×

Method and system for accessing a secure area

  • US 8,051,476 B2
  • Filed: 08/22/2006
  • Issued: 11/01/2011
  • Est. Priority Date: 08/22/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method for accessing a secure area, the computer implemented method comprising:

  • inputting by a user of a security device a specific sequence of a plurality of different positions of the security device used to access a secure area to form stored security device orientation data, wherein the user utilizes the security device to access a plurality of different secure areas and utilizes a different specific sequence of security device positions to access each of the plurality of different secure areas;

    presenting by the user the security device that includes security device information including an identification number and biometric fingerprint information that identifies the user of the security device and a unique design including eight different series of rectangular shapes placed at forty-five degree increments in a circular configuration on the security device in front of a digital scanner for scanning by the digital scanner the security device information and all of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device to access a secure area;

    performing by the user the specific sequence of the plurality of different positions of the security device in front of the digital scanner so that an orientation of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in front of the digital scanner changes with each position in the specific sequence of the plurality of different positions;

    scanning by the digital scanner the security device information and the orientation of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in each position of the specific sequence of the plurality of different positions of the security device in front of the digital scanner;

    recording the security device information to form recorded security device information that includes the identification number and the biometric fingerprint information that identifies the user of the security device;

    recording the orientation of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in each position of the specific sequence of the plurality of different positions of the security device in front of the digital scanner to form a plurality of recorded orientations of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in the specific sequence of the plurality of different positions of the security device in front of the digital scanner;

    determining whether a new orientation of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device is presented to the digital scanner within a predetermined period of time;

    responsive to determining that a new orientation of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device is not presented within the predetermined period of time, comparing the recorded security device information that includes the identification number and the biometric fingerprint information that identifies the user of the security device with stored security device information data and comparing the plurality of recorded orientations of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in the specific sequence of the plurality of different positions of the security device in front of the digital scanner with the stored security device orientation data;

    determining whether the recorded security device information that includes the identification number and the biometric fingerprint information that identifies the user of the security device is associated with the plurality of recorded orientations of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in the specific sequence of the plurality of different positions of the security device in front of the digital scanner;

    responsive to determining that a match occurs between the recorded security device information that includes the identification number and the biometric fingerprint information that identifies the user of the security device and stored security device information data and between the plurality of recorded orientations of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in the specific sequence of the plurality of different positions of the security device in front of the digital scanner and the stored security device orientation data and to determining that the recorded security device information that includes the identification number and the biometric fingerprint information that identifies the user of the security device is associated with the plurality of recorded orientations of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in the specific sequence of the plurality of different positions of the security device in front of the digital scanner, granting access to the secure area;

    responsive to determining that a match does not occur between the recorded security device information that includes the identification number and the biometric fingerprint information that identifies the user of the security device and stored security device information data or between the plurality of recorded orientations of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in the specific sequence of the plurality of different positions of the security device in front of the digital scanner and the stored security device orientation data or to determining that the recorded security device information that includes the identification number and the biometric fingerprint information that identifies the user of the security device is not associated with the plurality of recorded orientations of the unique design including the eight different series of rectangular shapes placed at forty-five degree increments in the circular configuration on the security device in the specific sequence of the plurality of different positions of the security device in front of the digital scanner, denying access to the secure area; and

    responsive to determining that access has been denied to the secure area a predetermined number of times, sending a security alert to a system administrator.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×