Iris imaging telephone security module and method
First Claim
1. A telecommunications device having telephone electronics for transmitting and receiving data, comprising:
- a telephone security module comprising;
iris acquisition means having a front surface for obtaining an image of an iris of an eye;
a lens having an image plane disposed in front of said front surface of said iris acquisition means;
a mirror disposed on a side of said lens opposite said iris acquisition means;
an illuminator disposed along a side of said mirror;
a first memory for storing at least one template of at least one image of an iris of at least one person'"'"'s eye;
a second memory for storing an iris image obtained by said iris acquisition means;
a processor for extracting a template from said stored iris image; and
a comparator for comparing said template from stored iris image with said at least one template to identify the person;
an input device for receiving user input;
a display for displaying said user input;
a power supply;
an antenna;
a microphone;
a speaker; and
an activator to begin iris image acquisition.
9 Assignments
0 Petitions
Accused Products
Abstract
A compact, handheld imaging apparatus which can be used to capture high-quality iris images for identification of a person. The handheld iris imager is non-invasive and non-contacting and comprises a camera, a cold mirror, a lens, and an illuminator. The imager has sensors and indicators which assist a user in aligning and focusing the device. The imager also automatically captures the image when proper positioning is achieved. A template of the image is then compared to a database of previously stored templates of images to identify the person. The imager is integrated into a telecommunications device as a security module. The telecommunications device cannot be unlocked and used unless a user has been identified and authorized by the imager.
177 Citations
28 Claims
-
1. A telecommunications device having telephone electronics for transmitting and receiving data, comprising:
-
a telephone security module comprising;
iris acquisition means having a front surface for obtaining an image of an iris of an eye;
a lens having an image plane disposed in front of said front surface of said iris acquisition means;
a mirror disposed on a side of said lens opposite said iris acquisition means;
an illuminator disposed along a side of said mirror;
a first memory for storing at least one template of at least one image of an iris of at least one person'"'"'s eye;
a second memory for storing an iris image obtained by said iris acquisition means;
a processor for extracting a template from said stored iris image; and
a comparator for comparing said template from stored iris image with said at least one template to identify the person;
an input device for receiving user input;
a display for displaying said user input;
a power supply;
an antenna;
a microphone;
a speaker; and
an activator to begin iris image acquisition. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A telecommunications device having telephone electronics for transmitting and receiving data, comprising:
-
a telephone security module comprising;
iris acquisition means having a front surface for obtaining an image of an iris of an eye;
a lens having an image plane disposed in front of said front surface of said iris acquisition means;
a mirror disposed on a side of said lens opposite said iris acquisition means;
an illuminator disposed along a side of said mirror;
a memory for storing an iris image obtained by said iris acquisition means;
a processor for extracting a template from said stored iris image; and
a communications interface for transmitting said template to a central station;
an input device for receiving user input;
a display for displaying said user input;
a power supply;
an antenna;
a microphone;
a speaker; and
an activator to begin iris image acquisition, wherein said processor unlocks the telecommunications device responsive to a signal received from said central station.
-
-
13. A method of unlocking a telecommunications device responsive to the identification of a person, comprising the steps of:
-
(a) storing image information of the iris of at least one person'"'"'s eye;
(b) illuminating an eye of an unidentified person having an iris;
(c) obtaining an image of said iris of said unidentified person;
(d) determining if said image is an image of sufficient quality for a step (f) of extracting;
(e) repeating steps (b) through (d) until said image of sufficient quality is obtained;
(f) extracting an iris template if said image is of sufficient quality;
(g) comparing said iris template of said obtained image with said stored image information to identify said unidentified person; and
(h) unlocking the telecommunications device responsive to a result of said step of comparing. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
wherein the telecommunications device remains locked if said iris template does not substantially match said stored image information. -
21. The method according to claim 20, further comprising the step of activating an indicator if said iris template substantially matches said stored image information.
-
22. The method according to claim 20, further comprising the step of transmitting said user code to a service provider via a set-up protocol.
-
23. The method according to claim 22, wherein said set-up protocol is one of GSM, TAC, and AMPS.
-
24. The method according to claim 22, further comprising the steps of:
-
authenticating said user code at said service provider;
if said user code is authentic, authorizing a telephone call to be placed, otherwise, preventing a telephone call from being placed.
-
-
25. The method according to claim 24, wherein the step of authenticating comprises comparing said user code to a plurality of predetermined codes.
-
26. The method according to claim 25, wherein said predetermined codes are stored in a server database.
-
27. The method according to claim 24, further comprising the step of activating an indicator responsive to said step of authenticating.
-
28. The method according to claim 24, wherein if said user code is authentic, further comprising the steps of placing a telephone call and billing against an identity of said person.
-
Specification