Person identification system
11189121 ยท 2021-11-30
Assignee
Inventors
Cpc classification
A61B5/6801
HUMAN NECESSITIES
A61B5/082
HUMAN NECESSITIES
A61B5/4845
HUMAN NECESSITIES
G08B21/0446
PHYSICS
A61B5/0028
HUMAN NECESSITIES
International classification
A61B5/08
HUMAN NECESSITIES
A61B5/00
HUMAN NECESSITIES
Abstract
A person identification device 100 has a tag 110 with a code and a tamper evident tether 120 able to secure the tag 110 to a person having a body. The person identification device also has a signal generator 140 able to generate a signal representing the code. The tag 110 has a capacitive contact 130 able to capacitively couple the signal into the body of the person.
Claims
1. A telephone comprising: an output capacitive contact able to capacitively couple a signal comprising a code from a body of a person using the telephone to make a voice call to a further person or receive a voice call from a further person, wherein the code identifies the person and wherein the signal is capacitively coupled into the body of the person from a person identification device secured to the body of the person by a tamper evident tether configured to secure an input capacitive contact of the person identification device to the body of the person; a receiver configured to receive, from the output capacitive contact, the signal representing the code identifying the person; and a controller configured to determine the code from the signal for identifying the person using the telephone to make or receive the voice call, the controller further configured to compare the code against a code database for determining the identity of the person and to send the determined identity by the telephone to a monitoring centre.
2. The telephone of claim 1, wherein the output capacitive contact is disposed within a handset of the telephone, such that when the person holds the phone to make or receive a voice call, the person makes contact with the output capacitive contact.
3. The telephone of claim 1, wherein the controller is configured to store a log of voice calls and the code received from the person making or receiving the voice call.
4. The telephone of claim 1, wherein the controller is configured to send the code of the person making or receiving the voice call to the further person.
5. The telephone of claim 1, wherein in the event that the telephone fails to determine the identity of the person, an alarm condition is triggered.
6. The telephone of claim 1, further comprising a camera configured to capture an image or video of the person.
7. A method of identifying a person using a telephone to make a voice call to a further person or receive a voice call from a further person, the method comprising: capacitively coupling a signal from an input capacitive contact of a person identification device to the body of the person, wherein the input capacitive contact is secured about the body of the person with a tamper evident tether, and wherein the signal comprises a code that identifies the person; capacitively coupling the signal comprising the code from the body of the person to a telephone the person is using to make or receive the voice call; comparing the code against a code database to determine the identity of the person using the telephone to make or receive the voice call using the code; and sending, by the telephone, the identity of the person determined to a monitoring centre.
8. The method of claim 7, further comprising reporting that the tamper evident device has been tampered with and disabling the person identification device and in response to tampering with the tamper evident tether.
9. The method of claim 7, further comprising identifying attempts to remove the input capacitive contact from the body of the person.
10. A system for identifying a person using a telephone to make a voice call to a further person or receive a voice call from a further person, the system comprising: a person identification device comprising: an input capacitive contact configured to capacitively couple a signal comprising a code that identifies the person into the body of the person; a tamper evident tether configured to secure the input capacitive contact to the body of the person; and a telephone comprising: an output capacitive contact configured to capacitively couple the signal comprising the code from the body of the person using the telephone to make a voice call to a further person or receive a voice call from a further person; and a controller configured to determine the code from the signal for identifying the person using the telephone to make or receive the voice call, the controller further configured to compare the code against a code database for determining the identity of the person and to send the determined identity, by the telephone, to a monitoring centre.
Description
(1) Various embodiments of the invention will now be described, with reference to the attached figures, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17) The tamper evident tether 120 is secured in a way that makes the person identification device 100 difficult to remove from the person. Making the person identification device 100 difficult to remove may be achieved by making the tamper evident tether 120 from a material which is difficult to cut through or break, for example, the tamper evident tether 120 may be made from metal or a reinforced material, such as a fabric containing metal fibres, or a fabric containing Kevlar, or a fibre reinforced plastic material.
(18) In addition, or alternatively, the tamper evident tether 120 may react to tampering. For example, the tamper evident tether 120 may contain an electrical wire, or an optical fibre, which, when cut, reports that the tamper evident tether 120 has been tampered with and may disable the person identification device 100. The tamper evident tether 120 may also contain an identifier, such as an RF-ID tag, which uniquely identifies the tamper evident tether 120, so that attempts to remove the tamper evident tether 120 and/or to replace the tamper evident tether 120 with a different tamper evident tether may be identified by the tag 110.
(19) Person identification devices, such as those shown in
(20)
(21) A signal generator 140 is able to generate a signal representing a code. The signal is coupled to the capacitive contact 130 and the capacitive contact 130 capacitively couples the signal to the body of the person, so that the signal may be picked up at other locations on the body of the person.
(22) In this embodiment, the capacitive contact is made of a sheet of conducting material, such as a metal, for example, copper, silver or gold. In general, the capacitive contact is as large as possible as this increases the signal that may be coupled into the person, although, the size of the contact may be limited by the size of the person identification device 100 which needs to be convenient for the person to wear. The capacitive contact usually has a surface area of at least 100 mm.sup.2.
(23) The person identification device 100 can be secured directly to the skin of the person, with the capacitive contact 130 in direct contact with the skin. Although typically, an air gap is allowed between the capacitive contact 130 and the skin of the person to improve the comfort for the person to whom the person identification device 100 is secured. The air gap attenuates the signal which is capacitively coupled to the body of the person, so the air gap is usually less than 10 mm to allow sufficient signal to be capacitively coupled to the body, so that the signal may be picked up at other locations on the body of the person. The strength of the signal may need to be increased to compensate for the air gap.
(24) Alternatively, the person identification device 100 may be secured over an item of clothing worn by the person. The item of clothing will attenuate the signal, although not as badly as an air gap having the same thickness as the item of clothing.
(25)
(26) The layer of non-conducting material 435 may be glass, plastic or polycarbonate. The layer of non-conducting material 435 will attenuate the signal slightly, so the non-conducting layer is thin enough (for example, less than 1 mm) to permit sufficient signal from the capacitive contact 430 to be capacitively coupled into the body of the person, so that the signal may be picked up at other locations on the body of the person.
(27) Since an air gap between the capacitive contact 130 and the body tends to attenuate the amount of signal which is capacitively coupled into the body more than the presence of a non-conducting material, the person identification device 100 is formed in a way that prevents an air gap between the non-conducting layer 435 and the capacitive contact 430, for example, the capacitive contact 430 may be glued to the non-conducting later 435, or the capacitive contact 430 may be deposited or evaporated on top of the non-conducting layer 435.
(28)
(29) The signal generator 140 shown in
(30)
(31) The modulated signal has a frequency towards the lower end of the radio frequency (RF) spectrum, typically between 50 kHz and 300 kHz. Using a low frequency RF signal is advantageous because it couples into the body more efficiently, thereby reducing the energy of the RF signal the person identification device 100 must generate. This is advantageous because the person identification device 100 is battery powered so reducing the energy of the RF signal improves battery life and leads to a smaller lighter device because a smaller battery may be used. In addition, the fact that a low energy RF signal is coupled into the body means that the signal cannot be detected remote from the body, thereby improving security as the code cannot be intercepted and it can be certain that the code received by a monitoring device is coming from the person touching the capacitive contact on the monitoring device and not from an external transmission.
(32)
(33)
(34)
(35) The circuit 970 comprises a capacitive contact 930, and an LC resonant circuit 962. The LC resonant circuit 962 is driven by a driver 964, such as a full bridge or a half bridge driver. A controller 966 generates the modulating signal which represents the code stored in a memory 968.
(36) In addition, the circuit 970 includes components which allow the circuit 970 to receive a signal capacitively coupled from the body of a person. An amplifier 972 is included to amplify the received signal which may be at a relatively low amplitude.
(37) As mentioned previously, the person identification device 100 couples a low frequency RF signal into the body. In contrast, the monitoring unit 750 couples a high frequency signal, in the range of 5 MHz to 20 MHz, into the body because it is easier to make the tag 110 smaller if receiving at a higher frequency So, a mixer 974 is provided to down-convert the high frequency signal into a lower frequency signal that the controller 966 can handle. The mixer is attached to a master clock 970. The master clock 970 may be a clock which is incorporated in the controller 966 and therefore the frequency may be a frequency, such as 125 kHz, which is a multiple of the controller clock frequency. The output of the amplifier 972 is not impendence matched with the mixer 974, so a matching network 976 is included to transform the output impendence of the amplifier to match the input impendence of the mixer 974.
(38) A band pass filter 978 rejects all signals other than the modulated signal. Certain embodiments use on-off keying modulation such that only the carrier of the signal needs to be passed through the band pass filter 978 which enables the band pass filter to be narrow at around or at twice the transmission baud rate, which improves noise rejection.
(39) A demodulator 980 takes the output of the band pass filter 978 and converts it into a digital pulse train which is passed to the controller 966 to determine the code.
(40) The circuit shown in
(41) The circuit shown in
(42) To prevent a third party from being able to determine the code that is capacitively coupled into the body of the person, the code may be encrypted. The monitoring unit 750 will poll for a person identification device 100 by capacitively coupling a response request which is encrypted with AES (advanced encryption standard) encryption. The person identification device 100 in capacitive communication with the body receives the response request and will decrypt the response request with an AES key stored in the memory 668 of the person identification device 100. The person identification device 100 will encode a response containing the code and a session key. The monitoring unit 750 will decrypt the response and authenticate the person identification device 100 based upon the session key.
(43) The monitoring unit 750 may use the code to attempt to determine the identity of the person to whom the person identification device 100 is secured. The controller 754 in the monitoring unit 750 compares the code against a code database. The code database is located either in a memory or storage device of the monitoring unit 750, or on a remote server with which the controller 754 is able to communicate. By comparing the code against the code database, the controller attempts to determine the identity of the person to which the person identification device 100 is secured.
(44) The controller may also send the code, or information concerning the identity of the person, to another device, for example, to permit the person wearing the tag to perform some action, such as opening a door, or authenticating a transaction.
(45)
(46)
(47)
(48) The sample tube 1210 may be made of plastic and may also be replaceable to improve hygiene. To form the capacitive contact 730, the plastic sample tube has particles of conducting material dispersed in the plastic material. The particles of conducting material may be metal particles, such as particles of copper, silver or gold.
(49) In other embodiments, a monitoring unit 750 may be incorporated into other devices where it is desirable to confirm the identity of a person interacting with the device.
(50) The monitoring unit 750 may be incorporated into an electronic door entry system and the controller uses the code to determine whether to permit access to the door.
(51) A monitoring unit 750 may be incorporated into a key pad with the capacitive contact 730 disposed on the surface of the key pad. The key pad may be used to receive a PIN number. The fact that the key pad has a capacitive contact 730 and monitoring unit 750 means that if the person using the key pad is wearing a tag 100, the identity of the person using the key pad can be confirmed. This identity information could be used to authorise a transaction, such as at an ATM, to open or unlock a door, or to confirm that a security guard patrolling an installation has visited a particular location.
(52) The skilled reader will understand that the capacitive contact 730 may be implemented in a number of different ways. For example, the capacitive contact 730 could be a metal plate or ring. Also, the capacitive contact 730 could be constructed from a composite material, which could also be in the form of a plate or a ring. The capacitive contact 730 could be an integral part of a device such as a phone 1000 or a breathalyser 1200 or a sample tube 1210, for example integrated with the materials forming the device. Also, the capacitive contact 730 could be in addition to the device, such as an externally fitted or retro-fit capacitive contact.
(53) We anticipate that some uses would not need a tamper evident tether 120.
(54) Cameras or other verification means may be used in addition to the signal.