`(19)United States
`Publication
`
`(12)Patent Application
`Al
`US 2004/0015450
`(10)Pub. No.:
`( 43)Pub. Date: Jan. 22, 2004
`
`Zingher et al.
`
`
`
`
`
`
`
`US 20040015450Al
`
`
`
`
`
`
`
`1111111111111111 IIIIII IIIII 11111 1111111111 11111 1111111111 111111111111111 1111111111 11111111
`
`(54)BIOMETRIC SYSTEM AND METHOD FOR
`DETECTING DURESS TRANSACTIONS
`
`
`(60)Provisional application
`3, 2000.
`
`
`
`No. 60/237,584, filed on Oct.
`
`(76)Inventors: Joseph Zingher, Beach Park, IL (US);
`
`
`
`Abraham Zingher, Beach Park, IL
`(US)
`
`
`
`Publication Classification
`
`(51)Int. CI.7 ..................................................... G06F 17/60
`
`
`(52)U.S. CI. ................................................................ 705/64
`
`McDonnell Boehnen Hulbert & Berghoff
`
`Correspondence Address:
`
`Edward K. Runyan
`
`
`
`32nd Floor
`
`300 S. Wacker Drive
`
`Chicago, IL 60606 (US)
`
`10/611,711
`(21)
`Appl. No.:
`
`Jul. 1, 2003
`(22)
`Filed:
`
`(57)
`
`ABSTRACT
`
`A system for responding to a duress identification made at a
`
`
`
`
`
`
`
`biometric identification site. The system may include a
`
`
`
`processor, a memory, a biometric reader for collecting
`
`
`
`
`biometric information about a user, wherein the biometric
`
`
`
`information is used for determining if the user is an autho
`
`
`
`
`rized user of the system. The system may also include a set
`
`
`
`of instructions stored in the memory, the set of instructions
`
`
`
`
`executable by the processor to determine whether the bio
`
`
`
`
`metric information represents a normal identification or a
`Related U.S. Application Data
`
`
`
`
`duress identification; if the biometric information represents
`filed on
`
`
`(63)Continuation of application No. 09/927,033,
`
`
`
`
`a duress identification, the system may initiate an emergency
`
`Sep. 24, 2001, now abandoned.
`
`
`
`
`response, such as (for example) triggering a silent alarm.
`
`
`
`.( 12a
`
`2sa
`
`L
`
`,--
`
`28
`J
`
`PROCESSOR �
`
`�
`
`COMMUNICATION [29
`
`POLICE
`
`DEVICE
`
`DEPARTMENT
`
`0
`)3
`
`s
`y
`
`s
`
`T
`
`E
`
`) 27
`
`MEMORY
`
`B
`Processor logic u
`
`
`Operating system
`Emergency
`s
`
`response routine
`
`Transaction delay �
`routine
`Fund limiting
`routine
`BID/BIDE
`
`comparison routine
`BID values
`BIDE values
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`-
`
`CONTROLLER v 31
`
`� FOR EXTERNAL ,--e-
`DEVICES
`
`)37
`
`SOUND
`
`- RECORDING
`
`SYSTEM
`
`24
`
`_r
`
`)35
`
`LOWLIGHT
`
`CAMERA OR
`
`VIDEO
`
`RECORDER
`
`IPR2022-00602
`Apple EX1037 Page 1
`
`
`
`
`
`Jan. 22, 2004 Sheet 1 of 8 US 2004/0015450 Al
`Patent Application Publication
`
`12
`
`20
`)
`
`18
`)
`
`CASH DISPENSER
`
`
`
`BIOMETRIC READER
`
`DISPLAY
`
`14
`
`1
`2
`3
`4
`6
`5
`7
`9
`8
`* 0 #
`
`16
`
`FIG. 1
`
`IPR2022-00602
`Apple EX1037 Page 2
`
`
`
`
`
`Jan. 22, 2004 Sheet 2 of 8
`Patent Application Publication
`US 2004/0015450 Al
`
`12a
`)
`
`J 26a
`
`,--
`
`28
`J
`
`PROCESSOR �
`
`�
`
`) 30
`
`[29
`COMMUNICATION
`POLICE
`DEVICE
`DEPARTMENT
`
`s
`y
`
`s
`T
`
`E
`
`M
`
`24
`
`)
`
`;-21
`MEMORY
`
`Processor logic
`
`
`Operating system
`Emergency
`CONTROLLER
`
`response routine
`
`Transaction delay
`+-4 � FOR EXTERNAL
`routine
`DEVICES
`Fund limiting
`routine
`BID/BIDE
`comparison routine
`BID values
`BIDE values
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`B
`
`u
`
`s
`
`�
`
`FIG. 2
`
`) 35
`LOWLIGHT
`CAMERA OR
`VIDEO
`RECORDER
`
`,---
`
`v 31
`
`-,--
`
`) 37
`SOUND
`� RECORDING
`SYSTEM
`
`IPR2022-00602
`Apple EX1037 Page 3
`
`
`
`
`
`Patent Application Publication
`Jan. 22, 2004 Sheet 3 of 8
`US 2004/0015450 Al
`
`J 12b
`
`"\ COMMUNICATION
`
`28
`
`26b
`
`29
`J
`
`) 31
`
`POLICE DEPARTMENT
`
`35
`J
`
`LOW LIGHT CAMERA
`
`OR VIDEO RECORDER
`
`SOUND RECORDING
`
`SYSTEM
`
`37 _j
`
`lr 27
`_f 25
`
`DEVICE
`
`"\ BANK CENTRAL
`
`
`
`PROCESSING UNIT
`
`24
`
`"\
`
`CONTROLLER FOR
`
`EXTERNAL
`
`DEVICES
`
`J 12b
`
`FIG. 3
`
`) 33
`
`26b
`
`(
`
`BANK CENTRAL
`
`
`
`PROCESSING UNIT
`
`COMPUTER
`
`CONSOLE
`
`J30
`
`l,_( 25
`24( CONTROLLER FOR
`
`EXTERNAL
`
`DEVICES
`
`I
`COMPUTER POLICE
`
`,--
`
`DEPARTMENT
`OPERATOR
`
`38 j
`
`r 31
`
`LOW LIGHT CAMERA
`
`OR VIDEO RECORDER
`
`SOUND RECORDING
`
`v 37
`
`SYSTEM
`
`FIG. 4
`
`IPR2022-00602
`Apple EX1037 Page 4
`
`
`
`
`
`Jan. 22, 2004 Sheet 4 of 8 US 2004/0015450 Al
`Patent Application Publication
`
`ACCESS
`
`PROCEDURE
`
`INITIATED
`
`,,
`
`60(
`
`VALID BID?
`
`YES
`
`PROCEED AS USUAL
`
`...
`
`NO
`
`,�
`
`70(
`
`BIDE?
`
`YES
`
`...
`
`TRIGGER ALARM
`
`NO
`
`,r
`
`REJECT
`
`TRANSACTION
`
`FIG. 5
`
`IPR2022-00602
`Apple EX1037 Page 5
`
`
`
`
`
`Patent Application Publication
`Jan. 22, 2004 Sheet 5 of 8
`US 2004/0015450 Al
`
`ACCESS
`PROCEDURE
`INITIATED
`
`�r
`
`VALID BID?
`
`YES
`
`60 "-
`
`PROCEED AS USUAL
`
`..
`
`NO
`
`� r
`
`BIDE?
`
`YES
`
`70�
`
`TRIGGER ALARM
`
`...
`
`NO
`
`' r
`
`REJECT
`TRANSACTION
`
`'"
`
`90
`� SLOW TRANSACTION
`
`FIG. 6
`
`IPR2022-00602
`Apple EX1037 Page 6
`
`
`
`
`
`Jan. 22, 2004 Sheet 6 of 8
`Patent Application Publication
`US 2004/0015450 Al
`
`ACCESS
`PROCEDURE
`INITIATED
`
`u
`
`VALID BID?
`
`YES
`
`NO
`
`u
`
`BIDE?
`
`YES
`
`NO
`�,
`REJECT
`TRANSACTION
`
`10
`
`/
`
`60 \__
`
`PROCEED AS USUAL
`
`...
`
`70
`�
`
`TRIGGER ALARM
`
`...
`
`, ,
`
`95� LIMIT FUNDS
`AVAILABLE
`
`FIG. 7
`
`IPR2022-00602
`Apple EX1037 Page 7
`
`
`
`Patent
`Application
`Publication
`Jan. 22, 2004 Sheet 7 of 8
`US 2004/0015450 Al
`
`12
`
`35
`
`20
`r
`CASH DISPENSER
`
`DISPLAY
`
`14
`Lf
`
`BIOMETRIC
`READER
`
`1 2
`3
`4
`5 6
`7 8 9
`* 0
`
`#
`
`FIG. 8
`
`CASH DISPENSER
`
`1a
`r
`BIOMETRIC
`READER
`
`1 2
`22 4
`5 6
`)
`7 8 9
`16
`( * 0 #
`
`DISPLAY
`
`14
`Lf
`[11}37
`
`FIG. 9
`
`IPR2022-00602
`Apple EX1037 Page 8
`
`
`
`
`
`Jan. 22, 2004 Sheet 8 of 8
`Patent Application Publication
`US 2004/0015450 Al
`
`210
`
`250( ACCESS
`PROCEDURE
`INITIATED
`
`) 260
`
`YES PROCEED AS
`USUAL
`
`:-
`
`1-----.
`
`) 290
`RE-ENTER BID
`BEFORE
`
`.--. RECEIVING FUNDS
`) 292
`
`255(
`
`,,
`
`VALID BID?
`
`265�
`
`NO
`
`,,
`
`BIDE?
`
`NO
`
`,.,
`
`280(
`
`REJECT
`TRANSACTION
`
`YES TRIGGER
`
`ALARM
`
`270 _j
`
`VALID BID ? �
`NO
`' ) 296
`NO BIDE?
`YES
`270 , \._ TRIGGER
`ALARM
`
`294 (
`
`'
`RECEIVE
`FUNDS I+--
`
`FIG. 10
`
`IPR2022-00602
`Apple EX1037 Page 9
`
`
`
`US 2004/0015450 Al
`
`Jan.22,2004
`
`1
`
`RELATED APPLICATION
`
`BACKGROUND OF THE INVENTION
`
`
`
`[0002] 1. Field of the Invention
`
`e-commerce or internet transactions). Electronic signatures
`
`
`BIOMETRIC SYSTEM AND METHOD FOR
`
`
`
`
`
`DETECTING DURESS TRANSACTIONS are commonly defined as any type of sound, symbol or
`
`
`
`
`process that is attached to and logically linked to a document
`
`
`
`
`to identify the author or source of the document. Any of the
`
`
`
`biometric traits described above may be used in the process
`[0001] The inventors claim priority to U.S. Provisional
`
`
`
`
`
`of creating or verifying an electronic signature.
`
`
`
`
`
`Patent Application No. 60/237,584, entitled "Biometric Sys
`[0009] While biometric identification is very useful in
`
`
`
`
`
`
`
`tem And Method For Detecting Duress Transactions at
`
`
`
`preventing fraudulent transactions, it does not solve the
`
`Automated Teller Machines," filed on Oct. 3, 2000, the
`
`
`security problem posed by ATMs, specifically, extortion.
`
`
`
`entirety of which is expressly incorporated by reference.
`
`
`The usual form of extortion at ATMs is to intimidate the
`
`
`ATM user by threat of physical harm. There are methods
`
`
`
`currently available to safeguard ATMs, most having to do
`
`
`
`
`with entering special codes on the keypad normally used for
`
`
`
`
`
`entering personal identification numbers or placing a panic
`
`
`
`
`[0003] The present invention relates to automated teller
`
`
`button on an ATM. These methods, however, are not well
`
`
`machines (ATMs) and more particularly to a method and
`
`suited to use in ATMs that use BID, as any act on the part
`
`
`
`system for detecting transactions made under duress at
`
`
`of the user other than selecting a transaction and entering a
`
`ATMs using biometric measurements.
`
`
`
`transaction amount could alert the criminal that his crime
`
`
`has been reported, which in turn could result in harm to the
`user.
`[0005] With the advent of the automatic teller machine
`
`
`
`
`
`
`(ATM), it has become possible for banking withdrawals to
`[0010] Accordingly, there is a need for the discreet iden
`
`
`
`
`be made without the assistance of human bank personnel or
`
`
`
`
`tification of a duress transaction and the discreet notification
`
`
`
`agents. For example, a customer may use an ATM to make
`
`
`
`
`of authorities that a crime is being committed at an ATM
`
`
`
`deposits or withdrawals from a checking or savings account,
`
`
`
`where biometrics are used to confirm the identity of a user.
`
`
`or to determine the balance of such an account. Point-of-sale
`[0011] The present system and method provides for dis
`
`
`
`
`
`
`systems, where users may have purchases of, e.g., gasoline,
`
`
`
`creetly identifying and signaling a user's duress at an
`
`
`
`
`
`
`groceries, or airline tickets, etc., directly debited from their
`
`
`automatic teller machine or other biometric identification
`
`
`
`bank accounts, use technology that is similar to that of
`
`
`
`site (e.g., a building checkpoint or an automobile) through
`ATMs.
`
`
`
`the use of a biometric identifier-emergency (BIDE). The
`[0006] Traditional ATMs identify a customer based on an
`
`
`
`
`
`BIDE is used by an ATM customer to signal both banking
`
`
`
`
`identification card provided by the customer's bank (or
`
`
`
`and law enforcement authorities that the user is under
`
`
`
`
`financial institution) and a personal identification number
`
`
`
`
`duress, and to send help without alerting the criminal that the
`
`
`
`(PIN) that is recorded in a database and, presumably, known
`
`
`user is calling for help. In the system, BID functions
`
`
`
`only to the customer. When using a traditional ATM, the
`normally.
`
`
`
`customer inserts an identification card into a slot of an ATM.
`
`
`The card includes a magnetic strip on which information
`[0012] BIDE, on the other hand, functions as an alternate
`
`
`
`
`
`about the customer's accounts (e.g., the numbers of the
`
`
`
`biometric identifier which also has a set of instructions to
`
`
`
`customer's accounts) is stored. The ATM responds to inser
`
`
`
`initiate an alarm to notify the police or an emergency
`
`
`tion of the card by prompting the customer to enter the
`
`
`operator as is well known in the industry-for example, a
`
`
`customer's PIN. The ATM then compares the PIN entered by
`
`
`
`
`
`silent bank robbery alarm. To trigger a BIDE response, an
`
`
`
`
`the customer to the PIN stored in the database. If the two
`
`
`
`ATM user could employ an alternate biometric identifier that
`
`
`PINs match, the ATM determines that the customer is
`
`
`is nearly indistinguishable from a non-emergency identifier.
`
`
`authorized to access the account associated with the inserted
`
`Furthermore, the prompts displayed by the ATM or other
`card.
`
`
`computerized system accepting a BIDE could be made
`
`
`indistinguishable from those displayed by an ATM or com
`
`
`puterized system accepting a normal BID transaction.
`
`
`
`
`
`[0004] 2. Description of Related Art
`
`SUMMARY OF THE INVENTION
`
`[0013] The system and method disclosed provides a safe
`
`
`
`
`
`[0007] It is now possible that the use of identification
`
`
`and efficient way to make all ATMs that use biometric
`
`
`cards and even PINs to access ATMs or point-of-sale sys
`
`
`
`identification methods the equivalent of a "911" emergency
`
`
`
`tems can be eliminated, and further, transactions made more
`
`
`
`
`
`line. The system provides a simple, certain, and secure way
`
`
`
`secure, through the use of biometric identification (BID).
`
`
`
`
`
`of allowing a customer to alert the police that a crime is
`
`
`
`See, for instance, U.S. Pat. No. 6,045,039. Biometrics is the
`
`
`
`taking place without alerting a criminal that an alarm has
`
`
`
`
`study of using human physical traits to verify identity. Many
`
`
`been given. BIDE use could trigger a silent alarm connected
`
`
`human traits can be used to make biometric identifications,
`
`
`
`
`
`
`to the nearest police station, initiating a police response.
`
`
`
`such as: fingerprints, recognition of retinal or iris scans,
`
`
`
`
`palm prints, DNA traces, voiceprints, and the speed, pres
`[0014] In an exemplary embodiment of the present inven
`
`
`
`
`
`
`sure, and motion associated with a physical act such as
`
`
`
`
`tion, an ATM user can provide an alternate biometric iden
`
`
`
`
`pressing keys or writing. See, for instance, U.S. Pat. Nos.
`
`
`
`tifier (BIDE) to an ATM, allowing it to identify a transaction
`
`
`6,097,035, 6,045,039, and 5,613,012.
`
`
`as a duress transaction. For example, in fingerprint biometric
`[0008] In addition to eliminating the use of identification
`
`
`
`identification, a customer might submit one finger to be
`
`
`cards and PINs to access ATMs, biometric identification
`
`
`
`examined and analyzed at an ATM in order to conduct an
`
`
`
`methods and devices can also be used to generate or verify
`
`
`
`ordinary transaction. Once the customer's identification is
`
`
`
`
`
`electronic signatures to validate paperless transactions (i.e.,
`
`
`verified, using the biometric information, the transaction
`
`IPR2022-00602
`Apple EX1037 Page 10
`
`
`
`US 2004/0015450 Al
`2
`
`Jan.22,2004
`
`proceeds normally. However, by using a different finger, the
`
`
`
`
`
`addition to sending a silent alarm to the police, cause the
`
`
`
`
`
`
`
`
`ATM may also make a positive identification of a customer
`
`
`
`automobile to operate in an impaired manner to give police
`
`
`
`and instruct the system to trigger an alarm sequence without
`
`more time to respond to the emergency.
`
`
`
`
`alerting a criminal that the transaction has been identified as
`[0021] In another exemplary embodiment, a user can
`
`
`
`
`
`
`a duress transaction. Similarly, where the biometric identi
`
`
`provide a BIDE rather than a BID while the user is providing
`
`
`
`
`fication is by retinal or iris scan, a customer could simply use
`
`
`
`a biometric identification to verify or generate an electronic
`
`
`his or her other eye (i.e., whichever eye does not correspond
`
`
`
`signature for a paperless or internet or e-commerce trans
`
`
`to a normal transaction) as the BIDE trigger. Alternatively,
`
`
`
`
`action. Once a BIDE is triggered in such an embodiment, the
`
`a BIDE could be triggered by other means, such as rapid
`
`
`
`system would function similarly to the ATM embodiment.
`
`
`
`successive blinking of one or both eyes, tapping a fingerprint
`
`
`
`
`
`scanner, pressing hard on the lens of a fingerprint scanner, or
`[0022] These, as well as other advantages of the present
`
`
`
`
`
`
`pressing the forehead, for example, against the headrest or
`
`
`
`invention will become apparent to those of ordinary skill in
`
`
`
`
`similar structure associated with a retinal scanner.
`
`
`
`
`the art by reading the following detailed description with
`
`
`
`appropriate reference to the accompanying drawings.
`[0015] Where biometric identification is made by sensing
`
`
`
`
`
`the speed, pressure, or pattern of a user's signature or other
`BRIEF DESCRIP TION OF THE DRAWINGS
`
`
`
`writing, a BIDE may be made when the user alters any of the
`
`
`
`measured variables: for example, the user might change the
`[0023] A fuller understanding of the foregoing may be had
`
`
`
`
`
`
`
`shape of a letter, cross a " T" twice, make an extraneous mark
`
`
`
`by reference to the accompanying drawings wherein:
`
`when making the writing, etc.
`
`
`
`
`
`[0027] FIG. 4 is an alternate schematic view of the system
`
`[0029] FIG. 6 is an expanded flow chart of the method
`
`[0030] FIG. 7 is an alternate expanded flow chart of the
`
`[0024] FIG. 1 is a simplified block diagram of an auto
`
`
`
`
`
`
`[0016] In an alternative exemplary embodiment or as an
`
`
`
`matic teller machine having a biometric reader;
`
`
`
`additional feature of any embodiment described herein, a
`[0025] FIG. 2 is a simplified schematic view of an exem
`
`
`
`
`
`
`method and/or system which identifies a duress transaction
`
`plary embodiment of the present system;
`
`
`
`at an ATM may discreetly notify the police or other agency.
`
`
`[0017] In addition, the system, having identified a duress
`[0026] FIG. 3 is a schematic view of an alternate embodi
`
`
`
`
`transaction at an ATM, may; discretely notify the police
`
`ment of the present system;
`
`
`
`while slowing down a transaction, giving police more time
`
`
`
`
`
`to respond; limit the funds available from a customer's
`
`shown in FIG. 2;
`
`
`
`
`account so that a criminal cannot get away with large sums
`
`
`
`of money; dispense marked bills to assist in positive iden
`[0028] FIG. 5 is a flow chart of an exemplary embodiment
`
`
`
`
`tification of the criminal; or reject a transaction with an
`
`
`of a method of identifying a duress transaction;
`
`
`
`
`"unable to complete transaction" message and then slow
`
`
`
`
`down the transaction on any subsequent attempts. Further,
`
`illustrated in FIG. 5;
`
`
`
`an entire ATM system could be alerted citywide or nation
`
`
`
`
`wide to the fact that a forced transaction has occurred. If a
`
`
`
`
`
`criminal makes it away from the first location and attempts
`
`illustration in FIG. 5;
`
`
`to force another withdrawal, the system could alert the
`[0031] FIG. 8 is a front view of an automatic teller
`
`
`
`
`
`
`police that another transaction was attempted. Still further,
`
`
`machine for use with the present invention;
`
`
`along with the alarm, the system could give a general
`
`
`
`description of the customer for the police to use, thus
`[0032] FIG. 9 is a front view of an alternate automatic
`
`
`
`
`
`
`
`
`avoiding a potential tragedy because of mistaken identity, as
`
`
`
`
`teller machine for use with the present invention; and
`
`
`well as giving the police an extra edge in spotting the parties
`[0033] FIG.10 is a flow chart of another alternate embodi
`
`
`
`
`involved.
`
`
`
`ment of the present invention wherein the PIN/BIDE must
`
`
`[0018] In another exemplary embodiment, an individual
`
`
`be entered before receiving funds.
`
`
`
`can provide a BIDE to a biometric identification site, such
`
`
`
`as a building security checkpoint or the entrance/ignition
`DE TAILED DESCRIPTION OF AN
`
`
`
`system of an automobile. Once a BIDE is triggered in such
`EXEMPLARY EMBODIMENT OF THE
`
`
`
`an embodiment, the system can function similarly to the
`PRESENT INVENTION
`ATM embodiment.
`[0034] While the invention is susceptible of embodiment
`
`
`
`
`
`[0019] Specifically, a silent alarm could alert the police or
`
`
`
`
`in many different forms, there is shown in the drawings and
`
`other appropriate agency that a user was under duress during
`
`
`
`will be described herein in detail, an exemplary embodiment
`
`
`
`
`the identification. Further, the actions allowed by the system
`
`
`
`
`and alternate exemplary embodiments of the invention. It
`
`
`could be made to appear normal while at the same time
`
`
`
`
`
`should be understood, however, that the present disclosure is
`
`
`
`
`giving the police more time to respond to an emergency. For
`
`
`
`
`to be considered an exemplification of the principles of the
`
`
`example, the system could delay entry into a building
`
`
`
`
`
`invention and is not intended to limit the spirit and scope of
`
`
`
`protected by a biometric identification system, or bar entry
`
`
`
`
`
`the invention and/or claims of any embodiment illustrated.
`
`
`
`
`altogether while displaying a message that indicates the
`
`
`
`
`
`reason for the delay was not due to any action taken by the
`[0035] FIGS. 1 through 10 illustrate a system and method
`
`
`
`
`
`
`system's user. For example, the system could display a
`
`
`
`
`of the present invention, as well as alternate embodiments,
`
`
`
`
`message indicating that the user's identification could not be
`
`
`
`for use with an ATM 12, such as that illustrated in FIG. 1,
`
`
`
`
`confirmed (although it actually had been confirmed), while
`
`
`
`
`having a display 14, a keypad 16, a biometric reader 18, and
`
`
`at the same time triggering a silent alarm.
`
`
`a cash dispenser 20. The biometric reader 18 can include
`
`
`[0020] Where the system is used for entry into or to enable
`
`
`
`such components as, for example, lenses, lens covers and
`
`
`
`the ignition system of an automobile, a BIDE could, in
`
`
`
`hoods, scanners, headrests (for retinal scanners), etc., in
`
`IPR2022-00602
`Apple EX1037 Page 11
`
`
`
`US 2004/0015450 Al
`3
`
`Jan.22,2004
`
`[0040] The ATM processor 26a can perform the BID or
`
`
`addition to routines stored in a memory to execute biometric
`
`
`
`
`
`
`
`the BIDE validation process, which will be described in
`
`
`
`
`identifications. Function buttons 22 are illustrated next to
`
`
`more detail with reference to FIGS. 5-7.
`
`
`
`
`display 14. A1M 12 may further include a processor or
`
`
`
`
`computer for detecting a biometric value stored in a bank's
`[0041] Upon determination that a BIDE has been recog
`
`
`computer system (See FIG. 2).
`
`
`nized, the processor 26a can cause the communication
`
`
`
`device 28 to contact the appropriate authorities. For
`[0036] During an ATM transaction, an ATM "recognizes"
`
`
`
`
`
`example, a telecommunication dialer, via a data link 29
`
`
`
`
`a customer based on the customer's biometric value. Let the
`
`
`
`
`(phone line, etc.) can contact the police department dispatch
`
`
`
`
`stored biometric information for a customer's left eye, for
`
`
`
`
`
`center's telephone or computer system 30, thereby discreetly
`
`
`
`
`
`example, represent a particular customer. During the recog
`
`
`
`
`informing the police that a duress transaction is occurring.
`(BID),
`
`
`
`nition phase of entering a biometric identification the
`
`
`Communication device 28 can send a prerecorded message
`
`
`
`
`ATM computer recognizes "left eye, account holder Smith"
`
`
`to the police indicating the location of the duress transaction
`
`
`as the correct BID. When an incorrect BID is read by the
`
`
`
`and the name of the individual under duress. Alternatively,
`
`
`
`system, the ATM computer recognizes, for example, "eye,
`
`
`
`the ATM computer or bank central processing computer
`
`
`
`pattern not recognized" as incorrect and rejects the BID. The
`
`
`could send a piece of information commonly referred to as
`
`
`
`
`exemplary embodiment is generally illustrated by the addi
`
`
`an "identifier". Identifiers are commonly used by police to
`
`
`tion of another step during the recognition process.
`
`
`
`
`access information about individuals through various data
`
`
`bases, such as the National Crime Information Center
`[0037] For example, if a user under duress purposely
`
`
`
`
`
`(NCIC) or a state's Department of Motor Vehicles database.
`
`
`
`submits his right eye for recognition, the computer can be
`
`
`
`
`
`Common identifiers include: social security numbers, driv
`
`
`
`programmed to recognize that Smith's right eye was read by
`
`
`
`er's license numbers, full name and date of birth, passport
`
`
`
`
`
`the system-i.e., that a biometric identification-emergency
`
`numbers, etc.
`
`(BIDE) was entered. Rather than reject the BID as invalid,
`
`
`[0042] By use of a physical description of an authorized
`
`
`the A1M computer could then cause the system to notify the
`
`
`
`
`user (e.g., an identified customer) stored either at the ATM
`
`
`
`nearest police station that the person withdrawing the cash
`
`
`
`
`or the bank's processor, the ATM computer could also send
`
`
`
`
`is under duress. Notification of the authorities can be accom
`
`
`
`
`a description of the customer to the police, thus assisting in
`
`
`
`plished through the use of a telephone dialer with a pre
`
`
`
`the identification of the customer and thereby the robber.
`
`
`
`recorded message or a "silent" alarm, similar to a jewelry
`
`
`
`Further, A1M 12a may be connected via a data link 31 to a
`
`
`
`
`store's or a bank's burglar alarm. Police could then have
`
`
`low light camera or videorecorder 35 or sound recording
`
`
`
`
`
`"real-time" notice that a crime is in progress. Further, an
`
`
`system 37, which will be described in more detail in
`
`
`ATM 12 of the exemplary embodiment may incorporate
`
`reference to FIGS. 8 and 9.
`
`
`
`
`
`various devices to prevent criminals from detecting what
`
`
`biometric represents a BID vs. a BIDE. For example, an
`[0043] FIG. 3 illustrates A1M 12b being connected
`
`
`
`ATM 12 may incorporate a shield or hood, etc., over a
`
`
`
`directly to a bank's processor 26b. ATM 12b further includes
`
`
`
`
`fingerprint scanner or an eye scanner, making it impossible
`
`
`
`
`a controller 24 for controlling the external devices of the
`
`
`
`for an eavesdropper to see which eye, finger, etc., a user
`
`
`ATM, and a communication device 28 such as a telephone
`
`submitted for a BID.
`
`
`
`
`dialer with a prerecorded message. The controller 24 may be
`
`communicatively coupled to the processor 26b via a data
`
`
`[0038] FIGS. 2-4 illustrate an ATM duress system of the
`
`
`
`
`link 25. The bank's processor 26b can perform the BIDE
`
`exemplary embodiment. Such an ATM can take two different
`
`
`
`validation process, which will be described in more detail
`
`
`forms. The ATM could have its own separate processor, or
`
`with reference to FIGS. 5-8 and 11.
`
`
`it could be directly linked to a bank's processor.
`[0044] Upon determination that a BIDE has been recog
`
`
`[0039] FIG. 2 illustrates ATM 12a that may have its own
`
`
`
`
`nized, the processor 26b, via a data link 27, may inform the
`
`
`
`
`
`processor 26a (e.g., an integrated circuit microprocessor), a
`
`
`communication device 28 to contact the appropriate authori
`
`
`
`
`memory 27 (e.g., ROM, flash memory, hard disk, etc.), a
`
`
`
`
`ties. For example, a telecommunication dialer, via a data link
`
`
`
`controller 24 for controlling the external devices of the
`
`
`29 (phone line, etc.) could contact the police department's
`
`
`ATM, and a communication device 28 such as a telephone
`
`
`
`
`dispatch center's telephone or computer system 30, thereby
`
`
`
`
`dialer with a prerecorded message, all of which may be
`
`
`
`discreetly informing the police that a duress transaction is
`
`
`interconnected by a system bus. Memory 27 may include
`
`occurring. Communication device 28 can send a pre-re
`
`
`
`
`more than one physical element, and may also include: an
`
`
`
`
`corded message to the police indicating the location of the
`
`
`
`operating system for processor 26a; an emergency response
`
`
`
`duress transaction and the name of the individual under
`
`
`
`routine (i.e., a set of instructions executable by a processor,
`
`
`
`duress. Further, ATM 12b may be connected via a data link
`
`
`
`
`
`typically stored in memory); a BID/BIDE comparison rou
`
`
`
`31 to a low light camera or videorecorder 35 or sound
`
`
`
`
`
`tine, a fund limiting routine; a transaction delay routine, and;
`
`
`recording system 37, which will be described in more detail
`
`
`BID and BIDE values. This particular configuration is not
`
`in reference to FIGS. 8 and 9.
`
`
`
`
`
`
`crucial to the functioning of the present invention. For
`
`
`example, the system could be implemented by a device
`[0045] FIG. 4 illustrates an alternate embodiment of a
`
`
`
`
`
`
`without a system bus and having a memory and processor
`
`
`
`system wherein ATM 12b is connected directly to the bank's
`
`
`
`
`processor 26b. ATM 12b further includes a controller 24 for
`
`
`
`
`contained in one integrated circuit. Further, those skilled in
`
`
`
`
`the art will appreciate that many of the elements described
`
`
`
`controlling the external devices of the ATM. The controller
`26b
`
`
`
`in this exemplary embodiment are functional entities that
`
`
`24 may be communicatively coupled to the processor
`
`
`via a data link 31. The bank's processor 26b performs the
`
`
`
`may be implemented as discrete components or in conjunc
`
`
`
`
`
`tion with other components, in any suitable combination and
`
`
`
`
`BIDE validation process, which will be described in more
`location.
`
`
`detail with reference to FIGS. 5-7.
`
`IPR2022-00602
`Apple EX1037 Page 12
`
`
`
`US 2004/0015450 Al
`
`Jan.22,2004
`
`4
`
`[0046] Upon determination that a BIDE has been recog
`
`her eye, finger, etc. for recognition, generally indicated as
`
`
`
`
`nized, the processor 26b, via a data link 33, may send an
`
`
`
`step 50. A computer may then attempt to verify the BID at
`
`
`alarm signal with the appropriate information, via data link
`
`
`step 55. If the received biometric value is a customer's
`
`
`
`33, to a computer console 36 at a remote location. A
`
`
`
`
`
`
`correct BID, the transaction could then proceed as usual, as
`
`
`
`
`computer operator 38 monitoring the computer console 36
`shown at step 60.
`
`
`
`
`could then notify or contact the appropriate authorities, such
`[0052] Upon failure of the BID, the ATM computer may
`
`
`
`
`
`as police department 30. Further, ATM 12b may be con
`
`
`
`
`set a flag indicating a failed identification and attempt to
`
`
`
`nected via a data link 31 to an event recorder such as a low
`
`
`
`
`verify the biometric value as the customer's BIDE, as shown
`
`
`
`light camera, a videorecorder 35, or sound recording system
`
`
`
`at step 65. If the ATM computer verifies the scanned
`
`
`
`
`37, which will be described in more detail in reference to
`
`
`
`
`
`biometric value as the customer's BIDE and the access flag
`
`FIGS. 8 and 9.
`
`
`
`
`is set, then the computer may cause a signal to be sent to alert
`[0047] Referring now to FIG. 5, the general BIDE method
`
`
`
`
`the authorities, as shown at step 70, and then continue
`
`
`
`
`of the exemplary embodiment 10 is illustrated. This method
`
`
`
`processing the transaction. If the computer does not verify
`
`
`is accomplished by adding to the Customer's Information
`
`
`the customer's biometric value as either a BID or BIDE,
`
`
`
`
`File in the ATM system, an additional "duress BID" or
`
`
`
`
`then the ATM computer could continue with ordinary failed
`
`
`BIDE. (A Customer's Information File is the file which
`
`
`access procedures, as shown at step 80.
`
`
`keeps the information relevant to an individual customer's
`[0053] By storing a second biometric value as the BIDE of
`
`
`
`
`
`
`accounts at the bank where the customer does business.)
`
`
`
`a customer, some problems associated with ATM security
`
`
`[0048] The BIDE process, such as using an alternate eye,
`
`
`
`
`and alarms may be solved. For example, even with a gun in
`
`
`
`
`palm, or finger, or an action taken in combination with a
`
`
`
`a customer's back, a criminal would not know whether a
`
`
`BID, may be chosen by a customer, so that it can be easily
`
`
`normal BID or a BIDE has been used. Once a BIDE has been
`
`
`
`remembered by the customer and not confused by the
`
`
`
`
`verified, the system, using a silent alarm similar to a jewelry
`
`
`
`
`customer with that customer's regular BID procedure. Thus,
`
`
`store's or a bank's burglar alarm, could immediately alert
`
`
`
`
`
`if the customer's regular BID procedure is to use the left eye,
`
`
`
`
`the nearest police station that a robbery was in progress, and
`
`
`the BIDE procedure could be to use the customer's right eye.
`
`
`
`
`police could be dispatched to the scene, providing a "real
`
`
`Further, the BID and BIDE need not even be of the same
`
`time" response to the crime.
`
`
`biometric type. For example, a BID may be the left eye,
`[0054] FIG. 6 illustrates an expanded flow chart of FIG.
`
`
`
`
`
`while the corresponding BIDE may be the right index finger.
`
`
`
`5. After an access number has been entered, as shown at step
`
`
`Other biometric combinations, such as voice recognition
`
`
`
`50, and a BIDE verified, as shown at step 65, the silent alarm
`
`
`BID and body measurement BIDE, may also be used.
`
`
`
`or distress call could be triggered, as shown at step 70. The
`
`
`
`
`
`Further, with a retinal scanner as a biometric reader, a BIDE
`
`
`system can then cause various actions to occur.
`
`
`
`could be made by a user's rapidly blinking his eyes (or
`
`
`
`
`blinking his eyes in another unusual manner) while submit
`[0055] For example, the whole transaction could be
`
`
`
`ting an otherwise normal BID. With such an embodiment,
`
`
`
`slowed down, as shown at step 90, i.e., the entire transaction
`
`
`
`storing a BIDE could be simpler because the BIDE could
`
`
`
`process could be delayed such that the system takes longer
`
`
`
`
`consist of BIDs already recorded for users with the addition
`
`
`
`to dispense cash. In this manner, the notified authorities
`
`
`of a routine stored in memory 27 for adding one or more
`
`
`
`
`could have more time to respond to the distress signal than
`
`
`
`blinking patterns. In other words, a BIDE could be repre
`
`
`
`they would ordinarily. The slowed transaction could take
`
`
`
`
`sented by a normal BID in combination with an eye-blinking
`
`
`
`several forms. The system could at first refuse the request
`
`
`
`
`pattern that is either selected by a user or by the user's bank
`
`
`and give out a false "out of service" message or "Error
`
`or financial institution.
`
`
`
`
`Please try again" message. The customer could be required
`
`
`
`[0049] As another alternative, a user could trigger a BIDE
`
`
`to restart the transaction. The system could merely stall for
`
`
`
`
`by actuating a pressure-sensitive switch or other sensor that
`
`
`time by slowing down the generation of user instruction
`
`
`is incorporated into the normal BID reader. For example, the
`
`
`
`screens and then giving a "Transaction in Progress" mes
`
`
`
`user could exert pressure on a lens of a fingerprint scanner
`
`
`sage. Ultimately, the system could dispense cash (that might
`
`
`
`
`or a headrest or other structure associated with a retinal
`
`
`
`
`
`
`be debited to the person's account or not, depending on the
`
`scanner. Such an activation could be made to be undetect
`
`
`
`system's administrator), so that the robber does not become
`
`
`
`able to anyone but the user submitting a BID or BIDE. As
`
`
`agitated and harm the user.
`
`
`
`
`used here, the tern "pressure