IDENTIFICATION WITH RFID ASSET LOCATOR FOR ENTRY AUTHORIZATION
First Claim
1. A system for controlling access by a person at secure facilities to locations and assets contained in those locations, comprising:
- a location at a secure facility that a person accesses or leaves through an access point controlled by a lock mechanism;
a biometric reader fixedly located proximate to the access point and positioned such that the person interacts with the biometric reader to produce at least one new biometric feature reading;
a personal RFID tag storing data comprising personal tag data wherein the personal RFID tag is carried by the person and wherein the biometric reader passes the new biometric feature reading to the personal RFID tag;
an RFID receiver that queries the personal RFID tag to obtain the personal tag data and the new biometric feature reading;
a prior biometric feature reading that was previously obtained; and
a comparator that compares the prior biometric feature reading and the new biometric feature reading and wherein the locking mechanism permits the person to transit the access point only when the prior biometric feature reading matches the new biometric.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for controlling access at secure facilities to locations and assets contained in those locations, comprising a biometric identification device, an RFID tag and receiver, and a database for processing information from them to allow or deny access to the locations and assets. The system ties into an existing network in the facility and also includes a programming device for evaluation of the biometric template and acknowledgement of the identification, if made. The system also controls the permissible locations of assets such as laptops, desktop computers, photographic equipment, weapons such as rifles, data storage devices and the like, such that while a person may have access to a location, use of an asset or removal of the asset may not be part of that person'"'"'s authorized conduct.
-
Citations
20 Claims
-
1. A system for controlling access by a person at secure facilities to locations and assets contained in those locations, comprising:
-
a location at a secure facility that a person accesses or leaves through an access point controlled by a lock mechanism; a biometric reader fixedly located proximate to the access point and positioned such that the person interacts with the biometric reader to produce at least one new biometric feature reading; a personal RFID tag storing data comprising personal tag data wherein the personal RFID tag is carried by the person and wherein the biometric reader passes the new biometric feature reading to the personal RFID tag; an RFID receiver that queries the personal RFID tag to obtain the personal tag data and the new biometric feature reading; a prior biometric feature reading that was previously obtained; and a comparator that compares the prior biometric feature reading and the new biometric feature reading and wherein the locking mechanism permits the person to transit the access point only when the prior biometric feature reading matches the new biometric. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for controlling access by a person at secure facilities to locations and assets contained in those locations, comprising:
-
a location that a person accesses or leaves through an access point controlled by a lock mechanism; a biometric reader fixedly located proximate to the access point and positioned such that the person interacts with the biometric reader to produce at least one new biometric feature reading; a personal RFID tag storing data comprising personal tag data wherein the personal RFID tag is carried by the person, and wherein the biometric reader passes the new biometric feature reading to the personal RFID tag; an RFID receiver that queries the personal RFID tag to obtain the personal tag data and the new biometric feature reading; an asset within the location wherein an asset RFID tag is fixed to the asset and wherein the RFID receiver obtains asset data from the asset RFID tag; a prior biometric feature reading that was obtained prior to the person interacting with the biometric reader; and an access verifier that examines the prior biometric feature reading, the new biometric feature reading, and the asset data to determine if the person has permission to access the asset and wherein the locking mechanism permits the person to transit the access point only when the person does have permission to access the asset. - View Dependent Claims (13, 14, 15)
-
-
16. A system comprising:
-
a location where a person accesses an asset wherein an asset RFID tag is fixed to the asset; a personal RFID tag storing data comprising personal tag data wherein the personal RFID tag is carried by the person; an RFID receiver that queries the personal RFID tag to obtain the personal tag data and queries the asset RFID tag to obtain asset data; an access verifier that examines the personal tag data and the asset data to determine if the person has permission to use the asset and wherein the access verifier causes the asset to be disabled unless the person does have permission to use the asset. - View Dependent Claims (17, 18, 19, 20)
-
Specification