1. Field of the Invention
The field of the invention is biometric fingerprint sensors, more specifically, a biometric fingerprint sensor directly linked into an acoustic signal generator.
2. Related Art
U.S. Pat. No. 5,280,527 to Gullman, et al., discloses a security apparatus which obtains a biometric input from a user, which is compared to a template to determine a correlation factor. The correlation factor, a fixed code and either a time-varying code or a challenge code are combined to generate a token. The token is displayed to the user, who then enters the token at an access device. The access device is coupled to a secure host system. The access device forwards the token to the host, which processes the token to determine whether access is permitted. In one embodiment, the host is an electronic banking system. If access to such system is permitted the user is allowed to perform an electronic funds transfer. The security apparatus in one embodiment is an integrated circuit card. Each apparatus includes a sensor for detecting the holder's biometric information (i.e., voice, signature, fingerprint), along with a processor and display. The processor generates the token which then is displayed to the holder.
Although the Gullman patent and the products it protects provides a contribution to the art, the patent is silent on using a fingerprint sensor in conjunction with an acoustic signal pattern generator for the purpose of authenticating the identity and location of a user. Additionally, the Gullman patent does not mention any usage of a location determining device such as a GPS device and system.
U.S. Pat. No. 4,998,279 to Weiss discloses a credit card sized computer which generates a token from a secret “fixed” code (i.e., PIN) and a public “time-varying” code (i.e., time of day). Such token is displayed on the card so the user can enter the token to an access machine. The entry is done so as to combine the token with biometric information. For example, the token may be entered by having the user write the token numbers on a pressure-sensing pad or speak the token numbers into a telephone. The access verification system then compares the token to see if valid and compares the biometric input (e.g., voice or signature) to see if it has been transmitted from an authorized user.
Although the Weiss patent provides useful contribution to the art, there is no mention of a fingerprint sensor in conjunction with an acoustic signal pattern generator for the purpose of authenticating both the identity and location of a user. Additionally, the Weiss patent does not mention any usage of the GPS position-locating system. Furthermore, while the Weiss patent does make use of voice authentication, it is merely authenticating the voice of the user. By comparison, the present invention is verifying the fingerprint and location of the user.
U.S. Pat. No. 6,607,136 to Atsmon, et al., discloses a electronic card such as a credit card which can be used to transmit a signal over a telephone to a base station so that special reader hardware need not be installed to interact with the electronic card. The card receives and transmits data via sound waves.
The Atsmon patent is a contribution to the art, however, the Atsmon patent does not claim biometric authentication and is silent on the topic of a GPS position-locating system and a fingerprint sensor coupled to an acoustic signal generator. This patent also discloses his invention in the form factor of an electronic card, unlike the present invention.
Use of biometric fingerprint sensors to authenticate users is well known in the art. Inventor has not seen any products having a device-independent fingerprint sensor which is directly linked into an acoustic signal generator.
Furthermore, it is very difficult if not impossible to electrically interface an authentication and tracking system into an existing cellular telephone without voiding the warranty and/or disturbing existing circuits.
Accordingly, there is a need in the art for a device to serve remote personnel monitoring applications. This need is served by means of biometric (fingerprint) authentication and an acoustic signal generator, in conjunction with remotely-monitored devices, such as cellular telephones and other communications devices, e.g., Personal Data Administrators (PDAs), “smart phones”, personal communicators (e.g., “Blackberry”™), beepers, radiotelephones, etc.
Accordingly, it is one object of the present invention, to provide a device-independent biometric fingerprint sensor which is used to authenticate a user prior to enabling an acoustic signal generator.
It is another object, to provide an acoustic signal generator for generating different individual sound “signatures”, which correspond to different individual enrolled users, to authenticate and identify the identity and location of each such user in direct proximity to an assigned cellular telephone.
It is another object, to provide an attachable, easily moved, integrated “authenticator” module with a fingerprint sensor and with an acoustic signal generator and optionally with a GPS module (a location determining device), which can in some embodiments be easily moved by a user from one platform device (e.g., a communications device such as a telephone or a cell telephone or a beeper or a Personal Data Administrator (PDA) apparatus or other communicating device) to another platform device. Essentially this optional feature, lends itself to a standard fitting wherein a module could be “ported” from one device to another, by simply moving it from one standard fitting to another standard fitting.
It is yet another object, to provide a monitoring and tracking station capable of monitoring and tracking the authenticated identities and locations of persons using the attachable “authenticator” module containing the fingerprint sensor, the acoustic signal generator, and optionally a GPS module.
The present invention is an easy-to-use, easy to deploy, highly portable, device-independent biometric fingerprint sensor directly coupled into an acoustic (sonic) signal generator and optionally additionally coupled either into a global positioning satellite (GPS) module (i.e., a location determining device) associated therewith and/or coupled into a cellular telephone or other communications device equipped with a GPS module. Each such acoustic signal generator can generate a unique “acoustic signature” that serves as a unique identifier signal pattern corresponding to each explicit individual user. In operation, the user being monitored is sent “into the field” into specific geographic locations and/or is sent out with specific geographic constraints for predetermined and agreed upon areas of their remote activity. The user, who is expected to remain within specific, predefined geographic limits and/or ranges, is periodically contacted by a person or automatic logging function responsible for monitoring the perambulations of the remote monitored user.
For example, in a probation release system application wherein a person is released on parole, the parolee user can be required to remain, e.g., within the geographic area comprising “City A”, and/or “specific suburbs of City A”, with the exception of areas demarcated by schools, playgrounds, and shopping malls. The parolee's compliance with this requirement can be verified periodically or randomly by prompting the user to provide a fingerprint authentication.
After successful authentication, the acoustic signal generator is enabled to generate a very specific, unique individual acoustic signature in the form of a sound pattern which corresponds to a “codeword” or “password” or “authentication proof” of the parolee. The remote location and identity process is further optimized, with the usage of a GPS module either in the “authenticator” module comprising the fingerprint sensor coupled to the acoustic signal generator, and/or with the use of a cellular telephone or other communicating device with GPS functionality.
Referring now to
After the user has successfully authenticated, authenticator 106 emits a digital signal which is modulated into an analog waveform which is in turn converted to audio tones by a sound generator. This digital signal further comprises the authentication information that is modulated to produce modem (modulator/demodulator) tones representing data to be sent to the microphone of cellular phone 108 (see
Alternatively, instead of using a cellular telephone, another communications channel or platform can be used, e.g., an automobile-based communications system, e.g., such as General Motors' ONSTAR™ System.
After the user successfully completes biometric authentication (e.g., using fingerprint sensor 104 aboard authenticator 106), the authenticator 106 emits a digital signal which is modulated into an analog waveform which is in turn converted into audio tones by a sound generator. If the user is positively authenticated, the processor sends a data stream to the audio output device, such as described in the following examples:
Example of an identifying message (without cryptography) from the authenticator apparatus 106 to the tracking and monitoring center 120:
Example of an identifying message (with encrypted data) from the authenticator apparatus 106 to the tracking and monitoring center 120:
Example with challenge and cryptographic message authentication:
Challenge from center 120 to authenticator 106:
Response from authenticator 106 to center 120
Header: A fixed data sequence to enable the recipient to recognize and synchronize with the message.
Device Serial Number: A unique number for each authenticator apparatus manufactured, which is installed at the factory or introduced at the time the device is issued to the user.
Authentication Result: An indication of the success or failure of an authentication event and optionally, an indication of the strength or certainty of that authentication (e.g., probability of positive match).
Checksum: A CRC (cyclic redundancy check) or other reliable means for detecting message errors, if any
Time-Varying Parameter: A number that changes over time and may optionally indicate the actual clock time at the transmitting authenticator device. NB: This is included to allow the center 120 to detect “replay” of previously-transmitted messages.
Time-Varying Challenge: An unpredictable number that is issued by the center 120 to be included in the encrypted or cryptographic response so as to prevent “replay” of old messages
Alternatively, the transmittable data can consist of the captured fingerprint image, itself, or a biometric template obtained from the fingerprint image. In any of these cases, the data is converted into a set of audio tones by modulating the audio signal to represent the binary data. This technique is well known to the art as “modern technology”, for example, as taught in U.S. Pat. No. 4,425,665 to Stauffer, and many others
The modulated signal is converted to sound by the acoustic (sonic) generator 204 which can be a small speaker or ceramic acoustic transponder. The sound reaches the cellular phone 108 either through the air by proximity to the cell phone's microphone or by conduction through the body of the phone due to direct contact. The cell phone transmits the modulated signal as described in the discussion of
Referring now to
Next, Step 2 shows the user responding to the “prompt” (such as the call from tracking center 120 (shown). When prompted in this way, the user responds by pressing the answer button on cell phone 108 (not shown) and placing a previously-enrolled finger on the fingerprint sensor 104 of authenticator apparatus 106.
In Step 3, (depending on the configuration) the processor 202 either (a) compresses the fingerprint image into transmittable data (e.g., a unique acoustic signal which uniquely identifies each individual user); (b) extracts a template of the fingerprint image as transmittable data; or (c) in the preferred embodiment, executes an algorithm to authenticate the presented fingerprint against a stored template of the user's fingerprint, and if successful, generates a positive acknowledgement as transmittable data.
Step 4 shows cell phone 108 or processor 202 optionally obtaining a local GPS satellite (geographic location) “fix” as a user location determining mechanism, in addition to (e.g.) unique user name, unique device serial number and/or other unique data associated with the user, all for inclusion in one or more message data stream(s) modulated by the processor as part of the transmitted data transmitted to a monitoring and tracking station such as tracking center 120. Of course, this location determining device must be provisioned either within authenticator 106 and/or provisioned within the communicating device, e.g. a cell phone, PDA, etc.
Step 5 illustrates a security enhancement, wherein the transmitted data may be encrypted or cryptographically authenticated by the process to provide device authentication and protection against eavesdropping or data substitution attacks.
Step 6 shows the conversion of the transmittable data into modem (modulator/demodulator) tones and the emission from the audio output device 204 as audible sounds 105 that are received by the microphone of cell phone 108.
In Step 7, the tracking center 120 receives the audio authentication signal and decodes it (similar to decoding provided by a modem) into data that can be used to authenticate the individual.
In Step 8, the tracking center can display the received data and information and update the map location of the user.
Step 9 shows that if the user is found to be outside of an authorized or required geographic location, then alert messages can be displayed and issued to the appropriate personnel.
Based on the foregoing, it is readily observed by those skilled in the art, that many variations of the present invention are possible. Accordingly, the literal scope of this patent application and its' claims is not limited only to the disclosed embodiments and configurations disclosed herein.