`(12) Patent Application Publication (10) Pub. No.: US 2003/0023882 A1
`(43) Pub. Date:
`Jan. 30, 2003
`Udom
`
`US 2003OO23882A1
`
`(54) BIOMETRIC CHARACTERISTIC SECURITY
`SYSTEM
`(76) Inventor: Charlie Udom, Albany, OR (US)
`Correspondence Address:
`HEWLETTPACKARD COMPANY
`Intellectual Property Administration
`P.O. BOX 272400
`Fort Collins, CO 80527-2400 (US)
`(21) Appl. No.:
`09/917,013
`(22) Filed:
`Jul. 26, 2001
`Publication Classification
`
`(51) Int. Cl." ....................................................... H04L 9/32
`
`(52) U.S. Cl. ............................................ 713/202; 382/115
`
`(57)
`
`ABSTRACT
`
`A Security System using biometric characteristics avoids lost
`data identifiers and lost physical keys. A biometric Scanner,
`Such as a capacitive fingerprint Scanner, coupled to the
`processor of a personal digital assistant or cellular telephone,
`wirelessly transmits data representing the biometric charac
`teristic using the Bluetooth protocol. By using a well known
`data communications protocol, Such as the Bluetooth pro
`tocol, wireleSS acceSS devices that rely upon biometric
`characteristics, preclude reliance upon passwords, PIN num
`bers, keys and other indicia used to establish authorization
`of a user and can function as universally accepted access
`keys.
`
`START
`
`
`
`SCAN
`FNGER
`
`
`
`
`
`204
`-
`
`CONVERT
`SCAN
`MAGE
`
`
`
`2O6
`
`READ DATA
`
`208
`
`SEARCH
`DATABASE
`FORMATCH
`
`SUBSTANTIAL
`MATCH FOUND
`
`
`
`
`
`
`
`DENIAL
`OR
`ERROR MSG
`
`
`
`212
`
`214
`
`OPEN/ENABLE
`ACCESS
`
`200
`
`Page 1 of 8
`
`GOOGLE EXHIBIT 1011
`
`
`
`Patent Application Publication
`
`Jan. 30, 2003 Sheet 1 of 2
`
`US 2003/0023882 A1
`
`
`
`Page 2 of 8
`
`
`
`Patent Application Publication Jan. 30, 2003 Sheet 2 of 2
`
`US 2003/0023882 A1
`
`START
`
`SCAN
`FINGER
`
`
`
`202
`
`
`
`204
`
`
`
`CONVERT
`SCAN
`MAGE
`
`
`
`
`
`208
`
`READ DATA
`
`SEARCH
`DATABASE
`FOR MATCH
`
`
`
`
`
`
`
`SUBSTANTIAL
`MATCH FOUND
`P
`
`
`
`
`
`
`
`DENAL
`OR
`ERROR MSG
`
`212
`
`214
`
`OPEN/ENABLE
`ACCESS
`
`200
`
`Page 3 of 8
`
`
`
`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`BIOMETRIC CHARACTERISTIC SECURITY
`SYSTEM
`
`BACKGROUND OF THE INVENTION
`0001. Security systems are used to control access to real
`property (cars, real estate etc.) as well intangible property
`(bank accounts, data files, etc.) Prior art Security Systems
`typically rely on either a Secret identifier (password, pass
`phrase, personal identification number or “PIN”) or a physi
`cal device (a mechanical key or electronic key card or Smart
`card) or both (an identifier and a device) in order to control
`who is granted access.
`0002 Security systems that rely upon an identifier (i.e. a
`password, pass phrase, or PIN) typically suffer from the
`drawback that a user must be able to provide the identifier.
`If the user loses or forgets the identifier, the user is denied
`access and/or usage. Security Systems that rely upon a
`physical device Suffer from the drawback that keys, key
`cards and Smart cards are frequently lost or Stolen thereafter
`precluding a legitimate user's access.
`0.003
`Instead of passwords or keys, biometric character
`istics (e.g., finger prints, retinal scans and voice “prints'),
`which uniquely identify an individual, can be effectively
`used to reliably identify an individual and do not suffer from
`the aforementioned drawbacks of electronic Security Sys
`tems that use identifiers or physical devices. Security Sys
`tems that use biometric characteristics are better than SyS
`tems that use an identifier or a device in that an authorized
`user presumably never loses his or her finger prints, retinas
`or voice characteristics.
`
`SUMMARY OF THE INVENTION
`0004. A security system controls access to goods and
`Services, computer files, bank accounts, or physical areas,
`using a biometric-characteristic Scanner coupled to a com
`puter, which is in turn coupled to a wireleSS communications
`device to provide a simple, reliable access/entry mechanism.
`In one embodiment of the invention, a fingerprint Scanner
`coupled to a personal digital assistant (PDA), which is in
`turn coupled to a so-called “Bluetooth’-compliant wireless
`data link, provides a wireleSS Security System access device.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0005 FIG. 1 shows a simplified block diagram of a
`Security System comprised of a Security acceSS device
`employing a biometric Scanner and a wireleSS data link.
`0006 FIG.2 shows a simplified flow chart of the steps of
`the method by which a biometric characteristic can be used
`to control access to a Secured area or resource.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`0007 FIG. 1 shows a simplified block diagram of an
`electronic security system 100 comprised of a wireless
`biometric-characteristic-Sensing Security device 102 in com
`bination with a wireless base station 103. The security
`System 100 can be used to control access to property (e.g.,
`cars, real property) and Services as well as resources Such as
`computer data, bank accounts, and the like. The Security
`device 102 relies upon biometric characteristics to grant or
`deny access and therefore does not require a user to remem
`
`ber any Sort of password nor does it require the user to have
`possession of any Sort of physical device Such as key or
`Smart card.
`0008. The biometric characteristic security device 102 is
`comprised of a biometric characteristic Scanner 106, the
`output of which 106A is coupled to a processor 104. The
`output 111 of the processor 104, is coupled to the input of a
`wireless communications device 108. In a preferred embodi
`ment, the processor 104 is implemented using the processor
`of a personal digital assistant or "PDA" but which also has
`an input data port 107 through which data Signals (such as
`those from a biometric scanner 106 described hereinafter)
`can be sent and received.
`0009 Predetermined-format data signals that are gener
`ated in (or originate from) a biometric Scanner 106 and are
`coupled into the PDA processor (i.e. CPU) via a data and
`control bus 110 (hereafter “data bus 110”). The PDA pro
`ceSSor output port 111 enables data Signals from the Scanner
`106, which have been processed by the CPU 104, to be sent
`to and from the wireless data transmitter 108 via an address
`and control buS 112. Data and program instructions that are
`executed by the processor 104 of the PDA are stored in, and
`accessed from, a memory device 105, typically implemented
`as a random access memory (RAM) or read only memory
`(ROM), electrically erasable programmable read only
`memory (EEPROM) device or other memory devices, vari
`ous embodiments of which are well-known to those skilled
`in the art.
`0010. In a preferred embodiment, the biometric charac
`teristic Scanner (also sometimes referred to as a “sensor'
`106 is a capacitive fingerprint Sensor available from at least
`Veridicom, Inc. of Santa Clara, Calif. the specifications of
`which are available at the time of filing this application at
`www.veridicom.com. The terminology “biometric scanner”
`is used herein to refer to devices that can electronically read
`or "scan a particular biological (bio-) measurable (metric)
`characteristic Such as a finger print pattern, retinal pattern, or
`a “voice print” pattern. A finger print, retina and the audio
`frequency components of a voice are all biometric charac
`teristics that can be used to identify an individual.
`0011. At the time of filing this application, biometric
`Scanners (or Sensors) are also available from Ethentica, Inc.
`of Aliso, Viejo, Calif. Ethentica's product specifications and
`other data about tactile fingerprint Sensors are available on
`the Ethentica website at www.ethentica.com. Still other
`types of biometric sensors 106 would include retinal scan
`ners and Voice recognition devices, which, among other
`things, can identify the distinctive frequency components
`and waveforms of an individual’s spoken Voice.
`0012. In the preferred embodiment, a fingerprint sensor,
`(such as the Veridicom model FPS 110 sensor) provides a
`relatively high resolution "image' of the peaks and Valleys
`of an individual's fingerprint using a matrix of parallel plate
`capacitors, one plate of each of which is formed by a users
`finger tip surface and the other one of which is one of 90,000
`or more “plates” formed on the finger print sensor. When an
`individual places his finger on the Sensor, the finger acts as
`one of the plates of a dual plate capacitor. The other plate is
`formed on the Silicon chip containing an array of capacitor
`plates.
`0013. According to data provided by Veridicom on its
`web site as of the filing date of this application, the Veridi
`
`Page 4 of 8
`
`
`
`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`com devices are capable of Sensing finger print character
`istics at a relatively high resolution of 500 dots per inch. The
`Veridicom module can create a raster-Scanned image of the
`ridges and Valleys of the finger pressed against the chip. The
`raster Scan image data is converted by the Veridicom device
`to a Video signal that is represented by 8 bit digital words,
`which can be read by the central processing unit 104 via the
`address and control bus 110. The 8 bit words representing a
`raster can be even further processed, Such as by computing
`a one-or-more byte checksum, to even further compress or
`truncate the Volume of data required to represent a biometric
`characteristic.
`0.014.
`In one embodiment, the process of verifying an
`individual's identity and authorizing that perSon to have
`access to a Secure resource (e.g., a bank account, computer
`data, automobile, or other valuable intangible or tangible
`property item), the software within the CPU 104 compares
`data from the sensor 106 that represents a scanned biometric
`characteristic, to either data or data templates Stored for
`various individuals in memory 105. (The term “data tem
`plates' refers to compressed, modeled, Sampled or other
`truncation of raw Scanner data, which can be Stored in
`Smaller amounts of memory than would be required to Store
`the raw data of a Scan, yet reliably identify an individual
`notwithstanding its truncation. For purposes of this disclo
`Sure and in particular, claim construction, “data” and “data
`templates' and truncated data representing a biometric char
`acteristic are all considered to be equivalents of each other.)
`If after comparing the data from the sensor 106 to stored data
`or data templates of biometric characteristics of authorized
`individuals, the software within the processor 104 rejects the
`access attempt, the individual identified by the data from the
`sensor 106 is denied access. If the biometric data from the
`sensor 106 substantially matches data of an authorized
`individual, that perSon is granted access by the base Station
`103 authorizing the person to access the Secured asset. In
`FIG. 1, the base station 103 is shown as including a solenoid
`128 that can be used to lock or unlock a physically Secured
`asset. Instead of a solenoid 128, the base station 103 might
`also enable or disable access to computer accounts or data
`files.
`0.015. In some instances, a stored representation of a
`biometric characteristic might not identically match a con
`temporaneously obtained Sample. By way of example, an
`injury might preclude an exact match of a finger print image
`from a Scanner to a stored Sample thereof. In Such instances,
`Software that measures the correspondence between a con
`temporaneous Sample and a Stored Sample must evaluate the
`degree, or amount by which the two images differ. One
`method by which images could be compared is a pixel-by
`pixel comparison. The acceptable number or level of differ
`ences between a Stored representation of a biometric char
`acteristic and a characteristic just read is a design choice. In
`Some instances where maximum Security is required, a
`100% correspondence might be necessary. In other
`instances, a reasonable certainty of identification might be
`considered to be tolerable. Methods to compare a Scanned
`biometric characteristic to a stored or archived characteristic
`are known in the art.
`0016. In the embodiment wherein the wireless security
`device 102 makes the determination that a user is authorized
`(by performing a comparison set forth above) the processor
`104 forwards an appropriate data Signal via an address and
`
`control bus 112 to a radio frequency (RF) modulator/
`transmitter 108 for broadcast to a corresponding security
`system comprised of a receiver 120, a CPU 122 and corre
`sponding memory 124 and an access control device 126.
`Examples of Signals that indicate that the Security device
`102 has made an identification by comparing biometric data
`Scanned from an individual to biometric stored within the
`device 102 include, but are not limited to, single or multibyte
`data messages transmitted by the device 102 that might or
`might not be encrypted prior to transmission. By way of
`example, if a user's thumb print Substantially matches a
`Stored print of an authorized perSon, a predetermined data
`word is transmitted from the wireless security device 102 to
`the base station 103. Upon receipt of the data word signal,
`the base Station can effectuate access to the Secured resource
`or property as set forth below. If on the other hand an
`individual's finger print does not match, a similar denial or
`rejection data message can be sent to the base Station 103.
`0017. In another embodiment of the invention, the Secu
`rity device 102 acts only as a biometric characteristic
`collector and forwarder. Data from the Scanner 106 is read
`by the CPU 104 and sent to the RF modulator 108 for
`transmission to the base station 103. The data transmitted
`from the security device 102 to the base station 103 can
`include, but is not limited to: raw Scan data from the Scanner
`106; data representing the raster Scan of the image from the
`scanner 106; truncated or otherwise compressed forms of
`either the raw data or raster data. Upon receipt of the data by
`the base station 103, the base station 103 performs the
`process of validating a user by comparing Scanned charac
`teristics to Stored characteristics. A comparison of Scanned
`characteristics to Stored characteristics can be performed in
`the base Station Such that a determination of the user's
`identity is assured. Data that represents a Scanned biometric
`characteristic (or that a person has been determined to be
`authorized by the security device 102) is preferably
`encrypted by the processor 104, prior to transmission, So as
`to preclude the Surreptitious interception of Sensitive iden
`tification data.
`0018. In yet another embodiment, the biometric security
`device 102 first obtains a biometric characteristic of an
`individual from the biometric scanner 106. The raw scan
`data is processed by the CPU 104 using one or more
`processes, Such as those Set forth above or otherwise known
`to those skilled in the art, to render a truncated numeric
`representation of the biometric characteristic. The measured
`biometric characteristic as represented by the numeric rep
`resentation is then compared by the processor 104 to
`numeric representations of biometric characteristics of one
`or more individuals who are authorized to access a resource
`or area, which are stored in local memory 105 of the
`biometric security device 102. Upon the processor's 104
`determination that the first numeric representation of a
`biometric characteristic of an individual attempting access is
`the same as, or at least Substantially the same as one or more
`representations stored in memory 105 of individuals who are
`in fact authorized, the biometric security device 102 trans
`mits a message from the transmitter 108, Signaling that it has
`made a determination of the person's identity. In addition to
`transmitting a message Signaling the identity determination,
`the biometric Security device also transmits an authenticator
`(also considered to be or referred to in the claims as an
`“identifier”) for the biometric security device itself, which
`uniquely identifies the biometric Security device to the
`
`Page 5 of 8
`
`
`
`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`controller or base station 103. In Such an embodiment, the
`base station 103 does not allow access unless the biometric
`characteristic is determined to be that of an authorized
`individual, and, the identity of the biometric device 102 as
`established by its authenticator is determined to be valid.
`0019. An authenticator for the security device 102 can
`include an encrypted or unencrypted Serial number of the
`device 102 stored in memory 105. An authenticator for the
`device 102 can also include an electronic identifying code
`word, analogous to electronic Serial numbers and or mobile
`identification numbers Stored in and used by cellular tele
`phones and wireleSS pagers. Authenticators can be Stored in
`memory 105 or electrically programmed into local or on
`chip memory of the processor 104. Electronic authentication
`data can also be encrypted in memory. The transmission of
`the authenticator can also be encrypted prior to transmission.
`0020. If the biometric security device makes a determi
`nation that a biometric characteristic at least Substantially
`matches a Stored representation for one or more individuals,
`and either before or after transmitting Such a determination,
`it includes the device's authenticator, both of these pieces of
`data can be used to determine that an individual is autho
`rized, and, the determination of the individuals authorization
`was made by an authorized Security device. The Security
`device 102 can transmit its authenticator to the base station
`or controller, with a signal representing that an identification
`of the person has also been made. The base station 103 can
`then determine whether the security device 102 that sent the
`authenticator was authorized and accept or reject the puta
`tive determination that the person is authorized to have
`access. A benefit to having the Security device 102 authen
`ticate itself to the base station 103 or other security control
`ler is that resource acceSS grants can be further controlled by
`disabling the ability of certain devices 102 from being used
`to gain access.
`0021 With respect to the biometric security device 102,
`the modulator/transmitter 108 is preferably a radio trans
`mitter device compliant with the Bluetooth communications
`protocol, the details of which are available from the “Blue
`tooth' website, www.Bluetooth.com. The Bluetooth TM com
`munications protocol is a wireleSS communications device
`connection protocol that enables various wireleSS commu
`nications devices (computers, phones and other devices) to
`communicate with each other using globally available radio
`frequencies ensuring Worldwide compatibility. The Blue
`tooth technology is a product of a joint effort between 3Com,
`Erickson, Intel, IBM, Lucent, Microsoft, Motorola, Nokia
`and Toshiba. Several hundred other manufacturers are
`expected to adopt or comply with the Bluetooth communi
`cations protocol, the details of which are available on the
`Bluetooth.com website.
`0022 Bluetooth essentially provides a short range stan
`dardized communications protocol for use with wireleSS
`devices. By using the Bluetooth communications protocol,
`signals from the modulator/transmitter 108 can be trans
`ferred to a Security or access control device the function of
`which is to control access to assets Such as bank accounts,
`computer files, or physical access to real property assets. In
`addition to the Bluetooth protocol however, infrared signals
`can also be used to wirelessly transfer data between the
`security device 102 and the base station 103.
`0023. In using Bluetooth, as shown in FIG. 1, signals
`from the modulator/transmitter unit 108 of the security
`
`device 102 are received at a radio receiver 120, demodul
`lated, and forwarded to a computer or other processor 122
`for analysis.
`0024. Upon the determination that the biometric charac
`teristic (fingerprint, retinal Scan, or voice print among oth
`ers) matches (or at least Substantially matches) a stored
`parameter, the control System computer 122 might provide
`access to a controlled area or resource by energizing a lock
`mechanism or other Security device 128 through an appro
`priate control circuit 126 as shown in FIG. 1.
`0025 FIG. 2 shows a simplified block diagram of pro
`cess steps 200 that might be employed in a biometric
`characteristic Security System. With respect to the apparatus
`shown in FIG. 1, the first step of the process shown in FIG.
`2 requires that a fingerprint or other biometric characteristic
`be scanned or measured in step 202. In the preferred
`embodiment, a fingerprint Scan is achieved using the devices
`disclosed above. Other biometric Scanning embodiments
`would require the Scanning of retinal patterns or images.
`Still other embodiments would employ voice recognition
`using Fourier analysis of Voice Samples, the purpose or
`purposes of which is to render a reasonably unique numeric
`representation of an individual.
`0026. In step 204, a fingerprint image is converted or
`processed to create a Video image represented by a Series of
`8 bit words that can be read by a computer as shown in Step
`206. Once data that is read in step 206 is ready for process
`ing and further analysis, it becomes only a matter of pro
`cessing power to Search database records (in either the PDA
`or base station) as shown in step 208 for a reasonable match
`or correspondence between the read data from step 206 to
`determine if a match is previously stored.
`0027 Step 208 presumes that a database of authorized
`individuals was created by reading biometric characteristics
`and Storing them in an appropriate Storage medium. By way
`of example, individuals to whom access to a computer file
`is to be granted, might have their fingerprints Scanned for
`archival purposes and Stored in a database for Subsequent
`retrieval.
`0028. In step 210, the characteristics of the scanned
`fingerprint as compared to those in the database are tested
`for correspondence and as shown in Step 210, if no corre
`spondence is found program control might loop back to the
`fingerprint Scanning Step 202 or to an error message Step 212
`which might be used to inform a user that his request for
`acceSS or authorize was denied.
`0029. In the event that a substantial match is found, the
`process shown in FIG. 2 can grant Such acceSS as shown in
`Step 214 by opening a lock, granting access to a computer,
`bank account or whatever resource or property value is
`being protected. With respect to 210, the reference to a
`“substantial match” refers to the possibility that image data
`from a fingerprint Scan or a retinal Scan might not match
`exactly with representative Samples that were previously
`obtained and Stored in a database for Subsequent retrieval. In
`many instances, dirt or impurities on a Sensor Surface,
`injuries to a perSons fingerprint or other artifacts of the
`Scanning process might preclude an exact match between a
`Scanned image and a Stored image. As a design choice, a
`System user might require a certain numerical correspon
`dence between Scanned images and Stored images and
`accept as reliable, images that do not correspond to each
`other at 100%.
`
`Page 6 of 8
`
`
`
`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`0030. With respect to FIG. 1, it should be noted that the
`radio signal broadcast from the modulator/transmitter 108 is
`preferably compliant with the so called Bluetooth standard.
`In order to further Secure the integrity of the data broadcasts
`from the transmitter 108, such data might be encrypted prior
`to transmission Such that a Surreptitious interception does
`not compromise the System Security by those who might
`capture the Signal, Store it, and replay it at a later time for
`unauthorized access.
`0.031
`Encrypting data representing a Scanned image, and
`encrypting authenticators for the Security device 102 is
`preferably performed by the CPU 104 using any appropriate
`encryption method. Encryption techniques are beyond the
`Scope of this disclosure and not germane to and understand
`ing of the disclosure hereof. In an application where a
`wireleSS Security device Sends acceSS control Signals and
`device authenticators using a well known communications
`Standard, Such as the Bluetooth Standard, Some form of
`transmitted data protection would be almost a necessity.
`Accordingly, decryption of an encrypted Signal from the
`base station 103 would of course need to take place inside
`the processor 104 prior to its comparison to its Stored
`biometric characteristics.
`0.032 Those skilled in the art will recognize that in
`addition to a capacitive fingerprint Sensor, the biometric
`Scanner 106 could just as well include a retinal Scanner or
`Voice recognition System. Moreover, in addition to using a
`central processing unit from a personal digital assistant,
`processor 104 might just as well be comprised of a cellular
`telephone or other two-way radio communications device
`Such as a two-way radio or a two-way pager.
`0.033
`For purposes of claim construction, a personal
`digital assistant, cellular telephone, or wireless two-way
`radio and its associated included processor are considered to
`be equivalent embodiments. All provide at least a modicum
`of computational capability by which Signals from a Scanner
`106 can be read and processed. After Such processing,
`(including encryption) the Signals are transferred via a data
`bus to an RF transmission unit 108. Those skilled in the art
`will also recognize that in addition to or instead of a radio
`frequency transmitter, the modulator/transmitter might also
`be comprised of an infrared modulator by which the data
`Signals from the processor 104 can be broadcast using
`infrared signals.
`0034. By use of the foregoing method and apparatus,
`readily available biometric Sensors can be used to reliably
`identify a perSon or perSons and wirelessly transmit signals
`by which Such individuals can gain access to Secured areas,
`computer files, databases, bank accounts and other forms of
`property which heretofore might be protected using pass
`words, personal identification numbers or electric or
`mechanical keys. In using biometric characteristics, that are
`unique to an individual, lost or forgotten passwords, PIN
`numbers, and keys no longer restrict access to resources,
`easing and Simplifying Security for a variety of applications
`and instances.
`
`What is claimed is:
`1. A biometric Security device comprised of:
`a biometric Scanner having an output data port;
`a processor having an input data port coupled to Said data
`output port of Said biometric Scanner and further having
`an output data port;
`
`a data transmitter having an input port coupled to the
`output port of Said processor device.
`2. The biometric security device of claim 1 wherein said
`biometric Scanner is a finger print Scanner.
`3. The biometric security device of claim 1 further includ
`ing a memory coupled to Said processor and having Stored
`therein at least one of: an identifier for said biometric
`Security device and data representing a biometric character
`istic of at least one individual.
`4. The biometric security device of claim 1 wherein said
`biometric data transmitter is a Bluetooth protocol-compliant
`transmitter.
`5. The biometric security device of claim 3 wherein said
`biometric data transmitter is a Bluetooth protocol-compliant
`transmitter.
`6. The biometric security device of claim 1 wherein said
`processor is a personal digital assistant.
`7. The biometric security device of claim 1 wherein said
`biometric data transmitter is an infrared transmitter.
`8. A security device comprised of:
`a biometric Scanner, that is capable of obtaining a first
`biometric characteristic,
`a memory having Stored therein a Second biometric char
`acteristic,
`a processor coupled to Said biometric Scanner and Said
`memory; and
`a data transmitter coupled to Said processor which trans
`mits a signal indicating that a person has been Substan
`tially identified from said first and second biometric
`characteristics.
`9. A security device comprised of:
`a biometric Scanner, that is capable of obtaining a first
`biometric characteristic,
`a memory having Stored therein a Second biometric char
`acteristic and an identifier for the Security device;
`a processor coupled to Said biometric Scanner and Said
`memory; and
`a data transmitter coupled to Said processor which trans
`mits at least one of Said identifier and a signal indicat
`ing that a perSon has been identified from Said first and
`Second biometric characteristics.
`10. A biometric security device comprised of:
`a personal digital assistant device having a processor
`coupled to an image Scanner to obtain a first biometric
`characteristic and further having a memory coupled to
`Said processor that Stores a Second biometric charac
`teristic therein;
`a data transmitter having an input port coupled to the
`Second output data port.
`11. The biometric security device of claim 10 further
`including a memory coupled to Said processor which Stores
`an authenticator for Said personal digital assistant.
`12. The biometric security device of claim 10 wherein
`Said image Scanner is a capacitive finger Scanner.
`13. The biometric security device of claim 10 wherein
`Said data transmitter is a Bluetooth protocol-compliant trans
`mitter.
`
`Page 7 of 8
`
`
`
`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`14. A biometric security device comprised of:
`a capacitive finger-print Scanner having an output data
`port,
`a processor coupled to Said capacitive finger print Scanner
`to obtain a first biometric characteristic,
`a memory coupled to Said processor,
`a data transmitter coupled to and responsive to Said
`processor.
`15. The biometric security device of claim 14 wherein
`Said capacitive finger-print Scanner is a finger print Scanner
`that generates a numerical representation of a finger-print of
`an individual.
`16. The biometric security device of claim 14 wherein
`Said transmitter is at least one of an infrared transmitter and
`a radio frequency transmitter.
`17. A biometric security device comprised of:
`a retinal image Scanner that obtains a first biometric
`characteristic,
`a memory Storing an identifier for Said biometric Security
`device;
`a personal digital assistant having a processor coupled to
`Said retinal image Scanner and to Said memory;
`a radio frequency data transmitter coupled to Said pro
`CCSSO.
`18. A biometric security device comprised of:
`a retinal image Scanner having a first data output port;
`a processor having a data input port coupled to Said first
`data output port and further having a Second data output
`port,
`a biometric data transmitter having an input port coupled
`to Said Second data output port.
`19. A method of controlling access to an area using
`biometric characteristics of individuals comprised of
`Scanning a biometric characteristic of an individual;
`generating a numeric representation of Said biometric
`characteristic,
`modulating Said numeric representation onto a radio fre
`quency (RF) Signal;
`transmitting Said RF signal to a radio receiver for analysis.
`20. A method of controlling access to an area using
`biometric characteristics of individuals comprised of
`obtaining a first biometric characteristic of an individual;
`generating a first numeric representation of Said first
`biometric characteristic,
`
`comparing Said first numeric representation to a Second
`numeric representation of a biometric characteristic of
`an individual authorized to have access to Said area;
`upon the determination that Said first numeric represen
`tation is at least Substantially the same as Said Second
`numeric representation, modulating Said first numeric
`representation onto a radio frequency (RF) Signal;
`transmitting Said RF signal to a radio receiver for analysis.
`21. The method of claim 20 wherein said step of obtaining
`a first biometric characteristic is comprised of the Step of
`optically Scanning a first biometric characteristic.
`22. A method of controlling access to an area using
`biometric characteristics of individuals comprised of
`obtaining a first biometric characteristic of an individual;
`generating a first numeric representation of Said first
`biometric characteristic,
`modulating Said first numeric representation onto a radio
`frequency (RF) signal;
`transmitting Said RF signal to a radio receiver for
`demodulation;
`after demodulating Said RF signal, comparing Said first
`numeric representation to a Second numeric represen
`tati