throbber

`(19)United States
`Publication
`
`(12)Patent Application
`Al
`US 2004/0015450
`(10)Pub. No.:
`( 43)Pub. Date: Jan. 22, 2004
`
`Zingher et al.
`
`
`
`
`
`
`
`US 20040015450Al
`
`
`
`
`
`
`
`1111111111111111 IIIIII IIIII 11111 1111111111 11111 1111111111 111111111111111 1111111111 11111111
`
`(54)BIOMETRIC SYSTEM AND METHOD FOR
`DETECTING DURESS TRANSACTIONS
`
`
`(60)Provisional application
`3, 2000.
`
`
`
`No. 60/237,584, filed on Oct.
`
`(76)Inventors: Joseph Zingher, Beach Park, IL (US);
`
`
`
`Abraham Zingher, Beach Park, IL
`(US)
`
`
`
`Publication Classification
`
`(51)Int. CI.7 ..................................................... G06F 17/60
`
`
`(52)U.S. CI. ................................................................ 705/64
`
`McDonnell Boehnen Hulbert & Berghoff
`
`Correspondence Address:
`
`Edward K. Runyan
`
`
`
`32nd Floor
`
`300 S. Wacker Drive
`
`Chicago, IL 60606 (US)
`
`10/611,711
`(21)
`Appl. No.:
`
`Jul. 1, 2003
`(22)
`Filed:
`
`(57)
`
`ABSTRACT
`
`A system for responding to a duress identification made at a
`
`
`
`
`
`
`
`biometric identification site. The system may include a
`
`
`
`processor, a memory, a biometric reader for collecting
`
`
`
`
`biometric information about a user, wherein the biometric
`
`
`
`information is used for determining if the user is an autho­
`
`
`
`
`rized user of the system. The system may also include a set
`
`
`
`of instructions stored in the memory, the set of instructions
`
`
`
`
`executable by the processor to determine whether the bio­
`
`
`
`
`metric information represents a normal identification or a
`Related U.S. Application Data
`
`
`
`
`duress identification; if the biometric information represents
`filed on
`
`
`(63)Continuation of application No. 09/927,033,
`
`
`
`
`a duress identification, the system may initiate an emergency
`
`Sep. 24, 2001, now abandoned.
`
`
`
`
`response, such as (for example) triggering a silent alarm.
`
`
`
`.( 12a
`
`2sa
`
`L
`
`,--
`
`28
`J
`
`PROCESSOR �
`
`�
`
`COMMUNICATION [29
`
`POLICE
`
`DEVICE
`
`DEPARTMENT
`
`0
`)3
`
`s
`y
`
`s
`
`T
`
`E
`
`) 27
`
`MEMORY
`
`B
`Processor logic u
`
`
`Operating system
`Emergency
`s
`
`response routine
`
`Transaction delay �
`routine
`Fund limiting
`routine
`BID/BIDE
`
`comparison routine
`BID values
`BIDE values
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`-
`
`CONTROLLER v 31
`
`� FOR EXTERNAL ,--e-
`DEVICES
`
`)37
`
`SOUND
`
`- RECORDING
`
`SYSTEM
`
`24
`
`_r
`
`)35
`
`LOWLIGHT
`
`CAMERA OR
`
`VIDEO
`
`RECORDER
`
`IPR2022-00602
`Apple EX1037 Page 1
`
`

`

`
`
`Jan. 22, 2004 Sheet 1 of 8 US 2004/0015450 Al
`Patent Application Publication
`
`12
`
`20
`)
`
`18
`)
`
`CASH DISPENSER
`
`
`
`BIOMETRIC READER
`
`DISPLAY
`
`14
`
`1
`2
`3
`4
`6
`5
`7
`9
`8
`* 0 #
`
`16
`
`FIG. 1
`
`IPR2022-00602
`Apple EX1037 Page 2
`
`

`

`
`
`Jan. 22, 2004 Sheet 2 of 8
`Patent Application Publication
`US 2004/0015450 Al
`
`12a
`)
`
`J 26a
`
`,--
`
`28
`J
`
`PROCESSOR �
`
`�
`
`) 30
`
`[29
`COMMUNICATION
`POLICE
`DEVICE
`DEPARTMENT
`
`s
`y
`
`s
`T
`
`E
`
`M
`
`24
`
`)
`
`;-21
`MEMORY
`
`Processor logic
`
`
`Operating system
`Emergency
`CONTROLLER
`
`response routine
`
`Transaction delay
`+-4 � FOR EXTERNAL
`routine
`DEVICES
`Fund limiting
`routine
`BID/BIDE
`comparison routine
`BID values
`BIDE values
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`B
`
`u
`
`s
`
`�
`
`FIG. 2
`
`) 35
`LOWLIGHT
`CAMERA OR
`VIDEO
`RECORDER
`
`,---
`
`v 31
`
`-,--
`
`) 37
`SOUND
`� RECORDING
`SYSTEM
`
`IPR2022-00602
`Apple EX1037 Page 3
`
`

`

`
`
`Patent Application Publication
`Jan. 22, 2004 Sheet 3 of 8
`US 2004/0015450 Al
`
`J 12b
`
`"\ COMMUNICATION
`
`28
`
`26b
`
`29
`J
`
`) 31
`
`POLICE DEPARTMENT
`
`35
`J
`
`LOW LIGHT CAMERA
`
`OR VIDEO RECORDER
`
`SOUND RECORDING
`
`SYSTEM
`
`37 _j
`
`lr 27
`_f 25
`
`DEVICE
`
`"\ BANK CENTRAL
`
`
`
`PROCESSING UNIT
`
`24
`
`"\
`
`CONTROLLER FOR
`
`EXTERNAL
`
`DEVICES
`
`J 12b
`
`FIG. 3
`
`) 33
`
`26b
`
`(
`
`BANK CENTRAL
`
`
`
`PROCESSING UNIT
`
`COMPUTER
`
`CONSOLE
`
`J30
`
`l,_( 25
`24( CONTROLLER FOR
`
`EXTERNAL
`
`DEVICES
`
`I
`COMPUTER POLICE
`
`,--
`
`DEPARTMENT
`OPERATOR
`
`38 j
`
`r 31
`
`LOW LIGHT CAMERA
`
`OR VIDEO RECORDER
`
`SOUND RECORDING
`
`v 37
`
`SYSTEM
`
`FIG. 4
`
`IPR2022-00602
`Apple EX1037 Page 4
`
`

`

`
`
`Jan. 22, 2004 Sheet 4 of 8 US 2004/0015450 Al
`Patent Application Publication
`
`ACCESS
`
`PROCEDURE
`
`INITIATED
`
`,,
`
`60(
`
`VALID BID?
`
`YES
`
`PROCEED AS USUAL
`
`...
`
`NO
`
`,�
`
`70(
`
`BIDE?
`
`YES
`
`...
`
`TRIGGER ALARM
`
`NO
`
`,r
`
`REJECT
`
`TRANSACTION
`
`FIG. 5
`
`IPR2022-00602
`Apple EX1037 Page 5
`
`

`

`
`
`Patent Application Publication
`Jan. 22, 2004 Sheet 5 of 8
`US 2004/0015450 Al
`
`ACCESS
`PROCEDURE
`INITIATED
`
`�r
`
`VALID BID?
`
`YES
`
`60 "-
`
`PROCEED AS USUAL
`
`..
`
`NO
`
`� r
`
`BIDE?
`
`YES
`
`70�
`
`TRIGGER ALARM
`
`...
`
`NO
`
`' r
`
`REJECT
`TRANSACTION
`
`'"
`
`90
`� SLOW TRANSACTION
`
`FIG. 6
`
`IPR2022-00602
`Apple EX1037 Page 6
`
`

`

`
`
`Jan. 22, 2004 Sheet 6 of 8
`Patent Application Publication
`US 2004/0015450 Al
`
`ACCESS
`PROCEDURE
`INITIATED
`
`u
`
`VALID BID?
`
`YES
`
`NO
`
`u
`
`BIDE?
`
`YES
`
`NO
`�,
`REJECT
`TRANSACTION
`
`10
`
`/
`
`60 \__
`
`PROCEED AS USUAL
`
`...
`
`70
`�
`
`TRIGGER ALARM
`
`...
`
`, ,
`
`95� LIMIT FUNDS
`AVAILABLE
`
`FIG. 7
`
`IPR2022-00602
`Apple EX1037 Page 7
`
`

`

`Patent
`Application
`Publication
`Jan. 22, 2004 Sheet 7 of 8
`US 2004/0015450 Al
`
`12
`
`35
`
`20
`r
`CASH DISPENSER
`
`DISPLAY
`
`14
`Lf
`
`BIOMETRIC
`READER
`
`1 2
`3
`4
`5 6
`7 8 9
`* 0
`
`#
`
`FIG. 8
`
`CASH DISPENSER
`
`1a
`r
`BIOMETRIC
`READER
`
`1 2
`22 4
`5 6
`)
`7 8 9
`16
`( * 0 #
`
`DISPLAY
`
`14
`Lf
`[11}37
`
`FIG. 9
`
`IPR2022-00602
`Apple EX1037 Page 8
`
`

`

`
`
`Jan. 22, 2004 Sheet 8 of 8
`Patent Application Publication
`US 2004/0015450 Al
`
`210
`
`250( ACCESS
`PROCEDURE
`INITIATED
`
`) 260
`
`YES PROCEED AS
`USUAL
`
`:-
`
`1-----.
`
`) 290
`RE-ENTER BID
`BEFORE
`
`.--. RECEIVING FUNDS
`) 292
`
`255(
`
`,,
`
`VALID BID?
`
`265�
`
`NO
`
`,,
`
`BIDE?
`
`NO
`
`,.,
`
`280(
`
`REJECT
`TRANSACTION
`
`YES TRIGGER
`
`ALARM
`
`270 _j
`
`VALID BID ? �
`NO
`' ) 296
`NO BIDE?
`YES
`270 , \._ TRIGGER
`ALARM
`
`294 (
`
`'
`RECEIVE
`FUNDS I+--
`
`FIG. 10
`
`IPR2022-00602
`Apple EX1037 Page 9
`
`

`

`US 2004/0015450 Al
`
`Jan.22,2004
`
`1
`
`RELATED APPLICATION
`
`BACKGROUND OF THE INVENTION
`
`
`
`[0002] 1. Field of the Invention
`
`e-commerce or internet transactions). Electronic signatures
`
`
`BIOMETRIC SYSTEM AND METHOD FOR
`
`
`
`
`
`DETECTING DURESS TRANSACTIONS are commonly defined as any type of sound, symbol or
`
`
`
`
`process that is attached to and logically linked to a document
`
`
`
`
`to identify the author or source of the document. Any of the
`
`
`
`biometric traits described above may be used in the process
`[0001] The inventors claim priority to U.S. Provisional
`
`
`
`
`
`of creating or verifying an electronic signature.
`
`
`
`
`
`Patent Application No. 60/237,584, entitled "Biometric Sys­
`[0009] While biometric identification is very useful in
`
`
`
`
`
`
`
`tem And Method For Detecting Duress Transactions at
`
`
`
`preventing fraudulent transactions, it does not solve the
`
`Automated Teller Machines," filed on Oct. 3, 2000, the
`
`
`security problem posed by ATMs, specifically, extortion.
`
`
`
`entirety of which is expressly incorporated by reference.
`
`
`The usual form of extortion at ATMs is to intimidate the
`
`
`ATM user by threat of physical harm. There are methods
`
`
`
`currently available to safeguard ATMs, most having to do
`
`
`
`
`with entering special codes on the keypad normally used for
`
`
`
`
`
`entering personal identification numbers or placing a panic
`
`
`
`
`[0003] The present invention relates to automated teller
`
`
`button on an ATM. These methods, however, are not well
`
`
`machines (ATMs) and more particularly to a method and
`
`suited to use in ATMs that use BID, as any act on the part
`
`
`
`system for detecting transactions made under duress at
`
`
`of the user other than selecting a transaction and entering a
`
`ATMs using biometric measurements.
`
`
`
`transaction amount could alert the criminal that his crime
`
`
`has been reported, which in turn could result in harm to the
`user.
`[0005] With the advent of the automatic teller machine
`
`
`
`
`
`
`(ATM), it has become possible for banking withdrawals to
`[0010] Accordingly, there is a need for the discreet iden­
`
`
`
`
`be made without the assistance of human bank personnel or
`
`
`
`
`tification of a duress transaction and the discreet notification
`
`
`
`agents. For example, a customer may use an ATM to make
`
`
`
`
`of authorities that a crime is being committed at an ATM
`
`
`
`deposits or withdrawals from a checking or savings account,
`
`
`
`where biometrics are used to confirm the identity of a user.
`
`
`or to determine the balance of such an account. Point-of-sale
`[0011] The present system and method provides for dis­
`
`
`
`
`
`
`systems, where users may have purchases of, e.g., gasoline,
`
`
`
`creetly identifying and signaling a user's duress at an
`
`
`
`
`
`
`groceries, or airline tickets, etc., directly debited from their
`
`
`automatic teller machine or other biometric identification
`
`
`
`bank accounts, use technology that is similar to that of
`
`
`
`site (e.g., a building checkpoint or an automobile) through
`ATMs.
`
`
`
`the use of a biometric identifier-emergency (BIDE). The
`[0006] Traditional ATMs identify a customer based on an
`
`
`
`
`
`BIDE is used by an ATM customer to signal both banking
`
`
`
`
`identification card provided by the customer's bank (or
`
`
`
`and law enforcement authorities that the user is under
`
`
`
`
`financial institution) and a personal identification number
`
`
`
`
`duress, and to send help without alerting the criminal that the
`
`
`
`(PIN) that is recorded in a database and, presumably, known
`
`
`user is calling for help. In the system, BID functions
`
`
`
`only to the customer. When using a traditional ATM, the
`normally.
`
`
`
`customer inserts an identification card into a slot of an ATM.
`
`
`The card includes a magnetic strip on which information
`[0012] BIDE, on the other hand, functions as an alternate
`
`
`
`
`
`about the customer's accounts (e.g., the numbers of the
`
`
`
`biometric identifier which also has a set of instructions to
`
`
`
`customer's accounts) is stored. The ATM responds to inser­
`
`
`
`initiate an alarm to notify the police or an emergency
`
`
`tion of the card by prompting the customer to enter the
`
`
`operator as is well known in the industry-for example, a
`
`
`customer's PIN. The ATM then compares the PIN entered by
`
`
`
`
`
`silent bank robbery alarm. To trigger a BIDE response, an
`
`
`
`
`the customer to the PIN stored in the database. If the two
`
`
`
`ATM user could employ an alternate biometric identifier that
`
`
`PINs match, the ATM determines that the customer is
`
`
`is nearly indistinguishable from a non-emergency identifier.
`
`
`authorized to access the account associated with the inserted
`
`Furthermore, the prompts displayed by the ATM or other
`card.
`
`
`computerized system accepting a BIDE could be made
`
`
`indistinguishable from those displayed by an ATM or com­
`
`
`puterized system accepting a normal BID transaction.
`
`
`
`
`
`[0004] 2. Description of Related Art
`
`SUMMARY OF THE INVENTION
`
`[0013] The system and method disclosed provides a safe
`
`
`
`
`
`[0007] It is now possible that the use of identification
`
`
`and efficient way to make all ATMs that use biometric
`
`
`cards and even PINs to access ATMs or point-of-sale sys­
`
`
`
`identification methods the equivalent of a "911" emergency
`
`
`
`tems can be eliminated, and further, transactions made more
`
`
`
`
`
`line. The system provides a simple, certain, and secure way
`
`
`
`secure, through the use of biometric identification (BID).
`
`
`
`
`
`of allowing a customer to alert the police that a crime is
`
`
`
`See, for instance, U.S. Pat. No. 6,045,039. Biometrics is the
`
`
`
`taking place without alerting a criminal that an alarm has
`
`
`
`
`study of using human physical traits to verify identity. Many
`
`
`been given. BIDE use could trigger a silent alarm connected
`
`
`human traits can be used to make biometric identifications,
`
`
`
`
`
`
`to the nearest police station, initiating a police response.
`
`
`
`such as: fingerprints, recognition of retinal or iris scans,
`
`
`
`
`palm prints, DNA traces, voiceprints, and the speed, pres­
`[0014] In an exemplary embodiment of the present inven­
`
`
`
`
`
`
`sure, and motion associated with a physical act such as
`
`
`
`
`tion, an ATM user can provide an alternate biometric iden­
`
`
`
`
`pressing keys or writing. See, for instance, U.S. Pat. Nos.
`
`
`
`tifier (BIDE) to an ATM, allowing it to identify a transaction
`
`
`6,097,035, 6,045,039, and 5,613,012.
`
`
`as a duress transaction. For example, in fingerprint biometric
`[0008] In addition to eliminating the use of identification
`
`
`
`identification, a customer might submit one finger to be
`
`
`cards and PINs to access ATMs, biometric identification
`
`
`
`examined and analyzed at an ATM in order to conduct an
`
`
`
`methods and devices can also be used to generate or verify
`
`
`
`ordinary transaction. Once the customer's identification is
`
`
`
`
`
`electronic signatures to validate paperless transactions (i.e.,
`
`
`verified, using the biometric information, the transaction
`
`IPR2022-00602
`Apple EX1037 Page 10
`
`

`

`US 2004/0015450 Al
`2
`
`Jan.22,2004
`
`proceeds normally. However, by using a different finger, the
`
`
`
`
`
`addition to sending a silent alarm to the police, cause the
`
`
`
`
`
`
`
`
`ATM may also make a positive identification of a customer
`
`
`
`automobile to operate in an impaired manner to give police
`
`
`
`and instruct the system to trigger an alarm sequence without
`
`more time to respond to the emergency.
`
`
`
`
`alerting a criminal that the transaction has been identified as
`[0021] In another exemplary embodiment, a user can
`
`
`
`
`
`
`a duress transaction. Similarly, where the biometric identi­
`
`
`provide a BIDE rather than a BID while the user is providing
`
`
`
`
`fication is by retinal or iris scan, a customer could simply use
`
`
`
`a biometric identification to verify or generate an electronic
`
`
`his or her other eye (i.e., whichever eye does not correspond
`
`
`
`signature for a paperless or internet or e-commerce trans­
`
`
`to a normal transaction) as the BIDE trigger. Alternatively,
`
`
`
`
`action. Once a BIDE is triggered in such an embodiment, the
`
`a BIDE could be triggered by other means, such as rapid
`
`
`
`system would function similarly to the ATM embodiment.
`
`
`
`successive blinking of one or both eyes, tapping a fingerprint
`
`
`
`
`
`scanner, pressing hard on the lens of a fingerprint scanner, or
`[0022] These, as well as other advantages of the present
`
`
`
`
`
`
`pressing the forehead, for example, against the headrest or
`
`
`
`invention will become apparent to those of ordinary skill in
`
`
`
`
`similar structure associated with a retinal scanner.
`
`
`
`
`the art by reading the following detailed description with
`
`
`
`appropriate reference to the accompanying drawings.
`[0015] Where biometric identification is made by sensing
`
`
`
`
`
`the speed, pressure, or pattern of a user's signature or other
`BRIEF DESCRIP TION OF THE DRAWINGS
`
`
`
`writing, a BIDE may be made when the user alters any of the
`
`
`
`measured variables: for example, the user might change the
`[0023] A fuller understanding of the foregoing may be had
`
`
`
`
`
`
`
`shape of a letter, cross a " T" twice, make an extraneous mark
`
`
`
`by reference to the accompanying drawings wherein:
`
`when making the writing, etc.
`
`
`
`
`
`[0027] FIG. 4 is an alternate schematic view of the system
`
`[0029] FIG. 6 is an expanded flow chart of the method
`
`[0030] FIG. 7 is an alternate expanded flow chart of the
`
`[0024] FIG. 1 is a simplified block diagram of an auto­
`
`
`
`
`
`
`[0016] In an alternative exemplary embodiment or as an
`
`
`
`matic teller machine having a biometric reader;
`
`
`
`additional feature of any embodiment described herein, a
`[0025] FIG. 2 is a simplified schematic view of an exem­
`
`
`
`
`
`
`method and/or system which identifies a duress transaction
`
`plary embodiment of the present system;
`
`
`
`at an ATM may discreetly notify the police or other agency.
`
`
`[0017] In addition, the system, having identified a duress
`[0026] FIG. 3 is a schematic view of an alternate embodi­
`
`
`
`
`transaction at an ATM, may; discretely notify the police
`
`ment of the present system;
`
`
`
`while slowing down a transaction, giving police more time
`
`
`
`
`
`to respond; limit the funds available from a customer's
`
`shown in FIG. 2;
`
`
`
`
`account so that a criminal cannot get away with large sums
`
`
`
`of money; dispense marked bills to assist in positive iden­
`[0028] FIG. 5 is a flow chart of an exemplary embodiment
`
`
`
`
`tification of the criminal; or reject a transaction with an
`
`
`of a method of identifying a duress transaction;
`
`
`
`
`"unable to complete transaction" message and then slow
`
`
`
`
`down the transaction on any subsequent attempts. Further,
`
`illustrated in FIG. 5;
`
`
`
`an entire ATM system could be alerted citywide or nation­
`
`
`
`
`wide to the fact that a forced transaction has occurred. If a
`
`
`
`
`
`criminal makes it away from the first location and attempts
`
`illustration in FIG. 5;
`
`
`to force another withdrawal, the system could alert the
`[0031] FIG. 8 is a front view of an automatic teller
`
`
`
`
`
`
`police that another transaction was attempted. Still further,
`
`
`machine for use with the present invention;
`
`
`along with the alarm, the system could give a general
`
`
`
`description of the customer for the police to use, thus
`[0032] FIG. 9 is a front view of an alternate automatic
`
`
`
`
`
`
`
`
`avoiding a potential tragedy because of mistaken identity, as
`
`
`
`
`teller machine for use with the present invention; and
`
`
`well as giving the police an extra edge in spotting the parties
`[0033] FIG.10 is a flow chart of another alternate embodi­
`
`
`
`
`involved.
`
`
`
`ment of the present invention wherein the PIN/BIDE must
`
`
`[0018] In another exemplary embodiment, an individual
`
`
`be entered before receiving funds.
`
`
`
`can provide a BIDE to a biometric identification site, such
`
`
`
`as a building security checkpoint or the entrance/ignition
`DE TAILED DESCRIPTION OF AN
`
`
`
`system of an automobile. Once a BIDE is triggered in such
`EXEMPLARY EMBODIMENT OF THE
`
`
`
`an embodiment, the system can function similarly to the
`PRESENT INVENTION
`ATM embodiment.
`[0034] While the invention is susceptible of embodiment
`
`
`
`
`
`[0019] Specifically, a silent alarm could alert the police or
`
`
`
`
`in many different forms, there is shown in the drawings and
`
`other appropriate agency that a user was under duress during
`
`
`
`will be described herein in detail, an exemplary embodiment
`
`
`
`
`the identification. Further, the actions allowed by the system
`
`
`
`
`and alternate exemplary embodiments of the invention. It
`
`
`could be made to appear normal while at the same time
`
`
`
`
`
`should be understood, however, that the present disclosure is
`
`
`
`
`giving the police more time to respond to an emergency. For
`
`
`
`
`to be considered an exemplification of the principles of the
`
`
`example, the system could delay entry into a building
`
`
`
`
`
`invention and is not intended to limit the spirit and scope of
`
`
`
`protected by a biometric identification system, or bar entry
`
`
`
`
`
`the invention and/or claims of any embodiment illustrated.
`
`
`
`
`altogether while displaying a message that indicates the
`
`
`
`
`
`reason for the delay was not due to any action taken by the
`[0035] FIGS. 1 through 10 illustrate a system and method
`
`
`
`
`
`
`system's user. For example, the system could display a
`
`
`
`
`of the present invention, as well as alternate embodiments,
`
`
`
`
`message indicating that the user's identification could not be
`
`
`
`for use with an ATM 12, such as that illustrated in FIG. 1,
`
`
`
`
`confirmed (although it actually had been confirmed), while
`
`
`
`
`having a display 14, a keypad 16, a biometric reader 18, and
`
`
`at the same time triggering a silent alarm.
`
`
`a cash dispenser 20. The biometric reader 18 can include
`
`
`[0020] Where the system is used for entry into or to enable
`
`
`
`such components as, for example, lenses, lens covers and
`
`
`
`the ignition system of an automobile, a BIDE could, in
`
`
`
`hoods, scanners, headrests (for retinal scanners), etc., in
`
`IPR2022-00602
`Apple EX1037 Page 11
`
`

`

`US 2004/0015450 Al
`3
`
`Jan.22,2004
`
`[0040] The ATM processor 26a can perform the BID or
`
`
`addition to routines stored in a memory to execute biometric
`
`
`
`
`
`
`
`the BIDE validation process, which will be described in
`
`
`
`
`identifications. Function buttons 22 are illustrated next to
`
`
`more detail with reference to FIGS. 5-7.
`
`
`
`
`display 14. A1M 12 may further include a processor or
`
`
`
`
`computer for detecting a biometric value stored in a bank's
`[0041] Upon determination that a BIDE has been recog­
`
`
`computer system (See FIG. 2).
`
`
`nized, the processor 26a can cause the communication
`
`
`
`device 28 to contact the appropriate authorities. For
`[0036] During an ATM transaction, an ATM "recognizes"
`
`
`
`
`
`example, a telecommunication dialer, via a data link 29
`
`
`
`
`a customer based on the customer's biometric value. Let the
`
`
`
`
`(phone line, etc.) can contact the police department dispatch
`
`
`
`
`stored biometric information for a customer's left eye, for
`
`
`
`
`
`center's telephone or computer system 30, thereby discreetly
`
`
`
`
`
`example, represent a particular customer. During the recog­
`
`
`
`
`informing the police that a duress transaction is occurring.
`(BID),
`
`
`
`nition phase of entering a biometric identification the
`
`
`Communication device 28 can send a prerecorded message
`
`
`
`
`ATM computer recognizes "left eye, account holder Smith"
`
`
`to the police indicating the location of the duress transaction
`
`
`as the correct BID. When an incorrect BID is read by the
`
`
`
`and the name of the individual under duress. Alternatively,
`
`
`
`system, the ATM computer recognizes, for example, "eye,
`
`
`
`the ATM computer or bank central processing computer
`
`
`
`pattern not recognized" as incorrect and rejects the BID. The
`
`
`could send a piece of information commonly referred to as
`
`
`
`
`exemplary embodiment is generally illustrated by the addi­
`
`
`an "identifier". Identifiers are commonly used by police to
`
`
`tion of another step during the recognition process.
`
`
`
`
`access information about individuals through various data­
`
`
`bases, such as the National Crime Information Center
`[0037] For example, if a user under duress purposely
`
`
`
`
`
`(NCIC) or a state's Department of Motor Vehicles database.
`
`
`
`submits his right eye for recognition, the computer can be
`
`
`
`
`
`Common identifiers include: social security numbers, driv­
`
`
`
`programmed to recognize that Smith's right eye was read by
`
`
`
`er's license numbers, full name and date of birth, passport
`
`
`
`
`
`the system-i.e., that a biometric identification-emergency
`
`numbers, etc.
`
`(BIDE) was entered. Rather than reject the BID as invalid,
`
`
`[0042] By use of a physical description of an authorized
`
`
`the A1M computer could then cause the system to notify the
`
`
`
`
`user (e.g., an identified customer) stored either at the ATM
`
`
`
`nearest police station that the person withdrawing the cash
`
`
`
`
`or the bank's processor, the ATM computer could also send
`
`
`
`
`is under duress. Notification of the authorities can be accom­
`
`
`
`
`a description of the customer to the police, thus assisting in
`
`
`
`plished through the use of a telephone dialer with a pre­
`
`
`
`the identification of the customer and thereby the robber.
`
`
`
`recorded message or a "silent" alarm, similar to a jewelry
`
`
`
`Further, A1M 12a may be connected via a data link 31 to a
`
`
`
`
`store's or a bank's burglar alarm. Police could then have
`
`
`low light camera or videorecorder 35 or sound recording
`
`
`
`
`
`"real-time" notice that a crime is in progress. Further, an
`
`
`system 37, which will be described in more detail in
`
`
`ATM 12 of the exemplary embodiment may incorporate
`
`reference to FIGS. 8 and 9.
`
`
`
`
`
`various devices to prevent criminals from detecting what
`
`
`biometric represents a BID vs. a BIDE. For example, an
`[0043] FIG. 3 illustrates A1M 12b being connected
`
`
`
`ATM 12 may incorporate a shield or hood, etc., over a
`
`
`
`directly to a bank's processor 26b. ATM 12b further includes
`
`
`
`
`fingerprint scanner or an eye scanner, making it impossible
`
`
`
`
`a controller 24 for controlling the external devices of the
`
`
`
`for an eavesdropper to see which eye, finger, etc., a user
`
`
`ATM, and a communication device 28 such as a telephone
`
`submitted for a BID.
`
`
`
`
`dialer with a prerecorded message. The controller 24 may be
`
`communicatively coupled to the processor 26b via a data
`
`
`[0038] FIGS. 2-4 illustrate an ATM duress system of the
`
`
`
`
`link 25. The bank's processor 26b can perform the BIDE
`
`exemplary embodiment. Such an ATM can take two different
`
`
`
`validation process, which will be described in more detail
`
`
`forms. The ATM could have its own separate processor, or
`
`with reference to FIGS. 5-8 and 11.
`
`
`it could be directly linked to a bank's processor.
`[0044] Upon determination that a BIDE has been recog­
`
`
`[0039] FIG. 2 illustrates ATM 12a that may have its own
`
`
`
`
`nized, the processor 26b, via a data link 27, may inform the
`
`
`
`
`
`processor 26a (e.g., an integrated circuit microprocessor), a
`
`
`communication device 28 to contact the appropriate authori­
`
`
`
`
`memory 27 (e.g., ROM, flash memory, hard disk, etc.), a
`
`
`
`
`ties. For example, a telecommunication dialer, via a data link
`
`
`
`controller 24 for controlling the external devices of the
`
`
`29 (phone line, etc.) could contact the police department's
`
`
`ATM, and a communication device 28 such as a telephone
`
`
`
`
`dispatch center's telephone or computer system 30, thereby
`
`
`
`
`dialer with a prerecorded message, all of which may be
`
`
`
`discreetly informing the police that a duress transaction is
`
`
`interconnected by a system bus. Memory 27 may include
`
`occurring. Communication device 28 can send a pre-re­
`
`
`
`
`more than one physical element, and may also include: an
`
`
`
`
`corded message to the police indicating the location of the
`
`
`
`operating system for processor 26a; an emergency response
`
`
`
`duress transaction and the name of the individual under
`
`
`
`routine (i.e., a set of instructions executable by a processor,
`
`
`
`duress. Further, ATM 12b may be connected via a data link
`
`
`
`
`
`typically stored in memory); a BID/BIDE comparison rou­
`
`
`
`31 to a low light camera or videorecorder 35 or sound
`
`
`
`
`
`tine, a fund limiting routine; a transaction delay routine, and;
`
`
`recording system 37, which will be described in more detail
`
`
`BID and BIDE values. This particular configuration is not
`
`in reference to FIGS. 8 and 9.
`
`
`
`
`
`
`crucial to the functioning of the present invention. For
`
`
`example, the system could be implemented by a device
`[0045] FIG. 4 illustrates an alternate embodiment of a
`
`
`
`
`
`
`without a system bus and having a memory and processor
`
`
`
`system wherein ATM 12b is connected directly to the bank's
`
`
`
`
`processor 26b. ATM 12b further includes a controller 24 for
`
`
`
`
`contained in one integrated circuit. Further, those skilled in
`
`
`
`
`the art will appreciate that many of the elements described
`
`
`
`controlling the external devices of the ATM. The controller
`26b
`
`
`
`in this exemplary embodiment are functional entities that
`
`
`24 may be communicatively coupled to the processor
`
`
`via a data link 31. The bank's processor 26b performs the
`
`
`
`may be implemented as discrete components or in conjunc­
`
`
`
`
`
`tion with other components, in any suitable combination and
`
`
`
`
`BIDE validation process, which will be described in more
`location.
`
`
`detail with reference to FIGS. 5-7.
`
`IPR2022-00602
`Apple EX1037 Page 12
`
`

`

`US 2004/0015450 Al
`
`Jan.22,2004
`
`4
`
`[0046] Upon determination that a BIDE has been recog­
`
`her eye, finger, etc. for recognition, generally indicated as
`
`
`
`
`nized, the processor 26b, via a data link 33, may send an
`
`
`
`step 50. A computer may then attempt to verify the BID at
`
`
`alarm signal with the appropriate information, via data link
`
`
`step 55. If the received biometric value is a customer's
`
`
`
`33, to a computer console 36 at a remote location. A
`
`
`
`
`
`
`correct BID, the transaction could then proceed as usual, as
`
`
`
`
`computer operator 38 monitoring the computer console 36
`shown at step 60.
`
`
`
`
`could then notify or contact the appropriate authorities, such
`[0052] Upon failure of the BID, the ATM computer may
`
`
`
`
`
`as police department 30. Further, ATM 12b may be con­
`
`
`
`
`set a flag indicating a failed identification and attempt to
`
`
`
`nected via a data link 31 to an event recorder such as a low
`
`
`
`
`verify the biometric value as the customer's BIDE, as shown
`
`
`
`light camera, a videorecorder 35, or sound recording system
`
`
`
`at step 65. If the ATM computer verifies the scanned
`
`
`
`
`37, which will be described in more detail in reference to
`
`
`
`
`
`biometric value as the customer's BIDE and the access flag
`
`FIGS. 8 and 9.
`
`
`
`
`is set, then the computer may cause a signal to be sent to alert
`[0047] Referring now to FIG. 5, the general BIDE method
`
`
`
`
`the authorities, as shown at step 70, and then continue
`
`
`
`
`of the exemplary embodiment 10 is illustrated. This method
`
`
`
`processing the transaction. If the computer does not verify
`
`
`is accomplished by adding to the Customer's Information
`
`
`the customer's biometric value as either a BID or BIDE,
`
`
`
`
`File in the ATM system, an additional "duress BID" or
`
`
`
`
`then the ATM computer could continue with ordinary failed
`
`
`BIDE. (A Customer's Information File is the file which
`
`
`access procedures, as shown at step 80.
`
`
`keeps the information relevant to an individual customer's
`[0053] By storing a second biometric value as the BIDE of
`
`
`
`
`
`
`accounts at the bank where the customer does business.)
`
`
`
`a customer, some problems associated with ATM security
`
`
`[0048] The BIDE process, such as using an alternate eye,
`
`
`
`
`and alarms may be solved. For example, even with a gun in
`
`
`
`
`palm, or finger, or an action taken in combination with a
`
`
`
`a customer's back, a criminal would not know whether a
`
`
`BID, may be chosen by a customer, so that it can be easily
`
`
`normal BID or a BIDE has been used. Once a BIDE has been
`
`
`
`remembered by the customer and not confused by the
`
`
`
`
`verified, the system, using a silent alarm similar to a jewelry
`
`
`
`
`customer with that customer's regular BID procedure. Thus,
`
`
`store's or a bank's burglar alarm, could immediately alert
`
`
`
`
`
`if the customer's regular BID procedure is to use the left eye,
`
`
`
`
`the nearest police station that a robbery was in progress, and
`
`
`the BIDE procedure could be to use the customer's right eye.
`
`
`
`
`police could be dispatched to the scene, providing a "real­
`
`
`Further, the BID and BIDE need not even be of the same
`
`time" response to the crime.
`
`
`biometric type. For example, a BID may be the left eye,
`[0054] FIG. 6 illustrates an expanded flow chart of FIG.
`
`
`
`
`
`while the corresponding BIDE may be the right index finger.
`
`
`
`5. After an access number has been entered, as shown at step
`
`
`Other biometric combinations, such as voice recognition
`
`
`
`50, and a BIDE verified, as shown at step 65, the silent alarm
`
`
`BID and body measurement BIDE, may also be used.
`
`
`
`or distress call could be triggered, as shown at step 70. The
`
`
`
`
`
`Further, with a retinal scanner as a biometric reader, a BIDE
`
`
`system can then cause various actions to occur.
`
`
`
`could be made by a user's rapidly blinking his eyes (or
`
`
`
`
`blinking his eyes in another unusual manner) while submit­
`[0055] For example, the whole transaction could be
`
`
`
`ting an otherwise normal BID. With such an embodiment,
`
`
`
`slowed down, as shown at step 90, i.e., the entire transaction
`
`
`
`storing a BIDE could be simpler because the BIDE could
`
`
`
`process could be delayed such that the system takes longer
`
`
`
`
`consist of BIDs already recorded for users with the addition
`
`
`
`to dispense cash. In this manner, the notified authorities
`
`
`of a routine stored in memory 27 for adding one or more
`
`
`
`
`could have more time to respond to the distress signal than
`
`
`
`blinking patterns. In other words, a BIDE could be repre­
`
`
`
`they would ordinarily. The slowed transaction could take
`
`
`
`
`sented by a normal BID in combination with an eye-blinking
`
`
`
`several forms. The system could at first refuse the request
`
`
`
`
`pattern that is either selected by a user or by the user's bank
`
`
`and give out a false "out of service" message or "Error­
`
`or financial institution.
`
`
`
`
`Please try again" message. The customer could be required
`
`
`
`[0049] As another alternative, a user could trigger a BIDE
`
`
`to restart the transaction. The system could merely stall for
`
`
`
`
`by actuating a pressure-sensitive switch or other sensor that
`
`
`time by slowing down the generation of user instruction
`
`
`is incorporated into the normal BID reader. For example, the
`
`
`
`screens and then giving a "Transaction in Progress" mes­
`
`
`
`user could exert pressure on a lens of a fingerprint scanner
`
`
`sage. Ultimately, the system could dispense cash (that might
`
`
`
`
`or a headrest or other structure associated with a retinal
`
`
`
`
`
`
`be debited to the person's account or not, depending on the
`
`scanner. Such an activation could be made to be undetect­
`
`
`
`system's administrator), so that the robber does not become
`
`
`
`able to anyone but the user submitting a BID or BIDE. As
`
`
`agitated and harm the user.
`
`
`
`
`used here, the tern "pressure

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket