The present invention relates generally to security systems and, in particular, to identification, verification and authorization in security access systems.
In recent years, security systems have become an integral part of guarding and protecting critical infrastructures and locations. Typically, security access is achieved using manual (e.g., visual verification by a guard, physical punching of pass-code, etc.) or electronic systems (e.g., Radio Frequency Identification (RFID), key-card entry, etc.). Manual systems are susceptible to human error that may lead to a breach in security. In addition, lower speeds and higher costs are often associated with using manual security. Hence, to avoid these disadvantages, electronic security systems are used more often.
RFID systems are generally reliable and efficient. However, when RFID systems are used by themselves, they are not adequately effective in securing access. Unauthorized personnel in possession of a valid RFID tag or a vehicle having a valid RFID tag may be allowed access. Another system used in security systems is facial recognition verification. Facial recognition is achieved by recording a picture of the person and executing biometric verification programs to determine the identity of the individual. Biometric verification involves positive interaction (such as stopping the vehicle for a picture to be taken) that slows the authorization process. In situations where a number of vehicles are waiting to get past a security guard gate, coordinating the RFID tag signals with the biometric verification to complete access authorization can be difficult. Also mechanical detection of synchronization processes is highly unreliable and it is generally desired to eliminate the need for mechanical vehicle detection actuators.
For the reasons stated above and for other reasons stated below which will become apparent to those skilled in the art upon reading and understanding the present specification, there is a need in the art for rapid, reliable and convenient verification of biometric data against credentials presented for authorized access control.
The above-mentioned problems and other problems are resolved by the present invention and will be understood by reading and studying the following specification.
In one embodiment, a security access system is disclosed. The security access system comprises, a radio frequency identification (RFID) activator loop integrated in an access road, a loop reactance sensing circuit, an RFID personal identification tag, an imaging device and a verification system. The loop reactance sensing circuit is adapted to measure the reactance of the RFID activator loop to determine the presence of a vehicle. The RFID personal identification tag is adapted to transmit identification data regarding the person it is associated with in response to the RFID activator loop. The imaging device is adapted to record an image of the person. The verification system is adapted to process the identification data of the RFID identification tag and produce an image of the person from a database associated with the identification data.
In another embodiment, a security access system is disclosed, the security access system includes a loop reactance sensing circuit, an imaging device, an identification (ID) tag, a verification system and a synchronization module. The loop reactance sensing circuit is adapted to detect the presence of a vehicle. The imaging device is adapted to capture facial images of persons in the vehicle upon detection of the presence of the vehicle. The ID tag is assigned to each person having access rights to a restricted area. Each ID tag is adapted to be carried on the person it is associated with. Moreover, each ID tag further is further adapted to electronically store ID information associated with the person who is carrying the ID tag. The verification system is adapted to read ID information stored on ID tags upon detection of the vehicle and compare stored facial images associated with each ID tag with the captured facial images from the imaging device. The verification system is further adapted to allow access to the restricted area when at least one match of the captured facial image and the stored facial image occur. In addition, the synchronization module is adapted synchronize the verification system upon the loop reactance sensing circuit determining the present of a vehicle.
In still another embodiment, a security access system is disclosed. The security access system includes a road loop, an RFID personal identification tag and a verification system. The road loop is integrated in an access road. The RFID personal identification tag is associated with a person in the vehicle. The RFID personal identification tag is adapted to transmit personal data in response to the road loop. The verification system includes a loop reactance sensing circuit, a receiver, an imaging device, a database and a computer. The loop reactance sensing circuit is coupled to sense changes in reactance in the road loop to track the motion of the vehicle over the road loop. The receiver is adapted to receive the personal data transmitted by the RFID personal identification tag. The imaging device is adapted to record an image of the person in the vehicle. The database is used to store images of persons authorized to access a restricted and the computer is used to compare store images associated with the transmitted personal data and an image taken by the imaging device to provide verification.
In yet another embodiment, a radio frequency identification (RFID) vehicle presence detection system is disclosed. The detection system comprises an RFID activator loop and a loop reactance sensing circuit. The RFID activator loop is adapted to be integrated in an access road. The loop reactance sensing circuit is coupled to sense changes in the reactance of the RFID activator loop to determine the presence of a vehicle.
In another embodiment, a method for synchronizing image recognition with vehicular movement is disclosed. The method comprises measuring the reactance of an activator loop to determine the presence of a vehicle. Transmitting identification information in response to the activation of one or more RFID devices in response to the activation loop. Capturing one or more images associated with at least one of the RFID devices and verifying captured images with images stored in a database
In yet another embodiment, a method of allowing select access to a secure location is disclosed. The method comprising, tracking the motion of a vehicle nearing the secure location, imaging a body associated with the vehicle, time stamping each image to create a stored record, processing identification information from an RFID tag associated with the body, comparing an image of the body with a stored image associated with the RFID tag and when the image of the body and the stored image match, allowing access to the secure location.
In further yet another embodiment, a machine readable medium having instructions stored thereon for allowing select access to a secure location is disclosed. The method comprising, detecting change in reactance in a loop field, initiating time tracking process, imaging the body, comparing an image of the body with a stored image associated with information received from an RFID tag activated by the loop field and indicating a match when the image of the body and the stored image match.
The present invention can be more easily understood and further advantages and uses thereof more readily apparent, when considered in view of the description of the preferred embodiments and the following figures in which:
In accordance with common practice, the various described features are not drawn to scale but are drawn to emphasize specific features relevant to the present invention. Reference characters denote like elements throughout Figures and text.
In the following detailed description of the preferred embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration specific preferred embodiments in which the inventions may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that logical, mechanical and electrical changes may be made without departing from the spirit and scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the claims and equivalents thereof.
The present invention provides a security system that allows reliable and accurate vehicle and driver recognition for access security. With this invention, the driver's out-of-the-vehicle-presence along with human contact is not needed. In addition, the present invention significantly reduces the amount of time needed to perform vehicle and driver recognition. In one embodiment, a security system is provided that reliably and accurately performs RFID-based verification. The security system integrates hands-free RFID technology with hands-free facial recognition technology in order to provide an access control database with a one-to-one dynamic, positive biometric verification. Embodiments of the present invention use a road loop to activate RFID devices associated with a car and driver (i.e. identification tags). When the devices are activated they send an identification signal to a processor that initiates a video device to record an image of the vehicle and a driver. The images are then compared to stored images associated with the RFIDs. If there is a match, an access gate is opened. If there is not a match, the access gate remains closed. Embodiments of the invention also time stamp the video so a time record is established.
Referring to
The verification system 128 includes an imaging device 114, an antenna 116, an RFID tag receiver 118, a synchronization module 120, a computer 122, a database 124 and a loop reactance sensing circuit 126. In one embodiment the verification system 128 is housed in a security guard station 134 or the like. The verification system 128 determines whether the vehicle 102 should be allowed access to the secure area 132. Antenna 116 receives signals from personal identification tag 106 and vehicle identification tag 108 once they are activated. The signals received by antenna 116 are passed to the RFID tag receiver 118. In one embodiment, the RFID receiver 118 verifies the validity of the signals it receives. In another embodiment, RFID receiver 118 receives periodic updates on valid RFID tag signals from database 124. Still in another embodiment, a processor in the computer 122 provides verification function of valid RFID tags 108 and 104. In one embodiment the RFID tag receiver 118 is coupled to synchronization module 120. As illustrated in
Synchronization module 120 of this embodiment receives signals from RFID tag receiver 118, video device 114 and loop reactance sensing circuit 126. In one embodiment, computer 122 is coupled to database 124. In one embodiment, synchronization module 120 performs a synchronization function based on time stamps by correlating captured images to relative positions of vehicle 102 while passing over the road loop 112. Based on these time stamps from loop reactance sensing circuit 126, appropriate sections of a continuous video stream recorded at video device 114 are used for image recognition and verification of biometric data. These video stream sections are compared to reference images stored in database 124. In one embodiment, verification system 128 is adapted to read the identification data of the RFID identification tag and produce an image of the body from a database associated with the identification data.
Computer 122 runs a software program to execute a vehicle location event synchronization algorithm. Synchronization module 120 works in conjunction with the vehicle location event synchronization algorithm to determine and analyze appropriate portion of the video stream recorded by video camera 114. When vehicle 102 moves across road loop 112, time stamps are generated and used by synchronization algorithm and synchronization module to determine relevant portion of the video stream to be used for biometric verification. Moreover, in one embodiment, a storage device 123 is used to store a record of the vehicle and the person within the vehicle.
In one embodiment, one a personnel RFID tag 106 is used. This embodiment has the advantage of not limiting authorized personnel 104 to only a specific vehicle 102. In this embodiment, the personal RFID tag 106 transmits personnel data associated with the personnel RFID tag 106 in response to the RFID road loop 112. Meanwhile, the loop reactance sensing circuit 126 detects the presence of the vehicle 102 by monitoring for a change in reactance in the RFID road loop 112. The loop reactance sensing circuit 126 sends a signal to the synchronization module 120 when the presence of a vehicle 102 has been detected. The synchronization module 120 synchronizes the verification process. The verification process includes imaging the person 104 in the vehicle, processing the received personnel data through the antenna 134 and RFID 118 and comparing stored data in the data base 124 associated with received personnel data and the image of the person 104 in the vehicle with a processor in a computer 122.
Following the detection of the presence of the vehicle (302), a time record of the vehicle entering into the system is also started (305). Subsequently, algorithms to monitor vehicle while in tracking area are started (307). A video imaging device then begins capturing images of the vehicle and person driving the vehicle (318). In one embodiment, the imaging device is a digital video camera. A captured image (318) by the video imaging device is compared with stored image that is associated with the valid RFID tag information (314). In the embodiment, a stored facial image associated with received tag information (310) is compared with a facial image captured by the video imaging device (318). If there is a biometric match (314), access is allowed. If there is not a biometric match (314), access is denied (322). In other embodiments of the present invention, an image of the vehicle is compared to a stored image of the vehicle associated with the RFID vehicle tag in determining access to the secure location. In further other embodiments both biometric and vehicle image identification is used. Moreover, in other embodiments, other biometric images are compared such as hand, iris, etc.
Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement, which is calculated to achieve the same purpose, may be substituted for the specific embodiment shown. This application is intended to cover any adaptations or variations of the present invention. Therefore, it is manifestly intended that this invention be limited only by the claims and the equivalents thereof.