)
`ABSTRACT
`
`(21) Appl. No.: 09/718,530
`(22) Filed:
`Nov. 21, 2000
`51) Int. Cl." ................................................ G05B 1900
`(51) In
`f
`(52) U.S. Cl. .................... 340/5.53; 340/5.52; 340/5.51;
`340/5.64; 340/5.61; 340/5.21; 340/5.27;
`340/5.2; 340/5.1; 340/426.28; 340/426.36;
`382/124
`(58) Field of Search ............................... 340/5.53, 5.52,
`340/5.61, 5.72, 5.21, 5.27, 5.64
`
`A fingerprint enrollment and Verification module is con
`nected to the electrical circuit of a vehicle to prevent
`operation of the vehicle by unauthorized users. The module
`has a Sensor that creates a template of a fingerprint when a
`finger is placed on the module. The module has a flash
`memory to Store enrolled templates and a verification Step.
`After a fingerprint has been enrolled in the module, any
`operation of that Vehicle is possible only after the user's
`fingerprint is verified to match the enrolled template.
`13 Claims, 3 Drawing Sheets
`
`
`
`IPR2022-00601
`Apple EX1007 Page 1
`
`

`

`U.S. Patent
`
`Aug. 9, 2005
`
`Sheet 1 of 3
`
`US 6,927,668 B1
`
`FIG.
`
`
`
`IPR2022-00601
`Apple EX1007 Page 2
`
`

`

`U.S. Patent
`
`Aug. 9, 2005
`
`Sheet 2 of 3
`
`US 6,927,668 B1
`
`
`
`UNOCK
`DOOR
`
`FINGER PRINT
`REMOVA
`
`IPR2022-00601
`Apple EX1007 Page 3
`
`

`

`U.S. Patent
`
`Aug. 9, 2005
`
`Sheet 3 of 3
`
`US 6,927,668 B1
`
`23
`
`
`
`21
`
`18
`
`20
`
`IPR2022-00601
`Apple EX1007 Page 4
`
`

`

`1
`PRINT ACCESS SECURITY SYSTEM
`
`US 6,927,668 B1
`
`FIELD OF THE INVENTION
`This invention is related to Security Systems and,
`particularly, to identity recognition through comparison of
`an image of a finger and a stored template. The Security
`System may be used to gain entry and to energize the
`Systems of a vehicle.
`BACKGROUND OF THE INVENTION
`It is generally accepted that Vehicles are items considered
`highly transportable by nature. Vehicles may include cars,
`trucks, buses, vans, construction equipment, water craft,
`motorcycles, airplanes, golf carts, Snowmobiles, and,
`generally, anything that is capable of Self powered mobility.
`Common to Such vehicles is a key or keys for Security of the
`interior and operation of the Systems. However, a key can be
`used by anyone and is easily duplicated, rendering the
`security of the vehicle Vulnerable to unauthorized use.
`Some automobile manufacturers utilize different keys for
`different functions. For instance, General Motors, for many
`years, employed one key for unlocking the doors and trunk
`and a Second key for Starting the engine. However, anyone
`who had access to the keys would be able to operate the
`vehicle. More recently, GM has made a key system that
`includes a microchip. These keys are extremely difficult to
`duplicate however, there are specialized vendors authorized
`to make copies. This program also degrades the Security
`System.
`Other Security Systems are in use. For instance, Ford
`Motor Company employs a keyleSS entry System which
`allows an individual to have a numeric or alphabetic code
`programmed into the keyleSS entry and a memory circuit
`Stores the code for activation of the door locks upon entry of
`a correct code Sequence. The code is typically maintained by
`the manufacturers as well as the local dealer. Thus, access to
`the code can be obtained by a number of people thereby
`degrading the efficacy of the System.
`Currently, most automobile companies and after market
`Suppliers offer Small electronic door openers which cooper
`ate with the electrical System in the auto to unlock doors.
`These devices are a convenience and may be overridden by
`a key. AS Such, these devices do not add any Security to the
`System.
`In addition to controlling entry to vehicles, there are
`devices that will cause the engine to Start and remotely
`operate various other electrical Systems in the vehicle.
`However, for Security purposes, these devices usually
`require a key for entry into the vehicle.
`In both the electronic door locking devices and the
`electronic engine Starters, there is a very real risk that the
`frequency used in the devices may be captured by unautho
`rized perSons using Scanners or like devices. Also, these
`devices and their associated circuits are over-ridden by the
`use of the key. Therefore, anyone with the frequency code or
`a key or both can operate the vehicle.
`However, what is lacking in the art is a Stand alone
`Security System that is hard wired into the vehicle and cannot
`be duplicated by copying of codes or keys. Further, what is
`lacking in the prior art is a System that is programmable,
`only, by the owner or authorized operator of the vehicle
`without the possibility of unauthorized duplication.
`Also what is lacking in the prior art is a mechanism for
`recognizing and Verifying less than perfect fingerprint
`imprints.
`
`5
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`DESCRIPTION OF THE PRIOR ART
`U.S. Pat. No. 5,686,765 to Washington teaches a system
`for preventing unauthorized or unlicenced perSons from
`using an automobile. In one embodiment, the System has a
`remote component that receives and compares physiological
`identification entered at the vehicle. If the data match, the
`ignition System of the vehicle is energized for normal
`operation. In another embodiment, the operator data is
`compared to a particular time frame for operation by that
`operator during Specified times. And in another embodiment,
`the System requires Subsequent data input to ensure that the
`authorized driver remains the current operator. There is also
`provision for a bar code reader of an encoded driver's
`licence and/or reading the Signal of an electronic tether. The
`physiological identification data may be generated by a
`fingerprint reader or an eyeball Scan. This requires a Scan
`and a transmission to a remote computer.
`U.S. Pat. No. 5,448,659 to Hiroshi teaches the use of a
`card-shaped waveguide-type image transmission device to
`Scan, read and transmit fingerprint data. Again, the identity
`input is a fingerprint Scan.
`The fingerprint Scanning technology of these prior art
`devices produces a representation of the grooves and ridges
`of the Surface of a finger. Therefore, these Scans are highly
`Susceptible to errors caused by extraneous matter Such as
`dirt, grease, paint, calluses, etc. on the fingers of the pro
`Spective users.
`
`SUMMARY OF THE INVENTION
`Accordingly, it is an objective of the instant invention to
`provide a System to Secure any vehicle from operation by an
`unauthorized user.
`It is a further objective of the instant invention to provide
`a System to identify and authenticate a potential user of a
`vehicle by fingerprint information. The system is referred to
`as Fingerprint Enrollment and Verification Module, FEVM.
`It is yet another objective of the instant invention to.
`provide a Stand alone System hard wired into the electrical
`System of a vehicle to authorize and/or control any vehicle
`function by an operator placing a finger on a Sensor.
`Other objects and advantages of this invention will
`become apparent from the following description taken in
`conjunction with the accompanying drawings wherein are
`Set forth, by way of illustration and example, certain
`embodiments of this invention. The drawings constitute a
`part of this Specification and include exemplary embodi
`ments of the present invention and illustrate various objects
`and features thereof.
`
`BRIEF DESCRIPTION OF THE FIGURES
`FIG. 1 is a perspective of a door of an automobile;
`FIG. 2 is a close up perspective of the FEVM housing
`shown in FIG. 1;
`FIG. 3 is a flow chart of the operative steps of the
`fingerprint enrollment and verification module, FEVM; and
`FIG. 4 is a pictural representation of the finger print
`SCSO.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`The term, “operation,” refers to any initiation of any
`System on a vehicle, to include a range of commands from
`merely authorizing a System component to perform in a
`normal manner to energizing the component to perform. For
`
`IPR2022-00601
`Apple EX1007 Page 5
`
`

`

`US 6,927,668 B1
`
`15
`
`25
`
`3
`example and not by way of limitation, authorizing door
`locks to open with a key or electronic device is an operation.
`Actually opening the door lockS is also an operation.
`Likewise, authorizing engine Start with a key and Starting the
`engine are both operations. Use of any of the Subsidiary
`Systems of a vehicle, Such as, transmission, radio, air
`conditioner, convertible top, windless, blade, lights, alarm,
`and the like, is an operation. The FEVM may be installed to
`enable or disable any operation of a vehicle.
`A vehicle, as used in this disclosure, is any mobile
`conveyance. Most vehicles are Self propelled and have an
`electrical System to operate essential and nonessential
`components, Such as an automobile, truck, boat, airplane,
`earthmoving equipment, motorcycle, farm equipment
`including tractors, combines, and military equipment includ
`ing tanks, Self propelled artillery, armored perSonnel
`carriers, to name a few. The FEVM is wired into the
`electrical system of the vehicle to enable or disable the
`electrically operated components. Of course, the FEVM
`would be designed to operate on the same electrical current
`used in the vehicle into which it is to be installed.
`Vehicles that are not self propelled may be affected by the
`FEVM blocking the source of power to the vehicle. Also,
`mechanical components may be enabled or disabled by the
`FEVM, e.g. by use of Solenoids.
`The FEVM has the capability of storing multiple finger
`print templates So that a number of operators may operate
`the same vehicle. The FEVM has multiple modes which
`correspond to different Subsystems on the same vehicle and
`each Subsystem may be operated by a different finger of the
`same operator. For example, a thumb print may unlock the
`doors of an automobile, an index fingerprint may start the
`engine, another fingerprint may turn on the cell phone, etc.
`In FIG. 1 an automobile door 10 is shown with a window
`11, a door handle 12 and a key lock 13. In one embodiment,
`the FEVM 14 is mounted in an aperture in the door near the
`door handle. Another embodiment mounts the sensor 1B and
`the housing 15 in the door with the sensor connected by
`wiring to the FEVM 14 located in another part of the vehicle.
`The FEVM may be mounted at any location on the vehicle
`as a matter of choice. As shown in FIG. 2, the FEVM 14 has
`a housing 15 Surrounding an aperture in the door (not
`shown) and connected to the door 10 by screws 16. The
`housing 15 may be metal or plastic with other connections
`used, Such as welding or adhesives. The housing 15 has an
`opening 17 of Such a shape and size to accommodate the
`fingerprint of a finger of an operator of the vehicle. A
`silicone chip sensor 18 is fixed in the housing 15 and extends
`acroSS the opening 17. The Silicone chip is an integral part
`of a solid state device 20, as shown in. FIG. 4, having an
`integrated circuit. The Sensor Surface or matrix 21 contains
`an active antenna array of more than 16,000 elements and is
`protected by a hard transparent coating that is Scratch and
`impact resistant. The matrix 21 is Surrounded by a drive ring
`22 which transmits an extremely Small signal that the
`individual antenna elements can detect. When a, finger is
`placed on the matrix, the drive ring couples a Small signal
`onto the finger's living Subdermal layer. The Signal is
`received by the antenna elements which creates a digital or
`Statistical pattern that reflects the finger's unique underlying
`Structure.
`In operation the FEVM is connected to the print access
`Security System programmer 19. The programmer is con
`nected to the FEVM by plug-in connection 23. The pro
`grammer is powered by the same Voltage as the System into
`which the FEVM is to be installed. The programmer controls
`
`4
`the loading function of the FEVM to enroll an operation for
`operation of a vehicle.
`The programmer 19 is connected to the FEVM and a
`mode of operation is chosen, then the operator places a
`finger on the sensor 18. The enroll function of the program
`mer is activated by pressing the enroll key. The image of the
`fingerprint on the sensor 18 is processed by the FEVM to
`form a template of the fingerprint. The template is not a
`picture or representation of the actual grooves and ridges of
`a fingerprint. The template is Statistical information about
`the fingerprint image and may be 144 bytes in length. AS
`such, the FEVM does not require a pristine fingerprint to be
`enrolled but may Successfully complete the function when
`the fingerprint image includes extraneous material, Such as
`perspiration, dirt, paint or grease. When the template is
`complete, it is Stored in the flash memory to complete the
`enrollment function. An indicator will signal the end of this
`function. The operator removes his finger from the Sensor.
`The operator then places the same finger on the Sensor a
`Second time and the Verify key on the programmer is
`activated. The FEVM compares the image on the sensor to
`the template Stored in the memory. A Signal, Such as a green
`light, will indicate that the image and the template match.
`The operator is now an authorized user of the mode for
`which he is verified on the vehicle.
`This procedure is repeated for each operator and each
`mode until complete. The programmer 19 is then unplugged
`from the FEVM and stored in a secure location. At this point,
`the FEVM is fully programmed with no electrical or elec
`tronic vulnerability. Any physical tampering with the FEVM
`would merely disable the hardware without invading the
`Software.
`FIG. 3 illustrates the Steps for opening a door lock using
`the FEVM. The prospective operator places a finger on the
`passive Sensor 18, the Sensor activates and detects the
`presence of the finger, the fingerprint image is compared to
`the templates in the flash memory to Verify the prospective
`user. If there is no verification, ie no match in the memory
`for the prospective operator, the Sensor returns to the detect
`Step. If there is a verification and the fingerprint image has
`a template in the memory, the door unlocks. The finger is
`removed and the Sensor returns to the passive mode.
`When the authorized user leaves the car, he again places
`his finger on the Sensor and the doors lock.
`A detailed command description of the FEVM follow:
`Standalone Fingerprint
`Enrollment
`and
`Verification
`Module
`(FEVM)
`Rev 1.0
`Oct. 28, 2000
`
`35
`
`40
`
`45
`
`50
`
`55
`
`Table of Contents
`PRINT ACCESS Fingerprint Enrollment and Verification
`Module
`Host Interface Command Set
`Command Summary
`Basic Concepts
`Detailed Command Description
`Status
`Enroll
`Verify Parameters
`Verify
`Baud
`
`60
`
`65
`
`IPR2022-00601
`Apple EX1007 Page 6
`
`

`

`15
`
`Upload
`Download
`Image
`Store
`Retrieve
`Header
`Signature
`Erase
`Persistent
`Calibrate
`Priveleges
`Restrict
`Set Code
`Serial Interface Command Features
`Power On/Off
`Reset
`Hardware Signals and Connections
`Standalone Connector
`Serial Connector
`Print Access Security Systems Fingerprint Enrollment
`and Verification Module
`Host Interface Command Set
`Copyright Print Access Security Systems, Inc., 2000.
`This document describes the host interface command Set
`for the Print Access Security model of Fingerprint Enroll
`ment and Verification Modules. Using these commands, all
`functionality of the Print Access Security module is exposed
`to the host CPU. The commands are simple single byte
`op-codes that are issued through the RS-232 interface. There
`are two types of commands, immediate and long. Immediate
`commands return their results immediately. Long commands
`require an extended length of time to complete. The device
`Status should be polled to determine when Such a command
`has completed or failed.
`Command Summary
`Command Op-code Description Status 0x00Retrieve the 2
`byte device statusEnroll.0x01 Generate an enrollment tem
`plate from a finger-Verify0x02Verify a finger against an
`enrollment template(s) BaudOx03 Set the RS-232 baud
`rateUpload0x04Send the active enrollment template to the
`hostDownload0x05Download an enrollment template from
`host and activatelmage0x06Send the enroll Fingerprint
`image to the hostStore(0x07Store the active enroll template
`in the device Retrieve?0x08Retrieve an enroll template from
`the device and activateHeader0x09Return the header from a
`Stored templateSignature0x0AReturn the device Signature
`GEZ6XXrrr Erase 0x0BErase the specified stored
`template Persistent 0x0CMake the current settings
`persistent Calib rate 0x0D Calib rate
`the
`device Privilege 0x0EBegin access to privileged
`commands Restrict 0x0FEnd access to privileged
`commands Set Code 0x10 Set a new privilege
`code VerifyParameters0x11Set the verification parameters
`Basic Concepts
`The basic operation of the FEVM is the Enrollment and
`Verification of fingerprints. All additional functionality is
`Simply in Support of these two key operations.
`Enrollment is a process by which a fingerprint image cap
`tured by the Sensor is transformed into a template. A
`60
`template may be up to 144 bytes in length and contains
`Statistical information about a particular fingerprint image.
`This information is sufficient to perform verification when
`the same-finger is again placed on the Sensor. The template
`is not a fingerprint image.
`Verification is a process that applies the Statistical informa
`tion found in an enrolled template against a fingerprint
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`65
`
`US 6,927,668 B1
`
`6
`image currently captured by the Sensor-No fingerprint
`image is transmitted outside of the FEVM during verifica
`tion.
`Active Enrollment Buffer: The active enrollment buffer is
`used to hold an enrollment template. After enrollment it
`contains the template that has just been enrolled. Prior to
`verification it should be loaded with the template to be
`verified. Store and Upload use this Buffer as a source
`whereas Download and Retrieve use this buffer as a desti
`nation.
`Storage Slot: A Storage slot is a piece of Flash memory
`allocated within the FEVM to hold enrolled templates.
`Enrolled templates may be stored, retrieved or erased from
`a storage slot.
`Detailed Command Description
`Status
`Op-code: OOH
`Type: Immediate
`Parameters: None
`Returns:
`Byte 1: Command Status
`The bits are described in the following table:
`BitNeaning0St Fail: Previous command failed if
`Set.
`1Stinenroll: Performing Enrollment if set.
`2StInVerify: Performing Verification if set.
`3StInStore: Storing data in Flash Memory if set.
`4StInCalibrate: Calibrating if set.
`6StPermission: Insufficient permissions.
`7StFinger: A finger is placed on the device if set.
`Byte 2: Extended Status
`The extended Status byte provides extra Status information
`for a command. This information is command and context
`dependent.
`CommandMeaning Verifylf Bit 0 is set during verification,
`then the FEVM is performing verification against the inter
`nal storage slots. If Bit 0 is clear during verification, then the
`FEVM is performing verification against the Active Enroll
`ment Buffer. If verification of multiple storage slots has
`completed then this Status byte contains the Verified Storage
`slot number if the verification was successful. Enrolliduring
`enrollment, the bits for this status byte are defined as
`follows, Bit Meaning 0. The finger pressure needs adjusting
`if set. See bits I and 2 for pressure direction. The yellow
`LED will be on plus one of the green or red LEDs. I If bit
`0 is set then too much finger preSSure is being applied too the
`sensor. If bit 0 is cleared then the finger is positioned too far
`to the left of the sensor. The red LED will be on.
`(Orientation: LEDs are at the top) 2 If bit 0 is set then too
`little finger pressure is being applied to the Sensor. If bit 0 is
`clear then the finger is positioned too far to the right of the
`sensor. The green LED will be on.
`Description
`Returns the current Status of the device. This command may
`be invoked at any time.
`Enroll
`Op-code:01H
`Type:Long
`Parameters: None
`Returns: None
`Description:
`Initiates enrollment. The command does not complete
`until a Successful enrollment has been achieved. To abort
`this command the device must be reset. To check for
`completion of this command, the Status must be polled. The
`Stinenroll bit will be cleared when this command com
`pletes. The host may detect when an individual has placed
`their finger on the Sensor of the device by checking the
`StFinger bit.
`
`IPR2022-00601
`Apple EX1007 Page 7
`
`

`

`US 6,927,668 B1
`
`8
`
`VerifyParameters
`Op-code: 11H
`Type: Immediate
`Parameters:
`Byte 1: The storage slot to begin verification from,
`Byte 2: The number of storage slots to verify. If this byte
`is 0 then verification is performed on the active enroll
`ment buffer.
`Returns: None.
`Description:
`This command Sunply Sets the Verification parameters.
`Separating the parameters from the Verify command is
`useful when configuring FEW4s. An application may wish
`to store multiple templates on an FEVM and then configure
`it to perform Verification on these templates. Forcing Veri
`fication. is not necessary. E.g. enrolling an individual from
`a hotel lobby and programming their door lock remotely.
`Note: To make these parameters persistent, the Persistent
`command should be called prior to the next invocation of
`reset, The Factory defaults are 0,0.
`Verify
`Op-code: 02H.
`Type: Long
`Parameters: None. The parameters are set using the
`VenfyParameters command.
`Returns: None.
`Description:
`Initiates verification. The command does not complete
`until a Successful verification has been achieved. To abort
`this command the device must be reset. To check for the
`completion of this command, the Status must be polled. The
`StInVerify bit in the first status byte will be cleared when
`Verification has completed. The host may detect when an
`individual has placed a finger on the Sensor of the device by
`checking the StFinger bit. The second status byte may be
`used to detect if a multiple verification or an Active Enroll
`ment Buffer verification is taking place.
`Baud
`Op-code: 03H
`Type: Immediate
`Parameters: Byte 1: The new baud rate to be set. Supported
`Baud rates are as follows:
`Baud
`Rate Value 1200024001480029600314,400419, 200528,
`800638,400757, 6008115.2009
`Returns: None.
`Description:
`Change the communication baud rate for the device to the
`newly Supplied baud rate.
`Note: To make the new baud rate persistent, the Persistent
`command should be called prior to the next invocation of
`reset The factory default is 3 (9600 baud).
`Upload
`Op-code: 04H
`Type: Immediate
`Parameters: None.
`Returns: The currently enrolled template in the active enroll
`buffer. The actual size of the template must be determined by
`examining the header of the template. The header is the first
`2 bytes of the data being returned.
`
`Template Header
`Bits Description 0-1 Reserved 2-3 The template
`structure4-6Template types: 3=84 bytes,4=104 bytes,6=144
`bytes Sizes include the header and trailer.7Valid template if
`clear. Invalid (deleted)if set.8-15Reserved for user data
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Description:
`Upload the template in the active enrollment buffer to the
`host.
`Download
`Op-code. 05H
`Type: Immediate
`Parameters: A valid template that has been previously
`uploaded from the device. The size of the download
`template is determined from the header. (See Upload)
`Returns: None. The device status should be checked for
`failure Status.
`Description:
`Download a template from the host and store it in the
`active enrollment buffer. This makes the template available
`for Verification, Storage or Upload.
`Image
`Op-code: 06H
`Type: Immediate
`Parameters: None
`Returns:
`Byte 1: The image type id.
`0: No image.
`1: The next 2 bytes contain the width and height.
`Byte 2: The width of the enrollment image in pixels
`Byte 3: The height of the enrollment image in pixels
`Subsequent Bytes: The enrollment image. This is a black
`and white image with a bit depth of one.
`Description:
`This image may be used to visually inspect the image of
`the finger that was just enrolled-The most unique features
`of the finger should be in the center of the image. A good
`enrollment is necessary for easy verification. This visual
`inspection is not necessary for enrollment but makes enroll
`ment Simpler. An alternative may be to enroll and then Verify
`Several times to ensure the quality of the enrolled image.
`Store
`Op-code: 07H
`Type: Long
`Parameters:
`Byte 1: The internal FEVM slot number to be used to store
`the active enrollment template. This number must be
`between 0 and 63.
`Returns: None. To check for Success or failure of this
`command, the device Status must be polled. Once the
`StInStore bit has been cleared from the first status byte, the
`Failed bit will indicate Success or failure of this command.
`Retrieve
`Op-code: 08H
`Type: Immediate
`Parameters:
`Byte 1: The internal FEVM slot number of the enrollment
`template to be retrieved. This number must be between
`O and 63.
`Returns: None. This is an immediate command. The status
`byte should be checked to determine Success or failure.
`Description: Retrieve the Stored template and place it in the
`active enrollment buffer. This makes the template available
`for Verify, Upload or Store.
`Header
`Op-code: 09FI
`Type: Immediate
`Parameters:
`Byte 1: The internal FEVM slot nurnber of the enrollment
`template to be retrieved. This number must be between
`O and 63.
`Returns: The 2 byte header from the stored template. Refer
`to the Upload command for a description of the header.
`
`IPR2022-00601
`Apple EX1007 Page 8
`
`

`

`US 6,927,668 B1
`
`9
`
`Description:
`This command is used to recover the header from a stored
`template. This is useful for applications that may be using
`the user data component of the header and wish to Search
`through the Stored templates to recover this data.
`Signature
`Op-code: OAH
`Type: Immediate
`Parameters: None.
`Returns: A String representing the Signature of the device.
`The expected return value is “GEZXXXrrr' where “XXX”
`represents the model of the module and rrr represents the
`revision. E.g. “GEZ6Aa0011” where 6Aa is the model and
`001 is the revision.
`Description: Returns a device Signature String. This com
`15
`mand also unlocks the FEVM command engine and must be
`issued after a reset or power on.
`Erase
`Op-code: OBH
`Type; Long
`Parameters:
`Byte 1: The internal FEVM slot number of the enrollment
`template to be erased. This number must be between 0 and
`63.
`Returns: None. The status of the device should be polled to
`determine the Success or failure of this command. The
`StinStore bit will be cleared when the command has com
`pleted.
`Description: Erase the enrolled template stored m the FEVM
`at the given slot number.
`Persistent
`Op-code: OCH
`Type:Long
`Parameters: To help eliminate the possible accidental invo
`cation of this command, the command accepts the
`op-code (0CH) as the one-byte parameter.
`Returns: None. The device status should be polled to deter
`mine the Success or failure of this command. The StinStore
`bit will be cleared when the command has completed.
`Description: This command will make the current
`calibration, Verification, baud rate and Privilege code Set
`tings persistent.
`Calibrate
`Op-code: ODH
`Type, Long
`Parameters: None.
`Returns: None. The device status should be polled to deter
`mine when the calibration has finished. The StinCalibrate
`bit will be cleared when the command has completed. The
`newly calibrated values will be made persistent if the
`Persistent command is invoked.
`Description: This command will cause the FEVM to per
`form calibration. No finger should be present on the FEVM
`Sensor when calibration is being performed.
`Note: To make this calibration persistent, the Persistent
`command should be invoked prior to the next reset.
`Privileges
`Op-code: OEH
`Type: Immediate
`Parameters: The Privilege code. This is the code previously
`set using SetCode. It is 6 bytes long. If a Privilege code
`has never been Set for this device, then the parameter must
`be set but is ignored.
`Returns: None. The device status should be polled to deter
`mine if privileges have been granted. The StPrivilege and
`StFail bits in the status word will be set if the privilege code
`was invalid
`
`65
`
`10
`Description: If the privilege code that is given matches the
`privilege code that is currently stored in the FEVM, then
`permission is granted to perform Image, Download,
`Persistent, Enroll, Store and Erase.
`Note: If no privilege code has been previously set then all
`privileges are granted without the necessity of calling the
`Privilege command.
`Restrict
`Op-code: OFH
`Type: Immediate
`Parameters: None.
`Returns: None.
`Description: If privileges are currently active, then this
`commands disables access to privileged operations thereby
`disabling Image, Download, Persistent, Enroll, Store and
`Erase.
`Note: If the Privilege code has been made persistent then
`resetting the device will have the same effect as calling
`Restrict
`SetCode
`Op-code: 10H
`Type: Immediate
`Parameters: First 6 bytes: The currently set Privilege code.
`If no privilege code currently exists, then this parameter
`should contain 6 bytes of Zeroes. Next 6 bytes: The new
`Privilege code.
`Description: Sets a Privilege code for the FEW This privi
`lege code is used with the Privilege command and is used to
`control access to Image, Download, Persistent, Enroll, Store
`and Erase.
`Note: To make new Privilege code persistent, the Persistent
`command should be called prior to the next invocation of
`reset. The factory default is 0x000000000000. Serial Inter
`face Command Features
`Power On/Off To power the device off, bring the DTR signal
`low (0). This will cause power to the device to be dropped
`down to nominal levels and prevent it from functioning.
`Bringing DTR high (1) will cause the device to resume
`operation. All non-persistent Setting will have been lost and
`must be reprogrammed.
`Reset
`To reset the device, Simply toggle the power off and back on
`using DTR as described above. A delay should be added
`after power on before the device is fully functional. This
`delay is approximately 200 ms.
`Hardware Signals and Connections
`The fingerprint module interface connectors are located on
`the back of the module (see FIG. 1). Viewing the module
`from the backside, with the connectors on the top edge, the
`STANDALONE connector will be on your right side, and
`the SERIAL connector is on the left side. The connectors are
`manufactured by Hirose Electric and belong to the FH12
`Series of 0.5 mm-pitch flex-cable connectors. An appropriate
`cable to use with these connectors would be Parlex Corpo
`ration partif0.5 MM-10-2-B.
`CAUTION. All module input signals are rated at 3.3 volts,
`and they are NOT 5 volttolerant. All module output signals
`must be buffered if they are required to drive LEDs, etc.
`Standalone Connector
`The standalone connector allows the FEVM to operate
`without an additional micro controller. A Serial interface will
`still be required to program the FEVM with templates,
`Privilege code and verify parameters.
`if PIN
`Standalone
`Connector PIN
`NAMEDIRECTION** FUNCTIONIVCC5VINPUT5 volt
`supply2GND-power/signal ground3GND-power/signal
`ground4CTRL-OUT OUTPUTActive low output indicating
`Verification Successful.
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`IPR2022-00601
`Apple EX1007 Page 9
`
`

`

`US 6,927,668 B1
`
`15
`
`25
`
`35

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket