Claims
- 1. A system for providing controlled access to a secured area, the system comprising:
a secured device for allowing access into the secured area upon receiving at least one access control signal; an identification device for providing identification data of an access card holder; an access card having at least one block of memory comprising:
application data corresponding to a unique identifier of the access card holder; and at least one application security key comprising an application read key; and an access reader for outputting the at least one access control signal for controlling the secured device, the access reader comprising:
a memory means for storing configuration data and at least one valid security read key; an RF interface for reading the application data from the access card if the at least one valid security read key is the same as the application read key, the at least one valid security read key providing an authenticated reading of the application data from the access card; at least one input data line for receiving the identification data from the identification device; and a processor means for comparing the application data to the identification data and for outputting the at least one access control signal upon a match between the application data and the identification data.
- 2. The system of claim 1, wherein the secured device is a transit gate.
- 3. The system of claim 1, wherein the secured device allows operation of electronic equipment having a device processor, further comprising:
security software for execution by the device processor, the security software disallowing use of the electronic equipment unless the at least one access control signal is received by the security software.
- 4. The system of claim 1, wherein the identification device is a biometric device and the identification data is image data.
- 5. The system of claim 4, wherein the identification data comprises template minutia comprising characteristics of the identification data.
- 6. The system of claim 5, wherein the processor means for comparing the application data is automated.
- 7. The system of claim 4, wherein the access reader further comprises means for displaying the image data and the application data, the displayed image data and application data for use by a security person for making a decision regarding issuance of the at least one access control signal for allowing access to the secured area.
- 8. The system of claim 1, wherein the access reader has a plurality of reader states comprising:
an activated state for controlling access to the secured area; and a deactivated state, the deactivated state having an activation key for reading an activation card.
- 9. The system of claim 1, further comprising an update card for updating the configuration data of the access reader.
- 10. The system of claim 1, wherein the at least one application security key of the access card further comprises an application write key.
- 11. The system of claim 10, wherein the memory means of the access reader further stores a valid security write key for writing to the access card if the valid security write key is the same as the application write key.
- 12. The system of claim 11, wherein the access reader writes an invalid flag to the access card if the application data does not match the identification data.
- 13. A method of controlling access to a secured area using an access reader, the method comprising the steps of:
providing identification data corresponding to an access card holder to the access reader; reading application data corresponding to the access card holder from an access card, comprising the steps of:
transmitting an application read key from the access reader to the access card; and allowing output of the application data from the access card if the transmitted application read key matches a read key stored on the access card; comparing the application data to the identification data; and outputting at least one access control signal upon a match between the identification data and the application data, the at least one access control signal for allowing access to the secured area.
- 14. The method of claim 13, wherein the at least one access control signal opens a gated entrance.
- 15. The method of claim 13, wherein the at least one access control signal allows the use of a processor enable device.
- 16. The method of claim 13, wherein the step of providing identification data corresponding to an access card holder to the access reader comprises the step of:
producing an image of the access card holder, wherein the image is one of a facial image, a retinal image, and a fingerprint image.
- 17. The method of claim 13, wherein the step of comparing the application data to the identification data is performed by the access reader.
- 18. The method of claim 13, wherein the step of comparing the application data to the identification data is performed by a security person.
- 19. The method of claim 13, further comprising the step of:
writing an invalid flag to the access card upon a mismatch between the identification data and the application data, the invalid flag for at least partially restricting use of the access card.
- 20. The method of claim 13, further comprising the step of updating configuration data of the access reader using a contactless update card.
CROSS-REFERENCES TO RELATED APPLICATIONS
[0001] This application claims the benefit of priority under 35 U.S.C. 119(e) to Provisional U.S. Patent Application No. 60/289,039 filed May 4, 2001 and Provisional U.S. Patent Application No. 60/318,385 filed September 10, 2001 which are incorporated herein by reference in their entirety.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60289039 |
May 2001 |
US |
|
60318385 |
Sep 2001 |
US |