Methods and systems for providing enhanced security over, while also facilitating access through, secured points of entry
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06K-009/00
G05B-019/00
출원번호
US-0885087
(2010-09-17)
등록번호
US-8462994
(2013-06-11)
발명자
/ 주소
Ortiz, Luis M.
Lopez, Kermit D.
출원인 / 주소
Random Biometrics, LLC
대리인 / 주소
Lopez, Kermit D.
인용정보
피인용 횟수 :
6인용 특허 :
66
초록▼
Systems and methods provide the verification of a registered user with authorized access through a point of entry in coordination with registered user profile information obtained from a remote server after preliminary identification of the registered user based on an identification number obtained
Systems and methods provide the verification of a registered user with authorized access through a point of entry in coordination with registered user profile information obtained from a remote server after preliminary identification of the registered user based on an identification number obtained wirelessly from an RFID tag carried by the registered user when the user is located near a point of entry. Registered user profile information including at least one of a photograph, biometric template, and a user name can be obtained by a computer at a point of entry from a remote server after preliminary identification of the user based on an identification number wirelessly provided to a RFID reader from a RFID carried by a registered user when the user is located near a point of entry such as, for example, a sports venue, border crossing or access point to a secured facility.
대표청구항▼
1. A method for verifying the identity of a user at a point of entry, comprising the steps of: providing an electronic system at a point of entry, the electronic system including a computer, a video monitor, a preliminary identification RFID reader, verification RFID reader, and access to a data net
1. A method for verifying the identity of a user at a point of entry, comprising the steps of: providing an electronic system at a point of entry, the electronic system including a computer, a video monitor, a preliminary identification RFID reader, verification RFID reader, and access to a data network;detecting user presence within a preliminary identification zone located near a point of entry by the wireless receipt of an identification number obtained by said preliminary identification RFID reader from an RFID carried by said user in said preliminary identification zone;providing said identification number from said computer over said data network to a remote server to access a user profile including at least one of a photograph and a user name associated with said user from a registered user database accessible by said remote server, said server utilizing the identification number to obtain said user profile from said registered user database;providing at least one of a photograph and user name from said remote server to said computer;detecting user presence within a verification zone located at said point of entry by wireless receipt of said identification number by said preliminary identification RFID reader from said RFID carried by said user; anddisplaying at least one of said photograph and said user name on said video monitor to personnel at said point of entry, said personnel comparing at least one of said photograph displayed on said video monitor with physical appearance of the user and said user name to credentials carried by the user and granting the user access through the point of entry if the at least one of said user appearance and said credentials match at least one of said photograph and said user name displayed on said video monitor. 2. The method of claim 1, wherein said RFID carried by the registered user operates wirelessly and is associated with at least one of a venue ticket, an identification card, a smartphone, and a RFID tag. 3. The method of claim 1, wherein said photograph comprises an image of a face of the user associated with said registration number and said profile. 4. The method of claim 1, wherein the credentials carried by the user comprise an identification medium bearing a name and a photograph of the user. 5. The method of claim 1, further comprising providing a biometric reader at said point of entry and a step wherein said registered user also provides at least one of fingerprint data, retinal scan data, handwriting data, voice data, skin tissue data, and facial data to said biometric interface to gain access through said point of entry. 6. The method of claim 1, wherein said point of entry comprises at least one of: an entry gate at a sports and entertainment venue, an entry doorway to a manufacturing facility, an entry doorway to a building, a international port of entry from one country to another country, and a security checkpoint in a public transportation terminal. 7. The method of claim 6, wherein said RFID carried by the registered user operates wirelessly and is associated with at least one of a venue ticket, an identification card, a smartphone, and a RFID tag. 8. The method of claim 6, wherein said photograph comprises an image of a face of the user associated with said registration number and said profile. 9. The method of claim 6, wherein the credentials carried by the user comprise an identification medium bearing a name and a photograph of the user. 10. The method of claim 6, further comprising a step wherein a biometric interface comprising a biometric reader is provided at said point of entry and the registered user is required to provide at least one of fingerprint data, retinal scan data, handwriting data, voice data, and facial data to said biometric interface to gain access through said point of entry. 11. A method for securing access through points of entry, comprising: providing preliminary identification RFID readers in a preliminary identification zone around a point of entry;providing at least one verification RFID reader in a verification zone at said point of entry;providing a video monitor and a computer at said point of entry;providing a server with access to a database of profiles for registered users authorized to pass through said point of entry, said profiles including at least one of registered user identification information, a photograph, and biometric templates of said registered users;providing data network access at said point of entry to support communication between said computer and said preliminary identification RFID readers, said at least one verification RFID reader and said server;detecting an RFID signal with at least one preliminary identification RFID reader from a registered user approaching a point of entry within said preliminary identification zone and obtaining a identification number from a RFID carried by said registered user, transmitting said RFID identification number to said server;determining if the RFID identification number is associated with a registered user profile stored in said database and retrieving said registered user profile if found;providing said registered user profile associated with said RFID identification number and the registered user to said computer that is located at said point of entry;detecting said RFID signal including said identification number with at least one verification RFID reader located within said verification zone at said point of entry when said registered user is in said verification zone;said computer retrieving said registered user profile associated with said identification number obtained from said RFID carried by said registered user, displaying registered user profile information including at least one of a registered user photograph and registered user name on said video monitor, and allowing said registered user to pass through said point of entry if at least one of said photograph, biometric, and name retrieved by said computer matches at least one of credentials carried by said registered user, a registered user biometric obtained at said point of entry, and physical appearance of said registered user. 12. The method of claim 11, wherein said RFID carried by the registered user operates wirelessly and is associated with at least one of a venue ticket, an identification card, a smartphone, and a RFID tag. 13. The method of claim 11, wherein said photograph comprises an image of a face of the user associated with said registration number and said profile. 14. The method of claim 11, wherein the credentials carried by the user comprise an identification medium bearing a name and a photograph of the user. 15. The method of claim 11, further comprising a step wherein a biometric interface comprising a biometric reader is provided at said point of entry and the registered user is required to provide at least one of fingerprint data, retinal scan data, handwriting data, voice data, and facial data to said biometric interface to gain access through said point of entry. 16. The method of claim 11, wherein said point of entry comprises at least one of: an entry gate at a sports and entertainment venue, an entry doorway to a manufacturing facility, an entry doorway to a building, a international port of entry from one country to another country, and a security checkpoint in a public transportation terminal. 17. The method of claim 16, wherein said RFID carried by the registered user operates wirelessly and is associated with at least one of a venue ticket, an identification card, a smartphone, and a RFID tag. 18. The method of claim 16, wherein said photograph comprises an image of a face of the user associated with said registration number and said profile. 19. The method of claim 16, wherein the credentials carried by the user comprise an identification medium bearing a name and a photograph of the user. 20. The method of claim 16, further comprising a step wherein a biometric interface comprising a biometric reader is provided at said point of entry and the registered user is required to provide at least one of fingerprint data, retinal scan data, handwriting data, voice data, skin tissue data, and facial data to said biometric interface to gain access through said point of entry. 21. A system for verifying the identity of a user at a point of entry, comprising: a preliminary identification RFID reader located near a point of entry scanning a preliminary identification zone near said point of entry for RFID signals including identification numbers associated with registered users having access through said point of entry;a verification RFID reader located at said point of entry scanning a passage zone at said point of entry for identification numbers associated with registered users having access through said point of entry; anda computer and video monitor located at said point of entry and including data network access to a remote server to obtain user profiles associated with identification numbers detected by said preliminary identification RFID and said verification RFID;wherein security personnel using said computer at said point of entry utilize user profile information obtained from said server to do at least one of: render at least one of said photograph displayed on said video monitor and compare it with the user's appearance, compare a biometric sample provided by user with a biometric obtained from a biometric template, and compare credentials carried by the user to said user name displayed on said video monitor, and granting the user access through the point of entry, if the at least one of the user's appearance, said biometric sample, and said credentials match at least one of said photograph, said user name, and said biometric template. 22. The method of claim 21, wherein said RFID carried by the registered user operates wirelessly and is associated with at least one of a venue ticket, an identification card, a smartphone, and a RFID tag. 23. The system of claim 21, wherein said photograph comprises an image of a face of the user associated with said registration number and said profile. 24. The system of claim 21, wherein the credentials carried by the user comprise an identification medium bearing a name and a photograph of the user. 25. The system of claim 21, further comprising a biometric reader at said point of entry, wherein the registered user is required to provide at least one of fingerprint data, retinal scan data, handwriting data, voice data, and facial data to said biometric interface to gain access through said point of entry. 26. The system of claim 21, wherein said point of entry comprises at least one of: an entry gate at a sports and entertainment venue, an entry doorway to a manufacturing facility, an entry doorway to a building, a international port of entry from one country to another country, and a security checkpoint in a public transportation terminal. 27. The system of claim 26, wherein said RFID carried by the registered user operates wirelessly and is associated with at least one of a venue ticket, an identification card, a smartphone, and a RFID tag. 28. The system of claim 26, wherein said photograph comprises an image of a face of the user associated with said registration number and said profile. 29. The system of claim 26, wherein the credentials carried by the user comprise an identification medium bearing a name and a photograph of the user. 30. The system of claim 26, further comprising a step wherein a biometric interface comprising a biometric reader is provided at said point of entry and the registered user is required to provide at least one of fingerprint data, retinal scan data, handwriting data, voice data, skin tissue data, and facial data to said biometric interface to gain access through said point of entry.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (66)
Lapsley Philip Dean ; Lee Jonathan Alexander ; Pare ; Jr. David Ferrin ; Hoffman Ned, Anti-fraud biometric scanner that accurately detects blood flow.
Kanevsky Dimitri ; Maes Stephane Herman, Apparatus and methods for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment.
Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
Wildes Richard Patrick ; Asmuth Jane Circle ; Hanna Keith James ; Hsu Stephen Charles ; Kolczynski Raymond Joseph ; Matey James Regis ; McBride Sterling Eduard, Automated, non-invasive iris recognition system and method.
Matchett Noel D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910) Kehoe Brian D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910), Continuous biometric authentication matrix.
Denison William D. (Palos Hills IL) Brownfield Lawrence C. (Downers Grove IL) Silvers Bradley S. (Oswego IL), Electronic access control device utilizing a single microcomputer integrated circuit.
Anderson Charles E. (Mint Hill NC) Miller William C. (Monroe NC), Electronic combination of lock with changeable entry codes, lock-out and programming code.
Yap Chas Hock Eng,MYX ; Chua Foong Mei,MYX, Luggage handling and reconciliation system using an improved security identification document including contactless communication insert unit.
Gibbons Phillip B. ; Matias Yossi,ILX ; Poosala Viswanath, Maintaining a random sample of a relation in a database in the presence of updates to the relation.
Hoguta, Kenneth J.; Rupert, Amy J.; Russell, Jesse Eugene; Sherman, Ronald, Method and apparatus for establishing a personalized connection with a network.
Tomko George J.,CAX ; Stoianov Alexei,CAX, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq.
Yuval Gideon A. (Mercer Island WA) Ernst Michael (Redmond WA), Method and system for controlling unauthorized access to information distributed to users.
Strait Robert S. ; Pearson Peter K. ; Sengupta Sailes K., Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy.
Bolle, Rudolf Maarten; Nunes, Sharon Louise; Pankanti, Sharathchandra; Ratha, Nalini Kanta; Smith, Barton Allen; Zimmerman, Thomas Guthrie, Method for biometric-based authentication in wireless communication for access control.
Gopalakrishnan, Ponani S.; Kanevsky, Dimitri; Maes, Stephane Herman, Methods and apparatus for restricting access of a user using random partial biometrics.
Oosta Gary M. ; Elstrom Tuan A. ; Shain Eric B. ; Schapira Thomas G., Non-invasive calibration and categorization of individuals for subsequent non-invasive detection of biological compound.
Ho-Lung, Joseph Anthony; McLean, James Gordon; Wong, Tin-Lup, Personal computer with a biometric sensor having improved resistance to environmental distortions.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Morrison, James; Addy, John C., Self-service checkout terminal having a biometric sensing device for verifying identity of a user and associated method.
Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
Tedesco, Daniel E.; Jorasch, James A.; Gelman, Geoffrey M.; Walker, Jay S.; Tulley, Stephen C.; O'Neil, Vincent M.; Alderucci, Dean P., System for image analysis in a network that is structured with multiple layers and differentially weighted neurons.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.