Systems and methods utilizing biometric data
First Claim
1. A method, comprising:
- (a) reading information from a smart card of an enrollee at an access control location;
(b) transmitting the information via a network to a central processing location;
(c) generating image data from a live capture of an image of a biometric of the enrollee using a live capture device at the access control location;
(d) transmitting the image data via the network to the central processing location;
(e) accessing the image data from the central processing location at an extraction location via the network to extract extraction information from the accessed image data;
(f) transmitting the extraction information via the network to the central processing location;
(g) accessing the information from the smart card from the central processing location and the extraction information from the central processing location at a matching location via the network to generate a matching result through comparing the extracted information with the information from the smart card;
(h) transmitting the matching result to the central processing location via the network; and
(i) performing access control at the access control location via the network based on the matching result.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods perform access control and mobile identity verification utilizing a memory, maybe on a handheld device, that stores at least biometric data, such as minutia. The handheld device may also store other data, such as a threshold value and Wiegand data. The data may be stored in a memory, a magnetic strip, a code, a bar code, or in all of these devices associated with the handheld device. The handheld device may be a SmartCard or the like. The threshold value may be a required value or parameter generated from input criteria based on biometric data read and extracted by an extracting system during an enrolling process. The threshold value is used during extracting, matching, or both, to most accurately determine the identity and characteristics of an individual wanting access to an accessed system or being questioned by law enforcement in the field.
-
Citations
21 Claims
-
1. A method, comprising:
-
(a) reading information from a smart card of an enrollee at an access control location;
(b) transmitting the information via a network to a central processing location;
(c) generating image data from a live capture of an image of a biometric of the enrollee using a live capture device at the access control location;
(d) transmitting the image data via the network to the central processing location;
(e) accessing the image data from the central processing location at an extraction location via the network to extract extraction information from the accessed image data;
(f) transmitting the extraction information via the network to the central processing location;
(g) accessing the information from the smart card from the central processing location and the extraction information from the central processing location at a matching location via the network to generate a matching result through comparing the extracted information with the information from the smart card;
(h) transmitting the matching result to the central processing location via the network; and
(i) performing access control at the access control location via the network based on the matching result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
a means for reading information from a smart card of an enrollee at an access control location;
a means for transmitting the information via a network to a central processing location;
a means for generating image data from a live capture of an image of a biometric of the enrollee using a live capture device at the access control location;
a means for transmitting the image data via the network to the central processing location;
a means for extracting that accesses the image data from the central processing location at an extraction location via the network to extract extraction information from the accessed image data;
a means for transmitting the extraction information via the network to the central processing location;
a means for matching that accesses the information from the smart card from the central processing location and the extraction information from the central processing location at a matching location via the network to generate a matching result through comparing the extracted information with the information from the smart card;
a means for transmitting the matching result to the central processing location via the network; and
a means for performing access control at the access control location via the network based on the matching result. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A distributed system for access control, comprising:
-
a reader that reads information from a smart card of an enrollee at an access control location;
a transmitter that transmits the information via a network to a central processing location;
an image generator that generates image data from a live capture of an image of a biometric of the enrollee using a live capture device at the access control location;
a transmitter that transmits the image data via the network to the central processing location;
an extraction service that accesses the image data from the central processing location at an extraction location via the network to extract extraction information from the accessed image data;
a transmitter that transmits the extraction information via the network to the central processing location;
a matching service that accesses the information from the smart card from the central processing location and the extraction information from the central processing location at a matching location via the network to generate a matching result through comparing the extracted information with the information from the smart card;
a transmitter that transmits the matching result to the central processing location via the network; and
an access controller at the access control location that controls access via the network based on the matching result.
-
Specification