EP1304659A1 - Method and system and monitoring apparatus for access control of persons - Google Patents
Method and system and monitoring apparatus for access control of persons Download PDFInfo
- Publication number
- EP1304659A1 EP1304659A1 EP01203970A EP01203970A EP1304659A1 EP 1304659 A1 EP1304659 A1 EP 1304659A1 EP 01203970 A EP01203970 A EP 01203970A EP 01203970 A EP01203970 A EP 01203970A EP 1304659 A1 EP1304659 A1 EP 1304659A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- string
- subject
- authorisation
- identification
- authorised
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
Definitions
- the invention relates to access control to an area for subjects. More specifically the invention relates to a method, system and monitoring apparatus for access control to an area using automatic recognition of representations of persons or objects.
- the area of recognition of representations of "subjects” involves automatic identification of persons or objects by means of algorithms that look for pattern matches between images representing a person or an object applying for access, and previously recorded reference images beyond a certain probability of doubt.
- a disadvantage of the known systems is that the system for person recognition and the system for service provisioning are separate systems, each of them using their own means and resources.
- the invention comprises a method, a system and monitoring apparatus for access control for subjects (e.g. persons or objects), to a physical (e.g. building, room) or virtual (e.g. network, facilities etc.) area.
- a monitoring apparatus can be a (digital) camera.
- a first identification string (initial identification string, IIS) is generated, comprising a (digital) representation, e.g. image, of (a distinguishing part of) the relevant subject.
- IIS initial identification string
- storage refers to having the data available in any possible manner such as registration of the location of the data, saving the data on a data carrier, knowing the whereabouts of the data somewhere in a network etc.
- a second identification string (operational identification string, OIS)
- OIS operational identification string
- the operational identification string can be compared with the various initial identification strings stored for the subjects which -via previous registration during the initial step- are authorised to have access to the secured area.
- an operational authorisation string (OAS) can be generated , representing a further information carrier (FIC), which comprises information about further access rights, facilities etc. to or services within the secured area, e.g. access or service time restrictions, further access or service rights and/or limits within the secured area, charges to be paid for use of the area e.g. network or communication facilities, etc. etc.
- an initial authorisation string is generated and stored in the initial step.
- the IAS relates to the OAS and may comprise -like the OAS- an image or other representation of a further information carrier (FIC) carrying information about access to or services within said physical or virtual area.
- FAC further information carrier
- the operational authorisation string OAS
- IAS initial stored authorisation string
- the further information carrier may compriseinformation about further access rights or services within the secured area, e.g. access or service time restrictions, further access or service rights and/or limits within the secured area, charges to be paid for use of the area e.g. network or communication facilities, etc. etc.
- a common initial identification/authorisation string may be generated and stored, incorporating, at least partly, an initial identification string (IIS) and an initial authorisation string (IAS), and comprising, for recognition purposes, e.g an image of at least part of the authorised subject, and, for further access and/or services provisioning purposes, the authorised subject's further information carrier (FIC).
- a common operational identification/authorisation string OIAS is generated, incorporating, at least partly, an operational identification string (OIS) as well as an operational authorisation string (OAS).
- the OIAS may comprise, for recognition purposes, e.g an image of at least part of the authorised subject and, for further access and/or services provisioning purpose, the relevant subject's further information carrier (FIC).
- the operational identification/authorisation string (OIAS) is compared with the initial identification/authorisation strings (IIAS) of the various subjects authorised to access to the secured area, storedduring the initial step.
- the further information carrier may have the form of a "token”, e.g. a card, label or coin. It may be restricted to an individual person or may apply for a group of persons.
- the FIC may be worn on a person's body or clothes.
- it may, for additional security, comprise a unique identification mark of e.g. the relevant person, authorised to or applying for access, e.g. the person's signature, fingerprint, face scan or retina scan.
- Figures 1 and 2 show an exemplary embodiment of a system fit for execution of the method depicted above.
- Figure 1 shows a system for access control of persons to a secured physical or virtual area 1, controlled by an access controller 2.
- the secured area here comprises a closed room 1, comprising a computer network 14 and terminals. Access to the room 1 is controlled by means of a door or the like, actuated by control means 2. After a person 4 or 8 has got permission to enter the room 1, each person has his specific further access and/or service privileges and/or restrictions in the use of the network 14.
- the access controller 2 is controlled by a system processor 3.
- an initial identification string (IIS) 6 is generated by means of a camera 5, comprising a digitised representation, viz. a digital image or scan of a distinguishing part of the authorised person's body, e.g. the person's face.
- the processor 3 stores the IIS 6, formatted as an ordinary bitmap or as a string of vector parameters describing the image, in a database (DB) 7.
- DB database
- an operational identification string (OIS) 9 is generated, by means of a camera 10, comprising a bitmap or -after processing inside or outside the camera- a vector string representing the face of the person 8 applying for access.
- the operational identification string is compared, by the processor 3, with the IISs 6 previously generated and stored in database 7for various persons 4 authorised to have access to the area 1.. If an IIS matches the OIS of person 8, the person is granted permission to enter the secured area.
- an operational authorisation string (OAS) 11 may be generated by a camera 12, comprising the image (again formatted as a bitmap string or a processed, e.g. vectorised data string) of a further information carrier (FIC) 13, comprisingfurther information concerning e.g. the rights of person 8 within the area 1.
- a camera 12 comprising the image (again formatted as a bitmap string or a processed, e.g. vectorised data string) of a further information carrier (FIC) 13, comprisingfurther information concerning e.g. the rights of person 8 within the area 1.
- FIC further information carrier
- the further information carrier may comprise further information concerning the access rights of the person 8 to the area 1 e.g. time restrictions (entrance times) or rights/restrictions to (not-shown) sub-rooms, or to further services to be offered within that area e.g. access rights to the computer network 14.
- the FIC 13 may have the form of a card, coin or label and may be strictly personal or may apply for a group of persons. Said "further information" may be printed upon the surface of the FIC card, coin or label, while such card, coin or label e.g. may be clipped on the person's clothes.
- OAS operational authorisation string
- IAS initial authorisation string
- the IAS 16 comprises a representation (vectorised or not) of the image of a further information carrier (FIC) 17, comprising further information concerning the access and service rights of the relevant authorised person 4 to the secure room 1 and/or network 14. Note: if person 4 and person 8 are one and the same, the FIC 13 is likely to be the same as the FIC 17.
- FIC information carrier
- each operational step II the operational authorisation string (OAS) 11 of the relevant person 8 requesting access to area 1, is compared, by processor 3, with the initial authorisation strings (IAS) 16, recorded previously and stored in database 7 during the initial step I.
- OFS operational authorisation string
- IAS initial authorisation strings
- the requesting person will or will not get permission, by means of the access control means 2, to enter and use the area 1 and the services of network 14. If person 8 gets permission to enter, the information content of the person's FIC 13 is interpreted by processor 3 and determines the person's further rights for access to and services within area 1.
- the cameras 5, 10, 12 and 15 can be replaced by a single camera suited to execute one or more of the functions of the cameras 5, 10, 12 and 15 as described above.
- the processor 3 can be an integral part of the camera(s).
- the storage means 7 can be an integral part of the camera as well as being physically separated from the camera. In the latter case the camera(s) can be equipped with network communication means in order to transmit and/or receive the various strings to be stored in said storage means 7 over a network.
- the camera is further equipped with state-of-the-art compression means to reduce the capacity needed for the storage means and to limit bandwidth usage of the network.
- Figure 2 shows a second embodiment of the invention.
- each IIAS comprises an integrated image of a (distinguishing part of the) body of the authorised person 4 and of the authorised person's FIC 17.
- a common operational identification/authorisation string (OIAS) 19 is generated by camera 10, comprising an integrated image of a (distinguishing part of the) body of the requesting person and of the requesting person's FIC 13. Subsequently, the OIAS 19 of person 8 is compared with the stored IIASs 18 of the various persons 4 authorised to have access to the area 1, each of which has an IIAS stored in the database 7.
- OIAS operational identification/authorisation string
- the access controller 2 not necessarily prohibits access of e.g. a person to an area in case the initial strings (IIS, IAS, IIAS) do not match with the operational strings (OIS, OAS, OIAS). Instead of or simultaneously to prohibitting access to said area an alarm or other signalling of non-matching strings can be provided for.
- the FIC of persons 4 and 8 also may, additionally, include a unique representation of those persons, e.g. the person's signature, fingerprint, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Telephonic Communication Services (AREA)
Abstract
Method, system and camera for access control to an area (1,14)
accessible for an authorised subject. In a first step, initial
identification strings IIS (6) of authorised subjects e.g.
persons (4) are stored, comprising representations of such
subjects. In a subsequent second step, an operational
identification string OIS (9) is created, comprising the image
of a person (8) requesting for access. The OIS is compared with
the saved IISs of the authorised persons. In the second step, an
additional, operational authorisation string OAS (11) is
generated, comprising the image of a further information carrier
FIC (13), carrying further information concerning the requested
access. In the first step, moreover, an initial authorisation
string (16) may be created and saved, comprising the image of a
further information carrier FIC (17) carrying further
information concerning the access to the secured area for
authorised persons (4), while in the second step, the OAS is
compared with IAS (16).
Description
The invention relates to access control to an area for
subjects. More specifically the invention relates to a method,
system and monitoring apparatus for access control to an area
using automatic recognition of representations of persons or
objects.
The area of recognition of representations of "subjects" , e.g.
digital images of persons or objects, involves automatic
identification of persons or objects by means of algorithms that
look for pattern matches between images representing a person or
an object applying for access, and previously recorded reference
images beyond a certain probability of doubt.
Additional to subject (person/object) recognition there is a
need to provide specific services (access rights, service
facilities etc.) to e.g specific persons or groups of persons,
based on personal identification means like ID cards etc. In
many cases additional information is needed to establish what
specific services (e.g. which access rights and/or limitations,
access times, etc.) should be provided to a person who has been
given permission to access a certain area, e.g. a building,
room and/or LAN, telecommunications or computing facilities
(network etc.).
A disadvantage of the known systems is that the system for
person recognition and the system for service provisioning are
separate systems, each of them using their own means and
resources.
The invention comprises a method, a system and monitoring
apparatus for access control for subjects (e.g. persons or
objects), to a physical (e.g. building, room) or virtual (e.g.
network, facilities etc.) area. Such a monitoring apparatus can
be a (digital) camera.
In a first step (initial step) for subjects e.g. persons to be
given access to a secure physical or virtual area, a first
identification string (initial identification string, IIS) is
generated, comprising a (digital) representation, e.g. image, of
(a distinguishing part of) the relevant subject. After
generation, the IIS will be stored. The term storage here refers
to having the data available in any possible manner such as
registration of the location of the data, saving the data on a
data carrier, knowing the whereabouts of the data somewhere in a
network etc.
Subsequently, for each subject applying for access to the
secured area, to investigate whether the subject is entitled to
enter the secured area or not, a second identification string
(operational identification string, OIS), is generated,
comprising a (digital) representation of that subject applying
for access. To investigate the subject's entrance rights to the
secure area the operational identification string can be
compared with the various initial identification strings stored
for the subjects which -via previous registration during the
initial step- are authorised to have access to the secured area.
In the operational step, besides said OIS, an operational
authorisation string (OAS) can be generated , representing a
further information carrier (FIC), which comprises information
about further access rights, facilities etc. to or services
within the secured area, e.g. access or service time
restrictions, further access or service rights and/or limits
within the secured area, charges to be paid for use of the area
e.g. network or communication facilities, etc. etc.
With the method as described above a single system can provide
the person recognition function as well as the service
provisioning function. In this way a significant advantage can
be achieved, while all information needed, viz. for access and
further services can be derived from the same kind of
information representation.
In a preferred embodiment an initial authorisation string (IAS)
is generated and stored in the initial step. The IAS relates
to the OAS and may comprise -like the OAS- an image or other
representation of a further information carrier (FIC) carrying
information about access to or services within said physical or
virtual area. In the mentioned operational step, to be executed
when a person requests access to the secured area, the
operational authorisation string (OAS) is compared with the
relevant initial stored authorisation string (IAS). This option
can provide additional security, while both the subject's OIS is
investigated whether it matches (at least) one stored IISs, and,
additionally, the subject's OAS is investigated whether it
matches the relevant OIS.
The further information carrier (FIC) may compriseinformation
about further access rights or services within the secured area,
e.g. access or service time restrictions, further access or
service rights and/or limits within the secured area, charges to
be paid for use of the area e.g. network or communication
facilities, etc. etc.
In a preferred embodiment instead of generating separate
initial strings (IIS and IAS) during the initial step, a common
initial identification/authorisation string (IIAS) may be
generated and stored, incorporating, at least partly, an initial
identification string (IIS) and an initial authorisation string
(IAS), and comprising, for recognition purposes, e.g an image
of at least part of the authorised subject, and, for further
access and/or services provisioning purposes, the authorised
subject's further information carrier (FIC). In a similar way,
in the subsequent, operational step, for a subject requesting
access to the secured area, a common operational
identification/authorisation string (OIAS) is generated,
incorporating, at least partly, an operational identification
string (OIS) as well as an operational authorisation string
(OAS). Like the IIAS, the OIAS may comprise, for recognition
purposes, e.g an image of at least part of the authorised
subject and, for further access and/or services provisioning
purpose, the relevant subject's further information carrier
(FIC). The operational identification/authorisation string
(OIAS) is compared with the initial identification/authorisation
strings (IIAS) of the various subjects authorised to access to
the secured area, storedduring the initial step.
The further information carrier (FIC) may have the form of a
"token", e.g. a card, label or coin. It may be restricted to an
individual person or may apply for a group of persons. The FIC
may be worn on a person's body or clothes. Finally, it may, for
additional security, comprise a unique identification mark of
e.g. the relevant person, authorised to or applying for access,
e.g. the person's signature, fingerprint, face scan or retina
scan.
It is noted that the previous embodiments or variants of the
previous embodiments of the invention can be combined.
Figures 1 and 2 show an exemplary embodiment of a system fit for
execution of the method depicted above.
For the purpose of teaching the invention, preferred embodiments
of the method and devices of the invention are described in the
sequel. It will be apparent to the person skilled in the art
that other alternative and equivalent embodiments of the
invention can be conceived and reduced to practice without
departing from the true spirit of the invention, the scope of
the invention being only limited by the claims as finally
granted.
Figure 1 shows a system for access control of persons to a
secured physical or virtual area 1, controlled by an access
controller 2. The secured area here comprises a closed room 1,
comprising a computer network 14 and terminals. Access to the
room 1 is controlled by means of a door or the like, actuated by
control means 2. After a person 4 or 8 has got permission to
enter the room 1, each person has his specific further access
and/or service privileges and/or restrictions in the use of the
network 14.
The access controller 2 is controlled by a system processor 3.
In an initial step I, for a person 4, to be authorised to have
access to room 1, an initial identification string (IIS) 6 is
generated by means of a camera 5, comprising a digitised
representation, viz. a digital image or scan of a distinguishing
part of the authorised person's body, e.g. the person's face.
Subsequently the processor 3 stores the IIS 6, formatted as an
ordinary bitmap or as a string of vector parameters describing
the image, in a database (DB) 7.
In a subsequent, operational step II for each person 8, applying
for access to the area 1, an operational identification string
(OIS) 9 is generated, by means of a camera 10, comprising a
bitmap or -after processing inside or outside the camera- a
vector string representing the face of the person 8 applying for
access. In this step II the operational identification string is
compared, by the processor 3, with the IISs 6 previously
generated and stored in database 7for various persons 4
authorised to have access to the area 1.. If an IIS matches the
OIS of person 8, the person is granted permission to enter the
secured area.
In the operational step II, moreover, an operational
authorisation string (OAS) 11 may be generated by a camera 12,
comprising the image (again formatted as a bitmap string or a
processed, e.g. vectorised data string) of a further information
carrier (FIC) 13, comprisingfurther information concerning e.g.
the rights of person 8 within the area 1.
The further information carrier (FIC) may comprise further
information concerning the access rights of the person 8 to the
area 1 e.g. time restrictions (entrance times) or
rights/restrictions to (not-shown) sub-rooms, or to further
services to be offered within that area e.g. access rights to
the computer network 14. The FIC 13 may have the form of a card,
coin or label and may be strictly personal or may apply for a
group of persons. Said "further information" may be printed upon
the surface of the FIC card, coin or label, while such card,
coin or label e.g. may be clipped on the person's clothes.
The image scanned by camera 12, representing the "further
information" e.g. printed on the FIC 13, is converted by
processor 3 into an operational authorisation string (OAS), fed
to the area controller 2 (for e.g. controlling the entrance
time) and/or the network 14, for controlling the services to be
offered to person 8 after being entered into area 1, in
conformity with the rights as displayed on the person's FIC 13.
In said initial step I, besides the OIS, an initial
authorisation string (IAS) 16 may be generated, by means of a
camera 15, for each person 4 to be authorised to have access to
the secured areas 1 (room) and 14 (network), which IAS is
subsequently stored in database 7.
The IAS 16 comprises a representation (vectorised or not) of the
image of a further information carrier (FIC) 17, comprising
further information concerning the access and service rights of
the relevant authorised person 4 to the secure room 1 and/or
network 14. Note: if person 4 and person 8 are one and the same,
the FIC 13 is likely to be the same as the FIC 17.
In each operational step II the operational authorisation string
(OAS) 11 of the relevant person 8 requesting access to area 1,
is compared, by processor 3, with the initial authorisation
strings (IAS) 16, recorded previously and stored in database 7
during the initial step I.
Depending on the result of the comparison of the requesting
person's OIS 9 with the stored IISs 6 and the result of the
(preferred) additional comparison of the requesting person's OAS
16 with the stored IASs 16, the requesting person will or will
not get permission, by means of the access control means 2, to
enter and use the area 1 and the services of network 14. If
person 8 gets permission to enter, the information content of
the person's FIC 13 is interpreted by processor 3 and determines
the person's further rights for access to and services within
area 1.
Note: if the preferred option of storing IASs 16 of authorised
persons 4 in the initial step is not applied, only the
comparison (matching) result of the person's OIS 11 with the
stored IISs 16 determines the grant or refusal of access to area
1. In that case the contents of person's FIC 13 is not checked
against stored FIC representations (IASs), but only serves to
determine -only after person 8 gets permission to access area 1
due to a positive investigation result of his OIS 9 against the
stored IISs 16- the further rights etc. of person 8 within area
1 (for instance the access rights to services of network 14)
after being entered area 1. It is noted that the cameras 5, 10,
12 and 15 can be replaced by a single camera suited to execute
one or more of the functions of the cameras 5, 10, 12 and 15 as
described above. The processor 3 can be an integral part of the
camera(s). The storage means 7 can be an integral part of the
camera as well as being physically separated from the camera. In
the latter case the camera(s) can be equipped with network
communication means in order to transmit and/or receive the
various strings to be stored in said storage means 7 over a
network. In an embodiment the camera is further equipped with
state-of-the-art compression means to reduce the capacity needed
for the storage means and to limit bandwidth usage of the
network.
Figure 2 shows a second embodiment of the invention.
In the initial step I for a person authorised to have access to
the area 1, instead of separate image strings IIS 6 and IAS 16
(in figure 1), one common initial identification/authorisation
string (IIAS) 18 is generated by camera 5, and saved in database
7. Each IIAS comprises an integrated image of a (distinguishing
part of the) body of the authorised person 4 and of the
authorised person's FIC 17.
In said operational step II for a person requesting for access
to the physical or virtual area a common operational
identification/authorisation string (OIAS) 19 is generated by
camera 10, comprising an integrated image of a (distinguishing
part of the) body of the requesting person and of the requesting
person's FIC 13. Subsequently, the OIAS 19 of person 8 is
compared with the stored IIASs 18 of the various persons 4
authorised to have access to the area 1, each of which has an
IIAS stored in the database 7.
It is noted that the access controller 2 not necessarily
prohibits access of e.g. a person to an area in case the initial
strings (IIS, IAS, IIAS) do not match with the operational
strings (OIS, OAS, OIAS). Instead of or simultaneously to
prohibitting access to said area an alarm or other signalling of
non-matching strings can be provided for.
Finally it is noted that, as an extra security option, the FIC
of persons 4 and 8 also may, additionally, include a unique
representation of those persons, e.g. the person's signature,
fingerprint, etc.
Claims (22)
- Method for access control of a requesting subject to an area accessible for an authorised subject comprising,
in a first step (I) generating and storing at least a first identification string comprising a representation of said authorised subject,
in a second step (II) generating a second identification string comprising a representation of said requesting subject requesting access to said area and generating a first authorisation string comprising a representation of a first information carrier having additional information of said requesting subject for said area
and comparing said second identification string with said stored first identification string. - Method according to claim 1, wherein, in the first step (I), a second authorisation string is generated and stored, comprising a representation of a second information carrier having additional information of said authorised subject for said area,
while in the second step (II) said first authorisation string is compared with said second authorisation string. - Method according to claim 1 or 2, wherein said first information carrier and/or said second information carrier comprise information about relevant subject's rights and/or restrictions about the use of and/or access to said area and/or services within said area.
- Method according to claim 2, wherein, in said first step (I), for said authorised subject a first identification/authorisation string is generated and stored, comprising a representation of said authorised subject and of said relevant authorised subject's second information carrier,
while in said second step (II) for the requesting subject a second identification/authorisation string is generated, comprising a representation of the requesting subjectand of said relevant requesting subject's first information carrier,
and comparing said second identification/authorisation string with said stored first identification/authorisation string. - System for access control of a requesting subject to an area accessible for an authorised subject comprising means for, in a first step (I), for said at least one authorised subject generating and storing at least a first identification string comprising a representation of said authorised subject,
and means for generating, in a second step (II), for said requesting subject a second identification string comprising a representation of said requesting subject,
and means for creating, in said second step, a first authorisation string, comprising a representation of a first information carrier, comprising additional information of said requesting subject for said area.
and means for comparing said second identification string with said stored first identification string, - System according to claim 5, comprising means for generating and storing, in said first step (I) a second authorisation string (16) comprising a representation of a second information carrier (17) comprising additional information of said authorised subject for said area,
and means for comparing said first authorisation string (11) with said second authorisation string (16). - System according to claim 5 or 6, wherein said first and/or second information carrier comprises information about the relevant subject's rights and/or restrictions about the use of and/or access to said area, and/or services to be offered.
- System according to claim 6, comprising means for generating and storing, in said first step for each authorised subject a first identification/authorisation string, comprising a representation of the authorised subject and of the authorised subject's second information carrier, and means for generating, for the requesting subject a second identification/authorisation string, comprising a representation of the requesting subject and of the requesting subject's first information carrier, and means for comparing said second identification/authorisation string with said stored first identification/authorisation string.
- System according to claim 5, wherein said first and/or second information carrier has the form of a card, label or coin.
- System according to claim 5, wherein said first and/or second information carrier applies for a group of subjects.
- System according to claim 5, wherein said first and/or second information carrier is worn on the relevant subject's body or clothes.
- System according to claim 5 or 8, wherein said first and/or second information carrier includes a unique representation of the relevant subject like a signature, fingerprint, etc.
- Monitoring apparatus for access control of a requesting subject to an area accessible for an authorised subject comprising:means for generating at least one first identification string comprising a representation of said at least one authorised subject;storing means for storing said first identification string; means for generating a second identification string comprising a representation of said requesting subject;means for generating a first authorisation string comprising a representation of a first information carrier comprising additional information of said requesting subject for said area processing means for comparing said second identification string with said stored first identification string.
- Monitoring apparatus according to claim 13 wherein said apparatus further comprises means for generating a second authorisation string comprising a representation of a second information carrier having additional information of said authorized subject for said area and storing means for storing said second authorisation string.
- Monitoring apparatus according to claim 14 wherein said apparatus comprises:means for generating a first identification/authorisation string comprising a representation of said authorised subject and of said relevant authorised subject's second information carrier; storage means for storing said firstidentification/authorisation string;means for generating a second identification/authorisation string comprising a representation of said requesting subject and of said relevant requesting subject's first information carrier;processing means for comparing said secondidentification/authorisation string with said stored first identification /authorisation string.
- Monitoring apparatus according to any of the claims 13 - 15 wherein said storage means are not an integral part of said apparatus and said apparatus comprises network communication means for transmitting and receiving said first identification string and/or said second authorisation string or said first identification /authorisation string.
- A computer program for running on a computer system at least including software code portions for access control of a requesting subject to an area accessible for an authorised subject performing in a first step (I) generating and storing at least a first identification string comprising a representation of said at least one authorised subject,
in a second step (II) generating a second identification string comprising a representation of said requesting subject requesting access to said area and generating a first authorisation string comprising a representation of a first information carrier having additional information of said requesting subject for said area
and comparing said second identification string with said stored first identification string. - A computer program according to claim 17 wherein said software code portions further include portions wherein in the first step (I), a second authorisation string is generated and stored, comprising a representation of a second information carrier having additional information of said authorised subject for said area,
while in the second step (II) said first authorisation string is compared with said second authorisation string. - A computer program according to claim 18 wherein said software code portions further include portions wherein in said first step (I), for said authorised subject a first identification/authorisation string is generated and stored, comprising a representation of said authorised subject and of said relevant authorised subject's second information carrier, while in said second step (II) for the requesting subject a second identification/authorisation string is generated, comprising a representation of the requesting subjectand of said relevant requesting subject's first information carrier,
and comparing said second identification/authorisation string with said stored first identification/authorisation string. - A data carrier, stored with data loadable in a computer memory said data representing a computer program for running on a computer system at least including software code portions for access control of a requesting subject to an area accessible for an authorised subject performing in a first step (I) generating and storing at least a first identification string comprising a representation of said at least one authorised subject,
in a second step (II) generating a second identification string comprising a representation of said requesting subject requesting access to said area and generating a first authorisation string comprising a representation of a first information carrier having additional information of said requesting subject for said area
and comparing said second identification string with said stored first identification string. - A data carrier according to claim 20 wherein said software code portions further include portions wherein in the first step (I), a second authorisation string is generated and stored, comprising a representation of a second information carrier having additional information of said authorised subject for said area,
while in the second step (II) said first authorisation string is compared with said second authorisation string. - A data carrier according to claim 20 wherein said software code portions further include portions portions wherein in said first step (I), for said authorised subject a first identification/authorisation string is generated and stored, comprising a representation of said authorised subject and of said relevant authorised subject's second information carrier, while in said second step (II) for the requesting subject a second identification/authorisation string is generated, comprising a representation of the requesting subjectand of said relevant requesting subject's first information carrier,
and comparing said second identification/authorisation string with said stored first identification/authorisation string.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP01203970A EP1304659A1 (en) | 2001-10-22 | 2001-10-22 | Method and system and monitoring apparatus for access control of persons |
PCT/EP2002/010901 WO2003036571A1 (en) | 2001-10-22 | 2002-09-30 | Method and system and monitoring apparatus for access control of authorised subjects |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP01203970A EP1304659A1 (en) | 2001-10-22 | 2001-10-22 | Method and system and monitoring apparatus for access control of persons |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1304659A1 true EP1304659A1 (en) | 2003-04-23 |
Family
ID=8181099
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP01203970A Withdrawn EP1304659A1 (en) | 2001-10-22 | 2001-10-22 | Method and system and monitoring apparatus for access control of persons |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1304659A1 (en) |
WO (1) | WO2003036571A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4805223A (en) * | 1985-04-22 | 1989-02-14 | The Quantum Fund Limited | Skin-pattern recognition method and device |
US4821118A (en) * | 1986-10-09 | 1989-04-11 | Advanced Identification Systems, Inc. | Video image system for personal identification |
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
WO1999030267A1 (en) * | 1997-12-08 | 1999-06-17 | Soltesz John A | Self-service kiosk with biometrics verification and/or registration capability |
EP0924655A2 (en) * | 1997-12-22 | 1999-06-23 | TRW Inc. | Controlled access to doors and machines using fingerprint matching |
-
2001
- 2001-10-22 EP EP01203970A patent/EP1304659A1/en not_active Withdrawn
-
2002
- 2002-09-30 WO PCT/EP2002/010901 patent/WO2003036571A1/en not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4805223A (en) * | 1985-04-22 | 1989-02-14 | The Quantum Fund Limited | Skin-pattern recognition method and device |
US4821118A (en) * | 1986-10-09 | 1989-04-11 | Advanced Identification Systems, Inc. | Video image system for personal identification |
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
WO1999030267A1 (en) * | 1997-12-08 | 1999-06-17 | Soltesz John A | Self-service kiosk with biometrics verification and/or registration capability |
EP0924655A2 (en) * | 1997-12-22 | 1999-06-23 | TRW Inc. | Controlled access to doors and machines using fingerprint matching |
Also Published As
Publication number | Publication date |
---|---|
WO2003036571A1 (en) | 2003-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6657538B1 (en) | Method, system and devices for authenticating persons | |
US10055726B2 (en) | Systems and methods for management of mobile banking resources | |
US6219439B1 (en) | Biometric authentication system | |
US5995014A (en) | Biometric interface device for upgrading existing access control units | |
US6801640B1 (en) | Gate control device | |
US6181803B1 (en) | Apparatus and method for securely processing biometric information to control access to a node | |
CN109711133A (en) | Authentication method, device and the server of identity information | |
KR20200006987A (en) | Access control method, access control device, system and storage medium | |
JP2021535520A (en) | Systems and methods for identifying and verifying one or more individuals using facial recognition | |
US20030135764A1 (en) | Authentication system and apparatus having fingerprint verification capabilities thereof | |
US11328532B2 (en) | Mask aware biometric identification system | |
CN112005231A (en) | Biometric authentication method, system and computer program | |
CN101911137A (en) | The combination of face recognition in cross channel authentication | |
CN111460413B (en) | Identity recognition system, identity recognition method, identity recognition device, electronic equipment and storage medium | |
CN112017326B (en) | In-vehicle user state monitoring system and method | |
CN110097662A (en) | A kind of electronic identity authentication method and Verification System | |
US20030052768A1 (en) | Security method and system | |
JP7111531B2 (en) | relief system | |
JPWO2021095359A5 (en) | ||
WO2023228744A1 (en) | Door unlocking system, terminal device, equipment control system, and door unlocking method | |
EP1304659A1 (en) | Method and system and monitoring apparatus for access control of persons | |
JP2001005836A (en) | Iris registration system | |
JP3583892B2 (en) | Network security methods | |
KR100300623B1 (en) | Iris data collation system | |
JP2003099780A (en) | Access control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
AKX | Designation fees paid | ||
REG | Reference to a national code |
Ref country code: DE Ref legal event code: 8566 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20031024 |