Claims
- 1. A system for validating the identity of a camera used in a secure access application employing biometrics and attached to a workstation, wherein said camera has a detector, a micro controller and a camera casing and wherein said workstation includes a microprocessor and memory, wherein the system comprises:
a. an authorized person for gaining secure access; b. a central authority for recording the identity of the authorized person against the identity of the camera; c. a first identification means for identifying the camera; d. a second identification means for identifying the micro controller; e. means for authenticating the identity of the camera attached to the workstation.
- 2. The system as claimed in claim 1 wherein said first and said second identification means are one of a string of numbers, letters or an alphanumeric string of a predetermined length sufficient to provide a unique identifier.
- 3. The system as claimed in claim 2 wherein the first identification number is visible to the central authority, permanently etched into the camera casing and recorded in the micro controller.
- 4. The system as claimed in claim 3 wherein the second identification number is invisible to the authorized person and central authority and permanently recorded in the micro controller.
- 5. The system as claimed in claim 4 wherein the means for authenticating the identity of the camera consists of a comparison between the first and second numbers stored in the micro controller and the first and second numbers stored in the workstation.
- 6. The system as claimed in claim 5 further including a challenge-response mechanism that operates between the camera and the workstation.
- 7. The system as claimed in claim 6 wherein the mechanism is installed on the micro controller during manufacture.
- 8. The system as claimed in claim 7 wherein the challenge response mechanism comprises the following steps:
a. the workstation queries the camera for the first and second identification numbers; b. the camera challenges the workstation with the challenge response mechanism; c. the workstation responds to the camera challenge with a response; d. the camera compares the received response with an expected response; e. if there is a match, the camera will permit the workstation to access the first and second identification numbers;
- 9. The system as claimed in claim 9 further including means to reinitiate the challenge if the first challenge fails.
- 10. In a system for validating the identity of a camera used in a secure access application employing biometrics and attached to a workstation, wherein said camera has a detector, a micro controller and a camera casing, wherein the system comprises:
a. an authorized user for gaining secure access; b. a central authority for recording the identity of said camera; c. a first identification means for identifying the camera; d. a second identification means for identifying the micro controller; a method for authenticating the identity of the camera attached to the workstation comprising the following steps:
i. assigning a visible first identification means to a camera casing; ii. recording said first visible identification means in the micro controller; iii. assigning a second invisible identification means to a micro controller; iv. recording said second identification number in the micro controller; v. issuance by the central authority of an identified camera to an identified authorized user; vi. recordance by the central authority of the name of the authorized user against the first identification means and the identification and location of the workstation; vii. biometric enrolment of the authorized person into the secure access system; viii. connection by the authorized user of the issued camera to the identified workstation; and, ix. initializing the camera by an initialization method.
- 11. The method of claim 10 wherein the initialization method comprises the following steps:
a. workstation initiates communication with micro controller; b. workstation requests first and second identification numbers stored in micro controller; c. micro controller transmits first and second identification numbers to the workstation; d. workstation recordal of the first and second identification means in the workstation memory.
- 12. The system as claimed in claim 1 further comprising means to prevent the compromising of the first and second identification means comprising a delay mechanism embedded in the camera micro controller.
- 13. The system as claimed in claim 12 wherein the delay mechanism comprises an algorithm programmed into the micro controller firmware to implement a pre-programmed delay in the transmission of response to a challenge.
- 14. The system as claimed in claim 13 further comprising a mechanism installed on the workstation being able to recognize in invalid response from the micro controller and initiate a time delay inhibiting further attempts to access the system until the time delay is expired.
- 15. The system as claimed in claim 14 wherein during the time delay invalid responses are sent to the workstation.
- 16. In a system for validating the identity of a camera used in a secure access application employing biometrics and attached to a workstation, wherein said camera has an image detector, a micro controller and a camera casing and wherein said workstation includes a microprocessor and memory, wherein the system comprises:
a. an authorized person for gaining secure access; b. a central authority for recording the identity of the authorized person against the identity of the camera; c. a first identification means for identifying the camera; d. a second identification means for identifying the micro controller; e. means for authenticating the identity of the camera attached to the workstation; and, a method for preventing the compromising of the first and second identification means comprising the following steps:
i. workstation requests first and second identification numbers from the micro controller; ii. camera issues a challenge to the workstation; iii. workstation responds to micro controller challenge; iv. micro controller recognizes response as invalid; v. micro controller starts timer to run for a predetermined time; vi. micro controller generates false responses during predetermine time.
- 17. The method as claimed in claim 17 wherein said method may be reinitiated after the predetermined amount of time has expired.
- 18. In a system for validating the identity of a camera used in a secure access application employing biometrics and attached to a workstation, wherein said camera has an image detector, a micro controller and a camera casing and wherein said workstation includes a microprocessor and memory, wherein the system comprises:
a. an authorized person for gaining secure access; b. a central authority for recording the identity of the authorized person against the identity of the camera; c. a first identification number for identifying the camera; d. a second identification number for identifying the micro controller; e. means for authenticating the identity of the camera attached to the workstation; and, f. means to prevent the compromising of the first and second numbers means wherein said means comprises a timer embedded in the camera driver software installed on the workstation; a method for preventing the compromising of the first and second identification means comprising the following steps:
i. request secure access to workstation; ii. workstation issues challenge to micro controller; iii. micro controller recognizes challenge as valid; iv. micro controller issues an invalid response to the workstation; v. workstation recognizes the response as invalid; vi. camera driver software starts a timer to run for a predetermined time during which responses to challenges are faked.
- 19. A system for validating the identity of a camera used in a secure access application employing biometrics and attached to a workstation, wherein said camera has an image detector, a micro controller and a camera casing and wherein said workstation includes a microprocessor and memory, and wherein the workstation is attached to a remote server; the system comprising:
a. an authorized person for gaining secure access; b. a central authority for recording the identity of the authorized person against the identity of the camera; c. a first identification means for identifying the camera; d. a second identification means for identifying the micro controller; e. means for authenticating the identity of the camera attached to the server; and, f. means for encryption of transmissions between the workstation and server.
- 20. The system as claimed in claim 20 wherein said encryption means between the workstation and the server comprises a first layer of encryption and a second layer of encryption.
- 21. The system as claimed in claim 21 wherein said first layer of encryption encrypts the first and second identification means transmitted between the workstation and server.
- 22. The system as claimed in claim 22 wherein the second layer of encryption encrypts the following data between the workstation and the server:
a. first layer encrypted first identification number; b. first layer encrypted second identification number; c. challenge issued by the micro controller; and, d. biometric data.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Patent Application Serial No. 60/297,055 filed in the United States Patent and Trademark Office on Jun. 5, 2001, which is hereby incorporated herein by reference in its entirety for all purposes.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60297055 |
Jun 2001 |
US |