System and method for securing a defined perimeter using multi-layered biometric electronic processing
First Claim
1. A method for providing security to a defined perimeter, the defined perimeter having at least one point of entry connecting the defined perimeter to an area external to the defined perimeter, one or more zones internal to the defined perimeter, and a central database that has stored therein a public biometric code associated with an authorized visitor, the method comprising:
- receiving at the point of entry from an authorized visitor an electronic credential having stored therein a private biometric code and an identification code;
receiving at a point of entry a private biometric code proffered by an authorized visitor;
making, a first determination whether the proffered private biometric code matches the private biometric code stored in the credential;
in the event the proffered private biometric code matches the private biometric code stored in the credential, acquiring at the point of entry a first instance of a public biometric code;
making, a second determination whether the acquired first instance of the public biometric code matches the public biometric code in the central database associated with the identification code;
in the event the acquired first instance of the public biometric code matches the public biometric code in the central database associated with the identification code;
saving the acquired first instance of the public biometric code to the central database;
assigning the authorized visitor access rights to one or more zones within the defined perimeter;
granting the authorized visitor entry to the defined perimeter;
acquiring at a zone boundary an second instance of the public biometric code;
comparing the acquired second instance of the public biometric code to the acquired first instance of the public biometric code; and
making a third determination whether the authorized visitor has violated the access rights.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securing a defined perimeter using multi-layered biometric electronic processing. The present invention provides means for authorizing objects to enter a defined perimeter, for assigning an object access rights to zones within a defined perimeter, and for monitoring and tracking objects within the defined perimeter without undue intrusion or delay. A private biometric and a public biometric are used to identify a human object to allow the human object to enter a defined perimeter. The public biometric is used monitor the movement of a human object within zones and to identify human objects that are in violation of their assigned access rights. In an air transportation system, the defined perimeter comprises all airport, airport terminals and facilities within the system.
119 Citations
1 Claim
-
1. A method for providing security to a defined perimeter, the defined perimeter having at least one point of entry connecting the defined perimeter to an area external to the defined perimeter, one or more zones internal to the defined perimeter, and a central database that has stored therein a public biometric code associated with an authorized visitor, the method comprising:
-
receiving at the point of entry from an authorized visitor an electronic credential having stored therein a private biometric code and an identification code;
receiving at a point of entry a private biometric code proffered by an authorized visitor;
making, a first determination whether the proffered private biometric code matches the private biometric code stored in the credential;
in the event the proffered private biometric code matches the private biometric code stored in the credential, acquiring at the point of entry a first instance of a public biometric code;
making, a second determination whether the acquired first instance of the public biometric code matches the public biometric code in the central database associated with the identification code;
in the event the acquired first instance of the public biometric code matches the public biometric code in the central database associated with the identification code;
saving the acquired first instance of the public biometric code to the central database;
assigning the authorized visitor access rights to one or more zones within the defined perimeter;
granting the authorized visitor entry to the defined perimeter;
acquiring at a zone boundary an second instance of the public biometric code;
comparing the acquired second instance of the public biometric code to the acquired first instance of the public biometric code; and
making a third determination whether the authorized visitor has violated the access rights.
-
Specification