RFID tag and method of user verification
First Claim
1. A method of verifying a user for access to a secure system or location, the method comprising the steps of:
- (a) acquiring identification information from an identification tag worn by the user;
(b) acquiring biometric information corresponding to the user including finger pulse information and wrist pulse information; and
(c) if the identification information is valid and if the finger pulse information matches the wrist pulse information, granting access to the user.
0 Assignments
0 Petitions
Accused Products
Abstract
An identification tag (100) facilitates use of a secure computer system (300). The tag (100) is adapted to be worn on a user'"'"'s wrist and includes an identification and registration circuit (102) that includes an identification component (106), an affiliation component (110), and a light-emitting diode (112). The computer system includes an RF identification tag registration device (302) operable to acquire user physical information and communicate the physical information to a computer (202), wherein the computer verifies that a valid user is wearing the tag (100). The identification and registration device (302) ensures that the physical information communicated to the computer pertains to the user wearing the tag by comparing pulse signals acquired from the user'"'"'s hand and wrist as the device (302) is acquiring physical information. The computer (202) uses the identification information and the affiliation information to log the user into and out of the system (300), and to associate the identification information with a particular user.
-
Citations
20 Claims
-
1. A method of verifying a user for access to a secure system or location, the method comprising the steps of:
-
(a) acquiring identification information from an identification tag worn by the user;
(b) acquiring biometric information corresponding to the user including finger pulse information and wrist pulse information; and
(c) if the identification information is valid and if the finger pulse information matches the wrist pulse information, granting access to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of verifying a user for access to a secure system or location, the method comprising the steps of:
-
(a) acquiring identification information from an identification tag worn by the user;
(b) acquiring biometric information corresponding to the user for each attempted user access, the biometric information including fingerprint information; and
(c) if the identification information is valid and the fingerprint information corresponds to the identification information for each attempted user access, granting access to the user. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method of verifying a user for access to a secure system or location, the method comprising the steps of:
-
(a) confirming communication with an identification tag worn by a user by sensing an infrared signal emitted from an LED coupled with the tag;
(b) acquiring identification information from the tag;
(c) acquiring biometric information corresponding to the user; and
(d) if the communication is confirmed, the identification information is valid, and the biometric information corresponds to the identification information, granting access to the user - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification