throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2003/0023882 A1
`(43) Pub. Date:
`Jan. 30, 2003
`Udom
`
`US 2003OO23882A1
`
`(54) BIOMETRIC CHARACTERISTIC SECURITY
`SYSTEM
`(76) Inventor: Charlie Udom, Albany, OR (US)
`Correspondence Address:
`HEWLETTPACKARD COMPANY
`Intellectual Property Administration
`P.O. BOX 272400
`Fort Collins, CO 80527-2400 (US)
`(21) Appl. No.:
`09/917,013
`(22) Filed:
`Jul. 26, 2001
`Publication Classification
`
`(51) Int. Cl." ....................................................... H04L 9/32
`
`(52) U.S. Cl. ............................................ 713/202; 382/115
`
`(57)
`
`ABSTRACT
`
`A Security System using biometric characteristics avoids lost
`data identifiers and lost physical keys. A biometric Scanner,
`Such as a capacitive fingerprint Scanner, coupled to the
`processor of a personal digital assistant or cellular telephone,
`wirelessly transmits data representing the biometric charac
`teristic using the Bluetooth protocol. By using a well known
`data communications protocol, Such as the Bluetooth pro
`tocol, wireleSS acceSS devices that rely upon biometric
`characteristics, preclude reliance upon passwords, PIN num
`bers, keys and other indicia used to establish authorization
`of a user and can function as universally accepted access
`keys.
`
`START
`
`
`
`SCAN
`FNGER
`PRINT
`
`
`
`
`
`204
`-
`
`CONVERT
`SCAN
`MAGE
`
`
`
`2O6
`
`READ DATA
`
`208
`
`SEARCH
`DATABASE
`FORMATCH
`
`SUBSTANTIAL
`MATCH FOUND
`
`
`
`
`
`
`
`DENIAL
`OR
`ERROR MSG
`
`
`
`212
`
`214
`
`OPEN/ENABLE
`ACCESS
`
`200
`
`Page 1 of 8
`
`GOOGLE EXHIBIT 1011
`
`

`

`Patent Application Publication
`
`Jan. 30, 2003 Sheet 1 of 2
`
`US 2003/0023882 A1
`
`
`
`Page 2 of 8
`
`

`

`Patent Application Publication Jan. 30, 2003 Sheet 2 of 2
`
`US 2003/0023882 A1
`
`START
`
`SCAN
`FINGER
`PRINT
`
`
`
`202
`
`
`
`204
`
`
`
`CONVERT
`SCAN
`MAGE
`
`
`
`
`
`208
`
`READ DATA
`
`SEARCH
`DATABASE
`FOR MATCH
`
`
`
`
`
`
`
`SUBSTANTIAL
`MATCH FOUND
`P
`
`
`
`
`
`
`
`DENAL
`OR
`ERROR MSG
`
`212
`
`214
`
`OPEN/ENABLE
`ACCESS
`
`200
`
`Page 3 of 8
`
`

`

`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`BIOMETRIC CHARACTERISTIC SECURITY
`SYSTEM
`
`BACKGROUND OF THE INVENTION
`0001. Security systems are used to control access to real
`property (cars, real estate etc.) as well intangible property
`(bank accounts, data files, etc.) Prior art Security Systems
`typically rely on either a Secret identifier (password, pass
`phrase, personal identification number or “PIN”) or a physi
`cal device (a mechanical key or electronic key card or Smart
`card) or both (an identifier and a device) in order to control
`who is granted access.
`0002 Security systems that rely upon an identifier (i.e. a
`password, pass phrase, or PIN) typically suffer from the
`drawback that a user must be able to provide the identifier.
`If the user loses or forgets the identifier, the user is denied
`access and/or usage. Security Systems that rely upon a
`physical device Suffer from the drawback that keys, key
`cards and Smart cards are frequently lost or Stolen thereafter
`precluding a legitimate user's access.
`0.003
`Instead of passwords or keys, biometric character
`istics (e.g., finger prints, retinal scans and voice “prints'),
`which uniquely identify an individual, can be effectively
`used to reliably identify an individual and do not suffer from
`the aforementioned drawbacks of electronic Security Sys
`tems that use identifiers or physical devices. Security Sys
`tems that use biometric characteristics are better than SyS
`tems that use an identifier or a device in that an authorized
`user presumably never loses his or her finger prints, retinas
`or voice characteristics.
`
`SUMMARY OF THE INVENTION
`0004. A security system controls access to goods and
`Services, computer files, bank accounts, or physical areas,
`using a biometric-characteristic Scanner coupled to a com
`puter, which is in turn coupled to a wireleSS communications
`device to provide a simple, reliable access/entry mechanism.
`In one embodiment of the invention, a fingerprint Scanner
`coupled to a personal digital assistant (PDA), which is in
`turn coupled to a so-called “Bluetooth’-compliant wireless
`data link, provides a wireleSS Security System access device.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0005 FIG. 1 shows a simplified block diagram of a
`Security System comprised of a Security acceSS device
`employing a biometric Scanner and a wireleSS data link.
`0006 FIG.2 shows a simplified flow chart of the steps of
`the method by which a biometric characteristic can be used
`to control access to a Secured area or resource.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`0007 FIG. 1 shows a simplified block diagram of an
`electronic security system 100 comprised of a wireless
`biometric-characteristic-Sensing Security device 102 in com
`bination with a wireless base station 103. The security
`System 100 can be used to control access to property (e.g.,
`cars, real property) and Services as well as resources Such as
`computer data, bank accounts, and the like. The Security
`device 102 relies upon biometric characteristics to grant or
`deny access and therefore does not require a user to remem
`
`ber any Sort of password nor does it require the user to have
`possession of any Sort of physical device Such as key or
`Smart card.
`0008. The biometric characteristic security device 102 is
`comprised of a biometric characteristic Scanner 106, the
`output of which 106A is coupled to a processor 104. The
`output 111 of the processor 104, is coupled to the input of a
`wireless communications device 108. In a preferred embodi
`ment, the processor 104 is implemented using the processor
`of a personal digital assistant or "PDA" but which also has
`an input data port 107 through which data Signals (such as
`those from a biometric scanner 106 described hereinafter)
`can be sent and received.
`0009 Predetermined-format data signals that are gener
`ated in (or originate from) a biometric Scanner 106 and are
`coupled into the PDA processor (i.e. CPU) via a data and
`control bus 110 (hereafter “data bus 110”). The PDA pro
`ceSSor output port 111 enables data Signals from the Scanner
`106, which have been processed by the CPU 104, to be sent
`to and from the wireless data transmitter 108 via an address
`and control buS 112. Data and program instructions that are
`executed by the processor 104 of the PDA are stored in, and
`accessed from, a memory device 105, typically implemented
`as a random access memory (RAM) or read only memory
`(ROM), electrically erasable programmable read only
`memory (EEPROM) device or other memory devices, vari
`ous embodiments of which are well-known to those skilled
`in the art.
`0010. In a preferred embodiment, the biometric charac
`teristic Scanner (also sometimes referred to as a “sensor'
`106 is a capacitive fingerprint Sensor available from at least
`Veridicom, Inc. of Santa Clara, Calif. the specifications of
`which are available at the time of filing this application at
`www.veridicom.com. The terminology “biometric scanner”
`is used herein to refer to devices that can electronically read
`or "scan a particular biological (bio-) measurable (metric)
`characteristic Such as a finger print pattern, retinal pattern, or
`a “voice print” pattern. A finger print, retina and the audio
`frequency components of a voice are all biometric charac
`teristics that can be used to identify an individual.
`0011. At the time of filing this application, biometric
`Scanners (or Sensors) are also available from Ethentica, Inc.
`of Aliso, Viejo, Calif. Ethentica's product specifications and
`other data about tactile fingerprint Sensors are available on
`the Ethentica website at www.ethentica.com. Still other
`types of biometric sensors 106 would include retinal scan
`ners and Voice recognition devices, which, among other
`things, can identify the distinctive frequency components
`and waveforms of an individual’s spoken Voice.
`0012. In the preferred embodiment, a fingerprint sensor,
`(such as the Veridicom model FPS 110 sensor) provides a
`relatively high resolution "image' of the peaks and Valleys
`of an individual's fingerprint using a matrix of parallel plate
`capacitors, one plate of each of which is formed by a users
`finger tip surface and the other one of which is one of 90,000
`or more “plates” formed on the finger print sensor. When an
`individual places his finger on the Sensor, the finger acts as
`one of the plates of a dual plate capacitor. The other plate is
`formed on the Silicon chip containing an array of capacitor
`plates.
`0013. According to data provided by Veridicom on its
`web site as of the filing date of this application, the Veridi
`
`Page 4 of 8
`
`

`

`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`com devices are capable of Sensing finger print character
`istics at a relatively high resolution of 500 dots per inch. The
`Veridicom module can create a raster-Scanned image of the
`ridges and Valleys of the finger pressed against the chip. The
`raster Scan image data is converted by the Veridicom device
`to a Video signal that is represented by 8 bit digital words,
`which can be read by the central processing unit 104 via the
`address and control bus 110. The 8 bit words representing a
`raster can be even further processed, Such as by computing
`a one-or-more byte checksum, to even further compress or
`truncate the Volume of data required to represent a biometric
`characteristic.
`0.014.
`In one embodiment, the process of verifying an
`individual's identity and authorizing that perSon to have
`access to a Secure resource (e.g., a bank account, computer
`data, automobile, or other valuable intangible or tangible
`property item), the software within the CPU 104 compares
`data from the sensor 106 that represents a scanned biometric
`characteristic, to either data or data templates Stored for
`various individuals in memory 105. (The term “data tem
`plates' refers to compressed, modeled, Sampled or other
`truncation of raw Scanner data, which can be Stored in
`Smaller amounts of memory than would be required to Store
`the raw data of a Scan, yet reliably identify an individual
`notwithstanding its truncation. For purposes of this disclo
`Sure and in particular, claim construction, “data” and “data
`templates' and truncated data representing a biometric char
`acteristic are all considered to be equivalents of each other.)
`If after comparing the data from the sensor 106 to stored data
`or data templates of biometric characteristics of authorized
`individuals, the software within the processor 104 rejects the
`access attempt, the individual identified by the data from the
`sensor 106 is denied access. If the biometric data from the
`sensor 106 substantially matches data of an authorized
`individual, that perSon is granted access by the base Station
`103 authorizing the person to access the Secured asset. In
`FIG. 1, the base station 103 is shown as including a solenoid
`128 that can be used to lock or unlock a physically Secured
`asset. Instead of a solenoid 128, the base station 103 might
`also enable or disable access to computer accounts or data
`files.
`0.015. In some instances, a stored representation of a
`biometric characteristic might not identically match a con
`temporaneously obtained Sample. By way of example, an
`injury might preclude an exact match of a finger print image
`from a Scanner to a stored Sample thereof. In Such instances,
`Software that measures the correspondence between a con
`temporaneous Sample and a Stored Sample must evaluate the
`degree, or amount by which the two images differ. One
`method by which images could be compared is a pixel-by
`pixel comparison. The acceptable number or level of differ
`ences between a Stored representation of a biometric char
`acteristic and a characteristic just read is a design choice. In
`Some instances where maximum Security is required, a
`100% correspondence might be necessary. In other
`instances, a reasonable certainty of identification might be
`considered to be tolerable. Methods to compare a Scanned
`biometric characteristic to a stored or archived characteristic
`are known in the art.
`0016. In the embodiment wherein the wireless security
`device 102 makes the determination that a user is authorized
`(by performing a comparison set forth above) the processor
`104 forwards an appropriate data Signal via an address and
`
`control bus 112 to a radio frequency (RF) modulator/
`transmitter 108 for broadcast to a corresponding security
`system comprised of a receiver 120, a CPU 122 and corre
`sponding memory 124 and an access control device 126.
`Examples of Signals that indicate that the Security device
`102 has made an identification by comparing biometric data
`Scanned from an individual to biometric stored within the
`device 102 include, but are not limited to, single or multibyte
`data messages transmitted by the device 102 that might or
`might not be encrypted prior to transmission. By way of
`example, if a user's thumb print Substantially matches a
`Stored print of an authorized perSon, a predetermined data
`word is transmitted from the wireless security device 102 to
`the base station 103. Upon receipt of the data word signal,
`the base Station can effectuate access to the Secured resource
`or property as set forth below. If on the other hand an
`individual's finger print does not match, a similar denial or
`rejection data message can be sent to the base Station 103.
`0017. In another embodiment of the invention, the Secu
`rity device 102 acts only as a biometric characteristic
`collector and forwarder. Data from the Scanner 106 is read
`by the CPU 104 and sent to the RF modulator 108 for
`transmission to the base station 103. The data transmitted
`from the security device 102 to the base station 103 can
`include, but is not limited to: raw Scan data from the Scanner
`106; data representing the raster Scan of the image from the
`scanner 106; truncated or otherwise compressed forms of
`either the raw data or raster data. Upon receipt of the data by
`the base station 103, the base station 103 performs the
`process of validating a user by comparing Scanned charac
`teristics to Stored characteristics. A comparison of Scanned
`characteristics to Stored characteristics can be performed in
`the base Station Such that a determination of the user's
`identity is assured. Data that represents a Scanned biometric
`characteristic (or that a person has been determined to be
`authorized by the security device 102) is preferably
`encrypted by the processor 104, prior to transmission, So as
`to preclude the Surreptitious interception of Sensitive iden
`tification data.
`0018. In yet another embodiment, the biometric security
`device 102 first obtains a biometric characteristic of an
`individual from the biometric scanner 106. The raw scan
`data is processed by the CPU 104 using one or more
`processes, Such as those Set forth above or otherwise known
`to those skilled in the art, to render a truncated numeric
`representation of the biometric characteristic. The measured
`biometric characteristic as represented by the numeric rep
`resentation is then compared by the processor 104 to
`numeric representations of biometric characteristics of one
`or more individuals who are authorized to access a resource
`or area, which are stored in local memory 105 of the
`biometric security device 102. Upon the processor's 104
`determination that the first numeric representation of a
`biometric characteristic of an individual attempting access is
`the same as, or at least Substantially the same as one or more
`representations stored in memory 105 of individuals who are
`in fact authorized, the biometric security device 102 trans
`mits a message from the transmitter 108, Signaling that it has
`made a determination of the person's identity. In addition to
`transmitting a message Signaling the identity determination,
`the biometric Security device also transmits an authenticator
`(also considered to be or referred to in the claims as an
`“identifier”) for the biometric security device itself, which
`uniquely identifies the biometric Security device to the
`
`Page 5 of 8
`
`

`

`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`controller or base station 103. In Such an embodiment, the
`base station 103 does not allow access unless the biometric
`characteristic is determined to be that of an authorized
`individual, and, the identity of the biometric device 102 as
`established by its authenticator is determined to be valid.
`0019. An authenticator for the security device 102 can
`include an encrypted or unencrypted Serial number of the
`device 102 stored in memory 105. An authenticator for the
`device 102 can also include an electronic identifying code
`word, analogous to electronic Serial numbers and or mobile
`identification numbers Stored in and used by cellular tele
`phones and wireleSS pagers. Authenticators can be Stored in
`memory 105 or electrically programmed into local or on
`chip memory of the processor 104. Electronic authentication
`data can also be encrypted in memory. The transmission of
`the authenticator can also be encrypted prior to transmission.
`0020. If the biometric security device makes a determi
`nation that a biometric characteristic at least Substantially
`matches a Stored representation for one or more individuals,
`and either before or after transmitting Such a determination,
`it includes the device's authenticator, both of these pieces of
`data can be used to determine that an individual is autho
`rized, and, the determination of the individuals authorization
`was made by an authorized Security device. The Security
`device 102 can transmit its authenticator to the base station
`or controller, with a signal representing that an identification
`of the person has also been made. The base station 103 can
`then determine whether the security device 102 that sent the
`authenticator was authorized and accept or reject the puta
`tive determination that the person is authorized to have
`access. A benefit to having the Security device 102 authen
`ticate itself to the base station 103 or other security control
`ler is that resource acceSS grants can be further controlled by
`disabling the ability of certain devices 102 from being used
`to gain access.
`0021 With respect to the biometric security device 102,
`the modulator/transmitter 108 is preferably a radio trans
`mitter device compliant with the Bluetooth communications
`protocol, the details of which are available from the “Blue
`tooth' website, www.Bluetooth.com. The Bluetooth TM com
`munications protocol is a wireleSS communications device
`connection protocol that enables various wireleSS commu
`nications devices (computers, phones and other devices) to
`communicate with each other using globally available radio
`frequencies ensuring Worldwide compatibility. The Blue
`tooth technology is a product of a joint effort between 3Com,
`Erickson, Intel, IBM, Lucent, Microsoft, Motorola, Nokia
`and Toshiba. Several hundred other manufacturers are
`expected to adopt or comply with the Bluetooth communi
`cations protocol, the details of which are available on the
`Bluetooth.com website.
`0022 Bluetooth essentially provides a short range stan
`dardized communications protocol for use with wireleSS
`devices. By using the Bluetooth communications protocol,
`signals from the modulator/transmitter 108 can be trans
`ferred to a Security or access control device the function of
`which is to control access to assets Such as bank accounts,
`computer files, or physical access to real property assets. In
`addition to the Bluetooth protocol however, infrared signals
`can also be used to wirelessly transfer data between the
`security device 102 and the base station 103.
`0023. In using Bluetooth, as shown in FIG. 1, signals
`from the modulator/transmitter unit 108 of the security
`
`device 102 are received at a radio receiver 120, demodul
`lated, and forwarded to a computer or other processor 122
`for analysis.
`0024. Upon the determination that the biometric charac
`teristic (fingerprint, retinal Scan, or voice print among oth
`ers) matches (or at least Substantially matches) a stored
`parameter, the control System computer 122 might provide
`access to a controlled area or resource by energizing a lock
`mechanism or other Security device 128 through an appro
`priate control circuit 126 as shown in FIG. 1.
`0025 FIG. 2 shows a simplified block diagram of pro
`cess steps 200 that might be employed in a biometric
`characteristic Security System. With respect to the apparatus
`shown in FIG. 1, the first step of the process shown in FIG.
`2 requires that a fingerprint or other biometric characteristic
`be scanned or measured in step 202. In the preferred
`embodiment, a fingerprint Scan is achieved using the devices
`disclosed above. Other biometric Scanning embodiments
`would require the Scanning of retinal patterns or images.
`Still other embodiments would employ voice recognition
`using Fourier analysis of Voice Samples, the purpose or
`purposes of which is to render a reasonably unique numeric
`representation of an individual.
`0026. In step 204, a fingerprint image is converted or
`processed to create a Video image represented by a Series of
`8 bit words that can be read by a computer as shown in Step
`206. Once data that is read in step 206 is ready for process
`ing and further analysis, it becomes only a matter of pro
`cessing power to Search database records (in either the PDA
`or base station) as shown in step 208 for a reasonable match
`or correspondence between the read data from step 206 to
`determine if a match is previously stored.
`0027 Step 208 presumes that a database of authorized
`individuals was created by reading biometric characteristics
`and Storing them in an appropriate Storage medium. By way
`of example, individuals to whom access to a computer file
`is to be granted, might have their fingerprints Scanned for
`archival purposes and Stored in a database for Subsequent
`retrieval.
`0028. In step 210, the characteristics of the scanned
`fingerprint as compared to those in the database are tested
`for correspondence and as shown in Step 210, if no corre
`spondence is found program control might loop back to the
`fingerprint Scanning Step 202 or to an error message Step 212
`which might be used to inform a user that his request for
`acceSS or authorize was denied.
`0029. In the event that a substantial match is found, the
`process shown in FIG. 2 can grant Such acceSS as shown in
`Step 214 by opening a lock, granting access to a computer,
`bank account or whatever resource or property value is
`being protected. With respect to 210, the reference to a
`“substantial match” refers to the possibility that image data
`from a fingerprint Scan or a retinal Scan might not match
`exactly with representative Samples that were previously
`obtained and Stored in a database for Subsequent retrieval. In
`many instances, dirt or impurities on a Sensor Surface,
`injuries to a perSons fingerprint or other artifacts of the
`Scanning process might preclude an exact match between a
`Scanned image and a Stored image. As a design choice, a
`System user might require a certain numerical correspon
`dence between Scanned images and Stored images and
`accept as reliable, images that do not correspond to each
`other at 100%.
`
`Page 6 of 8
`
`

`

`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`0030. With respect to FIG. 1, it should be noted that the
`radio signal broadcast from the modulator/transmitter 108 is
`preferably compliant with the so called Bluetooth standard.
`In order to further Secure the integrity of the data broadcasts
`from the transmitter 108, such data might be encrypted prior
`to transmission Such that a Surreptitious interception does
`not compromise the System Security by those who might
`capture the Signal, Store it, and replay it at a later time for
`unauthorized access.
`0.031
`Encrypting data representing a Scanned image, and
`encrypting authenticators for the Security device 102 is
`preferably performed by the CPU 104 using any appropriate
`encryption method. Encryption techniques are beyond the
`Scope of this disclosure and not germane to and understand
`ing of the disclosure hereof. In an application where a
`wireleSS Security device Sends acceSS control Signals and
`device authenticators using a well known communications
`Standard, Such as the Bluetooth Standard, Some form of
`transmitted data protection would be almost a necessity.
`Accordingly, decryption of an encrypted Signal from the
`base station 103 would of course need to take place inside
`the processor 104 prior to its comparison to its Stored
`biometric characteristics.
`0.032 Those skilled in the art will recognize that in
`addition to a capacitive fingerprint Sensor, the biometric
`Scanner 106 could just as well include a retinal Scanner or
`Voice recognition System. Moreover, in addition to using a
`central processing unit from a personal digital assistant,
`processor 104 might just as well be comprised of a cellular
`telephone or other two-way radio communications device
`Such as a two-way radio or a two-way pager.
`0.033
`For purposes of claim construction, a personal
`digital assistant, cellular telephone, or wireless two-way
`radio and its associated included processor are considered to
`be equivalent embodiments. All provide at least a modicum
`of computational capability by which Signals from a Scanner
`106 can be read and processed. After Such processing,
`(including encryption) the Signals are transferred via a data
`bus to an RF transmission unit 108. Those skilled in the art
`will also recognize that in addition to or instead of a radio
`frequency transmitter, the modulator/transmitter might also
`be comprised of an infrared modulator by which the data
`Signals from the processor 104 can be broadcast using
`infrared signals.
`0034. By use of the foregoing method and apparatus,
`readily available biometric Sensors can be used to reliably
`identify a perSon or perSons and wirelessly transmit signals
`by which Such individuals can gain access to Secured areas,
`computer files, databases, bank accounts and other forms of
`property which heretofore might be protected using pass
`words, personal identification numbers or electric or
`mechanical keys. In using biometric characteristics, that are
`unique to an individual, lost or forgotten passwords, PIN
`numbers, and keys no longer restrict access to resources,
`easing and Simplifying Security for a variety of applications
`and instances.
`
`What is claimed is:
`1. A biometric Security device comprised of:
`a biometric Scanner having an output data port;
`a processor having an input data port coupled to Said data
`output port of Said biometric Scanner and further having
`an output data port;
`
`a data transmitter having an input port coupled to the
`output port of Said processor device.
`2. The biometric security device of claim 1 wherein said
`biometric Scanner is a finger print Scanner.
`3. The biometric security device of claim 1 further includ
`ing a memory coupled to Said processor and having Stored
`therein at least one of: an identifier for said biometric
`Security device and data representing a biometric character
`istic of at least one individual.
`4. The biometric security device of claim 1 wherein said
`biometric data transmitter is a Bluetooth protocol-compliant
`transmitter.
`5. The biometric security device of claim 3 wherein said
`biometric data transmitter is a Bluetooth protocol-compliant
`transmitter.
`6. The biometric security device of claim 1 wherein said
`processor is a personal digital assistant.
`7. The biometric security device of claim 1 wherein said
`biometric data transmitter is an infrared transmitter.
`8. A security device comprised of:
`a biometric Scanner, that is capable of obtaining a first
`biometric characteristic,
`a memory having Stored therein a Second biometric char
`acteristic,
`a processor coupled to Said biometric Scanner and Said
`memory; and
`a data transmitter coupled to Said processor which trans
`mits a signal indicating that a person has been Substan
`tially identified from said first and second biometric
`characteristics.
`9. A security device comprised of:
`a biometric Scanner, that is capable of obtaining a first
`biometric characteristic,
`a memory having Stored therein a Second biometric char
`acteristic and an identifier for the Security device;
`a processor coupled to Said biometric Scanner and Said
`memory; and
`a data transmitter coupled to Said processor which trans
`mits at least one of Said identifier and a signal indicat
`ing that a perSon has been identified from Said first and
`Second biometric characteristics.
`10. A biometric security device comprised of:
`a personal digital assistant device having a processor
`coupled to an image Scanner to obtain a first biometric
`characteristic and further having a memory coupled to
`Said processor that Stores a Second biometric charac
`teristic therein;
`a data transmitter having an input port coupled to the
`Second output data port.
`11. The biometric security device of claim 10 further
`including a memory coupled to Said processor which Stores
`an authenticator for Said personal digital assistant.
`12. The biometric security device of claim 10 wherein
`Said image Scanner is a capacitive finger Scanner.
`13. The biometric security device of claim 10 wherein
`Said data transmitter is a Bluetooth protocol-compliant trans
`mitter.
`
`Page 7 of 8
`
`

`

`US 2003/0023882 A1
`
`Jan. 30, 2003
`
`14. A biometric security device comprised of:
`a capacitive finger-print Scanner having an output data
`port,
`a processor coupled to Said capacitive finger print Scanner
`to obtain a first biometric characteristic,
`a memory coupled to Said processor,
`a data transmitter coupled to and responsive to Said
`processor.
`15. The biometric security device of claim 14 wherein
`Said capacitive finger-print Scanner is a finger print Scanner
`that generates a numerical representation of a finger-print of
`an individual.
`16. The biometric security device of claim 14 wherein
`Said transmitter is at least one of an infrared transmitter and
`a radio frequency transmitter.
`17. A biometric security device comprised of:
`a retinal image Scanner that obtains a first biometric
`characteristic,
`a memory Storing an identifier for Said biometric Security
`device;
`a personal digital assistant having a processor coupled to
`Said retinal image Scanner and to Said memory;
`a radio frequency data transmitter coupled to Said pro
`CCSSO.
`18. A biometric security device comprised of:
`a retinal image Scanner having a first data output port;
`a processor having a data input port coupled to Said first
`data output port and further having a Second data output
`port,
`a biometric data transmitter having an input port coupled
`to Said Second data output port.
`19. A method of controlling access to an area using
`biometric characteristics of individuals comprised of
`Scanning a biometric characteristic of an individual;
`generating a numeric representation of Said biometric
`characteristic,
`modulating Said numeric representation onto a radio fre
`quency (RF) Signal;
`transmitting Said RF signal to a radio receiver for analysis.
`20. A method of controlling access to an area using
`biometric characteristics of individuals comprised of
`obtaining a first biometric characteristic of an individual;
`generating a first numeric representation of Said first
`biometric characteristic,
`
`comparing Said first numeric representation to a Second
`numeric representation of a biometric characteristic of
`an individual authorized to have access to Said area;
`upon the determination that Said first numeric represen
`tation is at least Substantially the same as Said Second
`numeric representation, modulating Said first numeric
`representation onto a radio frequency (RF) Signal;
`transmitting Said RF signal to a radio receiver for analysis.
`21. The method of claim 20 wherein said step of obtaining
`a first biometric characteristic is comprised of the Step of
`optically Scanning a first biometric characteristic.
`22. A method of controlling access to an area using
`biometric characteristics of individuals comprised of
`obtaining a first biometric characteristic of an individual;
`generating a first numeric representation of Said first
`biometric characteristic,
`modulating Said first numeric representation onto a radio
`frequency (RF) signal;
`transmitting Said RF signal to a radio receiver for
`demodulation;
`after demodulating Said RF signal, comparing Said first
`numeric representation to a Second numeric represen
`tati

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket