System and method for gate access control
First Claim
1. A method for providing dynamic security verification, comprising:
- storing data regarding information and a face print of a person in a database, wherein the face print is represented by numerical codes of a face image of the person;
at a first checkpoint, reading an RFID device and relating a read RFID number to the information stored in the database, retrieving a face print corresponding to the RFID device from the database;
scanning a face of the person to obtain a facial image;
comparing the facial image with the retrieved face print; and
at a second checkpoint, re-reading the RFID device and comparing the re-read RFID device at the first checkpoint.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for providing stand-off biometric verification of a driver of a vehicle at a control gate while the vehicle is moving, including a pre-verification system and a post-verification systems. The pre-verification system is installed before an entrance of a facility and comprises an RFID vehicle tag reader, an RFID personal tag reader and a facial detection and recognition (verification) system. The RFID vehicle tag reader scans and reads an ID from an RFID vehicle tag of the vehicle that is trying to pass through the gate. The RFID personal tag reader reads an ID from an RFID personal tag carried by personnel who are driving in the vehicle. The facial detection and verification system scans and reads facial images for the driver. The post-verification system is installed on at least one of an entrance and an exit for post-verification to ensure that the vehicle that enters the entrance or leaves from the exit is the one that has been verified/denied at the control gate. In one embodiment, the post-verification system comprises an RFID personal tag reader and an RFID vehicle tag reader. In another embodiment, the post-verification system also comprises a facial detection and recognition system.
-
Citations
27 Claims
-
1. A method for providing dynamic security verification, comprising:
-
storing data regarding information and a face print of a person in a database, wherein the face print is represented by numerical codes of a face image of the person;
at a first checkpoint, reading an RFID device and relating a read RFID number to the information stored in the database, retrieving a face print corresponding to the RFID device from the database;
scanning a face of the person to obtain a facial image;
comparing the facial image with the retrieved face print; and
at a second checkpoint, re-reading the RFID device and comparing the re-read RFID device at the first checkpoint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for dynamically verifying a vehicle and a person riding in the vehicle at a control gate, the method comprising:
-
storing information associated with the person'"'"'s RFID tag, wherein the information associated with the person comprises personal information regarding the personnel and vehicle information regarding a vehicle that the person is driving;
at a first sensing point, reading an ID from the RFID tag when the vehicle passes through the first sensing point and sending the ID to a computer for processing;
retrieving data regarding the vehicle and person from a database based on the RFID and comparing the retrieved data with the read data;
at a second sensing point, re-reading the ID from the RFID tag and sending re-read data to the computer;
retrieving template data corresponding to the data read from the RFID tag at the first sensing point; and
comparing the retrieved template data with data read at the second sensing point to determine whether the template data and the data read at the second sensing point match. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for dynamic stand-off verification at a control gate, comprising:
-
a database for storing data regarding the information of a plurality of individuals;
a first verification device installed at the control gate comprising a first RFID tag reader for reading data from an RFID tag on which information of an individual is stored;
a computer for processing the data read by the RFID tag reader, and a second verification device installed on at least one of an entrance and an exit, comprising at least one of a second and a third RFID tag readers for reading the RFID tag;
wherein the data read by the first verification device are sent to the computer, and the computer, according to received ID, retrieves data regarding information associated with the at least one individual from the database and determines if the received data matches stored data, wherein if the data read by the first verification device and the retrieved ID, from the database match, the individual is directed to the entrance, wherein if the ID read from the RFID tag and the retrieved data do not match, the individual is directed to an exit; and
wherein the data obtained at the first verification device and the second verification device are sent to the computer for processing to compare if these two data match. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification