throbber
US007110580B2
`
`(12) United States Patent
`BOstrom
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,110,580 B2
`Sep. 19, 2006
`
`(54) DISTRIBUTED BIOMETRIC ACCESS
`CONTROL METHOD AND APPARATUS
`
`Primary Examiner Vikkram Bali
`(74) Attorney, Agent, or Firm Nixon Peabody, LLP
`
`(75) Inventor: Susan J. Bostrom, San Antonio, TX
`(US)
`(73) Assignee: NextgenID, Inc., San Antonio, TX (US)
`(*) Notice:
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`(21) Appl. No.: 10/384,070
`
`(22) Filed:
`
`Mar. 10, 2003
`
`(65)
`
`Prior Publication Data
`US 2004/OO36574 A1
`Feb. 26, 2004
`
`(51) Int. Cl.
`(2006.01)
`G06K 9/00
`(52) U.S. Cl. ........................ 382/124; 382/118; 382/116
`(58) Field of Classification Search ........ 382/115-119,
`382/124-127; 902/3–6: 235/380,382,382.5;
`713/182, 186: 340/5.2, 5.53, 5.1, 5.8, 5.83
`See application file for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`4,993,068 A * 2/1991 Piosenka et al. ............ T13, 186
`5,802,199 A * 9/1998 Pare et al. .................. 382,115
`6, 160,903 A * 12/2000 Hamid et al. ............... 382,115
`6,496,595 B1* 12/2002 Puchek et al. .............. 382,124
`* cited by examiner
`
`
`
`(57)
`
`ABSTRACT
`
`The present invention is directed to an access control
`apparatus and method. Enrollment is conducted at a cen
`tralized server and enrollment data, Such as identification
`data is downloaded to plural local access units at respective
`entrances to a restricted area. The local access units then
`collect data of a person upon an attempted entry in to the
`area and compare the data with downloaded enrollment data
`to determine if the person is authorized for access. If the
`person is authorized, an access control device is operated to
`open a door, gate, or the like of the entrance. The enrollment
`data can be primary biometric data or primary and secondary
`biometric data, said secondary biometric data can be col
`lected at the local access units. If a secondary type of
`biometric data is collected at the local access units and is
`correlated to data stored on the local access unit, data of the
`same type is compared to the downloaded data for access
`control. The primary enrollment data can be non-environ
`mentally affected data, Such as fingerprint parameter data
`and the secondary type of data can be environmentally
`affected data, Such as facial parameter data. In cases where
`the primary biometric data does not correspond to stored
`primary biometric data, secondary biometric data can be
`collected and authenticated and new primary biometric data
`collected for potential addition to a user's primary biometric
`enrollments.
`
`4 Claims, 4 Drawing Sheets
`
`IPR2022-00602
`Apple EX1042 Page 1
`
`

`

`U.S. Patent
`U.S. Patent
`
`Sep. 19, 2006
`Sep. 19, 2006
`
`Sheet 1 of 4
`Sheet 1 of 4
`
`US 7,110,580 B2
`US 7,110,580 B2
`
`PTTTT 7
`|
`
`09
`
`|
`|
`|
`|
`|
`
`||
`
`4
`
`|
`lo
`|
`|
`
`o9
`
`!

`ows
`|

`om: oN
`= |

`LL. i
`\
`!
`i
`re
`_ {
`|
`ow td
`{
`|
`-
`
`Louw __I
`i
`\
`=
`|
`=
`x
`
`&
`
`oo”
`
`IPR2022-00602
`Apple EX1042 Page 2
`
`IPR2022-00602
`Apple EX1042 Page 2
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 2 of 4
`
`US 7,110,580 B2
`
`
`
`
`
`
`
`A
`
`FG. 2
`
`Collect
`Biometric
`Parameters
`
`
`
`Enter
`Corresponding
`Data
`
`All
`Enrollment
`Finished 2
`
`C
`
`DOWnload
`Enrollment Data i
`to label ACCess
`Terminals
`
`N-D
`
`End
`
`E
`
`IPR2022-00602
`Apple EX1042 Page 3
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 3 of 4
`
`US 7,110,580 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`ex
`
`Collect
`Biometric Parameters
`of Approaching
`PerSOn
`
`A
`
`B
`
`Compare Collected
`Parameters with
`Templates
`
`
`
`E
`
`C
`No
`
`Scan
`Fingerprint
`
`dentified
`Yes -D
`AllOW
`Compare Collected
`ACCeSS
`Parameters with Templates
`
`F
`
`H
`
`G
`
`ldentified NO i-Alarm
`Yes
`
`Collect
`Facial Parameters
`
`J
`
`Store Template
`
`K
`
`AllOW
`Access
`
`IPR2022-00602
`Apple EX1042 Page 4
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 4 of 4
`
`US 7,110,580 B2
`
`F.G. 4
`
`Error image
`Au-Assembly? No-Data & Return
`Yes
`to Operation
`
`
`
`C
`
`--
`
`B
`
`Server
`
`Send
`Messages & Alarm
`
`Save & Send
`Image Data
`
`
`
`
`
`Display
`Image Data
`
`IPR2022-00602
`Apple EX1042 Page 5
`
`

`

`1.
`DISTRIBUTED BOMETRIC ACCESS
`CONTROL METHOD AND APPARATUS
`
`RELATED APPLICATION DATA
`
`This application is related to U.S. patent application Ser.
`No. 10/215,950 filed Aug. 12, 2002, the disclosure of which
`is herby incorporated by reference. This application is also
`related to U.S. patent application Ser. No. 09/574,001 filed
`May 19, 2000, now U.S. Pat. No. 6,496,595 the disclosure
`of which is herby incorporated by reference.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The invention relates to automated systems for permitting
`authorized persons to access secured buildings or other areas
`while preventing Such access by unauthorized persons. More
`particularly, the invention relates to an access control system
`that uses biometric parameters to identify authorized persons
`and to permit access by the authorized persons.
`2. Description of the Related Art
`The invention relates to restricting access into a restricted
`area and thus the term “access', as used herein, refers to
`physical entry into a building, or other restricted area.
`However, the restricted area can be the exterior of a building
`or the like and thus the invention can be applied to control
`ling entry or exit out of a building or other area. There have
`always been situations in which it was desirable to restrict
`access to certain physical areas to a select person or group
`of people. Such restricted access has been accomplished by
`fences, walls, locks and other barriers. However, even the
`use of barriers has not prevented unauthorized access.
`Accordingly, it has been necessary in many instances to
`provide human Surveillance in the form of a security guard
`at an entrance to an area or through the use of video cameras
`or the like to transmit images to a security guard at a remote
`or centralized location. Of course, the use of security guards
`and video cameras can become expensive and is only as
`reliable as the particular guard and his state of alertness at
`any particular time.
`The complexities of modern society have only served to
`increase the need for access control. For example, many
`government agencies and contractors work on matters that
`are of a confidential or even “top secret” nature. In fact, most
`workplaces, such as offices, warehouses, and even retail
`stores in Some instances, have a need to implement access
`control to prevent the theft of intellectual property and/or
`goods.
`In response to the need for access control, many govern
`ment agencies and businesses have issued identification
`cards to their employees and other authorized personnel.
`Often, the identification card includes a picture of the
`authorized person. However, such an identification card still
`requires a security guard or other personnel for Verification.
`Also, Such cards are easily forged by replacing the picture
`with that of an unauthorized person. To overcome these
`limitations, it is known to provide the employee with a
`personal identification number (PIN) or other identifying
`code. The identifying code can be encoded in a magnetic
`strip or the like in a security card and read by an automated
`reader at an entrance to grant access only to persons having
`the card. Alternatively, the code can be entered by the user
`on a keypad to gain access. However, the use of identifying
`codes also has drawbacks in access control applications. In
`particular, the identification card can be stolen or the user
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 7,110,580 B2
`
`2
`can be forced under duress to reveal their code. In such
`cases, unauthorized possessors of the card or code can gain
`access to a restricted area.
`The use of biometrics has been proposed as a solution to
`the limitations noted above. Generally, the term “biomet
`rics' refers to the study of measurable biological character
`istics, i.e. biometric parameters, of a living being. In the
`context of security, “biometrics' refers to techniques that
`rely on a unique, measurable characteristic of a living being
`for automatically recognizing or verifying identity.
`Examples of biometric parameters are facial data, retinal
`data, fingerprint data, speech data, and the like.
`Generally, biometric systems operate in the following
`manner. First, a system captures a sample of at least one
`biometric parameter during an “enrollment process. The
`parameters are then converted by the system into a math
`ematical code, i.e., data, that is stored as the biometric
`template representing measured biometric parameters for
`that person. There may also be a way to correlate the
`template to the person. For example, a personal identifica
`tion number (PIN) can be given to an enrolled user, which
`is entered to access the template. A new biometric sample is
`then taken and compared to the template or to a group of
`templates. If one of the templates and the new sample match,
`the person is recognized as authorized. Central to a biomet
`ric system is the “engine' which processes the biometric
`data in accordance with various algorithms or artificial
`neural networks.
`Some biometric systems use “identification' methods and
`some use “verification' methods. In identification systems,
`a sample is presented to the biometric system and the system
`then attempts to find out who the sample belongs to by
`comparing the sample with a plurality of templates obtained
`through enrollment. Verification systems on the other hand
`perform a one-to-one process where the biometric system is
`seeking to Verify identity. A single biometric sample is
`matched against a single template obtained during enroll
`ment. If the two match, the system effectively confirms that
`the person actually is who he presents himself to be. The key
`difference between these two approaches centers on the
`logic addressed by the biometric system and how these fit
`within a given application. Identification systems decide
`who the person is and can check whether more than one
`matching biometric template exists. Accordingly, identifica
`tion systems can deny access to an individual who is
`attempting to pass himself off with more than one identity.
`Verification, on the other hand only decides if the person is
`who he says he is. Accordingly, identification systems are
`more versatile and powerful. However, verification systems
`generally require less processing horsepower and thus are
`commonly used.
`In typical biometric access control systems, biometric
`sensors are placed, proximate entrances and are linked to a
`central computer having biometric "enrollment data, i.e.,
`templates, representing biometric parameters of authorized
`users collected from a central enrollment station. If the
`biometric parameter collected at the entrance matches a
`template stored in the central computer, access is granted.
`However, conventional biometric systems have several limi
`tations. In particular, the sensing accuracy of biometric
`parameters, such as facial parameters, retinal parameters,
`and the like is highly dependent on the environment in which
`the parameters are sensed. For example, the lighting inten
`sity, angle and color will affect sensing of biometric param
`eters. Accordingly, the ability to reliably match data repre
`senting parameters collected at an entrance with data of
`templates collected during enrollment is limited, especially
`
`IPR2022-00602
`Apple EX1042 Page 6
`
`

`

`3
`when the entrance is an external entrance where the weather,
`season, and time of day will affect lighting significantly.
`Also, sensing biometric parameters, converting the param
`eters to data, communicating the data to a central computer,
`and comparing the data parameters with templates of enroll
`ment data in the central computer is relatively time consum
`ing, even with modern high speed computers and commu
`nication links. Accordingly, such systems present significant
`inconveniences to the authorized persons through improp
`erly rejected access and time delays prior to granting access.
`The use of less environmentally affected biometric param
`eters, such as fingerprint parameters can alleviate Some of
`the problems noted above. However, sensing Such param
`eters requires that the person desiring access make physical
`contact with a sensor. Such as a fingerprint Scanner, upon
`each entry request. Also, Such parameters are easily affected
`by skin debris, and skin blemishes. Therefore, the person
`desiring access may have to wipe off their finger, not to
`mention remove any gloves, prior to Submitting to the
`physical contact with the sensor. The match tolerance
`between a template and data corresponding to a measured
`parameter can be increased to minimize lockout of autho
`rized users. However, Such an approach inherently reduces
`the accuracy and effectiveness of the system by increasing
`the likelihood of allowing access to unauthorized users.
`U.S. Pat. No. 5,802,199 attempts to solve the issue of slow
`response in biometric identification systems by transmitting
`a subset of templates obtained through enrollment from a
`central computer to one of plural “local computers. If the
`user attempts to use an ATM terminal that corresponds to the
`“local” computer, identification is accomplished by collec
`tion of biometric data and a PIN number and by comparison
`with templates in the “local computer. If a matching
`template and PIN number is not in the “local computer,
`35
`biometric identification is accomplished in the central com
`puter by transmitting collected data over a remote commu
`nication link.
`U.S. Pat. No. 5,802,199 relates to identification for allow
`ing use of ATM terminals and not for access control as
`defined herein. The practical communications of access
`control and ATM use control are quite different. For
`example, the “local computers disclosed in U.S. Pat. No.
`5,802,199 are apparently not at the location of biometric
`sampling, i.e. the ATM terminal. It appears that plural ATM
`45
`terminals are assigned to each local computer because of the
`inherent geographic distribution of ATM terminals. The
`“local computers are actually centralized computers.
`Accordingly, the system disclosed in U.S. Pat. No. 5,802,
`199 is not suitable for high speed access control which
`generally requires high speed identification within a rela
`tively small geographic area, such as a single building or
`campus. Also, since enrollment is conducted centrally, i.e.
`not at the site of the ATM terminal, environmental variables
`will affect the accuracy of identification. Finally, this system
`requires that two separate things be recognized, the biomet
`ric sample parameters and a PIN number entered by the user.
`U.S. Pat. No. 5,903.225 discloses an access control sys
`tem in which data is encoded on a card during an enrollment
`procedure in correspondence to the person’s fingerprint.
`When attempting to gain access to a restricted area, a
`transmitter on the card transmits the data to a receiver at the
`entrance to grant access. This system apparently does not
`implement biometric recognition or identification and thus
`has the same limitations as conventional access systems
`using magnetic cards. In particular, whoever possesses the
`card is granted access regardless of their identity.
`
`4
`U.S. Pat. No. 4,993,068 discloses an access system in
`which the enrollment procedure includes recording biomet
`ric data on a card to be carried by the user and comparing the
`data on the card with data of biometric parameters measured
`at the entrance. This system is inherently a verification
`system and thus is not as flexible as an identification system
`for the reasons discussed above. Also, since enrollment is
`conducted at a central location, sensing of parameters upon
`access can be affected by the environment at the entrance.
`Accordingly, the accuracy of this system is limited.
`
`SUMMARY OF THE INVENTION
`
`It is an object of the invention to overcome the limitations
`of the known systems described above.
`It is an object of the invention to maximize the speed of
`biometric identification access control.
`It is another object of the invention to maximize the
`accuracy of biometric identification access control.
`It is another object of the invention to minimize the
`inconvenience and obtrusiveness of biometric identification
`access control.
`It is another object of the invention to minimize the effect
`of environmental variables in biometric identification access
`control.
`It is another object of the invention to clearly indicate any
`security anomaly in a biometric identification access control
`system.
`A first aspect of this invention is an apparatus for con
`trolling access into an area. The apparatus comprises (1) a
`server including a server memory and a server data collec
`tion device; (2) a local access unit; (3) an access control
`device and (4) a communication channel. The server data
`collection device is configured to collect identification data.
`The local access unit is associated with an entrance to an
`area and includes a local memory, a local processor, a
`primary local biometric parameter sending device and at
`least one secondary biometric parameter sensing device, a
`local data collection device, and an access control device.
`The communication channel is used for downloading the
`identification data from the server to the local access unit.
`The local processor is operative to recognize an autho
`rized user by comparing primary biometric parameter data
`of a person proximate an entrance with primary biometric
`parameter data stored in the local memory. Access to the area
`is granted when the primary biometric parameter data of a
`person proximate the entrance and the primary biometric
`parameter data stored in the local memory correspond.
`The local processor is also operative to collect secondary
`biometric parameter data through the secondary biometric
`parameter sensing device when the primary biometric
`parameter data collected by the local primary biometric
`sensing device and the primary biometric parameter data
`stored in the local memory do not correspond. In this event,
`access to the area is granted when the secondary biometric
`parameter data collected by the local secondary biometric
`parameter sensing device and the secondary biometric
`parameter data stored in the local memory correspond.
`When the biometric parameter data collected by the local
`primary biometric parameter sensing device and the biomet
`ric parameter data stored in the local memory do not
`correspond and the secondary biometric parameter data
`collected by the local secondary biometric parameter sens
`ing device and the secondary biometric parameter data
`stored in the local memory correspond, the local processor
`is operative to prompt the user to provide a new biometric
`parameter data to the local primary biometric parameter
`
`US 7,110,580 B2
`
`10
`
`15
`
`25
`
`30
`
`40
`
`50
`
`55
`
`60
`
`65
`
`IPR2022-00602
`Apple EX1042 Page 7
`
`

`

`5
`sensing device and to store the new biometric parameter
`sensing device in correspondence with primary biometric
`parameter data stored in the local memory.
`A second aspect of the invention is an apparatus for
`controlling access to an area comprising a local processor
`that is operative to recognize an authorized user by com
`paring primary biometric parameter data of a person proxi
`mate the entrance with primary biometric parameter data
`corresponding to a plurality of users stored in the local
`memory. Access is granted if the primary biometric param
`eter data collected by the local primary biometric parameter
`sensing device and the stored primary biometric parameter
`data corresponding to any one of the plural users correspond.
`A third aspect of the invention is an apparatus for con
`trolling access to an area, comprising a local processor that
`is operative to recognize an authorized user by prompting a
`person proximate the entrance to enter identification data
`into the local data collection device, retrieving a subset of
`primary biometric parameter data corresponding to the iden
`tification data stored in the local memory, and comparing the
`primary biometric parameter data collected by the local
`primary biometric parameter sensing device with the Subset
`of primary biometric parameter data. Access to the area is
`granted when the primary biometric parameter data col
`lected by the local primary biometric parameter sensing
`device and the Subset of primary biometric parameter data
`correspond.
`A fourth aspect of the invention is an apparatus for
`controlling access to an area comprising a means for authen
`ticating a secondary biometric parameter data when the
`primary biometric parameter data collected by the local
`primary biometric parameter sensing device and the primary
`biometric parameter data stored in the local access unit do
`not correspond.
`A fifth aspect of the invention is a method of controlling
`access into an area comprising the steps of (1) recognizing
`an authorized user by comparing primary biometric param
`eter data of a person proximate the entrance collected by the
`local primary biometric parameter sensing device with pri
`mary biometric parameter data stored in the local memory,
`and granting access by operating the access control device if
`the primary biometric parameter data collected by the local
`primary biometric parameter sensing device and the primary
`biometric parameter data stored in the local access unit
`correspond; (2) prompting the person to enter secondary
`biometric parameter data through at least one secondary
`biometric parameter sensing device when the primary bio
`metric parameter data collected by the primary biometric
`parameter sensing device and the primary biometric param
`eter data stored in the local access unit do not correspond
`and granting access by operating the access control device
`when the secondary biometric parameter data of an autho
`rized person collected by the local secondary biometric
`parameter sensing device and the secondary biometric
`parameter data stored in the local memory correspond; and
`(3) prompting the person to provide additional primary
`biometric data through the primary biometric parameter
`sensing device and storing said additional primary biometric
`parameter data collected by the local primary biometric
`parameter sensing device in the local access unit when the
`primary biometric parameter data collected by the local
`primary biometric parameter sensing device and the primary
`biometric parameter data stored in the local access unit do
`not correspond and when the secondary biometric parameter
`data collected by the at least one local secondary biometric
`parameter sensing device and the secondary biometric
`parameter data stored in the local memory correspond.
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 7,110,580 B2
`
`5
`
`10
`
`15
`
`6
`A sixth aspect of the invention is a method wherein the
`recognizing step comprises comparing primary biometric
`parameter data of a person collected by the local primary
`biometric parameter sensing device with primary biometric
`parameter data corresponding to plural users stored in the
`local memory, and granting access to the area by operating
`the access control device if the primary biometric parameter
`data collected by the local primary biometric parameter
`sensing device and the primary biometric parameter data
`correspond.
`A seventh aspect of the invention is a method wherein the
`recognizing step comprises prompting a person proximate
`the entrance to enter identification data into the local data
`collection device, retrieving a Subset of primary biometric
`parameter data corresponding to the identification data
`stored in the local memory, comparing the primary biometric
`parameter data collected by the local primary biometric
`parameter sensing device with the Subset of primary bio
`metric parameter data, and granting access to the area when
`said primary biometric parameter data collected by said
`local primary biometric parameter sensing device and said
`Subset of primary biometric parameter data correspond.
`A eighth aspect of the invention is a method including the
`step of a system administrator authenticating the additional
`primary biometric parameter data collected by the local
`primary biometric parameter sensing device when the sec
`ondary biometric parameter data collected by the secondary
`biometric parameter sensing device and the secondary bio
`metric parameter data stored in the local memory corre
`spond, by comparing primary biometric parameter data
`collected during the primary enrollment procedure with the
`additional primary biometric parameter data collected by the
`local primary biometric parameter sensing device.
`
`BRIEF DESCRIPTION OF THE DRAWING
`
`The invention is described through a preferred embodi
`ment and the attached drawing in which:
`FIG. 1 is a block diagram of the architecture of an access
`control system of the preferred embodiment;
`FIG. 2 is a flow chart of the primary enrollment procedure
`of the preferred embodiment;
`FIG. 3 is a flow chart of the identification and secondary
`enrollment procedures of the preferred embodiment; and
`FIG. 4 is a flow chart of the anomaly enunciation proce
`dure.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`FIG. 1 illustrates the system architecture of a preferred
`embodiment of the invention. Biometric access control
`system 20 includes server 40, plural local access units 60,
`and communications channel 80. Server 40 and local access
`units 60 can each include microprocessor based digital
`computers as described in detail below. In the preferred
`embodiment, communications channel 80 is a local area
`network (LAN) such as an Ethernet network communicating
`over a coaxial cable or unshielded twisted pair (UTP).
`However, communication channel 80 can be any type of
`communication channel using cables, radio frequency trans
`mission, optical transmission over fibers, infrared transmis
`Sion, or any other wired or wireless communication mode
`capable of providing the communication described herein.
`Any communications protocols and transmission medium
`can be used. For example, communication channel 80 can be
`the Internet and each computer can have a separate IP
`
`IPR2022-00602
`Apple EX1042 Page 8
`
`

`

`US 7,110,580 B2
`
`10
`
`15
`
`7
`address. Also, communication channel 80 can be accom
`plished merely by physically moving a removable recording
`medium, Such as a diskette, between server 40 and access
`terminals 60: a channel sometimes referred to as "sneaker
`net’.
`Server 40 is a digital microprocessor based computer,
`Such as a personal computer, a minicomputer, a program
`mable logic controller, or any other proprietary or non
`proprietary device capable of accomplishing the processing
`and communication functions described below. Server 40
`includes central processing unit (CPU) 42, memory device
`44 (Such as a magnetic hard drive), random access memory
`(RAM) 46, input device 48 (such as a keyboard and mouse),
`display 50, microphone 52, speaker 54, biometric parameter
`sensing device 56, a data bus (not illustrated) for providing
`communications between the various components and the
`appropriate interfaces for each component (also not illus
`trated). Biometric parameter sensing device 56 serves to
`collect identification data during an enrollment procedure, as
`described below, and can be of any type, such as a finger
`print Scanner, a camera for sensing facial parameters, a
`retinal scanner, or the like. For the sake of discussion of the
`preferred embodiment, it is assumed herein that biometric
`parameter sensing device 56 is a facial recognition camera
`or a fingerprint Scanner capable of sensing parameters
`relating to a persons fingerprint. Server 40 has a control
`program stored on memory device 44 that includes instruc
`tions for accomplishing the functions described below. The
`control program of server 40 also includes a biometric
`engine such as that described in U.S. Pat. No. 5,386,103, the
`disclosure of which is incorporated herein by reference.
`Local access unit 60 also is a digital microprocessor based
`computer, such as a personal computer, a minicomputer, a
`programmable logic controller, or any other proprietary or
`non-proprietary device capable of accomplishing the pro
`cessing and communication functions described below. Only
`one local access unit 60 is illustrated in detail and discussed
`in detail below. However, each local access unit is similar
`and thus the description below applies to each local access
`unit 60. Local access unit 60 includes central processing unit
`(CPU) 62, memory device 64 (such as a magnetic hard
`drive), random access memory (RAM) 66, input device 68
`(such as a keypad), display 70, microphone 72, speaker 74,
`biometric parameter sensing device 76 (serving as an aux
`iliary biometric parameter sensing device), biometric param
`45
`eter sensing device 77, access control device 78 (such as a
`lock Solenoid, gate, or the like), a data bus (not illustrated)
`for providing communications between the various compo
`nents, and the appropriate interfaces for each component
`(not illustrated). Biometric parameter sensing device 76
`preferably is of the same type, i.e. senses the same biometric
`parameters, as biometric parameter sensing device 56 of
`server 40, a fingerprint scanner or facial recognition camera
`in the preferred embodiment. Biometric parameter sensing
`device 77 can be of any type but is preferably of a different
`type, i.e. senses different biometric parameters, than bio
`metric parameter sensing device 76. In the preferred
`embodiment, biometric parameter sensing device 77 is a
`camera for sensing facial parameters.
`Each local access unit 60 has a control program stored in
`memory device 64 that includes instructions for accomplish
`ing the functions described below. The control programs of
`local access units 60 also include a biometric engine, Such
`as that described in U.S. Pat. No. 5,386,103. Each local
`access unit 60 can include access panel 60a (including input
`device 68, display 70, microphone 72, speaker 74, biometric
`parameter sensing device 76, biometric parameter sensing
`
`55
`
`8
`device 77, and access control device 78) and controller 60b
`(including CPU 62, memory device 64, and RAM 66).
`Access panel 60a and controller 60b can be housed sepa
`rately. However, it will become apparent below that access
`panel 60a and controller 60b preferably are located in close
`proximity to one another. The number of physical enclosures
`associated with local access unit 60 can vary as is required
`by the particular application and entrance.
`Server 40 can be disposed at any location in the building
`or other area to which access control system 20 is being
`applied or at a remote location. Also, server 40 can be any
`one of plural computers coupled to a network or can be
`embodied by plural computers on the network each con
`ducting a different portion of the function of server 40. For
`example, the enrollment procedure disclosed below can be
`conducted on one computer and the anomaly monitoring
`functions disclosed below can be conducted by another
`computer with the two computers together constituting
`server 40. Local access units 60 are associated with the
`respective doors or other entrances of the building or other
`area to which access control system 20 is applied. Typically,
`access panels 60a are located just outside the doorframe and
`controllers 60b are located inside an entrance to the building
`or other area to prevent tampering therewith. However,
`controllers 60b are preferably located close enough to
`respective access panels 60a to allow local communications
`through a serial port, parallel port, Universal Serial Bus
`(USB) port or the like.
`FIG. 2 illustrates the primary enrollment procedure of the
`preferred embodiment in which persons are authorized for
`access. A person to be allowed access to the area controlled
`by system 20 is brought to an enrollment location proximate
`server 40. Biometric parameters are sensed by biometric
`parameter sensing device 56 of server 40 in step A. Prefer
`ably, both fingerprint and facial parameters are collected
`during the primary enrollment procedure. The collection of
`fingerprint parameters is accomplished by placing the finger
`of the person on a sensing Surface of biometric parameter
`sensing device 56 and selecting appropriate menu choices
`di

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket