throbber
I 1111111111111111 11111 111111111111111 111111111111111 IIIII IIIIII IIII 11111111
`
`US006927668Bl
`
`(12)United States Patent
`
`Odle et al.
`
`(10)Patent No.:US 6,927,668 Bl
`
`
`(45)Date of Patent:
`Aug. 9, 2005
`
`(54)PRINT ACCESS SECURITY SYSTEM
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`Richard Odle, 5336 2nd Rd., Lake
`
`Knapp ........................ 382/124
`
`5,325,442 A *
`
`6/1994
`(76)Inventors:
`Worth, FL (US) 33461; Gary Odle,
`
`Tsutsui et al.
`
`5,448,659 A
`9/1995
`A *
`5,523,746
`
`
`Gallagher .............. 340/825.31
`6/1996
`
`14900 Stirrup La., West Palm Beach,
`FL (US) 33414; Robert E. Henry,
`1/1997
`5,598,474 A *
`
`
`Johnson ...................... 713/186
`5/1997
`
`
`Sibbald ...................... 382/124
`
`5,633,947 A *
`
`
`2461 Village Blvd., West Palm Beach,
`FL (US) 33409; David Coriaty, 144
`Washington
`11/1997
`
`5,686,765 A
`
`
`
`Hsu et al. .............. 340/825.31
`8/2000
`6,100,811 A *
`Royal Palm Beach, FL Cocoplum La.,
`
`*cited by examiner
`(US) 33411
`Primary Examiner-Michael Horabik
`
`
`
`
`Assistant Examiner-Vernal Brown
`to any disclaimer, the term of this
`
`( * ) Notice:Subject
`
`
`patent is extended or adjusted under 35
`
`
`
`ABSTRACT
`
`
`U.S.C. 154(b) by 218 days.
`
`PA(74)Attorney, Agent, or Firm-McHale & Slavin
`
`(57)
`
`(21)Appl. No.: 09/718,530
`A fingerprint enrollment and verification module is con­
`
`
`
`
`nected to the electrical circuit
`
`of a vehicle to prevent
`(22)Filed:Nov. 21, 2000
`
`
`
`
`operation of the vehicle by unauthorized users. The module
`
`(51)Int. Cl.7 ................................................ G05B 19/00
`
`
`has a sensor that creates a template of a fingerprint when a
`340/5.53; .................... 340/5.52; 340/5.51;
`(52)U.S. Cl.
`
`
`finger is placed on the module. The module has a flash
`
`
`
`
`
`
`
`memory to store enrolled templates and a verification step.
`
`
`340/5.64; 340/5.61; 340/5.21; 340/5.27;
`
`
`
`
`After a fingerprint has been enrolled in the module, any
`340/5.2;
`
`
`340/5.1; 340/426.28; 340/426.36;
`
`
`
`operation of that vehicle is possible only after the user's
`382/124
`
`
`
`fingerprint is verified to match the enrolled template.
`(58)Field of Search ...............................
`
`340/5.53, 5.52,
`
`
`13 Claims, 3 Drawing Sheets
`
`340/5.61, 5.72, 5.21, 5.27, 5.64
`
`10----..._
`
`IPR2022-00602
`Apple EX1007 Page 1
`
`

`

`U.S. Patent Aug. 9, 2005
`Sheet 1 of 3
`
`
`US 6,927,668 Bl
`
`10---......
`
`FIG. 1
`
`16
`
`00 00
`
`0 0
`E V
`
`17
`
`18
`
`FIG. 2
`
`IPR2022-00602
`Apple EX1007 Page 2
`
`

`

`U.S. Patent Aug. 9, 2005 Sheet 2 of 3
`
`
`US 6,927,668 Bl
`
`18
`
`orna
`ANGER
`
`ANGER NO
`--
`a---
`PRESENT
`?
`
`-----i
`
`SLEEP
`XXXMS
`
`FIG. 3
`
`VERIFY
`ANGER
`
`NO
`VALID
`f.PRINT
`?
`
`UNLOCK
`DOOR
`
`FINGER PRINT
`
`REMOVAL
`
`IPR2022-00602
`Apple EX1007 Page 3
`
`

`

`U.S. Patent Aug. 9, 2005
`
`
`US 6,927,668 Bl
`Sheet 3 of 3
`
`21
`
`18
`
`20
`
`FIG. 4
`
`IPR2022-00602
`Apple EX1007 Page 4
`
`

`

`
`
`US 6,927,668 Bl
`
`1
`
`2
`
`
`
`PRINT ACCESS SECURITY SYSTEM
`
`
`
`DESCRIPTION OF THE PRIOR ART
`
`
`
`FIELD OF THE INVENTION
`
`U.S. Pat. No. 5,686,765 to Washington teaches a system
`
`
`
`
`
`
`for preventing unauthorized or unlicenced persons from
`
`
`using an automobile. In one embodiment, the system has a
`
`
`
`This invention is related to security systems and,
`5
`
`
`
`remote component that receives and compares physiological
`
`
`
`particularly, to identity recognition through comparison of
`
`
`
`
`
`identification entered at the vehicle. If the data match, the
`
`
`
`
`an image of a finger and a stored template. The security
`
`
`
`ignition system of the vehicle is energized for normal
`
`
`system may be used to gain entry and to energize the
`
`
`
`
`operation. In another embodiment, the operator data is
`
`systems of a vehicle.
`
`
`
`compared to a particular time frame for operation by that
`10
`
`
`
`
`operator during specified times. And in another embodiment,
`BACKGROUND OF THE INVENTION
`
`
`
`the system requires subsequent data input to ensure that the
`It is generally accepted that vehicles are items considered
`
`
`
`
`
`
`
`authorized driver remains the current operator. There is also
`
`
`
`
`
`highly transportable by nature. Vehicles may include cars,
`
`
`provision for a bar code reader of an encoded driver's
`
`
`
`trucks, buses, vans, construction equipment, water craft,
`
`
`
`licence and/or reading the signal of an electronic tether. The
`15
`
`
`
`
`motorcycles, airplanes, golf carts, snowmobiles, and,
`
`
`
`
`physiological identification data may be generated by a
`
`
`
`
`generally, anything that is capable of self powered mobility.
`
`
`
`fingerprint reader or an eyeball scan. This requires a scan
`
`
`
`Common to such vehicles is a key or keys for security of the
`
`and a transmission to a remote computer.
`
`
`
`
`interior and operation of the systems. However, a key can be
`
`
`
`
`U.S. Pat. No. 5,448,659 to Hiroshi teaches the use of a
`
`
`
`used by anyone and is easily duplicated, rendering the
`20 card-shaped waveguide-type image transmission device to
`
`
`
`
`security of the vehicle vulnerable to unauthorized use.
`
`
`
`scan, read and transmit fingerprint data. Again, the identity
`
`
`
`
`Some automobile manufacturers utilize different keys for
`input is a fingerprint scan.
`different functions. For instance, General Motors, for many
`
`
`
`
`
`The fingerprint scanning technology of these prior art
`
`
`
`
`
`
`
`years, employed one key for unlocking the doors and trunk
`
`
`
`
`
`devices produces a representation of the grooves and ridges
`
`
`
`and a second key for starting the engine. However, anyone
`
`
`
`of the surface of a finger. Therefore, these scans are highly
`
`who had access to the keys would be able to operate the 25
`
`
`
`
`
`
`susceptible to errors caused by extraneous matter such as
`
`
`vehicle. More recently, GM has made a key system that
`
`
`
`
`
`dirt, grease, paint, calluses, etc. on the fingers of the pro­
`
`
`
`
`includes a microchip. These keys are extremely difficult to
`
`spective users.
`
`
`
`
`
`duplicate however, there are specialized vendors authorized
`
`
`
`
`to make copies. This program also degrades the security
`
`30
`system.
`Accordingly, it is an objective of the instant invention to
`
`
`
`
`
`
`
`Other security systems are in use. For instance, Ford
`
`
`
`
`provide a system to secure any vehicle from operation by an
`
`
`Motor Company employs a keyless entry system which
`
`unauthorized user.
`allows an individual to have a numeric or alphabetic code
`
`
`
`programmed into the keyless entry and a memory circuit
`
`
`
`It is a further objective of the instant invention to provide
`
`
`
`
`35
`
`
`stores the code for activation of the door locks upon entry of
`
`
`
`a system to identify and authenticate a potential user of a
`
`
`
`
`a correct code sequence. The code is typically maintained by
`
`
`
`vehicle by fingerprint information. The system is referred to
`
`
`
`
`the manufacturers as well as the local dealer. Thus, access to
`FEVM.
`
`
`as Fingerprint Enrollment and Verification Module,
`the code can be obtained by a number of people thereby
`
`
`
`
`
`
`It is yet another objective of the instant invention to.
`
`degrading the efficacy of the system.
`
`
`electrical 40 provide a stand alone system hard wired into the
`
`
`Currently, most automobile companies and after market
`
`
`system of a vehicle to authorize and/or control any vehicle
`
`
`
`suppliers offer small electronic door openers which cooper-
`
`
`
`function by an operator placing a finger on a sensor.
`
`
`ate with the electrical system in the auto to unlock doors.
`
`
`Other objects and advantages of this invention will
`
`
`
`
`These devices are a convenience and may be overridden by
`
`become apparent from the following description taken in
`
`
`
`
`a key. As such, these devices do not add any security to the
`
`
`
`conjunction with the accompanying drawings wherein are
`45
`system.
`
`
`
`set forth, by way of illustration and example, certain
`
`
`
`In addition to controlling entry to vehicles, there are
`
`
`
`
`embodiments of this invention. The drawings constitute a
`devices that will cause the engine to start and remotely
`
`
`
`
`
`part of this specification and include exemplary embodi­
`operate various other electrical systems in the vehicle.
`
`
`
`
`
`
`
`
`ments of the present invention and illustrate various objects
`However, for security purposes, these devices usually
`
`
`
`
`50 and features thereof.
`
`require a key for entry into the vehicle.
`
`
`
`In both the electronic door locking devices and the
`
`
`
`electronic engine starters, there is a very real risk that the
`FIG. 1 is a perspective of a door of an automobile;
`
`
`
`
`
`
`frequency used in the devices may be captured by unautho­
`FIG. 2 is a close up perspective of the FEVM housing
`
`
`
`
`rized persons using scanners or like devices. Also, these 55
`shown in FIG. 1;
`
`
`
`
`devices and their associated circuits are over-ridden by the
`steps of the FIG. 3 is a flow chart of the operative
`
`
`
`
`
`use of the key. Therefore, anyone with the frequency code or
`
`
`
`
`fingerprint enrollment and verification module, FEVM; and
`
`a key or both can operate the vehicle.
`
`
`FIG. 4 is a pictural representation of the finger print
`
`
`However, what is lacking in the art is a stand alone
`60 sensor.
`security system that is hard wired into the vehicle and cannot
`
`
`
`
`
`
`
`be duplicated by copying of codes or keys. Further, what is
`DETAILED DESCRIPTION OF THE
`
`
`
`lacking in the prior art is a system that is programmable,
`INVENTION
`
`
`
`
`only, by the owner or authorized operator of the vehicle
`
`
`
`without the possibility of unauthorized duplication.
`The term, "operation," refers to any initiation of any
`
`
`
`
`Also what is lacking in the prior art is a mechanism for 65
`
`
`
`system on a vehicle, to include a range of commands from
`
`
`
`recognizing and verifying less than perfect fingerprint
`
`
`
`merely authorizing a system component to perform in a
`imprints.
`
`
`
`
`normal manner to energizing the component to perform. For
`
`SUMMARY OF THE INVENTION
`
`BRIEF DESCRIPTION OF THE FIGURES
`
`IPR2022-00602
`Apple EX1007 Page 5
`
`

`

`
`
`US 6,927,668 Bl
`
`the loading function of the FEVM to enroll an operation for
`
`
`
`4
`3
`example and not by way of limitation, authorizing door
`
`
`
`
`
`
`
`
`
`
`
`
`locks to open with a key or electronic device is an operation.
`
`operation of a vehicle.
`
`
`Actually opening the door locks is also an operation.
`The programmer 19 is connected to the FEVM and a
`
`
`
`
`
`
`
`Likewise, authorizing engine start with a key and starting the
`
`
`
`
`mode of operation is chosen, then the operator places a
`
`engine are both operations. Use of any of the subsidiary
`
`
`
`
`finger on the sensor 18. The enroll function of the program­
`5
`
`
`
`
`systems of a vehicle, such as, transmission, radio, air
`
`
`
`
`
`mer is activated by pressing the enroll key. The image of the
`
`
`
`
`
`conditioner, convertible top, windless, blade, lights, alarm,
`
`
`
`
`fingerprint on the sensor 18 is processed by the FEVM to
`
`
`
`and the like, is an operation. The FEVM may be installed to
`
`
`
`
`form a template of the fingerprint. The template is not a
`
`
`
`enable or disable any operation of a vehicle.
`
`
`
`
`
`picture or representation of the actual grooves and ridges of
`
`
`A vehicle, as used in this disclosure, is any mobile
`
`
`
`10 a fingerprint. The template is statistical information about
`
`
`
`
`conveyance. Most vehicles are self propelled and have an
`
`
`the fingerprint image and may be 144 bytes in length. As
`
`
`
`electrical system to operate essential and nonessential
`
`
`
`
`such, the FEVM does not require a pristine fingerprint to be
`
`
`
`components, such as an automobile, truck, boat, airplane,
`
`
`
`
`enrolled but may successfully complete the function when
`
`
`
`earthmoving equipment, motorcycle, farm equipment
`
`
`
`
`the fingerprint image includes extraneous material, such as
`
`
`
`
`
`including tractors, combines, and military equipment includ­
`
`
`
`15 perspiration, dirt, paint or grease. When the template is
`
`
`
`
`
`complete, it is stored in the flash memory to complete the
`
`
`
`
`ing tanks,. self propelled artillery, armored personnel
`
`
`
`
`
`enrollment function. An indicator will signal the end of this
`carriers, to name a few. The FEVM is wired into the
`
`
`
`function. The operator removes his finger from the sensor.
`
`electrical system of the vehicle to enable or disable the
`
`
`electrically operated components. Of course, the FEVM
`
`
`
`
`
`
`
`
`The operator then places the same finger on the sensor a
`20
`
`
`
`
`
`would be designed to operate on the same electrical current
`
`
`second time and the verify key on the programmer is
`
`
`used in the vehicle into which it is to be installed.
`
`
`
`activated. The FEVM compares the image on the sensor to
`
`
`
`
`the template stored in the memory. A signal, such as a green
`
`
`
`
`Vehicles that are not self propelled may be affected by the
`
`
`light, will indicate that the image and the template match.
`
`
`FEVM blocking the source of power to the vehicle. Also,
`
`
`
`The operator is now an authorized user of the mode for
`
`
`
`mechanical components may be enabled or disabled by the
`25
`
`
`which he is verified on the vehicle.
`
`FEVM, e.g. by use of solenoids.
`
`
`
`This procedure is repeated for each operator and each
`
`
`
`The FEVM has the capability of storing multiple finger­
`
`
`mode until complete. The programmer 19 is then unplugged
`
`
`
`print templates so that a number of operators may operate
`
`
`
`
`from the FEVM and stored in a secure location. At this point,
`
`
`
`the same vehicle. The FEVM has multiple modes which
`
`
`the FEVM is fully programmed with no electrical or elec­
`
`
`
`
`
`correspond to different subsystems on the same vehicle and
`30
`
`
`
`
`tronic vulnerability. Any physical tampering with the FEVM
`
`
`
`each subsystem may be operated by a different finger of the
`
`
`
`would merely disable the hardware without invading the
`
`
`same operator. For example, a thumb print may unlock the
`software.
`
`
`doors of an automobile, an index fingerprint may start the
`
`
`
`
`engine, another fingerprint may turn on the cell phone, etc.
`FIG. 3 illustrates the steps for opening a door lock using
`
`
`
`
`
`
`operator places a finger on the 35 the FEVM. The prospective
`
`In FIG. 1 an automobile door 10 is shown with a window
`
`
`passive sensor 18, the sensor activates and detects the
`
`
`11, a door handle 12 and a key lock 13. In one embodiment,
`
`
`
`
`
`presence of the finger, the fingerprint image is compared to
`
`
`
`
`the FEVM 14 is mounted in an aperture in the door near the
`
`
`the templates in the flash memory to verify the prospective
`
`
`
`
`
`door handle. Another embodiment mounts the sensor lB and
`
`
`
`user. If there is no verification, ie no match in the memory
`
`
`
`the housing 15 in the door with the sensor connected by
`
`
`
`
`
`40 for the prospective operator, the sensor returns to the detect
`
`
`
`
`
`wiring to the FEVM 14 located in another part of the vehicle.
`
`
`step. If there is a verification and the fingerprint image has
`
`
`The FEVM may be mounted at any location on the vehicle
`
`
`
`a template in the memory, the door unlocks. The finger is
`
`
`
`as a matter of choice. As shown in FIG. 2, the FEVM 14 has
`
`
`
`a housing 15 surrounding an aperture
`
`
`
`
`
`removed in the door (not and the sensor returns to the passive mode.
`shown) and connected to the door 10 by screws 16. The
`
`
`
`
`
`When the authorized user leaves the car, he again places
`
`
`housing 15 may be metal or plastic with other connections
`
`
`45 his finger on the sensor and the doors lock.
`
`
`
`used, such as welding or adhesives. The housing 15 has an
`
`
`
`A detailed command description of the FEVM follow:
`
`
`
`opening 17 of such a shape and size to accommodate the
`
`Standalone Fingerprint
`
`
`
`
`fingerprint of a finger of an operator of the vehicle. A
`Enrollment
`
`
`
`
`silicone chip sensor 18 is fixed in the housing 15 and extends
`and
`
`
`
`
`across the opening 17. The silicone chip is an integral part 50
`Verification
`
`
`of a solid state device 20, as shown in. FIG. 4, having an
`Module
`
`
`
`
`integrated circuit. The sensor surface or matrix 21 contains
`(FEVM)
`
`
`
`
`an active antenna array of more than 16,000 elements and is
`Rev 1.0
`
`
`
`
`
`protected by a hard transparent coating that is scratch and
`
`Oct. 28, 2000
`
`
`
`
`impact resistant. The matrix 21 is surrounded by a drive ring 55
`
`
`22 which transmits an extremely small signal that the
`Table of Contents
`
`
`
`
`
`individual antenna elements can detect. When a,finger is
`
`
`PRINT ACCESS Fingerprint Enrollment and Verification
`
`
`
`placed on the matrix, the drive ring couples a small signal
`Module
`
`
`
`
`onto the finger's living subdermal layer. The signal is
`
`Host Interface Command Set
`
`
`
`
`
`
`received by the antenna elements which creates a digital or 60
`Command Summary
`
`
`
`
`statistical pattern that reflects the finger's unique underlying
`Basic Concepts
`structure.
`
`Detailed Command Description
`
`
`
`
`In operation the FEVM is connected Status to the print access
`
`
`security system programmer Enroll 19. The programmer is con­
`
`
`
`
`
`nected to the FEVM by plug-in connection 23. The pro­65 Verify Parameters
`
`
`
`
`
`
`grammer is powered by the same voltage as the system into Verify
`
`
`
`
`
`which the FEVM is to be installed. The programmer controls Baud
`
`IPR2022-00602
`Apple EX1007 Page 6
`
`

`

`
`
`US 6,927,668 Bl
`
`5
`
`Serial Interface Command Features
`
`6
`Upload
`
`
`image currently captured by the sensor-No fingerprint
`
`
`image is transmitted outside of the FEVM during verifica­
`Download
`tion.
`Image
`Active Enrollment Buffer: The active enrollment buffer is
`
`
`
`
`Store
`
`
`
`it 5 used to hold an enrollment template. After enrollment
`Retrieve
`
`
`
`contains the template that has just been enrolled. Prior to
`Header
`
`
`
`verification it should be loaded with the template to be
`Signature
`
`
`verified. Store and Upload use this Buffer as a source
`Erase
`
`
`
`whereas Download and Retrieve use this buffer as a desti­
`Persistent
`nation.
`Calibrate
`10 Storage Slot: A Storage slot is a piece of Flash memory
`
`
`Priveleges
`
`
`allocated within the FEVM to hold enrolled templates.
`Restrict
`
`
`
`
`
`Enrolled templates may be stored, retrieved or erased from
`Set Code
`
`a storage slot.
`
`
`
`Detailed Command Description
`Power On/Off
`15 Status
`Reset
`
`Op-code: OOH
`Hardware Signals and Connections
`
`Type: Immediate
`
`Standalone Connector
`Parameters: None
`
`Serial Connector
`Returns:
`20
`
`Byte 1: Command Status
`
`
`
`Print Access Security Systems Fingerprint Enrollment
`
`
`The bits are described in the following table:
`
`and Verification Module
`
`
`
`BitMeaning0St Fail: Previous command failed if
`
`Host Interface Command Set
`set.
`Copyright Print Access Security Systems, Inc., 2000.
`
`
`
`
`lStlnEnroll: Performing Enrollment if set.
`
`
`
`
`
`
`This document describes the host interface command set
`
`
`
`2Stln Verify: Performing Verification if set.
`
`for the Print Access Security model of Fingerprint Enroll-25
`
`
`
`
`3StlnStore: Storing data in Flash Memory if set.
`
`
`
`ment and Verification Modules. Using these commands, all
`
`
`4StlnCalibrate: Calibrating if set.
`
`
`functionality of the Print Access Security module is exposed
`
`
`6StPermission: Insufficient permissions.
`
`
`
`to the host CPU. The commands are simple single byte
`
`
`
`7StFinger: A finger is placed on the device if set.
`
`op-codes that are issued through the RS-232 interface. There
`
`
`
`Byte 2: Extended Status
`
`
`are two types of commands; immediate and long. Immediate
`30
`
`
`
`The extended status byte provides extra status information
`
`
`
`
`commands return their results immediately. Long commands
`
`
`for a command. This information is command and context
`
`
`
`require an extended length of time to complete. The device
`dependent.
`
`
`
`
`status should be polled to determine when such a command
`CommandMeaningVerifylf Bit O is set during verification,
`
`
`
`
`has completed or failed.
`
`
`
`then the FEVM is performing verification against the inter-
`
`
`
`
`
`35 nal storage slots. If Bit O is clear during verification, then the
`Command Summary
`
`
`
`FEVM is performing verification against the Active Enroll­
`Command Op-code Description Status 0x00Retrieve the 2
`
`
`
`
`
`
`
`ment Buffer. If verification of multiple storage slots has
`
`
`byte device statusEnroll0x0lGenerate an enrollment tem­
`
`
`
`
`completed then this status byte contains the verified storage
`
`
`plate from a finger-Verify0x02Verify a finger against an
`
`
`slot number if the verification was successful. EnrollDuring
`
`
`40 enrollment, the bits for this status byte are defined as
`
`
`enrollment template(s)Baud0x03 Set the RS-232 baud
`
`
`
`
`rateUpload0x04Send the active enrollment template to the
`
`
`follows, Bit Meaning O The finger pressure needs adjusting
`
`
`
`hostDownload0x0SDownload an enrollment template from
`
`
`if set. See bits I and 2 for pressure direction. The yellow
`
`
`
`host and activatelmage0x06Send the enroll Fingerprint
`
`LED will be on plus one of the green or red LEDs. I If bit
`
`
`
`image to the hostStore0x07Store the active enroll template
`
`
`
`
`
`0 is set then too much finger pressure is being applied too the
`
`
`
`in the deviceRetrieve0x08Retrieve an enroll template from
`
`
`
`
`45 sensor. If bit O is cleared then the finger is positioned too far
`
`
`the device and activateHeader0x09Return the header from a
`
`
`to the left of the sensor. The red LED will be on.
`
`
`stored templateSignature0x0AReturn the device signature
`
`
`(Orientation: LEDs are at the top) 2 If bit O is set then too
`
`G EZ6x x r r rErase0x0BErase the spec ified stored
`
`
`
`
`little finger pressure is being applied to the sensor. If bit O is
`
`templatePersistentOx0CMake the current settings
`
`
`
`clear then the finger is positioned too far to the right of the
`p e r s i s t e n t C a l i br a t e Ox OD C a l i br a t e t h e
`
`50 sensor. The green LED will be on.
`
`devicePrivilege0x0EBeg i n access t o p r i v ileged
`Description
`
`c o m m andsRestrictOx0FEnd access t o p r i vileged
`
`
`
`
`
`c o m m a n d sS e t C o d e 0 xl 0 S e t a new p r i v il e g e
`
`be invoked at any time.
`
`
`code VerifyParameters0xllSet the verification parameters
`Enroll
`Basic Concepts
`55 Op-code:0lH
`
`
`
`The basic operation of the FEVM is the Enrollment and
`Type:Long
`
`
`
`Verification of fingerprints. All additional functionality is
`
`Parameters: None
`
`
`simply in support of these two key operations.
`
`Returns: None
`
`
`
`
`Enrollment is a process by which a fingerprint image cap­Description:
`
`
`
`
`tured by the sensor is transformed into a template. A 60 Initiates enrollment. The command does not complete
`
`
`
`
`
`
`
`
`template may be up to 144 bytes in length and contains until a successful enrollment has been achieved. To abort
`
`
`
`
`
`
`statistical information about a particular fingerprint image. this command the device must be reset. To check for
`
`
`
`
`
`
`
`
`
`This information is sufficient to perform verification when completion of this command, the Status must be polled. The
`
`
`
`the same-finger is again placed
`
`
`StlnEnroll on the sensor. The template bit will be cleared when this command com-
`
`
`
`
`65 pletes. The host may detect when an individual has placed
`
`is not a fingerprint image.
`
`
`
`
`
`
`Verification is a process that applies the statistical informa­their finger on the sensor of the device by checking the
`
`
`
`
`tion found in an enrolled template against a fingerprint StFinger bit.
`
`Returns the current status of the device. This command may
`
`IPR2022-00602
`Apple EX1007 Page 7
`
`

`

`
`
`US 6,927,668 Bl
`
`
`
`Upload the template in the active enrollment buffer to the
`
`7
`8
`Verify Parameters
`
`Description:
`
`
`
`Op-code: llH
`host.
`Type: Immediate
`Download
`Parameters:
`5 Op-code. 05H
`
`
`
`Byte 1: The storage slot to begin verification from,
`Type: Immediate
`
`
`
`
`Byte 2: The number of storage slots to verify. If this byte
`Parameters: A valid template that has been previously
`
`
`
`
`
`
`
`is O then verification is performed on the active enroll­
`
`
`uploaded from the device. The size of the download
`ment buffer.
`
`
`
`template is determined from the header. (See Upload)
`
`Returns: None.
`10 Returns:
`
`
`
`None. The device status should be checked for
`Description:
`
`failure status.
`
`
`This command sunply sets the Verification parameters.
`Description:
`
`
`Separating the parameters from the Verify command is
`
`
`Download a template from the host and store it in the
`
`
`
`useful when configuring FEW4s. An application may wish
`
`
`
`
`active enrollment buffer. This makes the template available
`
`to store multiple templates on an FEVM and then configure
`
`
`for verification, storage or Upload.
`• 15
`
`
`
`it to perform verification on these templates. Forcing ven-
`Image
`
`
`
`
`fication. is not necessary. E.g. enrolling an individual from
`
`Op-code: 06H
`
`a hotel lobby and programming their door lock remotely.
`Type: Immediate
`
`
`Note: To make these parameters persistent, the Persistent
`
`Parameters: None
`
`command should be called prior to the next invocation of
`
`Returns:
`20
`
`
`
`reset, The Factory defaults are 0,0.
`Byte 1: The image type id.
`Verify
`0: No image.
`Op-code: 02H.
`1: The next 2 bytes contain the width and height.
`
`
`Type: Long
`
`
`Byte 2: The width of the enrollment image in pixels
`Parameters: None. The parameters are set using the
`
`
`
`
`image in pixels 25 Byte 3: The height of the enrollment
`
`
`VenfyParameters command.
`
`
`
`Subsequent Bytes: The enrollment image. This is a black
`
`Returns: None.
`
`and white image with a bit depth of one.
`Description:
`Description:
`
`
`Initiates verification. The command does not complete
`This image may be used to visually inspect the image of
`
`
`
`
`
`
`
`until a successful verification has been achieved. To abort
`
`
`30 the finger that was just enrolled-The most unique features
`
`
`this command the device must be reset. To check for the
`
`
`
`
`
`of the finger should be in the center of the image. A good
`
`
`
`
`completion of this command, the Status must be polled. The
`
`
`
`enrollment is necessary for easy verification. This visual
`
`
`Stln Verify bit in the first status byte will be cleared when
`
`
`
`
`inspection is not necessary for enrollment but makes enroll­
`
`
`
`verification has completed. The host may detect when an
`
`
`
`ment simpler. An alternative may be to enroll and then verify
`
`
`
`
`individual has placed a finger on the sensor of the device by
`
`
`
`
`
`enrolled image. the quality of the 35 several times to ensure
`
`
`checking the StFinger bit. The second status byte may be
`Store
`
`
`
`
`used to detect if a multiple verification or an Active Enroll­
`
`Op-code: 07H
`
`
`
`ment Buffer verification is taking place.
`Type: Long
`Baud
`Parameters:
`
`Op-code: 03H
`Byte 1: The internal FEVM slot number to be used to store
`
`
`Type: Immediate
`
`
`
`
`the active enrollment template. This number must be
`
`Parameters: Byte 1: The new baud rate to be set. Supported
`
`between O and 63.
`Baud rates are as follows:
`Returns: None. To check for success or failure of this
`
`
`
`
`Baud
`
`
`command, the device status must be polled. Once the
`Rate Value 1200024001480029600314,400419,200528,
`
`
`
`
`
`
`the from the first status byte, 45 StlnStore bit has been cleared
`
`800638,400757, 6008115,2009
`
`
`
`
`Failed bit will indicate success or failure of this command.
`
`Returns: None.
`Retrieve
`Description:
`
`Op-code: 08H
`
`
`Change the communication baud rate for the device to the
`
`Type: Immediate
`
`newly supplied baud rate.
`50 Parameters:
`
`
`
`Note: To make the new baud rate persistent, the Persistent
`
`
`Bytel: The internal FEVM slot number of the enrollment
`
`
`command should be called prior to the next invocation of
`
`
`template to be retrieved. This number must be between
`
`
`
`reset The factory default is 3 (9600 baud).
`0 and 63.
`Upload
`Returns: None. This is an immediate command. The status
`
`
`
`
`Op-code: 04H
`
`
`to determine success or failure. 55 byte should be checked
`Type: Immediate
`
`
`
`
`Description: Retrieve the stored template and place it in the
`Parameters: None.
`
`
`
`
`active enrollment buffer. This makes the template available
`
`
`
`
`
`
`Returns: The currently enrolled template in the active enroll
`
`for Verify, Upload or Store.
`
`
`
`
`buffer. The actual size of the template must be determined by
`Header
`
`
`
`
`examining the header of the template. The header is the first
`60 Op-code: 09H
`
`
`
`2 bytes of the data being returned.
`Type: Immediate
`Parameters:
`Template Header
`Byte 1: The internal FEVM slot number of the enrollment
`
`
`
`
`
`
`
`
`
`B i t sD e s c r i p t i o n 0 - 1 R e s e r v e d 2 - 3 T h e t e m p l a t e template to be retrieved. This number must be between
`
`
`
`
`
`structure4-6Template types: 3=84 bytes,4=104 bytes,6=144 0 and 63.
`65
`bytes Sizes include the header and trailer. 7Valid template if Returns: The 2 byte header from the stored template. Refer
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`clear. Invalid ( deleted)if set.8-15Reserved for user data to the Upload command for a description of the header.
`
`40
`
`IPR2022-00602
`Apple EX1007 Page 8
`
`

`

`
`
`US 6,927,668 Bl
`
`9
`
`10
`Description:
`Description: If the privilege code that is given matches the
`
`
`
`
`
`
`
`privilege code that is currently stored in the FEVM, then
`This command is used to recover the header from a stored
`
`
`
`
`
`permission is granted to perform Image, Download,
`
`
`
`
`
`template. This is useful for applications that may be using
`
`
`
`Persistent, Enroll, Store and Erase.
`
`
`the user data component of the header and wish to search
`5 Note: If no privilege code has been previously set then all
`
`
`
`
`
`
`through the stored templates to recover this data.
`
`
`
`
`privileges are granted without the necessity of calling the
`Signature
`
`Privilege command.
`
`Op-code: OAH
`Restrict
`Type: Immediate
`OFH
`Op-code:
`
`Parameters: None.
`Type: Immediate
`
`
`Returns: A string representing the signature of the device.
`10
`
`Parameters: None.
`
`
`
`The expected return value is "GEZxxxrrr" where "xxx"
`Returns: None.
`
`
`represents the model of the module and rrr represents the
`Description: If privileges are currently active, then this
`
`
`
`
`
`
`revision. E.g "GEZ6Aa0011" where 6Aa is the model and
`
`
`
`
`commands disables access to privileged operations thereby
`001 is the revision.
`
`
`
`
`disabling Image, Download, Persistent, Enroll, Store and
`
`
`
`Description: Returns a device signature string. This com­
`15 Erase.
`
`
`mand also unlocks the FEVM command engine and must be
`Note: If the Privilege code has been made persistent then
`
`
`
`
`
`
`issued after a reset or power on.
`
`resetting the device will have the same effect as calling
`Erase
`Restrict
`
`Op-code: OBH
`SetCode
`Type;Long
`20 Op-code:lOH
`Parameters:
`Type: Immediate
`Bytel: The internal FEVM slot number of the enrollment
`
`
`
`Parameters: First 6 bytes: The currently set Privilege code.
`
`
`
`
`
`
`template to be erased. This number must be between 0 and
`
`
`If no privilege code currently exists, then this parameter
`63.
`
`
`
`
`should contain 6 bytes of zeroes. Next 6 bytes: The new
`
`Privilege code.
`Returns: None. The status of the device should be polled to 25
`
`
`
`
`
`
`Description: Sets a Privilege code for the FEW This privi­
`
`
`
`
`
`determine the success or failure of this command. The
`
`
`
`StlnStore bit will be cleared com­
`
`
`lege code when the command has is used with the Privilege command and is used to
`
`
`
`
`control access to Image, Download, Persistent, Enroll, Store
`pleted.
`FEVM
`Description: Erase the enrolled template and Erase. stored m the
`
`
`
`
`the Persistent 30 Note: To make new Privilege code persistent,
`
`
`
`at the given slot number.
`
`command should be called prior to the next invocation of
`Persistent
`OCH
`
`
`
`
`reset. The factory default is 0x000000000000. Serial Inter­
`Op-code:
`
`face Command Features
`Type:Long
`
`Power On/Off To power the device off, bring the DTR signal
`
`
`
`
`Parameters: To help eliminate the possible accidental invo­
`
`
`
`low (0). This will cause power to the device to be dropped
`
`
`cation of this command, the command accepts the 35
`
`op-code (OCH) as the one-byte parameter.
`
`
`
`down to nominal levels and prevent it from functioning.
`
`Bringing DTR high (1) will cause the device to resume
`
`
`
`
`
`Returns: None. The device status should be polled to deter­
`
`
`
`
`operation. All non-persistent setting will have been lost and
`
`
`
`
`mine the success or failure of this command. The StlnStore
`must be reprogrammed.
`
`bit will be cleared when the command has completed.
`Reset
`Description: This command will make the current
`40
`To reset the device, simply toggle the power off and back on
`
`
`
`
`calibration, verification, baud rate and Privilege code set­
`
`using DTR as described above. A delay should be added
`tings persistent.
`Calibrate
`
`
`after power on before the device is fully functional. This
`ODH
`
`delay is approximately 200 ms.
`Op-code:
`Type,Long
`
`
`45 Hardware Signals and Connections
`
`Parameters: None.
`The fingerprint module interface connectors are located on
`
`
`
`
`Returns: None. The device status should be polled to deter­
`
`
`
`
`
`
`
`
`the back of th

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket