Voice authenticated alarm exit and entry interface system
First Claim
1. A biometric security system, comprising:
- a detector for detecting an identifier of a wireless tag carried by a user;
a biometric user interface for obtaining biometric data of the user;
at least one database for storing at least one tag identifier and at least one biometric template; and
at least one processor for verifying an identity of the user by determining whether the detected identifier matches the at least one tag identifier, and whether the biometric data matches the at least one biometric template;
wherein the at least one processor controls the security system by at least one of arming and disarming the security system if the identity of the user is verified.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system includes biometric authentication such as voice authentication with wireless tag detection to identify both the user and a wireless tag carried by the user. When the user approaches the entrance to a building that is secured by the security system, a tag detector of a user interface receives an identifier from the tag. The user interface transmits the tag identifier to a base station for comparison to pre-stored tag identifiers in a database. If there is a match, the user is prompted to provide a biometric input, such as by speaking a pre-arranged phrase. The biometric input is compared with templates stored in the database to determine if there is a match. If there is a match, the security system is disarmed. The template can be selected based on the tag identifier to improve processing speed.
-
Citations
19 Claims
-
1. A biometric security system, comprising:
-
a detector for detecting an identifier of a wireless tag carried by a user;
a biometric user interface for obtaining biometric data of the user;
at least one database for storing at least one tag identifier and at least one biometric template; and
at least one processor for verifying an identity of the user by determining whether the detected identifier matches the at least one tag identifier, and whether the biometric data matches the at least one biometric template;
wherein the at least one processor controls the security system by at least one of arming and disarming the security system if the identity of the user is verified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A biometric security system, comprising:
-
means for detecting an identifier of a wireless tag carried by a user;
means for obtaining biometric data of the user;
means for storing at least one tag identifier and at least one biometric template; and
means for verifying an identity of the user by determining whether the detected identifier matches the at least one tag identifier, and whether the biometric data matches the at least one biometric template;
means, responsive to the verifying means, for controlling the security system by at least one of arming and disarming the security system if the identity of the user is verified.
-
-
19. A method for providing a biometric security system, comprising:
-
detecting an identifier of a wireless tag carried by a user;
obtaining biometric data of the user;
storing at least one tag identifier and at least one biometric template; and
verifying an identity of the user by determining whether the detected identifier matches the at least one tag identifier, and whether the biometric data matches the at least one biometric template; and
responsive to the verifying, controlling the security system by at least one of arming and disarming the security system if the identity of the user is verified.
-
Specification