throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2003/0046552 A1
`(43) Pub. Date:
`Mar. 6, 2003
`Hamid
`
`US 200300.46552A1
`
`(54) METHOD AND SYSTEM FOR PROVIDING
`ACCESS TO SECURE ENTITY OR SERVICE
`BY A SUBSET OF N PERSONS OF M
`DESIGNATED PERSONS
`(76) Inventor: Larry Hamid, Ottawa (CA)
`Correspondence Address:
`FREEDMAN & ASSOCATES
`117 CENTREPOINTE DRIVE
`SUTE 350
`NEPEAN, ONTARIO K2G 5X3 (CA)
`(21) Appl. No.:
`09/940,795
`(22) Filed:
`Aug. 29, 2001
`
`Publication Classification
`
`(51) Int. Cl." ....................................................... H04L 9/00
`(52) U.S. Cl. .............................................................. 713/186
`(57)
`ABSTRACT
`A Security System for Securing an entity or a Service from
`indiscriminate access and a method for operating the same
`is disclosed. Each designated perSon of M designated per
`
`sons is provided with a portable biometric device. Biometric
`data in dependence upon a biometric characteristic of each
`of the M designated perSons is Stored in memory of the
`respective portable biometric device. Biometric information
`representative of a biometric characteristic of each of a
`Subset of 1<N<M perSons is captured in response to each of
`the N perSons presenting Said information to the respective
`portable biometric device. The biometric information is
`encoded and biometric data in dependence thereupon is
`provided to the processor of each respective portable bio
`metric device. Using the processor of each respective por
`table biometric device the captured biometric data is then
`compared with the Stored biometric data to produce a
`comparison result. If the comparison result is indicative of
`a match an authorization Signal is transmitted from each of
`the respective portable biometric devices to a receiving port
`of the Security System. Upon receipt of the authorization
`Signal a processor of the locking mechanism determines
`access privileges to the Secure entity or Service in depen
`dence upon the authorization Signals it received from the
`respective portable biometric devices of the Subset of N
`perSons. If an authorization signal of the Subset of N perSons
`is missing, the Security System denies access to the Secure
`entity or Service.
`
`/11 100
`
`
`
`102
`
`110
`
`108
`
`12
`
`106
`
`processor for determining
`access privileges to the secured
`entity or service in dependence
`upon the authorization signals
`of a subset of N persons of M
`designated persons with N < M
`
`IPR2022-00602
`Apple EX1022 Page 1
`
`

`

`Patent Application Publication
`
`Mar. 6, 2003 Sheet 1 of 3
`
`US 2003/0046552 A1
`
`11 100
`
`
`
`102
`
`110
`
`108
`
`112
`
`106
`
`
`
`processor for determining
`access privileges to the secured
`entity or service in dependence
`upon the authorization signals
`of a subset of N persons of M
`designated persons with N < M
`
`Fig. 1
`
`IPR2022-00602
`Apple EX1022 Page 2
`
`

`

`Patent Application Publication
`
`Mar. 6, 2003 Sheet 2 of 3
`
`US 2003/0046552 A1
`
`providing each designated person of the M designated persons with a portable
`biometric device operable to capture biometric information presented thereto
`
`assigning a biometric characteristic of each of the M designated persons to a
`respective portable biometric device and storing biometric data in the respective
`portable biometric device in dependence upon the biometric characteristic
`
`capturing biometric information representative of a biometric characteristic of
`each of N persons in response to each of the N persons presenting said
`information to the respective portable biometric device and providing biometric
`data in dependence thereupon, with N < M being a subset of the M designated
`persons
`
`
`
`
`
`comparing the captured biometric data with biometric data stored in each of the
`respective portable biometric devices to produce a comparison result
`
`if the comparison result is indicative of a match performing the steps of:
`
`transmitting an authorization signal from each of the respective portable
`biometric devices to a receiving port of the secure entity or service
`
`determining access privileges to the secure entity or service in
`dependence upon the authorization signals received from the respective
`portable biometric devices of the subset of N persons
`
`Fig. 2
`
`IPR2022-00602
`Apple EX1022 Page 3
`
`

`

`Patent Application Publication
`
`Mar. 6, 2003 Sheet 3 of 3
`
`US 2003/0046552 A1
`
`storing biometric data in dependence upon a biometric characteristic of a
`plurality of persons of the M designated persons in at least a portable biometric
`device
`
`capturing biometric information representative of a biometric characteristic of
`each of N persons in response to each of the N persons presenting said
`information to one of the at least a portable biometric device and providing
`biometric data in dependence thereupon, with N < M being a subset of the M
`designated persons
`
`
`
`
`
`comparing the captured biometric data of each of the N persons with the stored
`biometric data to produce N comparison results
`
`if a comparison result of the N comparison results is indicative of a match
`performing the steps of:
`
`transmitting an authorization signal from the at least a portable biometric
`device to a receiving port of the secure entity or service
`
`determining access privileges to the secure entity or service in
`dependence upon the authorization signals of the subset of N persons
`received from the at least a portable biometric device
`
`Fig. 3
`
`IPR2022-00602
`Apple EX1022 Page 4
`
`

`

`US 2003/0046552 A1
`
`Mar. 6, 2003
`
`METHOD AND SYSTEM FOR PROVIDING
`ACCESS TO SECURE ENTITY OR SERVICE BY A
`SUBSET OF N PERSONS OF M DESIGNATED
`PERSONS
`
`FIELD OF THE INVENTION
`0001. This invention relates generally to automated Secu
`rity for permitting access to a Service or a predefined area by
`designated perSons and more particularly relates to a bio
`metric Security System for providing limited access to a
`secure entity or service by a Subset of N persons of M
`designated perSons.
`BACKGROUND OF THE INVENTION
`0002. Access to most any secure entity or service is
`commonly limited by use of a Security System. The use of
`Security Systems is generally well known. Their use is
`increasing with greater availability of digital electronic
`components at a relatively low cost. Such Systems are
`known for Securing buildings, banks, automobiles, comput
`erS and many other devices.
`0003) For example, U.S. Pat. No. 4,951,249 discloses a
`computer Security System, which protects computer Software
`from unauthorized acceSS by requiring the user to Supply a
`name and a password during the operating System loading
`procedure (“boot-up”) of a personal computer (PC). This PC
`Security System, utilizing password protection, is typical of
`many Systems that are currently available. Password pro
`tection requires a user's name and a password associated
`with that user's name. Only once an associated password is
`detected for a valid user's name does the PC complete the
`boot-up routine. Though passwords may be useful in Some
`instances, they are inadequate in many respects. For
`example, an unauthorized skilled user with a correct pass
`word in hand, can gain entry to Such a processor based
`System. Yet another undesirable feature of the foregoing
`System is that passwords on occasion are forgotten; and
`furthermore, and more importantly, passwords have been
`known to be decrypted.
`0004. As of late one of the most ubiquitous electronic
`components is the digital processor. Multi-purpose and
`dedicated processors of various types control devices rang
`ing from bank machines, to cash registers and automobiles.
`With ever-increasing use of these processor-based devices,
`there is greater concern that unauthorized use will become
`more prevalent. Thus, the Verification and/or authentication
`of authorized users of processor based Systems is a burgeon
`ing industry.
`0005 Alarms and security systems to warn of unautho
`rized use of automobiles and other processor controlled
`Systems are available, however, these Security Systems have
`been known to be circumvented. Unfortunately, many com
`mercially available Solutions aimed at preventing theft or
`unauthorized use of automobiles have also been circum
`vented. AS of late, initiatives have been underway in the
`Security industry, to provide biometric identification Systems
`to validate users of electronic and other Systems that are to
`have restricted access. A biometric identification System
`accepts unique biometric information from a user and iden
`tifies the user by matching the information against informa
`tion belonging to registered users of the System. One Such
`biometric identification System is a fingerprint recognition
`System.
`
`0006. In a fingerprint input transducer or sensor, the
`finger under investigation is usually pressed against a flat
`Surface, Such as a Side of a glass plate; the ridge and Valley
`pattern of the finger tip is Sensed by a Sensing means Such
`as an interrogating light beam.
`0007 Various optical devices are known which employ
`prisms upon which a finger whose print is to be identified is
`placed. The prism has a first Surface upon which a finger is
`placed, a Second Surface disposed at an acute angle to the
`first Surface through which the fingerprint is viewed and a
`third illumination surface through which light is directed
`into the prism. In Some cases, the illumination Surface is at
`an acute angle to the first Surface, as Seen for example, in
`U.S. Pat. Nos. 5,187,482 and 5,187,748. In other cases, the
`illumination Surface is parallel to the first Surface, as Seen for
`example, in U.S. Pat. Nos. 5,109,427 and 5,233,404. Fin
`gerprint identification devices of this nature are generally
`used to control the building-acceSS or information-access of
`individuals to buildings, rooms, and devices Such as com
`puter terminals.
`0008 U.S. Pat. No. 4,353,056 in the name of Tsikos
`issued Oct. 5, 1982, discloses an alternative kind of finger
`print Sensor that uses a capacitive Sensing approach. The
`described Sensor has a two dimensional, row and column,
`array of capacitors, each comprising a pair of Spaced elec
`trodes, carried in a Sensing member and covered by an
`insulating film. The Sensors rely upon deformation to the
`Sensing member caused by a finger being placed thereon So
`as to vary locally the Spacing between capacitor electrodes,
`according to the ridge/trough pattern of the fingerprint, and
`hence, the capacitance of the capacitors. In one arrangement,
`the capacitors of each column are connected in Series with
`the columns of capacitors connected in parallel and a Voltage
`is applied acroSS the columns. In another arrangement, a
`Voltage is applied to each individual capacitor in the array.
`Sensing in the respective two arrangements is accomplished
`by detecting the change of Voltage distribution in the Series
`connected capacitors or by measuring the Voltage values of
`the individual capacitances resulting from local deforma
`tion. To achieve this, an individual connection is required
`from the detection circuit to each capacitor.
`0009. Before the advent of computers and imaging
`devices, research was conducted into fingerprint characteri
`sation and identification. Today, much of the research focus
`in biometricS has been directed toward improving the input
`transducer and the quality of the biometric input data.
`Fingerprint characterization is well known and can involve
`many aspects of fingerprint analysis. The analysis of finger
`prints is discussed in the following references which are
`hereby incorporated by reference:
`0010 Xiao Qinghan and Bian Zhaoqi. An approach
`to Fingerprint Identification. By Using the Attributes
`of Feature Lines of Fingerprint," IEEE Pattern Rec
`ognition, pp 663, 1986;
`0011 C. B. Shelman, “Fingerprint Classification
`Theory and Application,” Proc. 76 Carnahan Con
`ference on Electronic Crime Countermeasures,
`1976;
`0012 Feri Pernus, Stanko Kovacic, and Ludvik
`Gyergyek, "Minutalie Based Fingerprint Registra
`tion.” IEEE Pattern Recognition, pp 1380, 1980;
`
`IPR2022-00602
`Apple EX1022 Page 5
`
`

`

`US 2003/0046552 A1
`
`Mar. 6, 2003
`
`0013 J. A. Ratkovic, F. W. Blackwell, and H. H.
`Bailey, “Concepts for a Next Generation Automated
`Fingerprint System.” Proc. 78 Carnahan Conference
`on Electronic Crime Countermeasures, 1978;
`0014 K. Millard, “An approach to the Automatic
`Retrieval of Latent Fingerprints.” Proc. 75 Carnahan
`Conference on Electronic Crime Countermeasures,
`1975;
`0015 Moayer and K. S. Fu, “A Syntactic Approach
`to Fingerprint Pattern Recognition,” Memo Np.
`73-18, Purdue University, School of Electrical Engi
`neering, 1973;
`0016 Wegstein, An Automated Fingerprint Identifi
`cation System, NBS special publication, U.S.
`Department of Commerce/National Bureau of Stan
`dards, ISSN 0083-1883; no. 500-89, 1982;
`0017 Moenssens, Andre A., Fingerprint Tech
`niques, Chilton Book Co., 1971; and, Wegstein and
`J. F. Rafferty, The LX39 Latent Fingerprint Matcher,
`NBS special publication, U.S. Department of Com
`merce/National Bureau of Standards; no. 500-36,
`1978.
`0.018. In the field of digital and analog communications,
`wireleSS devices are becoming more commonplace. IneX
`pensive computer Systems are currently commercially avail
`able wherein printers communicate with computers, which
`in turn communicate with other computers via infrared
`transmitters and receivers. Other devices, using other optical
`communication Systems, Such as data transmitting/receiving
`wrist watches are now available in department Stores at
`Substantially affordable prices, these wrist watches include
`processors and Software for communication with a computer
`and for downloading and uploading Small amounts of data as
`required.
`0.019
`Biometric security identification systems, such as
`fingerprint Scanning and input devices are becoming more
`commonplace as the need to validate authorized users of
`computers, databases, and Secure Spaces grows. AS comput
`erS become more miniaturized, So too are other communi
`cation and Security devices decreasing in size. One of the
`more important reasons, however, to miniaturize electronic
`devices is to lessen the burden of porting them.
`0020. One biometric security identification system pro
`vides each user with a hand-held portable fingerprint rec
`ognition and transmission device, for example, as disclosed
`in U.S. Pat. No. 6,111,977 to Scott et al. Their device
`includes a fingeprint Scanner that encodes a fingerprint and
`Sends the encoded fingerprint, via an infrared or a radio
`frequency transmitter, to a receiver in the Secure item,
`facility or area. It is nonetheless necessary to have a central
`computer that analyzes the encoded fingerprint to allow
`recognition and authorization of an individual.
`0021 Generally, present electronic security systems are
`very inflexible in their functionality providing either full
`access to an authorized user or denying access if user
`authorization fails. It would be advantageous to have a
`handheld biometric identification device allowing only
`access to a secure entity or service if a subset of 1<N<M
`perSons of M designated perSons is present. For example, 10
`bank employees are allowed to access the bank vault, but
`
`only in groups of 3 employees for Security reasons. Other
`examples would be the operation of a vehicle, access to
`hazardous areas or materials, computer Systems and data
`bases.
`0022. It is an object of the invention to use the progress
`in miniaturization of processors and biometric Sensors for
`providing a biometric Security System allowing only acceSS
`to a secure entity or service if a subset of 1<N<M persons
`of M designated perSons is present.
`0023. It is a further object of the invention to provide a
`method of expanding the flexibility of biometric identifica
`tion Systems.
`
`SUMMARY OF THE INVENTION
`In accordance with the present invention there is
`0024.
`provided a method for providing access to a Secure entity or
`Service by M designated perSons having only limited access
`privileges comprising the Steps of:
`0025 storing biometric data in dependence upon a
`biometric characteristic of each of the M designated
`perSons,
`0026 capturing biometric information representa
`tive of a biometric characteristic of each of N per
`Sons and providing biometric data in dependence
`thereupon, with 1.<N<M being a subset of the M
`designated perSons,
`0027 comparing the captured biometric data of each
`of the N persons with the stored biometric data to
`produce N comparison results, and,
`0028 if the N comparison results are indicative of
`the N perSons each being one of the M designated
`perSons and thereby forming a Subset, determining
`access privileges to the Secure entity or Service in
`dependence upon the Subset.
`0029. In accordance with the present invention there is
`further provided a method for providing access to a Secure
`entity or Service by M designated perSons having only
`limited access privileges comprising the Steps of:
`0030 providing each designated person of the M
`designated perSons with a portable biometric device
`operable to capture biometric information presented
`thereto;
`0031 assigning a biometric characteristic of each of
`the M designated perSons to a respective portable
`biometric device and Storing biometric data in the
`respective portable biometric device in dependence
`upon the biometric characteristic,
`0032 capturing biometric information representa
`tive of a biometric characteristic of each of N per
`Sons in response to each of the N perSons presenting
`Said information to the respective portable biometric
`device and providing biometric data in dependence
`thereupon, with 1.<N<M being a subset of the M
`designated perSons,
`0033 comparing the captured biometric data with
`biometric data Stored in each of the respective por
`table biometric devices to produce a comparison
`result,
`
`IPR2022-00602
`Apple EX1022 Page 6
`
`

`

`US 2003/0046552 A1
`
`Mar. 6, 2003
`
`0034) if the comparison result is indicative of the N
`perSons each being one of the M designated perSons,
`transmitting an authorization Signal from each of the
`respective portable biometric devices to a receiving
`port of the Secure entity or Service, and,
`0035) determining access privileges to the secure
`entity or Service in dependence upon the authoriza
`tion Signals received from the respective portable
`biometric devices of the Subset of N persons.
`0036). In accordance with the present invention there is
`yet further provided a method for providing access to a
`Secure entity or Service by M designated perSons having
`only limited access privileges comprising the Steps of
`0037 storing biometric data in dependence upon a
`biometric characteristic of a plurality of perSons of
`the M designated perSons in at least a portable
`biometric device;
`0038 capturing biometric information representa
`tive of a biometric characteristic of each of N per
`Sons in response to each of the N perSons presenting
`Said information to one of the at least a portable
`biometric device and providing biometric data in
`dependence thereupon, with 1.<N<M being a subset
`of the M designated perSons,
`0039 comparing the captured biometric data of each
`of the N persons with the stored biometric data to
`produce N comparison results,
`0040 if a comparison result is indicative of one of
`the N perSons each being one of the M designated
`perSons, transmitting an authorization signal from
`the at least a portable biometric device to a receiving
`port of the Secure entity or Service, and,
`0041) determining access privileges to the Secure
`entity or Service in dependence upon the authoriza
`tion signals of the Subset of N persons received from
`the at least a portable biometric device.
`0042. In accordance with an aspect of the present inven
`tion there is provided a Security System for Securing an entity
`or a Service from indiscriminate acceSS and for providing
`access to a Subset of N perSons of M designated perSons
`comprising:
`0043 at least a portable biometric device, the device
`comprising:
`0044) a biometric sensor for capturing biometric
`information representative of a biometric charac
`teristic in response to a perSon presenting Said
`information to the biometric Sensor;
`0045 an encoder for digitally encoding the cap
`tured biometric information and providing bio
`metric data in dependence thereupon;
`0046 memory for storing biometric data of at
`least one of the M designated perSons,
`0047 a processor for comparing the captured
`biometric data with stored biometric data of a
`designated person to produce a comparison result,
`and if the comparison result is indicative of a
`match for providing an authorization Signal; and,
`
`a transmitter for transmitting the authoriza
`0.048
`tion Signal;
`0049 at least a port for receiving authorization
`signals of the subset of 1<N<M persons from the
`at least a portable biometric device; and,
`0050 a processor for determining access privileges
`to the Secured entity or Service in dependence upon
`the authorization signals of the Subset of 1.<N<M
`perSons.
`BRIEF DESCRIPTION OF FIGURES
`Exemplary embodiments of the invention will now
`0051
`be described in conjunction with the following drawings, in
`which:
`0052 FIG. 1 is a simplified block diagram illustrating a
`biometric Security System according to the invention;
`0053 FIG. 2 is a simplified flow diagram illustrating a
`method of operation according to the invention of the
`biometric security system shown in FIG. 1; and,
`0054 FIG. 3 is a simplified flow diagram illustrating
`another method of operation according to the invention of
`the biometric security system shown in FIG. 1.
`DETAILED DESCRIPTION OF PREFERRED
`EMBODIMENTS
`0055 FIG. 1 illustrates the block diagram of a biometric
`security system 100 for securing an entity or service from
`indiscriminate acceSS according to the invention. The System
`100 comprises at least a portable biometric device 102 and
`at least a receiving module 104 connected over a transmis
`Sion channel. For Simplicity, only one portable biometric
`device 102 and one receiving module 104 is shown in FIG.
`1, but it is obvious that the invention is not limited thereto.
`Preferably, the system comprises a plurality of portable
`biometric devices 102, one for each person of M designated
`persons of the biometric security system 100. The portable
`biometric device 102 comprises a biometric sensor 106 for
`capturing biometric information representative of a biomet
`ric characteristic in response to a perSon presenting Said
`information. In a preferred embodiment the biometric Sensor
`106 comprises a capacitive fingerprint imager for its com
`pact design, but obviously the invention is not limited
`thereto. An encoder 108 digitizes or otherwise converts the
`analog signal into a signal format, which provides an
`encoded description of the biometric characteristic, Suitable
`for processing. A processor 110 compares the captured
`biometric data with biometric data of an authorized perSon
`Stored in memory 112 to produce a comparison result.
`Preferably, the memory 112 is a non-volatile memory. If the
`comparison result is indicative of a match an authorization
`Signal is provided to a transmitter 114 for transmitting the
`signal to a port 120 of the receiving module 104. A locking
`mechanism 122 comprising a processor 124 at the receiving
`module 104 then provides access to the secure entity or
`Service in dependence upon the received authorization Sig
`nals. The processor 124 determines acceSS privileges to the
`Secured entity or Service in dependence upon the authoriza
`tion signals received from a subset of N persons of the M
`designated persons, with 1.<N<M.
`0056. Optionally, the locking mechanism 122 comprises
`memory for Storing various predetermined levels of access
`privileges for different predetermined Subsets of perSons of
`the M designated perSons.
`
`IPR2022-00602
`Apple EX1022 Page 7
`
`

`

`US 2003/0046552 A1
`
`Mar. 6, 2003
`
`0057. In a preferred embodiment the processor 124 is a
`central processor of the Secure entity or Service connected to
`a plurality of ports and connected to a plurality of locking
`mechanisms. Therefore, Security is enhanced by having the
`Signal processing and, optionally, the Storage of access
`privileges located in one Secure location only accessible to
`authorized perSonnel Such as a network administrator.
`0058. The portable biometric device 102 can be manu
`factured as a Small handheld device Such as a remote control,
`a watch, or a pendant comprising a transmitter 114 for
`wireleSS transmission Such as infrared or radio frequency
`transmission. Alternatively, the portable biometric device
`102 comprises a smart card, wherein the transmitter 114 is
`to be interfaced with the port 120 of the receiving module
`104. In one embodiment a portable biometric device 102 for
`each of the M designated perSons is provided. In memory of
`each portable biometric device 102 biometric data represen
`tative of a biometric characteristic of one respective perSon
`of the M designated persons is stored. This allows use of the
`portable biometric device 102 by only one person. Alterna
`tively, the biometric information of a plurality of perSons is
`stored in one portable biometric device 102. For example,
`each person of a subset has a portable biometric device 102
`with the biometric data representative of a biometric char
`acteristic of all N persons of the subset stored in memory.
`This allows use of a portable biometric device 102 by more
`than one perSon, for example, if one perSon of the Subset has
`forgotten his portable biometric device 102.
`0059 Optionally, for each designated person or groups of
`designated perSons a different authorization signal is pro
`Vided. This is advantageous if the Security System has
`various levels of access privileges for different Subsets of
`perSons of the M designated perSons.
`0060) Further optionally, the authorization signals of the
`N persons of a subset is received at different ports 120. For
`example, a driver and an assistant driver of a plurality of
`drivers of an armored vehicle are enabled to access the
`vehicle only together, each authorization signal from a
`respective portable biometric device is received by a receiv
`ing module on either Side of the vehicle.
`0061 The flow diagram in FIG. 2 illustrates a method of
`operation according to the invention of the portable biomet
`ric devices 102 in conjunction with the receiving modules
`104. Each designated perSon of the M designated perSons is
`provided with a portable biometric device. Biometric data in
`dependence upon a biometric characteristic Such as a fin
`gerprint of each of the M designated perSons is Stored in
`memory of the respective portable biometric device. The
`portable biometric device is preauthorized for use with a
`particular Security System and personalized for use by a
`particular perSon. Prior to operation an administrator initial
`izes the portable biometric device with the assistance of
`either a central computer or a personal computer. Alterna
`tively, a first user of the portable biometric device providing
`biometric information to the sensor after fabrication is
`designated as authorized user and biometric data in depen
`dence upon the captured biometric characteristic are Stored
`in memory. A following function block Starts the proceSS in
`response, for example, to a touch of a person's digit to a
`fingerprint imager. Biometric information representative of
`a biometric characteristic of each of a Subset of 1.<N<M
`perSons is captured in response to each of the N perSons
`
`presenting Said information to the respective portable bio
`metric device. The biometric information is encoded and
`biometric data in dependence thereupon is provided to the
`processor of each respective portable biometric device.
`Using the processor of each respective portable biometric
`device the captured biometric data is then compared with the
`Stored biometric data to produce a comparison result. If the
`comparison result is indicative of a match an authorization
`Signal is transmitted from each of the respective portable
`biometric devices to a receiving port of the Security System.
`Upon receipt of the authorization Signal a processor of the
`locking mechanism determines access privileges to the
`Secure entity or Service in dependence upon the authoriza
`tion signals it received from the respective portable biomet
`ric devices of the Subset of N persons. If an authorization
`Signal of the Subset of N perSons is missing, the Security
`System denies access to the Secure entity or Service.
`0062) A subset comprises any set of an arbitrary but
`predetermined number of at least two perSons but less than
`the number of all designated perSons. Generally, a Subset
`will be one of a plurality of predetermined subsets, wherein
`each of the plurality of Subsets comprises a different com
`bination of the M designated persons. Furthermore, different
`Subsets comprise a different number of perSons combined in
`the Subset. Optionally, different Subsets of the plurality of
`Subsets have different access privileges to the Secure entity
`or Service.
`0063 Preferably, different authorization signals associ
`ated with different perSons are provided. This accommodates
`more flexibility in defining various access privileges for
`different Subsets of the M designated perSons. In dependence
`upon the received Nauthorization Signals the processor of
`the locking mechanism determines which of a plurality of
`predefined Subsets of perSons is requiring access to the
`Secure entity or Service and provides access according to
`preset access privileges associated with the determined
`Subset. Preset access privileges comprise, for example, a
`time limitation allowing access only at certain times, func
`tional limitations, a combination of both, or varying of the
`functional limitations with time of access.
`0064.
`For example, 10 employees of a branch of a bank
`are allowed to access the bank vault, but for Security reasons
`they are allowed to enter only in Subsets of at least 3 perSons.
`Here, each of the subset of 3 bank employees provides a
`fingerprint to a respective portable biometric device, which
`is like a remote control or, alternatively, Something as
`inconspicuous as a pendant. After comparing the captured
`biometric information with biometric data stored in the
`device an authorization signal is transmitted, for example
`via infrared transmission, to a receiving port of the Security
`System if the comparison result is indicative of a match.
`Upon receipt of the authorization signals from the 3 employ
`ees a processor of the locking mechanism of the Security
`System determines access privileges for the Subset 3 bank
`employees. After Successful determination of the access
`privileges the door to the vault is unlocked. Further flex
`ibility is added to the security system by defining different
`Subsets of different bank employees for accessing different
`areas of the vault. For example, after the main door to the
`vault there are Several door a for accessing different Sections
`of the vault Such as customerS Safety deposit boxes, different
`rooms for Storing money, gold, documents, etc. The Security
`System according to the invention ensured that only Subsets
`
`IPR2022-00602
`Apple EX1022 Page 8
`
`

`

`US 2003/0046552 A1
`
`Mar. 6, 2003
`
`of perSons assigned to the tasks in a predefined room are able
`to access the Same. Furthermore, the Security System is
`expanded to enable access by a Subset only at a predeter
`mined time. For instance, one Subset is enabled to acceSS
`only during the morning work hours while another Subset is
`enabled to access only during the afternoon work hours.
`0065 Referring to FIG. 3 a simplified flow diagram of
`another method of operation according to the invention of
`the security system 100 is shown. Biometric data in depen
`dence upon a biometric characteristic of a plurality of
`perSons of the M designated perSons is Stored in a portable
`biometric device. Preferably, biometric data of a Subset of N
`perSons is Stored in each portable biometric device provided
`to the persons of the Subset. This provides more flexibility,
`allowing use of another perSon's portable biometric device.
`Or even the whole Subset of N persons is able use one
`portable biometric device to get access to the Secure entity
`or Service. For example, if the portable biometric device is
`a Smart card one perSon of the Subset inserts his Smart card
`and all N persons of the Subset pro

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket