Entries |
Document | Title | Date |
20080252414 | BIOMETRIC ACCESS CONTROL SYSTEM INCORPORATING A TOUCHSCREEN ACCESSIBLE AND KIOSK BASED ID STATION OPERATING IN COMBINATION WITH MULTIPLE CRITICAL ASSET RETAINING RACKS AND LOCERS FOR PERMITTING SELECTIVE BIOMETRIC INPUT AND PROCESSOR DRIVEN/WIRELESS RELEASE AUTHORIZATION, MAINTENANCE AND INVENTORY CONTROL OF ANY PLURALITY OF CRITICAL ASSETS AND INCLUDING AN ASSOCIATED COMPUTER WRITEABLE MEDIUM OPERATING WITH THE ID STATION FOR ENABLING ASSET RELEASE, REENTRY AND ASSOCIATED INVENTORY CONTROL - A biometric access control system for tracking critical assets and including an ID station incorporating a biometric input reader, an RFID antenna and reader and a wired or wireless (Bluetooth) communication device. A remotely positioned structure includes either or both of a rack or a locker for holding a plurality of the critical assets in individually locked fashion. A processor control built into the ID station operatively actuates each of a plurality of individual locking mechanisms incorporated into the rack structure or locker, in response to successive biometric and weapon selection inputs communicating with the processor, and for determining at least one of user identification and weapon release authorization prior to the processor actuating the locking mechanism to release the weapon. An associated computer writeable medium operates with the processor and establishes a series of subroutines for establishing user identification, weapons rating, selective weapon release/reentry and associated maintenance and record keeping log reports. | 10-16-2008 |
20080266054 | METHOD AND APPARATUS FOR BIOMETRIC AUTHENTICATION OF FLIGHT CREW AND MONITORING CONTROLLED SPACE OF AIRCRAFT - Access to a controlled space aboard a transport vehicle is controlled by sensing a biometric characteristic associated with a person requesting access to the controlled space. The biometric characteristic is evaluated, both aboard the vehicle and distinctly from the vehicle, and two determinations are made, based on the biometric characteristic, whether the person is authorized to access the controlled space. In the event that both determinations indicate that the person is authorized to access the controlled space, the person's request for access is approved; otherwise the request for access is denied. | 10-30-2008 |
20090051487 | System and Methods for the Remote Measurement of a Person's Biometric Data in a Controlled State by Way of Synchronized Music, Video and Lyrics - A method enabling a user with an electronic communication device to establish and stabilize his mental, emotional and physical condition in respose to stimulation data and then using biometric sensors applied to the user to provide for remote/local gathering of standardized biometric data into a remote database coordinated with remote server software via an electronic network. The method includes initiating a session and selecting a session type by the user. The method also includes loading a track with the stimulation data, establishing links to the biometric sensors, setting the timing tolerances and biometric parameters based on new or existing user rules, stimulating the user with at least one of visual, audio, lyrics, text and vibration tracks to elicit stimulation data from the user, recording time stamps corresponding to key/tap input, deriving sync relationship between the user and the stimulation data, waiting for the variance and biometric parameters to stabilize and displaying a depiction of the stabilized condition on a screen. | 02-26-2009 |
20090108988 | SYSTEM AND METHOD FOR ADMINISTERING ACCESS TO AN INTERIOR COMPARTMENT OF AN ENCLOSURE - A system and method for administrating access to an interior compartment of a safe is provided. The safe includes a locking mechanism for locking and unlocking a safe door, and a lock interface including a biometric sensor, a keypad, and a memory. The interior compartment of the safe may be accessed using primary and secondary identification sequences, and primary and secondary unique identifying features. The manager initiates the safe using the pre-established master sequence and administrates the number of secondary users permitted to access the interior compartment of the safe. The pre-established master sequence may also be used to delete all identification sequences and unique identifying features that are stored in the lock interface. A key lock operates as a threshold or secondary lock that controls whether the primary and secondary identification sequences, and primary and secondary unique identifying features, may be used to unlock the locking mechanism. | 04-30-2009 |
20090153292 | BUSINESS AND SOFTWARE SECURITY AND STORAGE METHODS, DEVICES AND APPLICATIONS - The current invention describes methods and apparatuses for providing improved security for access to networks, on and off the Internet. A series of sign-in options configured according to several parameters prevent several types of automatic hacking. The nature of the choices for access, the method of controlling one's choices, and the method of randomization are new. Devices for applying these options include data-processing units such as computers and cell phones to which these methods are written. Some applications of increased security are online storage solutions, web-based email, and a shopping cart system. One particular combination of these applications that is discussed is the integration of web-based email with online storage for other files as well. | 06-18-2009 |
20090167491 | PORTABLE ACCESS DEVICE - Portable devices, methods, and systems for controlling access to computers and other secure systems such as systems protecting secure premises, by processing data supplied by the individual seeking access to the system and data supplied by the system to which the prospective user seeks access, to determine whether access by the individual is to be authorized or enabled. In one embodiment the invention provides a device for providing a code that may be used to access a system such as a computer or security system. The device comprises an output device and at least one processor. The processor processes data representing a biometric characteristic of a prospective user of the system and a signal provided by the system, and, depending upon a result of the processing, provides to the output device a code that may be used to access the system. | 07-02-2009 |
20090174526 | Systems and Methods for Recognition of Individuals Using Multiple Biometric Searches - The search results of a first iteration of a biometric search are used to form a probe for subsequent iterations searches in a biometric database. his enables the search methodology to “drill down” into the database to find matching biometric templates. In addition, the results of a search using a template of first biometric type are used to limit the search applied using a template of a second biometric type to improve the effectiveness of a one to many search for matching data in a biometric database. These search methods are used in various combinations with different types of biometric templates and demographic information of an individual who is subject of the one to many search. | 07-09-2009 |
20090189734 | Security systems and methods relating to travelling vehicles - There is provided a method for identifying, at the moment of verification, the situation of a threat to a protected ground, airspace and/or sea limits by an approaching ground vehicle, aircraft or sea-going vessel. The method includes an authorized driver/pilot/captain to select first state in which the vehicle, aircraft or sea-going vessel is not considered to present a threat and a second state in which the vehicle, aircraft or sea-going vessel is considered to present a threat. The method further provides entering the first and second PIN codes into a smart card for generating a One Time Indicia (OTI) for each of the PIN codes and disclosing the state associated with each of the first and second OTI codes to at least one control center. Upon the control center receiving an OTI code, the control center obtains positive identification of the driver/pilot/captain and the degree of the threat that the vehicle, aircraft or sea-going vessel presents. | 07-30-2009 |
20090206988 | Method and Server of Electronic Safes With Information Sharing - A method of managing electronic safes implemented by a server on behalf of at least one user possessing at least a first electronic safe, said method comprising a step of implementing access means designed to provide said user with access, via a second safe belonging to said user, to a set of data forming part of a content accessible via the first electronic safe, said implementation step being intended to be carried out in the event of authentication of said user as the user owning the first electronic safe. | 08-20-2009 |
20090237203 | IDENTIFICATION WITH RFID ASSET LOCATOR FOR ENTRY AUTHORIZATION - A system for controlling access at secure facilities to locations and assets contained in those locations, comprising a biometric identification device, an RFID tag and receiver, and a database for processing information from them to allow or deny access to the locations and assets. The system ties into an existing network in the facility and also includes a programming device for evaluation of the biometric template and acknowledgement of the identification, if made. The system also controls the permissible locations of assets such as laptops, desktop computers, photographic equipment, weapons such as rifles, data storage devices and the like, such that while a person may have access to a location, use of an asset or removal of the asset may not be part of that person's authorized conduct. | 09-24-2009 |
20090243794 | CAMERA MODULES COMMUNICATING WITH COMPUTER SYSTEMS - A camera module includes an image sensor, a first signal processor, a bus interface, and a security device interface. The image sensor acquires an image data input. The first signal processor is coupled to the image sensor to receive the image data input, exchange data with a security device, and exchange data with a computer system which includes a second signal processor. The bus interface is coupled to the first signal processor to exchange data between the first signal processor and the second signal processor. The security device interface is coupled to the first signal processor to exchange data between the first signal processor and the security device. | 10-01-2009 |
20090278655 | Method for inhibiting egress from a chamber containing contaminants - An embodiment of the present invention comprises a method of securing a room from removal of contaminants from the room, comprising a chamber and a portal with a door, wherein the method comprises: locking the door of the portal of the room; electronically sensing flesh of a hand of an occupant with a detecting device to determine if the flesh is exposed; automatically unlocking the door of the portal in response to electronically sensing the flesh in contact with the detecting device. | 11-12-2009 |
20090295536 | Selective security masking within recorded speech - A marker is derived from an interaction between a person and an agent of a business and the agent's user interface. A part of a speech signal that corresponds to a portion of the person's special information is located with the marker. The speech signal results from the interaction between the person and the agent. The part of the speech signal that corresponds to the portion of the person's special information is rendered unintelligible. | 12-03-2009 |
20090309698 | Single-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features. These security features can be based, for example, on unique knowledge of the person being authenticated, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 12-17-2009 |
20100007460 | BIOMETRICS SENSOR - A biometrics sensor includes a portion for sucking air, a molecular sieve portion for selectively passing or adsorbing specific gas contained in the air, a gas detecting section for detecting the concentration of gas passed through the molecular sieve or the remaining gas, and a data processing section for comparing the detection result with a prestored detection result, wherein the gas detecting section selectively detects predetermined gas, and the data processing section performs determination or probabilistic determination on an authentication object person by comparing the composition ratio of gas for each authentication object person with a prestored composition ratio. | 01-14-2010 |
20100039220 | RFID READER WITH EMBEDDED ATTACK DETECTION HEURISTICS - The present invention is directed toward secure access control systems. Specifically, a method and system is provided that detects, blocks, and reports attempts to compromise access control systems that utilizes machine readable credentials and reader devices. | 02-18-2010 |
20100117791 | Biometric Authentication Method, Biometric Authentication System, IC Card, and Terminal - A biometric authentication system | 05-13-2010 |
20100237986 | MICROELECTRONIC LOCK SYSTEM - A microelectronic lock system includes a computer interface for connecting to an external computer; a biometric interface configured for connecting to a biometric sensor and receiving biometric data that a user inputs to the biometric sensor; and a control unit connected to the biometric interface and the computer interface. The control unit is configured to transmit the biometric data received through the biometric interface to the external computer through the computer interface, to receive data from the external computer through the computer interface, and to determine whether to grant access to the user according to the received data. | 09-23-2010 |
20100271173 | MANAGEMENT SYSTEM AND MANAGEMENT METHOD - Provided is a management technology capable of ensuring adequate security management even when using finger vein authentication for restricting entry by specific workers to a controlled area and for limiting the use of apparatuses inside the controlled area. This invention is a system for managing authority of a worker to work in a controlled area that requires wearing of protective clothing. The system performs: personal authentication outside the controlled area, using biometric information of the worker when not wearing the protective clothing; and determination processing to determine, in the controlled area, whether or not the worker who has been authenticated has authority to work in the controlled area, using security information other than the biometric information. | 10-28-2010 |
20100321151 | HOME AUTOMATION SECURITY SYSTEM AND METHOD - A control system for allowing access to the use of home automation devices. The control system can include at least one home automation device. A biometric scanner can gather biometric data from a user. An automation controller can be in networked communication with the home automation device and the biometric scanner. The receive controller can process biometric data from the biometric scanner to enable access to the at least one home automation device. | 12-23-2010 |
20110050392 | COMMUNICATION DEVICE - A method for operating an electronic device is disclosed. First biological information of a first operator performing an input operation to the electronic device is detected. Second biological information from a second operator of a second electronic device is received. Third biological information of a registered person permitted to use the electronic device is provided. A display module is prohibited from displaying received data if the first biological information does not correspond to the second biological information and the first biological information does not correspond to the third biological information. | 03-03-2011 |
20110102137 | Biometric Security Device - The invention relates to a security device ( | 05-05-2011 |
20110109431 | METHOD AND SYSTEM FOR COMMUNICATING ACCESS AUTHORIZATION REQUESTS BASED ON USER PERSONAL IDENTIFICATION AS WELL AS METHOD AND SYSTEM FOR DETERMINING ACCESS AUTHORIZATIONS - A control system for access to a limited access area requires identification and preferably authentication of the accessing person; in order to achieve efficiency and effectiveness, the system need to be automatic. According to the present invention, the arrangement associated with the accessing person is split into at least two devices in communication between each other: a personal identity biometric authentication device (D | 05-12-2011 |
20110115604 | REMOTE CONTROL FOR MULTIMEDIA SYSTEM HAVING TOUCH SENSITIVE PANEL FOR USER ID - Operating a remote control to identify a user by receiving touch pad input from at least one touch sensitive element of the remote control that has a plurality of touch sensitive elements. The touch pad input corresponds to the user's touch of at least some of the plurality of touch sensitive elements. The touch pad input is at least partially processed by processing circuitry of the remote control and transmitted to a multimedia system console via a communications interface of the remote control for processing of the at least partially processed touch pad input to identify the user via pattern recognition. At least partially processing the touch pad input can be by identifying at least one finger orientation, at least one finger spacing, at least one finger width, a plurality of finger knuckle/joint locations, and/or a plurality of finger lengths based upon the touch pad input. | 05-19-2011 |
20110169603 | DISTINGUISHING BETWEEN USER PHYSICAL EXERTION BIOMETRIC FEEDBACK AND USER EMOTIONAL INTEREST IN A MEDIA STREAM - The present invention discloses a method, system, and computer program product for determining user interest in media. The invention can select one of a set of different activity profiles specified within a data store. Each activity profile can include biometric attributes and associated baseline attribute values specific to an activity state. A media stream can be manipulated (e.g., created from environmental inputs and/or played upon a presentation device). Biometric data can be received from a user in proximity to the media stream. The received biometric data can be compared values in the selected activity profile. An interest level in the media stream can be determined based on comparison differences. A programmatic action can be performed relating to the media stream based upon the determined interest level. For example, a bitrate of the media and/or a marker in the media can be modified based on interest level. | 07-14-2011 |
20110199183 | LOCKABLE ENCLOSURE HAVING IMPROVED ACCESS SYSTEM - A biometric security system, including a biometric validation module for receiving a biometric profile (such as a fingerprint scan) and asserting a control signal responsive to a biometric evaluation of the biometric profile for securing access to a physical locking storage unit, such as a cabinet. Disclosed is a system that not only provides secured mechanical locking devices for security and access control, it further augments such a system with a computer controlled biometric access control and access monitoring system. The system is managed by central management software which may encompass a standalone configuration or a networked configuration. Preferred embodiments of the present invention provide a solution that provides a software platform and firmware that provides a control signal controls an electromechanical locking assembly for an electrical physical locking unit, such as a server cabinet having at least one locking/unlocking door panel for gaining entry thereof. | 08-18-2011 |
20110205016 | Method and apparatus for access control using dual biometric authentication - A biometrically authenticated access control in which a wireless authentication signal is provided from a primary instrumentality of access, only after a dual-stage biometric verification of the user's identity is performed. In one embodiment, an accessing device includes memory for storing a device identification code and an authentication code, along with first and second biometric templates corresponding to biometric samples from a user. In another embodiment, an accessing device includes memory for storing a device identification code and more than one authentication code, for separate users, along with first and second biometric templates corresponding to biometric samples from multiple users. In order to gain access to a secured resource, a user undergoes first and second biometric sampling to generate biometric data to be compared with the first and second biometric templates. Upon authentication of the user by positive matches with said first and second biometric samples, the accessing device communicates the accessing device identification code and authentication code to a remote station controlling access to the secured resource. A central server maintains a central database of records each establishing a correlation between an enrolled accessing device's identification code and an authentication code assigned to that accessing device. | 08-25-2011 |
20110241827 | METHOD, APPARATUS AND SYSTEM FOR AUTOMATED CHANGE OF AN OPERATING MODE RELATING TO A WIRELESS DEVICE - A method, apparatus, and system for automatically changing the operating mode of a wireless device are provided. A determination is made whether at least one state of the wireless device has changed. This determination is performed using at least one integrated device of the wireless device. A determination is made whether the change in the state of the wireless device indicates that the first operating mode should be changed. The operating mode is changed to a second operating mode of the wireless device in response to a determination that the change in the state of the wireless device indicates that the first operating mode should be changed. Changing to the second operating mode includes altering at least one wireless communication operation of the wireless device. Examples of the second operating mode may include, but is not limited to, an airplane mode, a train mode, a vehicle mode, an environmental condition mode; or a device-access mode. | 10-06-2011 |
20110248818 | VISITOR MANAGEMENT SYSTEMS AND METHODS - Various apparatus, methods, techniques and systems are disclosed for admitting, tracking, monitoring and processing data about visitors and vehicles that visit an access-controlled environment. A network having one or more greeting stations and a number of linked answering stations collects and manages data concerning visitors and/or vehicles in the access-controlled environment, and can manage or assist individuals in managing granting access to the access-controlled environment, monitoring visitors and vehicles present in the access-controlled environment, limiting movement and access to certain areas in the access-controlled environment and generating records and other data about each visit. Some embodiments of the network are also adaptable for use in providing traveler assistance and consular services for various types of individuals. | 10-13-2011 |
20110260830 | BIOMETRIC INTERFACE FOR A HANDHELD DEVICE - Methods and systems for applying biometric data to an interactive program executed by a portable device are provided. According to embodiments of the invention, raw bio-signal data is captured and filtered so as to determine the bio-signal of the user of the interactive program. The bio-signal is analyzed so as to determine biometrics of the user, which are applied as input to the interactive program. A setting or state of the interactive program is modified based on the biometrics. An updated state of the interactive program is rendered to the user, reflecting the modification of the setting or state of the interactive program. | 10-27-2011 |
20110309910 | SECURITY DOCUMENT CONTROL SYSTEM AND CONTROL METHOD THEREOF - A security document control system and a control method thereof are disclosed. The system functions to automatically control a series of security operations including sensing security documents, storing all records with respect to check-out of security documents in a database, closing exit gates if illegal removal of security documents is judged, and informing a control center and security guards of the illegal removal of security documents so as to arrest an employee who attempts to illegally remove security documents. | 12-22-2011 |
20110316665 | PERSONAL WRITING DEVICE WITH USER RECOGNITION CAPABILITIES AND PERSONAL INFORMATION STORAGE - Systems and method for a handheld biometrically secured user input device are described. A biometric authentication device may be coupled with a handheld enclosure, the biometric authentication device capable of collecting user authentication information from a user to authenticate the user's identity. A computer-readable storage device may be coupled with the handheld enclosure for storing confidential financial information of the user, wherein access to the confidential financial information is granted only after the user's identity has been authenticated. A sensor may be coupled with the handheld enclosure, capable of capturing the user's handwriting. Also, a communication device may be configured to transmit information gathered with the sensor to a computer system. | 12-29-2011 |
20120001726 | SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS - The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader. | 01-05-2012 |
20120013435 | METHOD AND APPARATUS FOR PROVIDING IDENTIFICATION - A method of providing identification of an entity includes maintaining a database of identification data specific to the appearance and condition of entities, providing a unique description for each entity enabling access to the entity's identification data in the database, providing identification means adapted for portage with the entity and containing the unique description and maintaining secondary databases containing the entity's identification data as acquired from prior encounters so that multiple comparisons can be made to assure that the entity bearing the identification means is the same entity to whom the identification means were issued. | 01-19-2012 |
20120032778 | COMMUNICATION SYSTEM AND COMMUNICATION DEVICE - A communication system includes a transmission device configured to transmit a signal on which given biological information is superposed to a human body, and a reception device that receives the signal through the human body, and acquires the given biological information and measures biological information of the human body simultaneously from the signal that is received, so as to perform personal authentication with respect to the human body based on the given biological information that is acquired and the biological information that is measured. | 02-09-2012 |
20120092126 | Biometric Module for Vehicle Access Control - A biometric module for a vehicle access control employs a base assembly and a cover assembly which is pivotally mounted to the base assembly. The cover assembly forms a chute and has an access opening at one end. A bio-reader, which is preferably a fingerprint reader, is located adjacent the access opening and is carried by the cover assembly. A sensor senses the presence of a vehicle and actuates a switch for the blower. A heater is also employed to maintain a temperature range for the bio-reader. | 04-19-2012 |
20120098640 | BIOMETRIC-BASED IDENTITY CONFIRMATION - Embodiments of the present invention provide an approach for confirming/verifying an identity of a test taker using a biometric analysis. For example, in the medical field, it is desirous to ensure that a given test is being administered to a correct individual (e.g., “test taker’). By comparing a given/submitted identity against a biometric-based identity, such verification can be performed. In one embodiment, the individual will submit biometric information via a biometric reader or the like coupled to a testing apparatus. The identity submitted by or on behalf of the individual (referred to herein as a “submitted identity”) will then be confirmed against the individual's identity as determined based on the biometric reading (referred to herein as a “biometric-based identity”). If the submitted identity and the biometric-based identity match, results of the test will be accepted. If the two identities do not match, then results of the test will be denied. Alternatively, if the identities do not match, then the testing apparatus could refuse to commence or complete the test. | 04-26-2012 |
20120169460 | Multiparty Controlled Remote Security Lock System - A multiparty controlled remote security lock is disclosed. The embodiments herein relate to security systems and, more particularly, to remotely controlled biometric based mechanisms in security systems. In order to operate the remote security lock at least one OC and a plurality of RCs are employed. Further, the OC is located at the site of the lock and the RCs may be located away from the site of the lock. The remote security lock employs 2-factor authentication mechanisms using smartcard access and biometric means. A method for randomized selection of a subset of controllers (RCs) who operate the lock is used. The randomization enhances the scalability of the system, while keeping the security strength of the system as that of choosing the full set of controllers for operating the lock. | 07-05-2012 |
20120194319 | Automatic Teller Machine Capable of Performing Remote Controlling Function and Opening and Closing Operation Method of Automatic Teller Machine Using Same - The present invention relates to an automatic teller machine (ATM) capable of control with a remote controller and an opening and closing operation method of the automatic teller machine using the same. In addition, the invention provides an automatic teller machine capable of performing a remote control function and an opening and closing operation method of the automatic teller machine using the same, which can enable the user to easily control power on/off, module reset, and rebooting operations of the automatic teller machine with a remote controller, thereby quickly and simply carrying out the opening and closing operations of the automatic teller machine, which were complicated and took a lot of time in the past, and easily performing some processes for maintaining the automatic teller machine. Further, the invention provides an automatic teller machine capable of performing a remote control function, comprising: a plurality of buttons and an automatic teller machine body equipped with a short-range wireless receiving device; and a remote controller which can execute the short-range wireless communication with the automatic teller machine body, wherein a system controlling program stored in the automatic teller machine body is activated through the remote controller in such a manner that the opening and closing operations of the automatic teller machine are conducted automatically through the button operation of the remote controller. | 08-02-2012 |
20120200389 | ANTI-IDENTITY THEFT AND INFORMATION SECURITY SYSTEM PROCESS - The anti-identity theft and information security system process includes storing secure information in association with an electronic device having a communication circuit for sending and receiving data. Biometric information is read with a scanner so that the identity of a user can be authenticating in connection with the supplied biometric information. Once approved, a data communication line is established with a remote device and access to the secure information is unlocked. Thereafter, the secure information may be transmitted between the electronic device and the remote device. | 08-09-2012 |
20120218074 | BIOMETRIC AUTHENTICATION AND VERIFICATION - Biometric authentication and verification are described. A method in biometric identification includes establishing a foundational biometric measurement based on a first user input. The method also includes providing a second user input at a biometric terminal, the second user input used by the biometric terminal to determine whether to acknowledge a verifying biometric measurement, in response to receipt of the established foundational biometric measurement and the second user input. The method may also include establishing the foundational biometric measurement, by the user, utilizing biometric equipment. Alternatively, the establishing of the foundational biometric measurement based on first user input is performed by providing the first user input to a biometric kiosk, the biometric kiosk using the first user input to establish the foundational biometric measurement. Advantages of the present invention include the ability to perform more secure biometric transactions. | 08-30-2012 |
20120249292 | PROXIMITY BASED BIOMETRIC IDENTIFICATION SYSTEMS AND METHODS - Systems and methods which provide identification of a user in combination with mutual authentication between a user and identification host are shown. Embodiments further provide mutual authentication between the identification host and a resource for which access is controlled, thereby providing three-party authentication (e.g., user, identification host, resource). Although utilizing biometric data for user identification, embodiments store such biometric information within devices which remain in the control of users. Protocols implemented according to embodiments facilitate a decentralized approach to user identification and authentication to allow a user to interact with any of a number of identification hosts for user identification and authorization. Auditing and tracing of user identification and authentication and/or resource access is provided according to embodiments. | 10-04-2012 |
20120249293 | RECOGNITION SYSTEM AND RECOGNITION METHOD - A recognition system is used for recognizing an operation of a user. The recognition system includes a sensor module, a processing device, a playing device, and data storage device. The sensor module is used for generating a first sensing signal according to an operation of a user. The data storage device stores a plurality of objects. The processing device compares the first sensing signal with the plurality of objects to generate a recognition result in response to the first sensing signal. The playing device is used for playing the recognition result. The sensor module is used for, after the recognition result is played, recognizing a response of the user to generate a second sensing signal, and feeding the second sensing signal back to the processing device. The processing device judges whether the recognition result corresponding to the first sensing signal is correct according to the second sensing signal. | 10-04-2012 |
20120262270 | SYSTEMS AND METHODS FOR ZONE-BASED SELECTION OF AIRPORT ACCESS POINT SECURITY FEATURES - Methods for configuring one or more access points between adjacent zones of different types at an airport facility are disclosed. One method includes determining an access point type based on a security level of a first zone on a first side of the access point and a second security level of a second zone on a second side of the access point. The method also includes selecting one or more security features for use at the access point. The method further includes applying the one or more security features at the first and second sides of the access point. | 10-18-2012 |
20120268241 | BIOMETRIC CHAIN OF PROVENANCE - The present disclosure is directed towards methods and systems for ensuring integrity of biometric data for one or more transactions. A mobile biometric device may acquire biometric information of an individual. A ranging module of a transaction device may determine that a distance between the mobile biometric device and a physical location of a first transaction with the individual is within a predefined value. The transaction device may link, responsive to the determination, the acquired biometric information to the first transaction if the biometric information is acquired within a specific time limit from the distance determination. The transaction device may link the acquired biometric information to a universal biometric record of the individual. A biometric integrity engine may compare information from the first transaction and a second transaction for inconsistency or fraud. | 10-25-2012 |
20120306616 | ASSOCIATING A BIOMETRIC REFERENCE TEMPLATE WITH AN IDENTIFICATION TAG - A method and system for associating a biometric reference template with an identification tag for a physical object. A processor of a computer system ascertains that an attribute included in the identification tag is signed with a digital signature. The attribute includes a privacy policy identifier which identifies a privacy policy pertaining to the identification tag. The identification tag is embedded in or attached to a physical object. The identification tag includes a first biometric reference template identifier that uniquely identifies biometric data pertaining to a person. The biometric reference template includes a second biometric reference template identifier that uniquely identifies the biometric data. The processor confirms that the digital signature matches a signature stored in a database of the computer system. The processor verifies that the first biometric reference template identifier matches the second biometric reference template identifier. | 12-06-2012 |
20130106569 | VEHICLE ACTIVITY MODULE | 05-02-2013 |
20130113602 | SYSTEM, METHOD AND APPARATUS FOR CREATING AND MAINTAINING BIOMETRIC SECURE SAFE DEPOSIT BOXES, AND SIMILAR CONTAINERS AND FACILITIES - A method for commissioning a collection of electronic locks by inserting the same electronic key into each of the locks and recording in the electronic key an internal code unique to that lock which identifies the lock and is needed to open the lock and a method for biometrically permitting controlled secure access to a container having one of the commissioned electronic locks. | 05-09-2013 |
20130127591 | SECURE FACILITIES ACCESS - Method, system, and computer program product are provided for secure facilities access. The method may include: receiving an access request from a mobile device to a secure facility; authenticating a user using multifactor biometric authentication with data from the mobile device; obtaining data from one or more fixed sensor devices at a location in the physical vicinity of the secure facility; cross-validating data from the mobile device with data from the one or more fixed sensor devices; and granting access to the secure facility if the authentication of the user and the cross-validation are successful. The cross-validating may determine that the access request from the mobile device is made in the vicinity of the secure facility using data from the one or more fixed sensor devices. | 05-23-2013 |
20130169410 | Telematics On-Board Unit For Vehicles - The present invention relates to telematics on-board units for vehicles including data collection means for collecting vehicle usage data, data transmission means for transmitting collected vehicle usage data and/or analyzed vehicle usage data derived therefrom, to a telematics service platform and driver identification means for identifying a driver using the vehicle and providing a driver identification. In accordance with the present invention, the driver identification means includes a plurality of peripheral elements of different types for entering, detecting and/or receiving different identification data for determining the driver identification on the basis of different identification features, the different peripherals being integrated in a common component to be installed in the vehicle's passenger compartment, thereby simplifying the installation of the device in the vehicle and reducing time and costs of first installation and reducing the number of possible mistakes done during the installation which usually would result in a recall to the installation plant with all costs associated. | 07-04-2013 |
20130176106 | REMOTE CONTROL AND REMOTE CONTROL SYSTEMS - A controller device for controlling multiple devices, where a controller and device are brought into near field communication distance of one another, the proximity of which is such that the controller and device communicate and initiate processes that establish control mechanisms between at least the controller and the respective device, wherein the controller and device each include: a processor for processing digital data; a digital data memory a portion of the memory including digital data usable by the processor to restrict access of the controller to none, one or more devices. | 07-11-2013 |
20130181810 | ERGONOMIC REMOTE CONTROL GLOVE - An ergonomic remote control glove for controlling an electronic device in military applications is disclosed. In one embodiment, the ergonomic remote control glove includes at least one motion sensor and a processor communicatively coupled to the at least one motion sensor. Further, the ergonomic remote control glove includes a communication link to connect to the electronic device. The communication link is communicatively coupled to the processor. Furthermore, the ergonomic remote control glove includes a wearable ergonomic glove configured to include the at least one motion sensor, the processor and the communication link. The processor is configured to send one or more control signals to the electronic device via the communication link upon detecting finger motions and/or hand gestures by the motion sensor. | 07-18-2013 |
20130187754 | INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE - An electronic device includes a structural component and a first sensor, the structural component wears the electronic device onto a body of a user, and the first sensor is provided on the structural component and located at a first position contacting with a body of the user. The method includes: acquiring a first physiological parameter of the user by the first sensor, when the electronic device is worn onto the body of the user, in which the first physiological parameter determines whether the electronic device is to be used by the user; determining whether the electronic device is to be used by the user based on the first physiological parameter to generate a determined result; and generating a first execution instruction in the case that the determined result indicates that the electronic device is to be used by the user. | 07-25-2013 |
20130200996 | GAIT-BASED AUTHENTICATION SYSTEM - Systems and methods for authenticating users based on their gait. A sensor module with multiple sensors is placed inside a user's shoe and biometric data is gathered from the sensors when the user takes a step. The data gathered from each of the sensors is then received by a data processing module. The data is processed and compared with a stored signature from an authenticated user. If the processed data does not match the stored signature within predetermined limits, then the user using the system is not authenticated. An alarm may then be generated. If, on the other hand, there is a match, the user is authenticated and this authenticated result can be used to give the user access to restricted resources. | 08-08-2013 |
20130200997 | CONTROL OF EQUIPMENT USING REMOTE DISPLAY - A wireless deadman system for controlling operation of equipment from a portable device includes a base station with an equipment control system, the base station wirelessly transmitting operational parameters for the equipment. A portable display unit has a housing, an electronic display, an electronic circuit, and a data receiver. A portable authorization device includes a liveness sensor and transmits an authorization signal when the sensor detects a liveness input. The display unit receives an authorization status for operation of the equipment from the portable authorization device and receives the operational parameters from the base station, the display displaying the authorization status and the operational parameters of the equipment on the electronic display. The equipment control system allows the equipment to operate when the authorization signal is provided and prevents the equipment from operating after the authorization signal is no longer provided. | 08-08-2013 |
20130229259 | STANDALONE BIOMETRIC AUTHORIZATION CONTROL DEVICE AND METHOD - A standalone biometric authorization control device ( | 09-05-2013 |
20130278380 | ELECTRONIC DEVICE INCLUDING FINGER MOVEMENT BASED MUSICAL TONE GENERATION AND RELATED METHODS - An electronic device may include a finger biometric sensor and an audio output transducer. The electronic device may further include a controller cooperating with the finger biometric sensor for determining at least one biometric characteristic of a user's finger. The controller may also cooperate with the finger biometric sensor for causing the audio output transducer to generate at least one musical tone changing based upon movement of a user's finger relative to the finger biometric sensor. | 10-24-2013 |
20140009262 | PERSONAL AUTHENTICATION APPARATUS SYSTEM AND METHOD - A target authentication device includes an electrode to detect an electrical signal associated with a user of the device. The electrical signal represents an authentication code for the device. An authentication receiver module is coupled to the electrode. The module receives the electrical signal from the electrode and determines whether the electrical signal matches a predetermined criterion to authenticate the identity of the user based on the electrical signal. An authentication module is also disclosed. The authentication module includes one electrode to couple an electrical signal associated with a user to a user of a target authentication device, the electrical signal represents an authentication code for the device. An authentication transmission module is coupled to the electrode. The authentication transmission module transmits the electrical signal from the electrode. A method of authenticating the identity of a user of a target authentication device also is disclosed. | 01-09-2014 |
20140070918 | TRAIN CONTROL SYSTEM USING DRIVER'S BIOMETRIC INFORMATION - A train control system is disclosed, the system including a biometric information input device configured to receive a driver's biometric information through a sensor and to transmit the driver's biometric information to a cab signal device, wherein the cab signal device compares the biometric information of a driver intending to operate a train with a pre-registered driver's biometric information to verify a relevant driver, and verification of a driver intending to operate a train is realized by biometric information, and unauthorized person's access can be fundamentally avoided because biometric information cannot be copied or leaked due to person's biometric information being intrinsic. | 03-13-2014 |
20140085047 | METHODS AND SYSTEMS FOR EFFICIENT SECURITY SCREENING - The present invention relates to systems and methods relating to security checkpoints. In some embodiments the present invention includes a security checkpoint system that is optimized in one or more of design and décor, audio characteristics, and efficiency in passing customers through the security checkpoint and generating revenue with adverting and sponsorships. | 03-27-2014 |
20140118108 | Wireless Personal Tracking Device - An apparatus for tracking, security, badging, and reporting is disclosed, as is a method of use. The apparatus may take the form of a keycard, fob, badge, or other encapsulated electronic device. The incorporation of an electronic compass, accelerometer, and wireless transceiver allows for the more dynamic uses of the apparatus when compared to existing radio frequency identification (RFID) cards. The power is supplied by a thin film micro energy cell (MEC) battery. Additionally, the apparatus has energy harvesting capabilities to recharge the battery. The apparatus interacts with various communication points, including but not limited to, computer terminals, mobile devices, security points, and entryways. This is achieved using a protocol such as Bluetooth Low Energy. The apparatus interacts and communicates with a host system employed on the premises. | 05-01-2014 |
20140152422 | VEHICLE ACCESS AND SECURITY BASED ON BIOMETRICS - Method for interacting with a vehicle includes controlling interaction with the vehicle based on receipt of a signal by a component on the vehicle, and generating the signal based on biometric data entered via a portable communications device proximate the vehicle. The entered biometric data may be verified as biometric data of a driver of the vehicle prior to generating the signal. The biometric data may be a fingerprint, a palm print, a hand print, a facial image, and/or a voiceprint, all of which may be obtained using the communications device, e.g., a smartphone. The controlled interaction with the vehicle may be maintaining a brake lockout mechanism coupled to at least one brake of the vehicle in a locked state until the signal is received and/or maintaining at least one door of the vehicle in a locked state until the signal is received. | 06-05-2014 |
20140159862 | METHOD AND APPARATUS FOR USER-TRANSPARENT SYSTEM CONTROL USING BIO-INPUT - A wearable sensor vehicle with a bio-input sensor and a processor. When the vehicle is worn, the sensor is arranged so as to sense bio-input from the user. The sensor senses bio-input, the processor compares the bio-input to a standard, and if the standard is met the processor indicates a response. The user may be uniquely identified from the bio-input. One or more systems on or communicating with the vehicle may be controlled transparently, without requiring direct action by the user. Control actions may include security identification of the user, logging in to accounts or programs, setting preferences, etc. The sensor collects bio-input substantially without instruction or dedicated action from the user; the processor compares bio-input against the standard substantially without instruction or dedicated action from the user; and the processor generates and/or implements a response based on the bio-input substantially without instruction or dedicated action from the user. | 06-12-2014 |
20140210590 | ENTRY TECHNOLOGY FOR BUILDING AUTOMATION - A computer system accesses identity data providing unique biometric identifications and associated names for respective people. Roles are stored and associating ones of the roles are associated with ones of the people. Rules are stored, wherein each rule is configured to define one of the roles or people and define a condition and an action. The computer system receives from a device at an entryway, biometric data for a person. A named person is indicated for the received biometric data by the identity data accessed by the computer system. The computer system selects a rule corresponding to the identified person or to one of the defined roles for the identified person. The computer system performs the defined action for the selected rule when a current condition satisfies the defined condition for the selected rule. | 07-31-2014 |
20140218166 | ENSURING THE PROVENANCE OF PASSENGERS AT A TRANSPORTATION FACILITY - The provenance of passengers intending to depart on a vehicle from a transportation facility, is ensured by providing biometric reading devices at both a check-in station and a departure area station of the facility. The name and/or other information concerning a passenger arriving at the facility is also entered for assessment into a background check system. A biometric template of the passenger is acquired by the reading device at the check-in station and forwarded to the departure area station. When the passenger appears at the latter station, a second biometric template is acquired by the reading device there. The second template is compared with each of a number of templates that were forwarded from the check-in station. If no match exists, or if the background check system returns an unsatisfactory assessment, the passenger is refused boarding onto the vehicle. | 08-07-2014 |
20140247110 | SELF-DEFENSE SYSTEM - In an embodiment, a self-defense system is disclosed. The self-defense system may include or comprise a material sized to conform to an appendage, and a defense unit coupled with the material and positioned to initiate a defense event in response to an input. | 09-04-2014 |
20140292479 | Access Authorization Servers, Methods and Computer Program Products Employing Wirleless Terminal Location - An access authorization server includes an access authorization processor configured to receive information concerning an access attempt at a subscribed location, to obtain location information from a wireless network provider for a wireless terminal associated with the subscribed location, to correlate a location of the wireless terminal with the subscribed location, to generate authorization information for the access attempt in response to a result of the correlation of the location of the wireless terminal and the subscribed location, and to transmit the authorization information to a security processor at the subscribed location or to the wireless terminal. Corresponding method and computer program embodiments are disclosed. | 10-02-2014 |
20140313007 | CONDITIONAL AND SITUATIONAL BIOMETRIC AUTHENTICATION AND ENROLLMENT - The present invention provides a system for conditionally selecting biometric modalities for biometric authentication at authentication run time. The inventive concept uses programmatic logic to identify which biometric modalities to use for authenticating a user. The software module for selecting biometric modalities includes, a plurality of rules or conditional logic for selecting one or more biometric modalities required to authenticate a user requesting a secure action. | 10-23-2014 |
20140313008 | SYSTEM AND METHOD FOR PROVIDING SECURE TRANSACTIONAL SOLUTIONS - The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader. | 10-23-2014 |
20140320259 | BIOMETRIC SECURITY APPARATUS FOR ACCESS AND CONTROL OF A PHYSICAL LOCKING STORAGE UNIT - A biometric security apparatus for use with a plurality of server cabinet enclosures is described herein. Each cabinet enclosure is configured with at least one electromechanical lock and a corresponding door. The biometric security apparatus includes a plurality of remote nodes, each remote node configured to provide an output signal to one or more of the at least one electromechanical lock in order to lock or unlock the corresponding door. In one aspect, a bus controller is connected to the plurality of remote nodes and a biometric input device is connected to the controller. In one aspect, a biometric input device is connected to a remote node. The biometric input device is configured to authenticate a user and allow selection of one or more doors to be actuated upon authentication of the user. In one aspect, the bus controller is configured to distribute a command to one or more remote nodes corresponding to doors selected by the user. | 10-30-2014 |
20140333413 | Systems And Methods For High Fidelity Multi-Modal Out-Of-Band Biometric Authentication - Systems and methods for high fidelity multi-modal out-of-band biometric authentication are disclosed. According to one embodiment, a method for multi-mode biometric authentication may include (1) receiving, at a computer application executed by an electronic device, a first input from a first input device on the electronic device; (2) receiving, at the computer application, a second data from a second input device on the electronic device; (3) receiving, at the computer application, a third input from a third input device on the electronic device; and (4) communicating, by the computer application and to a server, the first input, the second input, and the third input. The first input, second input and third input may be received within a predetermined time period, such as five seconds. | 11-13-2014 |
20140354401 | Resource Management Based on Biometric Data - The techniques and systems disclosed herein pertain to preventing unauthorized access to computing resources by unauthorized persons by deploying biometric security. To implement biometric security, the computing device, possibly by the OS, may obtain samples of one or more biometric factors unique to the owner. The computing device may construct pattern-matching templates corresponding to the biometric samples, which may be stored for later use when a protected resource is requested. Computing resources may be selected for protection by a biometric security mechanism by an authorized user or by other techniques or default settings. Before allowing certain restricted actions, the OS may request that the user provide one of the previously registered biometric samples. If the biometric sample matches the user's stored pattern-matching template, the OS may grant access to the computing resource, otherwise, the OS may deny access to the computing resource. | 12-04-2014 |
20140354402 | CONTROL, MONITORING, AND/OR SECURITY, APPARATUS AND METHOD FOR PREMISES, VEHICLES, AND/OR ARTICLES - A computer-implemented method, including receiving, with a receiver or computer, information regarding a user and a personal control and monitoring account associated with the user, processing, with the computer, the information regarding the user and the personal control and monitoring account, wherein the personal control and monitoring account can be utilized to allow the user to perform a control, a monitoring, or a security, operation, action, or function for or regarding any number of premises, any number of vehicle, or any number of articles, determining, with the computer, whether or not the user is an authorized user, and allowing, with the computer, the user to access the personal control and monitoring account if the user is authorized or denying the user access to the personal control and monitoring account if the user is not authorized. | 12-04-2014 |
20140361871 | DEVICE AND METHOD FOR CONTINUOUS BIOMETRIC RECOGNITION BASED ON ELECTROCARDIOGRAPHIC SIGNALS - Signal measurement for biometric recognition purpose includes a computational unit and a sensory unit designed to measure electrocardiographic (ECG) signals in a continuous fashion, guaranteeing that the biometric recognition is performed in an uninterrupted way whenever the device is used, with the purpose of enabling the automated recognition or validation of the identity of its wearer. The sensory unit has an electronic module through which the ECG is acquired. Its operating principle can be based in the electrical conductivity, in which case it requires contact with the skin of the user, or in any kind of capacitive or mechanical element, in which case it does not require any direct contact with the user. The device can be used in alternative or as a complement to existing systems that only perform a momentary identity check. It can be applied to vehicles, tablet computers or analogous contexts. | 12-11-2014 |
20150035643 | BIOMETRICS IDENTIFICATION MODULE AND PERSONAL WEARABLE ELECTRONICS NETWORK BASED AUTHENTICATION AND TRANSACTION PROCESSING - Biometrics identification module and personal wearable electronics network based authentication and transaction processing are disclosed. According to one embodiment, a method for biometric authentication may include (1) a biometric identification device connecting to a plurality of sensing devices, each of the plurality of sensing devices receiving a user characteristic from a user; (2) the biometric identification device receiving the user characteristics from the sensing devices; (3) the biometric identification device communicating the received user characteristics to a server; (4) the biometric identification device receiving a biometric profile for the user; and (5) the biometric identification device storing the biometric profile. | 02-05-2015 |
20150061824 | INFORMATION PROCESSING DEVICE, DETERMINATION METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM - An information processing device includes a collecting unit that collects biological information of a first user and a second user. The information processing device includes a specifying unit that specifies an emotion of the first user toward the second user and an emotion of the second user toward the first user using the biological information acquired by the collecting unit. The information processing device includes a determining unit that determines whether or not to provide information on the second user to the first user based on respective emotions specified by the specifying unit. | 03-05-2015 |
20150061825 | INFORMATION PROCESSING DEVICE, CONTROL METHOD, AND A NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM - An information processing device includes a collecting unit which collects user's biological information. The information processing device includes a determining unit which determines an emotion of the user by using the biological information collected by the collecting unit. The information processing device includes an output unit which outputs in association with information representing the user and the emotion of the user determined by the determining unit to terminal devices which are used by other users. | 03-05-2015 |
20150077222 | PARKING MANAGEMENT AND BILLING - A parking management system including a server, a plurality of mobile parking management devices mounted in cars, an plurality of parking area parking control devices mounted in a parking areas, and a plurality of portable parking control devices used by parking attendants, all communicating via one or more wireless networks. Upon request, the server provides a mobile parking management device with information pertaining to parking availability and to commercial establishments offering parking payment refunds. Upon request a commercial establishments sends a parking payment refund to the server. Upon request the server bills the account associated with the mobile parking management device according to the parking fee and period of parking. | 03-19-2015 |
20150116079 | ENHANCED VEHICLE KEY FOB - An enhanced vehicle key fob includes a controller that is coupled to a power source, an antenna, and an accelerometer that measures the acceleration of the enhanced vehicle key fob and outputs the measurement to the controller, wherein the enhanced vehicle key fob controls a vehicle function of a vehicle using the output of the accelerometer. | 04-30-2015 |
20150137937 | PERSISTENT USER IDENTIFICATION - Embodiments are disclosed that relate to persistently identifying a user interacting with a computing device. For example, one disclosed embodiment provides a method comprising receiving biometric data regarding the user, determining a determined identity of the user based on the biometric data, outputting a notification of the determined identity of the user, and providing a mechanism to receive feedback regarding a correctness of the determined identity of from the user. | 05-21-2015 |
20150317855 | BIOMETRICS FOR USER IDENTIFICATION IN MOBILE HEALTH SYSTEMS - A wearable device may include a sensor system capable of obtaining physiological from a user's body. Some wearable devices may include a substance delivery system. A sensor system of a wearable device may include at least one “bio-assurance sensor” capable of obtaining biometric data that may be used to identify a user. For example, the bio-assurance sensor may be used to ensure that the wearable device is not removed from the user's body and/or placed on or in another user's body. In some examples, the wearable device may be used with a second device, such as a smart phone, that includes at least one “authentication sensor,” such as a fingerprint sensor, that also may be used to identify a user. However, in some implementations the wearable device may include at least one authentication sensor. | 11-05-2015 |
20150371469 | SMART LOCK SYSTEMS AND METHODS - A door lock system can comprise a door lock movable between a locked state and an unlocked state. The door lock system can detect a first indication suggestive of a presence of a visitor. The door lock system can also detect a second indication suggestive of an identity of the visitor. As well, the door lock can validate that the first indication and the second indication are associated with a first identity. | 12-24-2015 |
20150373019 | ELECTROCARDIOGRAM (ECG) BIOMETRIC AUTHENTICATION - Electrocardiogram, better known as ECG or EKG, is a method used to measure and record the electrical potential generated by the heart on the skin. ECG data is unique to a user and can be used for authentication systems such as access or financial cards or for granting access to computing devices such as mobile devices. Electrode contact on a card or device are used to received ECG data which is processed to extract features of the ECG which are compared to a template for a user. | 12-24-2015 |
20160012656 | INDIVIDUALIZED CONTROL SYSTEM UTILIZING BIOMETRIC CHARACTERISTIC AND OPERATING METHOD THEREOF | 01-14-2016 |
20160055694 | ACCESS MANAGEMENT AND RESOURCE SHARING SYSTEM BASED ON BIOMETRIC IDENTITY - Disclosed are an apparatus and a method for managing access to a shared resource based on identity that is established by use of biometric data. A biometric locking device (i.e., a “b-lock”) can be used to restrict access to a shared resource, such as a house, a car, etc. In some embodiments, the b-lock can establish an identity of a user based on biometric data obtained by a biometric sensor of the b-lock, and can register the biometric data. After the biometric data is registered, the user can scan, e.g., his finger using the biometric sensor of the b-lock, and the b-lock can verify that the biometric data obtained based on the scan of the finger matches the registered biometric data. Once verified, the b-lock can unlock a locking mechanism of the b-lock to enable the user to access the shared resource. | 02-25-2016 |
20160055695 | ACCESS MANAGEMENT AND RESOURCE SHARING PLATFORM BASED ON BIOMETRIC IDENTITY - Disclosed are an apparatus and method that enables an owner/administrator to manage access to a shared resource based on identity that is established by use of biometric data. For example, access to a shared physical resource can be restricted via use of a biometric locking device. An access management platform can be used to authorize a new user to access the shared resource. Once authorized, the new user can unlock the biometric locking device based on, for example, fingerprint data of his finger. The access management platform can similarly be used to manage access to a virtual shared resource, such as an online account. A virtual locking device, such as a computer that acts as an intermediary between the user and the online account, can be used to restrict access to the online account. The access management platform can enable the user to access the online account based on biometric data. | 02-25-2016 |
20160055698 | Network-Assisted Remote Access Portal - A computing system contains a processor that is configured to receive, with the user interface, a registered access code and access permissions from a remote user of a property having a property location. The registered access code may be configured to provide access to the property. The access permissions may include a predefined access period that the access code is valid to provide access to the property. The processor may further be configured to receive a provided access code of a local user of the property in response to a user location of the local user being near the property location, match the provided access code with the registered access code, and grant or deny access to the property based in part on the provided access code matching the registered access code and being received within the predefined access period. | 02-25-2016 |
20160071343 | PREAUTHORIZED WEARABLE BIOMETRIC DEVICE, SYSTEM AND METHOD FOR USE THEREOF - Embodiments are directed towards authenticating users using biometric devices. The biometric device may be arranged to capture one or more biometric feature of a user that may be wearing the biometric device such as biometric features that correspond to an electrocardiogram of the user. The user of the biometric device may be authenticated based on one or more biometric features, or a combination thereof. Authenticating the user of the biometric device, may include communicating information that includes biometric features to an authorized authentication device (AAD). When the user is authenticated, the biometric device may be preauthorized for the user. When the preauthorized biometric device senses at least one access point, an authorization signal may be provided to the access point. If the preauthorized biometric device is removed from the user, the biometric device is deauthorized, disabling access to access points by the user. | 03-10-2016 |
20160093129 | System and Method of Enhanced Identity Recognition Incorporating Random Actions - A system and method for authenticating a requester seeking service. In response to a received request, the system selects a random biometric behavior. A request to provide the selected behavior is output by the system. Evaluation circuitry compares the received behavioral response, from the requester, to information from an authorized user database and determines if the requested service should be provided. | 03-31-2016 |
20160098878 | SMARTPHONE CONTROLLED BIOMETRIC AND BLUETOOTH ENABLED SMART WALLET SYSTEM - This application provides an electronic wallet or passport case for controlling the opening, unlocking and locking of enclosures such as luggage, briefcases, lockers, cases, cabinets, vehicles, buildings, homes and with indirect operational control by the means of a smartphone, tablet or any personal computing device. More particularly, a Smartphone Controlled Biometric and Bluetooth Enabled Locking Smart Wallet System is provided. The Smartphone Controlled Biometric and Bluetooth Enabled Locking Smart Wallet System includes a biometric based finger print authentication module, and a Bluetooth communications enabled module, to prevent a non-owner or unauthorized user from accessing the device, along with mobile applications to control the Smart Wallet System using a smartphone. The smart wallet equipped unit may be replaced by any locking case such as a briefcase or luggage. | 04-07-2016 |
20160109959 | ELECTRONIC DEVICE - An electronic device and method are disclosed, the electronic device including a variable detection module operable in a plurality of modes, each of the plurality of modes configuring the variable detection module to detect a different external signal; and a controller. The controller may implement the method, including operating the variable detection module in one of the plurality of operating modes, and executing a function of the electronic device in response to a signal detected by the variable detection module. | 04-21-2016 |
20160117876 | METHOD OF CONTROL OF PERSONS AND APPLICATION TO THE INSPECTION OF PERSONS - The invention relates to a method of control of persons, in which various control/inspection steps are implemented at various control points intended to be crossed by a person, characterized by the implementation of the following operations:—when a person passes a first point: • acquisition of biometric data of the person, • generation of a secure identity token, on the basis of biometric and/or identification data of the person, the token being an encrypted biometric signature obtained on the basis of a biometric datum acquired on the person, • generation of a public identifier associated with said token and storage of said identifier in a data base in association with the identity tokens or the data on the basis of which they are generated,—when a person passes at least one other control point, • acquisition of an identity datum and/or of a biometric datum about the same biometric trait or traits of those about which the biometric datum was acquired on passing the first control point, and on the basis of which the identity token (J) was generated, • determination of the public identifier of the person, by implementing an authentication of said person on the basis of the datum or data acquired and of the data stored in the database. The invention also relates to a system for controlling and for inspection of persons for the implementation of the method. | 04-28-2016 |
20160155279 | SYSTEM AND METHOD OF ASSOCIATING, ASSIGNING, AND AUTHENTICATING USERS WITH PERSONAL PROTECTIVE EQUIPMENT USING BIOMETRICS | 06-02-2016 |
20160162674 | METHOD AND APPARATUS FOR PROCESSING SENSOR DATA OF DETECTED OBJECTS - A system that incorporates teachings of the subject disclosure may include, for example, a method for detecting, by a system including at least one processor, a presence of an object from sensor data generated by a sensor device, retrieving, by the system, from a memory device a plurality of profiles biometrically descriptive of approved objects, asserting, by the system, an alarm responsive to determining from the sensor data that the detected object is not biometrically correlated to any of the plurality of profiles, classifying, by the system, the detected object as an authorized object responsive to determining from the sensor data that the detected object is biometrically correlated to at least one of the plurality of profiles, and notifying, by the system, at least one neighboring device responsive to asserting the alarm or responsive to classifying the detected object as the authorized object. Other embodiments are disclosed. | 06-09-2016 |
20160171804 | AUTHENTICATION OF USERS WITH TREMORS | 06-16-2016 |
20160180618 | INCREASED SECURITY ELECTRONIC LOCK | 06-23-2016 |
20160189455 | SYSTEM AND METHOD FOR MANAGING ACCESS FOR RESTRICTED AREA AND INFORMATION USED FOR ACCESS TO RESTRICTED AREA - An authenticating system includes: a biometric information registering device to obtain a first biometric information of a person entering into the area to register the first biometric information with identification information of the person in a database; an biometric authentication device to obtain a second biometric information of the person to authenticate the person based on the first biometric information and the second biometric information; and a biometric information deleting device to obtain a third biometric information of a person leaving the area to delete the first biometric information registered in the database when the first biometric information matches with the third biometric information. | 06-30-2016 |
20160378964 | System and Method for Detecting Liveness During Biometric Authentication - In certain embodiments of the present disclosure relate to a method for detecting liveness of a user during biometric authentication. The method comprising identifying a speech signal in a pre-determined time interval associated with the speech signal. Furthermore, the method comprising determining a speech respiration co-occurrence (SRC) score associated with the speech signal. In addition, the method comprising detecting liveness of the user, if the SRC score is above a predefined threshold, wherein the detection of liveness further aids in increasing the security of biometric authentication system. | 12-29-2016 |
20170231349 | SECURE PORTABLE ENCASEMENT SYSTEM | 08-17-2017 |
20180025143 | INDIVIDUALIZED CONTROL SYSTEM UTILIZING BIOMETRIC CHARACTERISTIC | 01-25-2018 |
20180025563 | Security and Public Safety Application for a Mobile Device with Audio/Video Analytics and Access Control Authentication | 01-25-2018 |