`
`US006927668Bl
`
`(12)United States Patent
`
`Odle et al.
`
`(10)Patent No.:US 6,927,668 Bl
`
`
`(45)Date of Patent:
`Aug. 9, 2005
`
`(54)PRINT ACCESS SECURITY SYSTEM
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`Richard Odle, 5336 2nd Rd., Lake
`
`Knapp ........................ 382/124
`
`5,325,442 A *
`
`6/1994
`(76)Inventors:
`Worth, FL (US) 33461; Gary Odle,
`
`Tsutsui et al.
`
`5,448,659 A
`9/1995
`A *
`5,523,746
`
`
`Gallagher .............. 340/825.31
`6/1996
`
`14900 Stirrup La., West Palm Beach,
`FL (US) 33414; Robert E. Henry,
`1/1997
`5,598,474 A *
`
`
`Johnson ...................... 713/186
`5/1997
`
`
`Sibbald ...................... 382/124
`
`5,633,947 A *
`
`
`2461 Village Blvd., West Palm Beach,
`FL (US) 33409; David Coriaty, 144
`Washington
`11/1997
`
`5,686,765 A
`
`
`
`Hsu et al. .............. 340/825.31
`8/2000
`6,100,811 A *
`Royal Palm Beach, FL Cocoplum La.,
`
`*cited by examiner
`(US) 33411
`Primary Examiner-Michael Horabik
`
`
`
`
`Assistant Examiner-Vernal Brown
`to any disclaimer, the term of this
`
`( * ) Notice:Subject
`
`
`patent is extended or adjusted under 35
`
`
`
`ABSTRACT
`
`
`U.S.C. 154(b) by 218 days.
`
`PA(74)Attorney, Agent, or Firm-McHale & Slavin
`
`(57)
`
`(21)Appl. No.: 09/718,530
`A fingerprint enrollment and verification module is con
`
`
`
`
`nected to the electrical circuit
`
`of a vehicle to prevent
`(22)Filed:Nov. 21, 2000
`
`
`
`
`operation of the vehicle by unauthorized users. The module
`
`(51)Int. Cl.7 ................................................ G05B 19/00
`
`
`has a sensor that creates a template of a fingerprint when a
`340/5.53; .................... 340/5.52; 340/5.51;
`(52)U.S. Cl.
`
`
`finger is placed on the module. The module has a flash
`
`
`
`
`
`
`
`memory to store enrolled templates and a verification step.
`
`
`340/5.64; 340/5.61; 340/5.21; 340/5.27;
`
`
`
`
`After a fingerprint has been enrolled in the module, any
`340/5.2;
`
`
`340/5.1; 340/426.28; 340/426.36;
`
`
`
`operation of that vehicle is possible only after the user's
`382/124
`
`
`
`fingerprint is verified to match the enrolled template.
`(58)Field of Search ...............................
`
`340/5.53, 5.52,
`
`
`13 Claims, 3 Drawing Sheets
`
`340/5.61, 5.72, 5.21, 5.27, 5.64
`
`10----..._
`
`IPR2022-00602
`Apple EX1007 Page 1
`
`
`
`U.S. Patent Aug. 9, 2005
`Sheet 1 of 3
`
`
`US 6,927,668 Bl
`
`10---......
`
`FIG. 1
`
`16
`
`00 00
`
`0 0
`E V
`
`17
`
`18
`
`FIG. 2
`
`IPR2022-00602
`Apple EX1007 Page 2
`
`
`
`U.S. Patent Aug. 9, 2005 Sheet 2 of 3
`
`
`US 6,927,668 Bl
`
`18
`
`orna
`ANGER
`
`ANGER NO
`--
`a---
`PRESENT
`?
`
`-----i
`
`SLEEP
`XXXMS
`
`FIG. 3
`
`VERIFY
`ANGER
`
`NO
`VALID
`f.PRINT
`?
`
`UNLOCK
`DOOR
`
`FINGER PRINT
`
`REMOVAL
`
`IPR2022-00602
`Apple EX1007 Page 3
`
`
`
`U.S. Patent Aug. 9, 2005
`
`
`US 6,927,668 Bl
`Sheet 3 of 3
`
`21
`
`18
`
`20
`
`FIG. 4
`
`IPR2022-00602
`Apple EX1007 Page 4
`
`
`
`
`
`US 6,927,668 Bl
`
`1
`
`2
`
`
`
`PRINT ACCESS SECURITY SYSTEM
`
`
`
`DESCRIPTION OF THE PRIOR ART
`
`
`
`FIELD OF THE INVENTION
`
`U.S. Pat. No. 5,686,765 to Washington teaches a system
`
`
`
`
`
`
`for preventing unauthorized or unlicenced persons from
`
`
`using an automobile. In one embodiment, the system has a
`
`
`
`This invention is related to security systems and,
`5
`
`
`
`remote component that receives and compares physiological
`
`
`
`particularly, to identity recognition through comparison of
`
`
`
`
`
`identification entered at the vehicle. If the data match, the
`
`
`
`
`an image of a finger and a stored template. The security
`
`
`
`ignition system of the vehicle is energized for normal
`
`
`system may be used to gain entry and to energize the
`
`
`
`
`operation. In another embodiment, the operator data is
`
`systems of a vehicle.
`
`
`
`compared to a particular time frame for operation by that
`10
`
`
`
`
`operator during specified times. And in another embodiment,
`BACKGROUND OF THE INVENTION
`
`
`
`the system requires subsequent data input to ensure that the
`It is generally accepted that vehicles are items considered
`
`
`
`
`
`
`
`authorized driver remains the current operator. There is also
`
`
`
`
`
`highly transportable by nature. Vehicles may include cars,
`
`
`provision for a bar code reader of an encoded driver's
`
`
`
`trucks, buses, vans, construction equipment, water craft,
`
`
`
`licence and/or reading the signal of an electronic tether. The
`15
`
`
`
`
`motorcycles, airplanes, golf carts, snowmobiles, and,
`
`
`
`
`physiological identification data may be generated by a
`
`
`
`
`generally, anything that is capable of self powered mobility.
`
`
`
`fingerprint reader or an eyeball scan. This requires a scan
`
`
`
`Common to such vehicles is a key or keys for security of the
`
`and a transmission to a remote computer.
`
`
`
`
`interior and operation of the systems. However, a key can be
`
`
`
`
`U.S. Pat. No. 5,448,659 to Hiroshi teaches the use of a
`
`
`
`used by anyone and is easily duplicated, rendering the
`20 card-shaped waveguide-type image transmission device to
`
`
`
`
`security of the vehicle vulnerable to unauthorized use.
`
`
`
`scan, read and transmit fingerprint data. Again, the identity
`
`
`
`
`Some automobile manufacturers utilize different keys for
`input is a fingerprint scan.
`different functions. For instance, General Motors, for many
`
`
`
`
`
`The fingerprint scanning technology of these prior art
`
`
`
`
`
`
`
`years, employed one key for unlocking the doors and trunk
`
`
`
`
`
`devices produces a representation of the grooves and ridges
`
`
`
`and a second key for starting the engine. However, anyone
`
`
`
`of the surface of a finger. Therefore, these scans are highly
`
`who had access to the keys would be able to operate the 25
`
`
`
`
`
`
`susceptible to errors caused by extraneous matter such as
`
`
`vehicle. More recently, GM has made a key system that
`
`
`
`
`
`dirt, grease, paint, calluses, etc. on the fingers of the pro
`
`
`
`
`includes a microchip. These keys are extremely difficult to
`
`spective users.
`
`
`
`
`
`duplicate however, there are specialized vendors authorized
`
`
`
`
`to make copies. This program also degrades the security
`
`30
`system.
`Accordingly, it is an objective of the instant invention to
`
`
`
`
`
`
`
`Other security systems are in use. For instance, Ford
`
`
`
`
`provide a system to secure any vehicle from operation by an
`
`
`Motor Company employs a keyless entry system which
`
`unauthorized user.
`allows an individual to have a numeric or alphabetic code
`
`
`
`programmed into the keyless entry and a memory circuit
`
`
`
`It is a further objective of the instant invention to provide
`
`
`
`
`35
`
`
`stores the code for activation of the door locks upon entry of
`
`
`
`a system to identify and authenticate a potential user of a
`
`
`
`
`a correct code sequence. The code is typically maintained by
`
`
`
`vehicle by fingerprint information. The system is referred to
`
`
`
`
`the manufacturers as well as the local dealer. Thus, access to
`FEVM.
`
`
`as Fingerprint Enrollment and Verification Module,
`the code can be obtained by a number of people thereby
`
`
`
`
`
`
`It is yet another objective of the instant invention to.
`
`degrading the efficacy of the system.
`
`
`electrical 40 provide a stand alone system hard wired into the
`
`
`Currently, most automobile companies and after market
`
`
`system of a vehicle to authorize and/or control any vehicle
`
`
`
`suppliers offer small electronic door openers which cooper-
`
`
`
`function by an operator placing a finger on a sensor.
`
`
`ate with the electrical system in the auto to unlock doors.
`
`
`Other objects and advantages of this invention will
`
`
`
`
`These devices are a convenience and may be overridden by
`
`become apparent from the following description taken in
`
`
`
`
`a key. As such, these devices do not add any security to the
`
`
`
`conjunction with the accompanying drawings wherein are
`45
`system.
`
`
`
`set forth, by way of illustration and example, certain
`
`
`
`In addition to controlling entry to vehicles, there are
`
`
`
`
`embodiments of this invention. The drawings constitute a
`devices that will cause the engine to start and remotely
`
`
`
`
`
`part of this specification and include exemplary embodi
`operate various other electrical systems in the vehicle.
`
`
`
`
`
`
`
`
`ments of the present invention and illustrate various objects
`However, for security purposes, these devices usually
`
`
`
`
`50 and features thereof.
`
`require a key for entry into the vehicle.
`
`
`
`In both the electronic door locking devices and the
`
`
`
`electronic engine starters, there is a very real risk that the
`FIG. 1 is a perspective of a door of an automobile;
`
`
`
`
`
`
`frequency used in the devices may be captured by unautho
`FIG. 2 is a close up perspective of the FEVM housing
`
`
`
`
`rized persons using scanners or like devices. Also, these 55
`shown in FIG. 1;
`
`
`
`
`devices and their associated circuits are over-ridden by the
`steps of the FIG. 3 is a flow chart of the operative
`
`
`
`
`
`use of the key. Therefore, anyone with the frequency code or
`
`
`
`
`fingerprint enrollment and verification module, FEVM; and
`
`a key or both can operate the vehicle.
`
`
`FIG. 4 is a pictural representation of the finger print
`
`
`However, what is lacking in the art is a stand alone
`60 sensor.
`security system that is hard wired into the vehicle and cannot
`
`
`
`
`
`
`
`be duplicated by copying of codes or keys. Further, what is
`DETAILED DESCRIPTION OF THE
`
`
`
`lacking in the prior art is a system that is programmable,
`INVENTION
`
`
`
`
`only, by the owner or authorized operator of the vehicle
`
`
`
`without the possibility of unauthorized duplication.
`The term, "operation," refers to any initiation of any
`
`
`
`
`Also what is lacking in the prior art is a mechanism for 65
`
`
`
`system on a vehicle, to include a range of commands from
`
`
`
`recognizing and verifying less than perfect fingerprint
`
`
`
`merely authorizing a system component to perform in a
`imprints.
`
`
`
`
`normal manner to energizing the component to perform. For
`
`SUMMARY OF THE INVENTION
`
`BRIEF DESCRIPTION OF THE FIGURES
`
`IPR2022-00602
`Apple EX1007 Page 5
`
`
`
`
`
`US 6,927,668 Bl
`
`the loading function of the FEVM to enroll an operation for
`
`
`
`4
`3
`example and not by way of limitation, authorizing door
`
`
`
`
`
`
`
`
`
`
`
`
`locks to open with a key or electronic device is an operation.
`
`operation of a vehicle.
`
`
`Actually opening the door locks is also an operation.
`The programmer 19 is connected to the FEVM and a
`
`
`
`
`
`
`
`Likewise, authorizing engine start with a key and starting the
`
`
`
`
`mode of operation is chosen, then the operator places a
`
`engine are both operations. Use of any of the subsidiary
`
`
`
`
`finger on the sensor 18. The enroll function of the program
`5
`
`
`
`
`systems of a vehicle, such as, transmission, radio, air
`
`
`
`
`
`mer is activated by pressing the enroll key. The image of the
`
`
`
`
`
`conditioner, convertible top, windless, blade, lights, alarm,
`
`
`
`
`fingerprint on the sensor 18 is processed by the FEVM to
`
`
`
`and the like, is an operation. The FEVM may be installed to
`
`
`
`
`form a template of the fingerprint. The template is not a
`
`
`
`enable or disable any operation of a vehicle.
`
`
`
`
`
`picture or representation of the actual grooves and ridges of
`
`
`A vehicle, as used in this disclosure, is any mobile
`
`
`
`10 a fingerprint. The template is statistical information about
`
`
`
`
`conveyance. Most vehicles are self propelled and have an
`
`
`the fingerprint image and may be 144 bytes in length. As
`
`
`
`electrical system to operate essential and nonessential
`
`
`
`
`such, the FEVM does not require a pristine fingerprint to be
`
`
`
`components, such as an automobile, truck, boat, airplane,
`
`
`
`
`enrolled but may successfully complete the function when
`
`
`
`earthmoving equipment, motorcycle, farm equipment
`
`
`
`
`the fingerprint image includes extraneous material, such as
`
`
`
`
`
`including tractors, combines, and military equipment includ
`
`
`
`15 perspiration, dirt, paint or grease. When the template is
`
`
`
`
`
`complete, it is stored in the flash memory to complete the
`
`
`
`
`ing tanks,. self propelled artillery, armored personnel
`
`
`
`
`
`enrollment function. An indicator will signal the end of this
`carriers, to name a few. The FEVM is wired into the
`
`
`
`function. The operator removes his finger from the sensor.
`
`electrical system of the vehicle to enable or disable the
`
`
`electrically operated components. Of course, the FEVM
`
`
`
`
`
`
`
`
`The operator then places the same finger on the sensor a
`20
`
`
`
`
`
`would be designed to operate on the same electrical current
`
`
`second time and the verify key on the programmer is
`
`
`used in the vehicle into which it is to be installed.
`
`
`
`activated. The FEVM compares the image on the sensor to
`
`
`
`
`the template stored in the memory. A signal, such as a green
`
`
`
`
`Vehicles that are not self propelled may be affected by the
`
`
`light, will indicate that the image and the template match.
`
`
`FEVM blocking the source of power to the vehicle. Also,
`
`
`
`The operator is now an authorized user of the mode for
`
`
`
`mechanical components may be enabled or disabled by the
`25
`
`
`which he is verified on the vehicle.
`
`FEVM, e.g. by use of solenoids.
`
`
`
`This procedure is repeated for each operator and each
`
`
`
`The FEVM has the capability of storing multiple finger
`
`
`mode until complete. The programmer 19 is then unplugged
`
`
`
`print templates so that a number of operators may operate
`
`
`
`
`from the FEVM and stored in a secure location. At this point,
`
`
`
`the same vehicle. The FEVM has multiple modes which
`
`
`the FEVM is fully programmed with no electrical or elec
`
`
`
`
`
`correspond to different subsystems on the same vehicle and
`30
`
`
`
`
`tronic vulnerability. Any physical tampering with the FEVM
`
`
`
`each subsystem may be operated by a different finger of the
`
`
`
`would merely disable the hardware without invading the
`
`
`same operator. For example, a thumb print may unlock the
`software.
`
`
`doors of an automobile, an index fingerprint may start the
`
`
`
`
`engine, another fingerprint may turn on the cell phone, etc.
`FIG. 3 illustrates the steps for opening a door lock using
`
`
`
`
`
`
`operator places a finger on the 35 the FEVM. The prospective
`
`In FIG. 1 an automobile door 10 is shown with a window
`
`
`passive sensor 18, the sensor activates and detects the
`
`
`11, a door handle 12 and a key lock 13. In one embodiment,
`
`
`
`
`
`presence of the finger, the fingerprint image is compared to
`
`
`
`
`the FEVM 14 is mounted in an aperture in the door near the
`
`
`the templates in the flash memory to verify the prospective
`
`
`
`
`
`door handle. Another embodiment mounts the sensor lB and
`
`
`
`user. If there is no verification, ie no match in the memory
`
`
`
`the housing 15 in the door with the sensor connected by
`
`
`
`
`
`40 for the prospective operator, the sensor returns to the detect
`
`
`
`
`
`wiring to the FEVM 14 located in another part of the vehicle.
`
`
`step. If there is a verification and the fingerprint image has
`
`
`The FEVM may be mounted at any location on the vehicle
`
`
`
`a template in the memory, the door unlocks. The finger is
`
`
`
`as a matter of choice. As shown in FIG. 2, the FEVM 14 has
`
`
`
`a housing 15 surrounding an aperture
`
`
`
`
`
`removed in the door (not and the sensor returns to the passive mode.
`shown) and connected to the door 10 by screws 16. The
`
`
`
`
`
`When the authorized user leaves the car, he again places
`
`
`housing 15 may be metal or plastic with other connections
`
`
`45 his finger on the sensor and the doors lock.
`
`
`
`used, such as welding or adhesives. The housing 15 has an
`
`
`
`A detailed command description of the FEVM follow:
`
`
`
`opening 17 of such a shape and size to accommodate the
`
`Standalone Fingerprint
`
`
`
`
`fingerprint of a finger of an operator of the vehicle. A
`Enrollment
`
`
`
`
`silicone chip sensor 18 is fixed in the housing 15 and extends
`and
`
`
`
`
`across the opening 17. The silicone chip is an integral part 50
`Verification
`
`
`of a solid state device 20, as shown in. FIG. 4, having an
`Module
`
`
`
`
`integrated circuit. The sensor surface or matrix 21 contains
`(FEVM)
`
`
`
`
`an active antenna array of more than 16,000 elements and is
`Rev 1.0
`
`
`
`
`
`protected by a hard transparent coating that is scratch and
`
`Oct. 28, 2000
`
`
`
`
`impact resistant. The matrix 21 is surrounded by a drive ring 55
`
`
`22 which transmits an extremely small signal that the
`Table of Contents
`
`
`
`
`
`individual antenna elements can detect. When a,finger is
`
`
`PRINT ACCESS Fingerprint Enrollment and Verification
`
`
`
`placed on the matrix, the drive ring couples a small signal
`Module
`
`
`
`
`onto the finger's living subdermal layer. The signal is
`
`Host Interface Command Set
`
`
`
`
`
`
`received by the antenna elements which creates a digital or 60
`Command Summary
`
`
`
`
`statistical pattern that reflects the finger's unique underlying
`Basic Concepts
`structure.
`
`Detailed Command Description
`
`
`
`
`In operation the FEVM is connected Status to the print access
`
`
`security system programmer Enroll 19. The programmer is con
`
`
`
`
`
`nected to the FEVM by plug-in connection 23. The pro65 Verify Parameters
`
`
`
`
`
`
`grammer is powered by the same voltage as the system into Verify
`
`
`
`
`
`which the FEVM is to be installed. The programmer controls Baud
`
`IPR2022-00602
`Apple EX1007 Page 6
`
`
`
`
`
`US 6,927,668 Bl
`
`5
`
`Serial Interface Command Features
`
`6
`Upload
`
`
`image currently captured by the sensor-No fingerprint
`
`
`image is transmitted outside of the FEVM during verifica
`Download
`tion.
`Image
`Active Enrollment Buffer: The active enrollment buffer is
`
`
`
`
`Store
`
`
`
`it 5 used to hold an enrollment template. After enrollment
`Retrieve
`
`
`
`contains the template that has just been enrolled. Prior to
`Header
`
`
`
`verification it should be loaded with the template to be
`Signature
`
`
`verified. Store and Upload use this Buffer as a source
`Erase
`
`
`
`whereas Download and Retrieve use this buffer as a desti
`Persistent
`nation.
`Calibrate
`10 Storage Slot: A Storage slot is a piece of Flash memory
`
`
`Priveleges
`
`
`allocated within the FEVM to hold enrolled templates.
`Restrict
`
`
`
`
`
`Enrolled templates may be stored, retrieved or erased from
`Set Code
`
`a storage slot.
`
`
`
`Detailed Command Description
`Power On/Off
`15 Status
`Reset
`
`Op-code: OOH
`Hardware Signals and Connections
`
`Type: Immediate
`
`Standalone Connector
`Parameters: None
`
`Serial Connector
`Returns:
`20
`
`Byte 1: Command Status
`
`
`
`Print Access Security Systems Fingerprint Enrollment
`
`
`The bits are described in the following table:
`
`and Verification Module
`
`
`
`BitMeaning0St Fail: Previous command failed if
`
`Host Interface Command Set
`set.
`Copyright Print Access Security Systems, Inc., 2000.
`
`
`
`
`lStlnEnroll: Performing Enrollment if set.
`
`
`
`
`
`
`This document describes the host interface command set
`
`
`
`2Stln Verify: Performing Verification if set.
`
`for the Print Access Security model of Fingerprint Enroll-25
`
`
`
`
`3StlnStore: Storing data in Flash Memory if set.
`
`
`
`ment and Verification Modules. Using these commands, all
`
`
`4StlnCalibrate: Calibrating if set.
`
`
`functionality of the Print Access Security module is exposed
`
`
`6StPermission: Insufficient permissions.
`
`
`
`to the host CPU. The commands are simple single byte
`
`
`
`7StFinger: A finger is placed on the device if set.
`
`op-codes that are issued through the RS-232 interface. There
`
`
`
`Byte 2: Extended Status
`
`
`are two types of commands; immediate and long. Immediate
`30
`
`
`
`The extended status byte provides extra status information
`
`
`
`
`commands return their results immediately. Long commands
`
`
`for a command. This information is command and context
`
`
`
`require an extended length of time to complete. The device
`dependent.
`
`
`
`
`status should be polled to determine when such a command
`CommandMeaningVerifylf Bit O is set during verification,
`
`
`
`
`has completed or failed.
`
`
`
`then the FEVM is performing verification against the inter-
`
`
`
`
`
`35 nal storage slots. If Bit O is clear during verification, then the
`Command Summary
`
`
`
`FEVM is performing verification against the Active Enroll
`Command Op-code Description Status 0x00Retrieve the 2
`
`
`
`
`
`
`
`ment Buffer. If verification of multiple storage slots has
`
`
`byte device statusEnroll0x0lGenerate an enrollment tem
`
`
`
`
`completed then this status byte contains the verified storage
`
`
`plate from a finger-Verify0x02Verify a finger against an
`
`
`slot number if the verification was successful. EnrollDuring
`
`
`40 enrollment, the bits for this status byte are defined as
`
`
`enrollment template(s)Baud0x03 Set the RS-232 baud
`
`
`
`
`rateUpload0x04Send the active enrollment template to the
`
`
`follows, Bit Meaning O The finger pressure needs adjusting
`
`
`
`hostDownload0x0SDownload an enrollment template from
`
`
`if set. See bits I and 2 for pressure direction. The yellow
`
`
`
`host and activatelmage0x06Send the enroll Fingerprint
`
`LED will be on plus one of the green or red LEDs. I If bit
`
`
`
`image to the hostStore0x07Store the active enroll template
`
`
`
`
`
`0 is set then too much finger pressure is being applied too the
`
`
`
`in the deviceRetrieve0x08Retrieve an enroll template from
`
`
`
`
`45 sensor. If bit O is cleared then the finger is positioned too far
`
`
`the device and activateHeader0x09Return the header from a
`
`
`to the left of the sensor. The red LED will be on.
`
`
`stored templateSignature0x0AReturn the device signature
`
`
`(Orientation: LEDs are at the top) 2 If bit O is set then too
`
`G EZ6x x r r rErase0x0BErase the spec ified stored
`
`
`
`
`little finger pressure is being applied to the sensor. If bit O is
`
`templatePersistentOx0CMake the current settings
`
`
`
`clear then the finger is positioned too far to the right of the
`p e r s i s t e n t C a l i br a t e Ox OD C a l i br a t e t h e
`
`50 sensor. The green LED will be on.
`
`devicePrivilege0x0EBeg i n access t o p r i v ileged
`Description
`
`c o m m andsRestrictOx0FEnd access t o p r i vileged
`
`
`
`
`
`c o m m a n d sS e t C o d e 0 xl 0 S e t a new p r i v il e g e
`
`be invoked at any time.
`
`
`code VerifyParameters0xllSet the verification parameters
`Enroll
`Basic Concepts
`55 Op-code:0lH
`
`
`
`The basic operation of the FEVM is the Enrollment and
`Type:Long
`
`
`
`Verification of fingerprints. All additional functionality is
`
`Parameters: None
`
`
`simply in support of these two key operations.
`
`Returns: None
`
`
`
`
`Enrollment is a process by which a fingerprint image capDescription:
`
`
`
`
`tured by the sensor is transformed into a template. A 60 Initiates enrollment. The command does not complete
`
`
`
`
`
`
`
`
`template may be up to 144 bytes in length and contains until a successful enrollment has been achieved. To abort
`
`
`
`
`
`
`statistical information about a particular fingerprint image. this command the device must be reset. To check for
`
`
`
`
`
`
`
`
`
`This information is sufficient to perform verification when completion of this command, the Status must be polled. The
`
`
`
`the same-finger is again placed
`
`
`StlnEnroll on the sensor. The template bit will be cleared when this command com-
`
`
`
`
`65 pletes. The host may detect when an individual has placed
`
`is not a fingerprint image.
`
`
`
`
`
`
`Verification is a process that applies the statistical informatheir finger on the sensor of the device by checking the
`
`
`
`
`tion found in an enrolled template against a fingerprint StFinger bit.
`
`Returns the current status of the device. This command may
`
`IPR2022-00602
`Apple EX1007 Page 7
`
`
`
`
`
`US 6,927,668 Bl
`
`
`
`Upload the template in the active enrollment buffer to the
`
`7
`8
`Verify Parameters
`
`Description:
`
`
`
`Op-code: llH
`host.
`Type: Immediate
`Download
`Parameters:
`5 Op-code. 05H
`
`
`
`Byte 1: The storage slot to begin verification from,
`Type: Immediate
`
`
`
`
`Byte 2: The number of storage slots to verify. If this byte
`Parameters: A valid template that has been previously
`
`
`
`
`
`
`
`is O then verification is performed on the active enroll
`
`
`uploaded from the device. The size of the download
`ment buffer.
`
`
`
`template is determined from the header. (See Upload)
`
`Returns: None.
`10 Returns:
`
`
`
`None. The device status should be checked for
`Description:
`
`failure status.
`
`
`This command sunply sets the Verification parameters.
`Description:
`
`
`Separating the parameters from the Verify command is
`
`
`Download a template from the host and store it in the
`
`
`
`useful when configuring FEW4s. An application may wish
`
`
`
`
`active enrollment buffer. This makes the template available
`
`to store multiple templates on an FEVM and then configure
`
`
`for verification, storage or Upload.
`• 15
`
`
`
`it to perform verification on these templates. Forcing ven-
`Image
`
`
`
`
`fication. is not necessary. E.g. enrolling an individual from
`
`Op-code: 06H
`
`a hotel lobby and programming their door lock remotely.
`Type: Immediate
`
`
`Note: To make these parameters persistent, the Persistent
`
`Parameters: None
`
`command should be called prior to the next invocation of
`
`Returns:
`20
`
`
`
`reset, The Factory defaults are 0,0.
`Byte 1: The image type id.
`Verify
`0: No image.
`Op-code: 02H.
`1: The next 2 bytes contain the width and height.
`
`
`Type: Long
`
`
`Byte 2: The width of the enrollment image in pixels
`Parameters: None. The parameters are set using the
`
`
`
`
`image in pixels 25 Byte 3: The height of the enrollment
`
`
`VenfyParameters command.
`
`
`
`Subsequent Bytes: The enrollment image. This is a black
`
`Returns: None.
`
`and white image with a bit depth of one.
`Description:
`Description:
`
`
`Initiates verification. The command does not complete
`This image may be used to visually inspect the image of
`
`
`
`
`
`
`
`until a successful verification has been achieved. To abort
`
`
`30 the finger that was just enrolled-The most unique features
`
`
`this command the device must be reset. To check for the
`
`
`
`
`
`of the finger should be in the center of the image. A good
`
`
`
`
`completion of this command, the Status must be polled. The
`
`
`
`enrollment is necessary for easy verification. This visual
`
`
`Stln Verify bit in the first status byte will be cleared when
`
`
`
`
`inspection is not necessary for enrollment but makes enroll
`
`
`
`verification has completed. The host may detect when an
`
`
`
`ment simpler. An alternative may be to enroll and then verify
`
`
`
`
`individual has placed a finger on the sensor of the device by
`
`
`
`
`
`enrolled image. the quality of the 35 several times to ensure
`
`
`checking the StFinger bit. The second status byte may be
`Store
`
`
`
`
`used to detect if a multiple verification or an Active Enroll
`
`Op-code: 07H
`
`
`
`ment Buffer verification is taking place.
`Type: Long
`Baud
`Parameters:
`
`Op-code: 03H
`Byte 1: The internal FEVM slot number to be used to store
`
`
`Type: Immediate
`
`
`
`
`the active enrollment template. This number must be
`
`Parameters: Byte 1: The new baud rate to be set. Supported
`
`between O and 63.
`Baud rates are as follows:
`Returns: None. To check for success or failure of this
`
`
`
`
`Baud
`
`
`command, the device status must be polled. Once the
`Rate Value 1200024001480029600314,400419,200528,
`
`
`
`
`
`
`the from the first status byte, 45 StlnStore bit has been cleared
`
`800638,400757, 6008115,2009
`
`
`
`
`Failed bit will indicate success or failure of this command.
`
`Returns: None.
`Retrieve
`Description:
`
`Op-code: 08H
`
`
`Change the communication baud rate for the device to the
`
`Type: Immediate
`
`newly supplied baud rate.
`50 Parameters:
`
`
`
`Note: To make the new baud rate persistent, the Persistent
`
`
`Bytel: The internal FEVM slot number of the enrollment
`
`
`command should be called prior to the next invocation of
`
`
`template to be retrieved. This number must be between
`
`
`
`reset The factory default is 3 (9600 baud).
`0 and 63.
`Upload
`Returns: None. This is an immediate command. The status
`
`
`
`
`Op-code: 04H
`
`
`to determine success or failure. 55 byte should be checked
`Type: Immediate
`
`
`
`
`Description: Retrieve the stored template and place it in the
`Parameters: None.
`
`
`
`
`active enrollment buffer. This makes the template available
`
`
`
`
`
`
`Returns: The currently enrolled template in the active enroll
`
`for Verify, Upload or Store.
`
`
`
`
`buffer. The actual size of the template must be determined by
`Header
`
`
`
`
`examining the header of the template. The header is the first
`60 Op-code: 09H
`
`
`
`2 bytes of the data being returned.
`Type: Immediate
`Parameters:
`Template Header
`Byte 1: The internal FEVM slot number of the enrollment
`
`
`
`
`
`
`
`
`
`B i t sD e s c r i p t i o n 0 - 1 R e s e r v e d 2 - 3 T h e t e m p l a t e template to be retrieved. This number must be between
`
`
`
`
`
`structure4-6Template types: 3=84 bytes,4=104 bytes,6=144 0 and 63.
`65
`bytes Sizes include the header and trailer. 7Valid template if Returns: The 2 byte header from the stored template. Refer
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`clear. Invalid ( deleted)if set.8-15Reserved for user data to the Upload command for a description of the header.
`
`40
`
`IPR2022-00602
`Apple EX1007 Page 8
`
`
`
`
`
`US 6,927,668 Bl
`
`9
`
`10
`Description:
`Description: If the privilege code that is given matches the
`
`
`
`
`
`
`
`privilege code that is currently stored in the FEVM, then
`This command is used to recover the header from a stored
`
`
`
`
`
`permission is granted to perform Image, Download,
`
`
`
`
`
`template. This is useful for applications that may be using
`
`
`
`Persistent, Enroll, Store and Erase.
`
`
`the user data component of the header and wish to search
`5 Note: If no privilege code has been previously set then all
`
`
`
`
`
`
`through the stored templates to recover this data.
`
`
`
`
`privileges are granted without the necessity of calling the
`Signature
`
`Privilege command.
`
`Op-code: OAH
`Restrict
`Type: Immediate
`OFH
`Op-code:
`
`Parameters: None.
`Type: Immediate
`
`
`Returns: A string representing the signature of the device.
`10
`
`Parameters: None.
`
`
`
`The expected return value is "GEZxxxrrr" where "xxx"
`Returns: None.
`
`
`represents the model of the module and rrr represents the
`Description: If privileges are currently active, then this
`
`
`
`
`
`
`revision. E.g "GEZ6Aa0011" where 6Aa is the model and
`
`
`
`
`commands disables access to privileged operations thereby
`001 is the revision.
`
`
`
`
`disabling Image, Download, Persistent, Enroll, Store and
`
`
`
`Description: Returns a device signature string. This com
`15 Erase.
`
`
`mand also unlocks the FEVM command engine and must be
`Note: If the Privilege code has been made persistent then
`
`
`
`
`
`
`issued after a reset or power on.
`
`resetting the device will have the same effect as calling
`Erase
`Restrict
`
`Op-code: OBH
`SetCode
`Type;Long
`20 Op-code:lOH
`Parameters:
`Type: Immediate
`Bytel: The internal FEVM slot number of the enrollment
`
`
`
`Parameters: First 6 bytes: The currently set Privilege code.
`
`
`
`
`
`
`template to be erased. This number must be between 0 and
`
`
`If no privilege code currently exists, then this parameter
`63.
`
`
`
`
`should contain 6 bytes of zeroes. Next 6 bytes: The new
`
`Privilege code.
`Returns: None. The status of the device should be polled to 25
`
`
`
`
`
`
`Description: Sets a Privilege code for the FEW This privi
`
`
`
`
`
`determine the success or failure of this command. The
`
`
`
`StlnStore bit will be cleared com
`
`
`lege code when the command has is used with the Privilege command and is used to
`
`
`
`
`control access to Image, Download, Persistent, Enroll, Store
`pleted.
`FEVM
`Description: Erase the enrolled template and Erase. stored m the
`
`
`
`
`the Persistent 30 Note: To make new Privilege code persistent,
`
`
`
`at the given slot number.
`
`command should be called prior to the next invocation of
`Persistent
`OCH
`
`
`
`
`reset. The factory default is 0x000000000000. Serial Inter
`Op-code:
`
`face Command Features
`Type:Long
`
`Power On/Off To power the device off, bring the DTR signal
`
`
`
`
`Parameters: To help eliminate the possible accidental invo
`
`
`
`low (0). This will cause power to the device to be dropped
`
`
`cation of this command, the command accepts the 35
`
`op-code (OCH) as the one-byte parameter.
`
`
`
`down to nominal levels and prevent it from functioning.
`
`Bringing DTR high (1) will cause the device to resume
`
`
`
`
`
`Returns: None. The device status should be polled to deter
`
`
`
`
`operation. All non-persistent setting will have been lost and
`
`
`
`
`mine the success or failure of this command. The StlnStore
`must be reprogrammed.
`
`bit will be cleared when the command has completed.
`Reset
`Description: This command will make the current
`40
`To reset the device, simply toggle the power off and back on
`
`
`
`
`calibration, verification, baud rate and Privilege code set
`
`using DTR as described above. A delay should be added
`tings persistent.
`Calibrate
`
`
`after power on before the device is fully functional. This
`ODH
`
`delay is approximately 200 ms.
`Op-code:
`Type,Long
`
`
`45 Hardware Signals and Connections
`
`Parameters: None.
`The fingerprint module interface connectors are located on
`
`
`
`
`Returns: None. The device status should be polled to deter
`
`
`
`
`
`
`
`
`the back of th