Encrypted biometric encoded security documents
First Claim
1. A travel permissions communication interface system comprising a scanner, a identifying characteristic reader, a computer, a comparator, a connection means, and a disposition device, wherein the connection means operably connects the computer to the scanner, the reader and disposition device, wherein the scanner reads a portable identification carrier on which is encoded machine-readable, digital identifying characteristic data of at least one person, the carrier comprising layers of binary information, each represented in a different color from either the visible or invisible part of the spectrum;
- wherein the computer has;
(a) transmission means to transmit such scanned identifying characteristic data from the scanner to the computer for verification of the authenticity of the carrier, and (b) logical extraction means to extract an identifying characteristic of a certain identifying characteristic parameter from the identifying characteristic data encoded on the carrier, wherein the identifying characteristic reader is adapted to read a same identifying characteristic parameter of the at least one person purported to be identified by the carrier, wherein the comparator compares the encoded identifying characteristic with the extracted identifying characteristic to authenticate the at least one person associated with the carrier;
wherein the connection means, if the carrier and at least one person are authenticated, enables the computer to connect to a data storage device of permissions associated with that person or type of person; and
wherein the disposition device dispositions the at least one person in a prescribed manner.
0 Assignments
0 Petitions
Accused Products
Abstract
A travel permissions communication interface system is provided, having a scanner, a identifying characteristic reader, a computer, a comparator, a connection device, and a display, all of which being managed by a computer operably connected therebetween. The scanner (a) reads a portable identification carrier onto which is encoded identifying characteristic data of at least one person; (b) sends such identification data to the computer for verification of authenticity of the carrier and (c) extracts a identifying characteristic of a certain identifying characteristic parameter from the identifying characteristic data encoded on the carrier. The identifying characteristic reader reads a same identifying characteristic parameter of the person purported to be identified by the carrier. The comparator compares the encoded identifying characteristic with the extracted identifying characteristic to authenticate the person associated with the carrier. The connection means, if the carrier and at least one person are authenticated, enables the computer to connect to a data storage device of travel permissions associated with that person or type of person. The display displays the travel permissions to an authority to aid the authority in determining a disposition with regard to the person. A method of using a travel permissions communication interface system is also disclosed.
-
Citations
50 Claims
-
1. A travel permissions communication interface system comprising a scanner, a identifying characteristic reader, a computer, a comparator, a connection means, and a disposition device,
wherein the connection means operably connects the computer to the scanner, the reader and disposition device, wherein the scanner reads a portable identification carrier on which is encoded machine-readable, digital identifying characteristic data of at least one person, the carrier comprising layers of binary information, each represented in a different color from either the visible or invisible part of the spectrum; -
wherein the computer has;
(a) transmission means to transmit such scanned identifying characteristic data from the scanner to the computer for verification of the authenticity of the carrier, and (b) logical extraction means to extract an identifying characteristic of a certain identifying characteristic parameter from the identifying characteristic data encoded on the carrier, wherein the identifying characteristic reader is adapted to read a same identifying characteristic parameter of the at least one person purported to be identified by the carrier, wherein the comparator compares the encoded identifying characteristic with the extracted identifying characteristic to authenticate the at least one person associated with the carrier;
wherein the connection means, if the carrier and at least one person are authenticated, enables the computer to connect to a data storage device of permissions associated with that person or type of person; and
wherein the disposition device dispositions the at least one person in a prescribed manner. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of using a travel permissions communication interface system, wherein the method comprises the steps of:
-
reading a portable identification carrier onto which is encoded identifying characteristic data of at least one person;
sending such identification data to the computer for verification of authenticity of the carrier;
extracting a identifying characteristic of a certain identifying characteristic parameter from the identifying characteristic data encoded on the carrier;
reading a same identifying characteristic parameter of the at least one person purported to be identified by the carrier, comparing the encoded identifying characteristic with the extracted identifying characteristic to authenticate the at least one person associated with the carrier;
if the carrier and at least one person are authenticated, enabling the computer to connect to a data storage device of permissions associated with that person or type of person; and
displaying the permissions to an authority to aid the authority in determining a disposition with regard to the at least one person.
-
-
24. A computer-readable medium encoded with a method of using a travel permissions communication interface system, the method comprising the steps of:
-
reading a portable identification carrier onto which is encoded identifying characteristic data of at least one person;
sending such identification data to the computer for verification of authenticity of the carrier;
extracting a identifying characteristic of a certain identifying characteristic parameter from the identifying characteristic data encoded on the carrier;
reading a same identifying characteristic parameter of the at least one person purported to be identified by the carrier, comparing the encoded identifying characteristic with the extracted identifying characteristic to authenticate the at least one person associated with the carrier;
if the carrier and at least one person are authenticated, enabling the computer to connect to a data storage device of permissions associated with that person or type of person; and
displaying the permissions to an authority to aid the authority in determining a disposition with regard to the at least one person.
-
- 25. An identification carrier reading and decoding device which reads and decodes an encoded, encrypted identifying characteristic on a portable identification carrier, the device including a scanner, a processor, and a comparator, wherein the scanner reads the encrypted identifying characteristic and transmits the read data to the processor for processing, the processor decrypts the identifying characteristic and transmits the decrypted identifying characteristic on to the comparator, and the comparator compares this data with identifying characteristic data of the same type read by an identification characteristic reader from a person purported to be associated with the carrier, in order to verify the person'"'"'s identity and subsequently, if identity is verified, to permit access to corresponding permission data.
- 27. An enhanced data storage device for machine-readable, digital data, for use in a portable identification carrier having at least one application surface onto which at least one layer is applied, the layer comprising encoded binary machine-readable, digital identifying characteristic data of at least one person, the data of each person being represented in a different color in the at least one layer.
-
50. A logical security verification method, the method establishing the coherence of information contained within a data storage device in which open data is also encoded and encrypted on the storage device in binary, machine readable data layers, the method having the following steps:
-
(a) scanning data zones on the storage device, (b) reading both the open data and the encoded encrypted data in the data zones of the storage device;
(c) decrypting the encoded, encrypted data read from one or more of the data layers;
(d) decoding the decrypted data; and
(e) comparing the information applied to the storage device in the open to that portion of the encrypted, encoded data in which the open data is also stored; and
(f) if the open data does not match the formerly encoded, encrypted open data, the storage device is flagged as counterfeit, and if the data do match, the storage device is flagged as genuine.
-
Specification