IDENTIFICATION AND VERIFICATION METHOD AND SYSTEM FOR USE IN A SECURE WORKSTATION
First Claim
1. A method for identifying and verifying a user seeking access to a secured workstation comprising the acts of:
- spontaneously detecting a first personal identification data set of an intended user associated with a wireless identification device upon positioning of said device within a predetermined proximity of said workstation;
querying at least one database accessible to said workstation by using said first personal identification data set for retrieval of a second personal identification data set, said second personal identification data set further including biometric data corresponding to said intended user;
obtaining biometric data from said user seeking access to said secured workstation from at least one biometric device disposed on said workstation; and
comparing said user obtained biometric data with said second personal identification data set to verify said user as said intended user;
whereby said user seeking access to said secured workstation is identified and verified, thereby permitting access to said secured workstation.
1 Assignment
0 Petitions
Accused Products
Abstract
The instant invention relates to a method and system for identifying and verifying a user seeking access to a secured workstation. The inventive procedure comprising the following acts. First, the first personal identification data (PIDS) within a wireless identification device is spontaneously detected by a secure workstation when located within a predetermined proximity. Next, at least one database accessible to the workstation is queried to retrieve the first personal identification data set and a second PIDS. The second PIDS contains biometric data corresponding to the user. Once the biometric data from the user is obtained at the point of transaction it is compared with the second PIDS to verify the identity of user. If there is a match, the user is permitted access to the secured workstation.
-
Citations
9 Claims
-
1. A method for identifying and verifying a user seeking access to a secured workstation comprising the acts of:
-
spontaneously detecting a first personal identification data set of an intended user associated with a wireless identification device upon positioning of said device within a predetermined proximity of said workstation; querying at least one database accessible to said workstation by using said first personal identification data set for retrieval of a second personal identification data set, said second personal identification data set further including biometric data corresponding to said intended user; obtaining biometric data from said user seeking access to said secured workstation from at least one biometric device disposed on said workstation; and comparing said user obtained biometric data with said second personal identification data set to verify said user as said intended user; whereby said user seeking access to said secured workstation is identified and verified, thereby permitting access to said secured workstation. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An identification and verification system for accessing a secured workstation, comprising:
-
at least one wireless identification device having a processing module for spontaneously communicating a first personal identification data set to a secured workstation located within a predetermined proximity; said secured workstation having at least one communications port for receiving said first personal identification data set, said workstation including at least one biometric device for obtaining biometric data from said user seeking access thereto; and at least one database accessible to said workstation and containing said first personal identification data set and a second personal identification data set, said second personal identification containing user biometric data, said workstation having at least one processing module for polling said database and comparing said user obtained biometric data with said second personal identification data; whereby said user seeking access to said secured workstation is identified and verified thereby permitting access to said secured workstation. - View Dependent Claims (7, 8, 9)
-
Specification