Method and system for providing gated access for a third party to a secure entity or service
First Claim
1. A method for providing gated access for a third party to a secure entity or service comprising:
- storing biometric data in dependence upon a biometric characteristic of a first designated user of the secure entity or service other than the third party;
capturing biometric information representative of a biometric characteristic and providing biometric data in dependence thereupon;
comparing the captured biometric data with the stored biometric data to produce a comparison result; and
,if the comparison result is indicative of a match;
providing a wireless gating signal for enabling wireless signals provided by the third party to access the secure entity or service said access provided for a predetermined, limited period of time.
3 Assignments
0 Petitions
Accused Products
Abstract
A security system for providing gated access for a third party to a secure entity or service and a method for operating the same is disclosed. The security system comprises a portable biometric device and a receiving module connected over a transmission channel. Biometric data in dependence upon a biometric characteristic such as a fingerprint of an authorized person is stored in memory of the portable biometric device. Biometric information of the person is captured, encoded and biometric data in dependence thereupon is provided to a processor. Using the processor the captured biometric data is then compared with the stored biometric data to produce a comparison result. If the comparison result is indicative of a match the first person is enabled to initiate provision of a gating signal for enabling signals provided by the third party to access the secure entity or service. The gating signal is received at a port of the secure entity or service. In response to the gating signal, a processor within a locking mechanism of the secure entity or service sets a flag for use in gating received signals provided by a third party for controlling access to the secure entity or service. The flag is set such that in a first state the locking mechanism is non-responsive to the signals and in a second other state the locking mechanism is responsive to the signals provided by the third party. If the first designated user has set the flag into the second other state access is provided to the secure entity or service by the third party upon receipt of a signal from the third party.
9 Citations
20 Claims
-
1. A method for providing gated access for a third party to a secure entity or service comprising:
-
storing biometric data in dependence upon a biometric characteristic of a first designated user of the secure entity or service other than the third party; capturing biometric information representative of a biometric characteristic and providing biometric data in dependence thereupon; comparing the captured biometric data with the stored biometric data to produce a comparison result; and
,if the comparison result is indicative of a match; providing a wireless gating signal for enabling wireless signals provided by the third party to access the secure entity or service said access provided for a predetermined, limited period of time. - View Dependent Claims (2, 3)
-
-
4. A method for providing gated access for a third party to a secure entity or service comprising:
-
storing biometric data in dependence upon a biometric characteristic of a first designated user of the secure entity or service other than the third party; storing biometric data in dependence upon a biometric characteristic of the third party; capturing biometric information representative of a biometric characteristic and providing biometric data in dependence thereupon; comparing the captured biometric data with the stored biometric data of the first designated user to produce a comparison result; and
,if the comparison result is indicative of a match; providing a wireless gating signal for enabling wireless signals provided by the third party to access the secure entity or service; receiving the gating signal at the secure entity or service; and
,in response to the wireless gating signal, setting a flag within the secure entity or service, the flag for use in gating received wireless signals for controlling access to the secure entity or service such that in a first state the secure entity or service is non responsive to the wireless signals and in a second other state the secure entity or service is responsive to the wireless signals provided by the third party, the flag supporting a timing function such that the flag once set to the second other state returns to the first state after a predetermined, limited period of time absent additional comparison results indicative of a match. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. A method for providing gated access for a third party to a secure entity or service comprising:
-
providing to a first designated user other than the third party a first portable biometric device operable to capture biometric information presented thereto, the portable biometric device having stored biometric data in dependence upon a biometric characteristic of the first designated user; providing the third party with a second other portable biometric device operable to capture biometric information presented thereto, the second portable biometric device having stored biometric data in dependence upon a biometric characteristic of the third party; capturing biometric information representative of a biometric characteristic in response to the first designated user presenting said information to the first portable biometric device and providing biometric data in dependence thereupon; comparing the captured biometric data with the stored biometric data in the first portable biometric device to produce a comparison result; and
,if the comparison result is indicative of a match, performing; providing a wireless gating signal from the first portable biometric device for enabling wireless signals provided by the third party to access the secure entity or service; receiving the gating signal at a port of the secure entity or service; and
,in response to the wire less gating signal, setting a flag within a locking mechanism of the secure entity or service, the flag for use in gating received wireless signals for controlling access to the secure entity or service such that in a first state the locking mechanism is non responsive to the wireless signals and in a second other state the locking mechanism is responsive to the wireless signals provided by the third party. - View Dependent Claims (12, 13, 14)
-
-
15. A security system for securing an entity or a service from indiscriminate access and for providing gated access for a third party, the security system comprising:
at least a portable biometric device, the device comprising; a biometric sensor for capturing biometric information representative of a biometric characteristic in response to a person presenting said information to the portable biometric device; an encoder for digitally encoding the captured biometric information and providing biometric data in dependence thereupon; memory for storing biometric data indicative of a biometric characteristic of a first designated user; a processor for comparing the captured biometric data with stored biometric data to produce a comparison result, and if the comparison result is indicative of the first designated user for providing a wireless gating signal for enabling wireless signals provided by the third party to access the secure entity or service, and if the comparison result is indicative of the third party for providing a wireless signal; a transmitter for wireless transmission of the wireless gating signal or the wireless signal; at least a port for receiving the wireless gating signal and the wireless signal from the portable biometric device; and
,a locking mechanism for securing the entity or service, the locking mechanism comprising a processor for setting a flag in response to the wireless gating signal, the flag for use in gating received wireless signals for controlling access to the secure entity or service such that in a first state the locking mechanism is non responsive to the wireless signals and in a second other state the looking mechanism is responsive to the wireless signals provided by the third party. - View Dependent Claims (16, 17, 18, 19, 20)
Specification