Claims
- 1. A method of verifying a user for access to a secure system or location, the method comprising the steps of:
(a) acquiring identification information from an identification tag worn by the user; (b) validating the identification information; (c) granting access to the user if the identification information is valid; and (d) denying access to the user if the identification information is not valid.
- 2. The method as set forth in claim 1, wherein the identification information is acquired by interrogating an RF identification component that is embedded in the tag.
- 3. The method as set forth in claim 1, wherein the identification information is validated by matching the identification information with information stored in a memory of a computer.
- 4. The method as set forth in claim 1, further comprising the steps of:
(e) acquiring user biometric information from a registration device; (f) validating the biometric information; and (g) associating the biometric information with the identification information.
- 5. The method as set forth in claim 4, step (e) further comprising the steps of:
(e1) acquiring finger pulse information and wrist pulse information; and (e2) communicating the user biometric information only if the finger pulse information corresponds to the wrist pulse information.
- 6. The method as set forth in claim 5, step (e) further comprising the steps of:
(e3) sensing a tag confirmation signal; and (e4) communicating the biometric information only if the finger pulse information corresponds to the wrist pulse information.
- 7. The method as set forth in claim 4, wherein the biometric information includes fingerprint information.
- 8. The method as set forth in claim 4, wherein the biometric information is validated by matching the user biometric information with information stored in a memory of a computer.
- 9. The method as set forth in claim 4, further comprising the steps of
(h) acquiring affiliation information, wherein the affiliation information indicates whether the identification tag is secured to the user; (i) confirming the association if the affiliation information indicates that the tag is secured to the user; (j) abandoning the association if the affiliation information indicates that the tag is not secured to the user; (k) granting computer access to the user if the association is confirmed; and (l) denying computer access to the user if the association is abandoned.
- 10. The method as set forth in claim 9, wherein the affiliation information is based on a capacitance.
- 11. A method of verifying a user for access to a secured system or location, the method comprising the steps of:
(a) acquiring identification information by interrogating an RF identification tag that is embedded in a wrist tag; (b) validating the identification information by matching the identification information with information stored in a memory of a computer; (c) acquiring a user's fingerprint information from a fingerprint scanner and pulse information from a finger pulse sensor and a wrist pulse sensor; (d) if pulse information from the user's wrist matches pulse information from the user's finger, validating the user's fingerprint information by matching the fingerprint information with fingerprint information stored in the memory; (e) if the fingerprint information is valid, associating the identification information with the fingerprint information; (f) acquiring affiliation information from the wrist tag, wherein the affiliation information is based on a capacitance and indicates whether the wrist tag is secured to the user; (g) if the affiliation information indicates that the wrist tag is secured to the user, confirming the association; (h) if the affiliation information indicates that the wrist tag is not secured to the user, abandoning the association; (i) if the association is confirmed, granting computer access to the user; and (j) if the association is abandoned, denying computer access to the user.
- 12. A method of isolating wireless communications between an RFID tag and a computer, the method comprising the steps of:
(a) transmitting an interrogation signal; (b) detecting response signals transmitted by one or more RFID tags; (c) determining if more than one response signal was detected; (d) transmitting an interrogation signal at a lower power if more than one response signal was detected; and (e) maintaining the power level of the interrogation signal if only one response signal was detected.
RELATED APPLICATIONS
[0001] The present application is a nonprovisional patent application and claims priority benefit, with regard to all common subject matter, of earlier-filed U.S. provisional patent applications entitled “SMART TOUCH SCREEN POINTER,” Ser. No. 60/479,752, filed Jun. 19, 2003; “USER VERIFICATION FOR SMART TOUCH SCREEN POINTER,” Ser. No. 60/483,012, filed Jun. 26, 2003; and “SMART TOUCH SCREEN POINTER,” Ser. No. 60/484,495, filed Jul. 2, 2003. The identified earlier-filed provisional applications are hereby incorporated by reference into the present application. This application also relates to co-pending U.S. application Ser. No. ______, filed ______, and entitled “RFID TAG AND METHOD OF USER VERIFICATION”; and U.S. application Ser. No. ______, filed ______, and entitled “RFID TAG AND METHOD OF USER VERIFICATION,” both of which are herein incorporated by reference.
Provisional Applications (3)
|
Number |
Date |
Country |
|
60479752 |
Jun 2003 |
US |
|
60483012 |
Jun 2003 |
US |
|
60484495 |
Jul 2003 |
US |