Procedure for operating a security system
First Claim
1. A method of operating a security system having a security device which the user can unlock by use of a transmitter unit, said method comprising:
- at the transmitter unit, scanning a finger print of the user by a detector on the transmitter and generating an identification signal characterizing the user from the detected fingerprint;
transmitting the identification signal from the transmitter unit to the security device via a wireless transmission route; and
, unlocking the security device only if there is a match between the identification signal transmitted by the transmitter unit and a stored identification signal provided by a user authorized to unlock the security device.
1 Assignment
0 Petitions
Accused Products
Abstract
A security device (2) of a security system which a user can unlock by means of a transmitter unit (1) normally can also be unlocked by unauthorized users utilizing the transmitter unit (1). The new procedure acording to the invention is to allow only authorized users to access the object (4) to be secured by means of a security system, even in the event of the transmitter unit (1) being lost or stolen. To this end, the transmitter unit (1) will generate an identification signal (3) characterizing the user, by means of a detector (10) scanning the user'"'"'s own physical features, preferably a finger print. This identification signal (3) will then be transmitted to the security device (2). This security device can then be unlocked only if there is a match between the identification signal (3) and a stored identification signal provided by a user authorized to unlock the security device. The procedure provides a high degree of theft and/or break-in protection for lockable objects, in particular motor vehicles, and for electric or electronic devices a high degree of protection against unauthorized use.
-
Citations
8 Claims
-
1. A method of operating a security system having a security device which the user can unlock by use of a transmitter unit, said method comprising:
- at the transmitter unit, scanning a finger print of the user by a detector on the transmitter and generating an identification signal characterizing the user from the detected fingerprint;
transmitting the identification signal from the transmitter unit to the security device via a wireless transmission route; and
, unlocking the security device only if there is a match between the identification signal transmitted by the transmitter unit and a stored identification signal provided by a user authorized to unlock the security device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- at the transmitter unit, scanning a finger print of the user by a detector on the transmitter and generating an identification signal characterizing the user from the detected fingerprint;
Specification