MULTIFACE DOCUMENT
20170032231 ยท 2017-02-02
Inventors
Cpc classification
H04L9/32
ELECTRICITY
G09C5/00
PHYSICS
G06K19/07345
PHYSICS
International classification
Abstract
A novel multilayer card has embedded therein a faraday cage layer which protects a RFID or ICC chip that is also embedded in the card. The antenna for the RFID or ICC device has an actuable switch which can alternatively open and close the antenna circuit enabling the user to disable or enable the RFID or ICC chip. The card can also be converted into a hollow prism with the faraday cage layer nearer the outer surface of the prism so that the RFID or ICC chip can only be accessed from the prism interior. Private or sensitive information stored on the interior surface is also protected from unauthorized access.
Claims
1. In combination with an embedded RFID device, an antenna comprising: a. An interrupted antenna circuit that is normally inoperable; and b. Bridging means for completing said antenna circuit to make it operable, Whereby deploying said bridging means renders the RFID device operable to receive and transmit signals representing information so that the RFID device can be interrogated and respond to interrogation.
2. The apparatus of claim 1 in which said bridging means comprise a slide switch positioned to complete said antenna circuit when translated from a first orientation to a second orientation Whereby translating said switch connects said antenna circuit so that the RFID device can receive and transmit signals so long as said switch remains in said second orientation.
3. The apparatus of claim i in which said bridging means comprise a dome switch positioned to complete said antenna circuit when pressure is exerted on said dome whereby the RFID device is operable to receive and transmit signals only when pressure is exerted on said dome.
4. Means for confirming identity to gain access comprising: a. a multilayer card including data storage means and having an obverse face and a reverse face; b. an integrated circuit chip (ICC) on at least one of said layers; c. a faraday screen laminated in the interior of said card between an inner and outer face whereby said ICC cannot be accessed when said faraday screen is between said ICC and an interrogating device; d. obverse face data storage means reserved for data not deemed sensitive if viewed by third parties; and e. reverse face data storage means reserved for data deemed sensitive and private; whereby data is easily recovered from said obverse face when directly exposed to an interrogation device and, in order to recover data from said reverse face, a user must expose said reverse face to the interrogation device, and where access is only obtained utilizing data from said reverse face.
5. Means for confirming identity as in claim 4 wherein the opposite edges of said document are fastened together to form a hollow prism with said reverse face on the interior Thereby preventing access to said ICC and other private sensitive information stored on said reverse face.
6. Means for confirming identity as in claim 5 wherein said prism is cylindrical.
7. Means for confirming identity as in claim 5 wherein said prism is quadrangular.
8. Means for accessing information retrievable only from the interior of a hollow prism shaped document comprising: a. A probe element adapted to be inserted into the interior of a hollow prism shaped document; b. A signal conduit adapted to be connected to a data processor; and c. Signaling means in electrical communication with said signal conduit and said probe element for transmitting interrogating signals to the document and for receiving signals representing information from the document.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0059]
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074]
[0075]
[0076]
[0077]
[0078]
[0079]
[0080]
[0081]
[0082]
[0083]
[0084]
[0085]
[0086]
[0087]
[0088]
[0089]
[0090]
[0091]
[0092]
[0093]
[0094]
[0095]
[0096]
[0097]
[0098]
[0099]
[0100]
[0101]
[0102]
DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0103] In the embodiment shown in
[0104] As shown, the obverse faces 16, 20 include a distinctive colored pattern 24 to discourage counterfeiting and a document ownership statement 21. This pattern may further include security metallic ink and may be unique to each document's visible surface, including properties in the thermal infrared range. The obverse faces 16, 20, can also include an official user purpose or application generated with security ink, preferably a metallic ink 23 governmental seal, for example, a departmental seal 26 on obverse face 16 and a governmental seal 28 on obverse face 20.
[0105] A degraded image 30 of the bearer on obverse face 16 is sufficiently representative to enable a human observer to recognize the image 30 as that of the bearer. Such a degraded image 30 might be considered a caricature or cartoon and is intended to be unusable for facial recognition equipment. Accordingly, a surreptitious scan of the image would not allow any information obtained from obverse surfaces to be included in or associated with a database record that is otherwise associated with the bearer.
[0106] On the obverse face 20 of card II 14, an encoded matrix image 32 is imprinted, preferably with metal ink. This matrix image 32 can, in conjunction with a scanner, camera equipped PC, laptop, netbook, or tablet device, or any digital camera in a cell phone or other PDA device or application, be decoded to represent the address of a web site which, when invoked, can provide information about the document 10 and how it can be employed as, for example, as a travel document or a passport or other secure type application document.
[0107] The reverse faces 18, 22 are not normally visible but must be manipulated by the bearer or a person with the authority to view those faces. As shown, one of the reverse faces 18 includes a photographic image 34 of the bearer but partly overlaid with a departmental seal 27 to thwart facial recognition scans but still capable of human interpretation as being a photograph of the holder.
[0108] A magnetic strip 35 is included for the storage of magnetically coded information that can be read by a magnetic scanner. A digital matrix 36, when decoded, presents biometric data, preferably in an encrypted form, of the bearer which can be used to verify independently scanned biometric data at an inspection station.
[0109] The comparison of the stored biometric data with the independently obtained biometric data is used to confirm the identity of both the respective card and the bearer of the document 10. In accordance with the teachings of the present inventor, the biometric data of the document 10 and the currently presented biometric data can be compared with the bearer's biometric data that is stored in a remote data base and or the secure portable database contained in the matrix and card surface readable data to confirm that the bearer is the person that he purports to be.
[0110] In this example, the other reverse face 22 carries information usually found on a passport, including the governmental seal 28, an optically readable information strip 38 and a digital matrix 39. The caricature 30 is also included which sufficiently resembles the bearer so that a human operator can, in all probability, recognize the bearer as the person so caricatured to enable the visual matching of the two component parts 14 & 16 during assembly or should they become separated, deliberately or inadvertently.
[0111] In the example, card I and II are perforated at 11 in such a manner as to not interfere with the functionality of either card but to enable their conjoining with preferably an identifiable security grommet that allows their rotation by the holder's deliberate action to expose their obverse and reverse surfaces 12 and 14.
[0112] Turning next to
[0113] Accordingly, the obverse faces 46, 48 include a governmental seal 50, a caricature of the bearer 52 and a coded matrix pattern 54, which, when scanned by an appropriate device, resolves into a web address where additional information can be found, preferably specific to the user. As in
[0114] An additional feature of this embodiment is a transparent and obstructed mask strip 56 of the same color as the dark magnetic strip 58. As an example here the strip is divided into five holder specific zones which may be used in conjunction with an encoded display (better seen in
[0115] The interior reverse faces, reverse face of card I 60 and reverse face of card II 62, contain information normally hidden from public scrutiny and which is exposed only when the bearer wishes to expose it. Which information is on which face is a matter of choice and the faces could be considered interchangeable. In the present embodiment, the reverse face of card II 62 contains the caricature 52 together with an encoded matrix 64 which, when decoded, can provide secure personal and biometric information unique to the bearer, preferably in an encrypted form.
[0116] The reverse face of card I has a photograph 66 of the bearer, partially obscured by the seal 50 to defeat facial recognition software. An additional code matrix 68 can include other secure personal information including image and other biometric data as well as other data such as date of birth and place of residence. Much of the same biographic and or encryption and or decryption key and or checksum-data information can also be encoded and stored on the magnetic strip 58, an important function of which is to obscure the mask pattern of the transparent, segmented mask 56. To facilitate the use of the mask 56, indexing or positioning points 57, here shown as clear spaces on both the obverse and reverse faces 48, 62 are provided. The card surface 44 is placed uppermost against the display screen of a computer, netbook, cell phone or other device which has an integral display screen, wherein the indexing apertures 57 can be positioned against single use indexing marks in order that the transparent apertures can be utilized.
[0117] Turning now to
[0118] As in
[0119] An additional feature of this embodiment is a transparent mask strip 44, 56, 59 which may be used in conjunction with an encoded display (better seen in
[0120] The interior reverse faces, i.e. the reverse face of card I 60 and the reverse face of card II 62, contain information normally hidden from public scrutiny and which is exposed only when the bearer wishes to expose it. Which information is on which face is a matter of choice and the faces could be considered interchangeable. In the present embodiment, the reverse face of card II 62 contains the caricature 52 together with an encoded matrix 64 which, when, decoded, can provide personal and biometric information unique to the bearer and can act as a secure portable database.
[0121] The reverse face 60 of card I has a photograph 66 of the bearer, partially obscured by the seal 50 to defeat facial recognition software. An additional code matrix 68 can include other personal information such as date of birth and place of residence and can act as a secure portable database. Much of the same biographic information can also be encoded and stored on the magnetic strip 58 including encryption/decryption key and checksum data, which obscures the mask pattern or zones of the transparent portions of mask 56. To facilitate the use of the mask 56, indexing points 57, shown as clear spaces on both the obverse and reverse faces 48, 62 are provided.
[0122]
[0123]
[0124] Added card element 73 is preferably a laminate inserted between card I 72 and card II 14. Preferably, card element 73 is transparent with some additional features added such as the governmental seal 28 and a matrix element 74 which can perform the function of a secure encrypted portable database specific to that document or card 70 function and may include biometric data or templates of the holder. A plurality of viewing apertures 75, which may either be actual apertures in the card element or may be just printed or preferably security printed within the laminates with metallic ink circles defining the real apertures or otherwise. A horizontal indexing line 76 and a vertical indexing line 78 near one end of the horizontal line 76 are, preferably, again security printed within the laminates with metallic ink. The indexing lines 76 and 78 are used to align the card with an information presentation on a display screen so that elements of the presentation can be selected and can serve as a secure, one time, card not present (virtual card) personal identification characters, which, when entered, identify a particular user, much the same as PIN numbers.
[0125] Turning to
[0126] The first card element 82 includes a mask 86, similar to transparent mask 56. Card element 82 need not be transparent but includes indexing apertures 88 so that the card element can be aligned with a display to reveal alpha numeric characters in the mask 56 clear areas.
[0127] The second card element 84 is similar to the transparent card 70 of
[0128] Turning next to
[0129] The inserted card 90 can include a departmental seal 26 and a governmental seal 28. Also included are transparent alignment apertures 57, a transparent mask 86 and semi transparent or obstructed components 87. When aligned using 57 on a preferably touch sensitive display screen, it can be viewed through mask 86 to determine which alpha numeric characters on a display screen are revealed to provide a unique validation code. Preferably, element 90 is constructed to be similar to the
[0130]
[0131] In
[0132] At the next step in the transaction, after the matrix 118 is paused, the transparent card 70 is placed over the screen 114 and the vertical line 78 is placed adjacent the edge of the matrix 118 and the horizontal line 76 is aligned with the indexing arrows 120. The apertures 75 will then be aligned with selected spheres of the matrix 118 elements, which when cursor 116 is maneuvered over them and clicked, will, on completion, activate a confirmation code combination. If the screen 114 is a touch screen, an operator digit or stylus movement may be traced and may be used to record the time pattern sequence by the operator to touch each of the revealed variable colored spheres to enable a system recognized access code or one time PIN.
[0133] Alternatively, the cursor 116 can be drawn under each aperture and the selected character may be clicked. When all of the revealed code characters have been identified, in a preferred embodiment of the system, the caricature image 122 can be dragged over the digital trigger matrix image 124. The integral camera 102 can then take an image or sequence of images of the user and, with the predetermined triggering of the matrix with the caricature of the intended user, the image of the user and the confirmation code can be transmitted to an appropriate organization where the confirmation code and image can be verified. If verified, the transaction is consummated.
[0134] The transaction can range from a travel authorization or a visa to a transaction with a vendor of goods or services, as well as the issuance of a high density code or a virtual card which may have a single or multiple use functionality which, when displayed at a terminal or reader of any type, can provide verification and authentication, which can permit entry, payment or other useful purpose. The dragging of a caricature image 122 over the digital trigger matrix image 124 provides the basis for consistent positioning of the user for imaging and, where appropriate, be used subsequently for prosecution of fraud, inasmuch as all transactions are biometrically bound to the user and the customer with transaction specific encryption, decryption keys.
[0135]
[0136] As in the previous example, the phone screen 132 displays the matrix pattern 118, the caricature 122 and the digital matrix 124. When properly aligned over the matrix 118, the apertures 75 will selectively reveal to the user the appropriate images that correspond to the security or confirmation code. When these are selected, using a stylus or finger pressure, the transaction can proceed. The camera 134 will capture the image of the user when, as required, the caricature image 122 is dragged over the digital matrix image 124 to initiate the transaction. Shown is a submit button 126 for use as may be necessary within the transaction. It may also be necessary to utilize function keys of the phone 130. The dragging of caricature image 122 over the digital trigger matrix image 124 provides the basis for consistent positioning of the user for imaging. If fraud is involved, the image can subsequently be used in the prosecution as all transactions are biometrically bound to the user/customer with transaction specific encryption, decryption keys.
[0137] On completion of the transaction, a receipt image or virtual single or multiple use card may be stored in the phone or secured within a virtual wallet contained as an application within such a phone or other such user controlled device, 130 to be displayed to an appropriate detector which will be able to recognize the image as a proper authorization for an action or procedure. For example, the receipt may be a boarding pass for an airline or an authorization for a withdrawal of cash from an ATM machine.
[0138]
[0139] As with a computer, the ATM or an AIIDM 140 may or may not also be equipped with a keyboard or optical document recognition device such as could read a machine readable passport 150, a touchpad ICC contact or contactless electronic document or virtual card reader according to this invention 152 and a fingerprint scanner 154. The ATM or AIIDM display with a remote document reader of any type including ICAO MRTD, NFC, RF ICC 156, which may be a touch screen, displays, after the user has been identified to the ATM or an AIIDM machine 140, possibly through the use of an appropriate digital matrix pattern 74 on the document 70 which is scanned by camera 144. The moving digital matrix 118 is displayed together with the caricature 122 of the user and the digital matrix 124.
[0140] With the digital matrix 118 image paused, the transparent card 70 can be aligned with indexing arrows and the confirmation code can be ascertained. As in the earlier examples, the individual code characters are selected and the caricature 122 is dragged and dropped on the digital matrix 124. The user's image is taken by the cameras 144, 146 in combination with cameras 142 and 148 as a part of the transaction record and a desired amount of cash can be dispensed through the dispenser 158.
[0141]
[0142] The second layer 162, shown in
[0143] A fourth layer 168 is the RFID circuit 170 which can be printed using a conductive ink. If desired, a two part antenna circuit can be integrated and would be inactive under normal circumstances but can be activated by a user applying and maintaining pressure on a tactile detectable dome or micro type switch which would indicate that the card is being activated by an individual in a conscious state 172 through layers 1, 2 & 3 which is deactivated by manual release of pressure on the dome. Such a switch would make the RFID circuit normally inoperative and would require manual manipulation to complete the circuit and allow the RFID circuit to respond to interrogation at the total discretion of the user.
[0144] As seen in
[0145]
[0146] A next layer 176 is either a conductive mesh or a printed mesh 178 using conductive inks to act as a Faraday cage for this document. As can be seen, each of the layers includes the mask 56 with clear areas through which authorization or confirmation code characters could be seen. In preferred embodiments, each clear area could accommodate one or more characters which could be placed anywhere within the area. In one embodiment, four or even five characters positions 86 could be found or located in a single area, each in a different part of the area.
[0147] The next layer 180, (shown in
[0148] Using the above domed pressure switch controlled RFID and the slider type switch in combination within the same card as
[0149]
[0150] Useful biometric identification data acquisition, particularly in an unsupervised environment, presents particular difficulties. Accordingly this invention utilizes a technique that insures the rightful owner of the card is, by task repetition, self pre-positioned for a camera, in similar manner to so called key stroke recognition, at the times when user verification is required to activate the virtual card.
[0151] In
[0152] This activates the terminal's camera or cameras to collect an image or sequence of images or derived templates thereof and transmit all that data to the entity. On completion of a successful transaction, the entity would forward to the card holder's virtual card holding device 130 their receipt which may be in the form of a single use or multiple use matrix, which would be linked to the virtual card holder's biometrics. This could be required should the receipt be used as a boarding pass by, for example, the Department of Homeland Security or other agencies of the government.
[0153] In another method of use, the complete transaction can be initiated and completed via the virtual card holding device 130. After the virtual card holder opens the virtual card 131 via an application on device 130 a card transaction with the virtual card issuing entity 135 is illustrated by one such potential entity, namely an entity that conducts a ubiquitous universal biometric authorized and validated service to its customers but this could apply to a single card provider who each issues its own individual virtual cards in like manner.
[0154] A transaction is activated by initiating the displayed card's Open button 131. Thereafter, one such transaction could be with an air carrier that is required to interface with the US TSA for US domestic air passenger identification and travel authority. Accordingly the transaction may be conducted via several screens leading to
[0155] On a satisfactory result, further display 400 is added with which is incorporated an active matrix relative to the template locators 57. The transaction continues in one of three ways, one button save & exit 139 is activated which terminates the transaction at that point to be resumed at a later time. Two, change button 137 is activated which results in another template 400 being issued, or. Three, the template 409 active matrix 141 is activated by touch, stylus, or cursor click.
[0156] Subsequently an active screen 120, as seen in
[0157] The system then recognizes the allocated alpha numeric code relative to matrix 141 against the position selected by locator 120. When the card holder completes this card not present action caricature 122 is dragged over active matrix trigger 141 which again activates biometric camera sensor 134 as previously discussed. A successful transaction is indicated, preferably, by the addition of their departmental seal 407 or further biometric identification may be signaled to be submitted via finger print sensor 136. Actuating the submit button 405 terminates the transaction.
[0158] Thereafter, as previously discussed, a virtual receipt or pass may be issued that bears the respective caricature. A single or multiple use active matrix, is required as to the requesting individual's use of respective entities system or network of systems. Preferably, a caricature 122 of the expected card holder is displayed together with a transaction encrypted security matrix issued for the next appropriate use.
[0159] For additional security purposes, a fingerprint may be required to be scanned by the scanner 136 and a photo image can also be taken by the camera 134 before any transaction commences. Should it be necessary, the open button remains inactive until this action is completed at which time it is illuminated to signal that the required biometric data has been collected. Thereafter, the transaction proceeds after the open button is touched on screen 132. This touch results in the transmission of the fingerprint and photo for biometric recognition and, when recognized, a transaction screen is presented, as shown in
[0160] Again, on completion as above, a confirmation receipt of a successfully completed transaction can then be sent to the phone for later use. If the transaction sought is a travel authorization, the stored receipt could later be used at embarkation and or debarkation points to permit access to the facility, transport vehicle or other appropriate uses.
[0161]
[0162] Similarly, the alternative RFID device 190 of
[0163]
[0164] In
[0165]
[0166] The new image includes a virtual card 204 which includes a caricature 52, indexing apertures 206 and a virtual mask 208 with individual windows 210. Also present are indexing elements 200 and a confirmation matrix 202. The virtual card 204 can be positioned so that the indexing apertures 206 align with the indexing elements 200. This places the characters constituting the confirmation code into the windows 210 of the virtual mask 208 as seen in
[0167] By moving the virtual card 204, a partially obscured photo image 212 of the user is revealed. As before, the confirmation code, here 795284 is selected with a stylus and a transmit key on the phone is accessed, transmitting the information back to the web site. As before, a photo may be taken to maintain a record of the user of the phone at the time the transaction was consummated.
[0168] Considering the safety and security of transactions using the concepts of the present invention, whether with real or virtual documents, yet additional applications have been made possible. A user controlled virtual wallet or purse in which several different entities' virtual cards can be securely kept collectively and used only when the rightful owner chooses. This aspect takes on particular importance should the device holding the cards be lost or stolen. Virtual credit or other entity cards, in addition other user credentials, may be created as secure files and subfiles in a remote server accessible securely through the interne by their own user or individual owner being able to effect the creation of a personal virtual card with its own unique encryption/decryption trusted key exchange for the user's personal use, Such virtual accessible documents could be a birth certificate, marriage certificate, deeds to property, and any other valuable document whose presentation may be required.
[0169] Such a key exchange may involve the use of multiple encrypted and re-encrypted session key exchanges and which may be triple or more times key transfer sequences to ensure system integrity throughout all transactions. At least one of the keys used may be biometrically based, being derived from the user's biometrics.
[0170] These security steps are taken in order to facilitate an evidentiary chain of accountability for later use should that be necessary in a legal proceeding. Contacting the server and establishing identity through the use of a smart phone with fingerprint scan capabilities and a camera can retrieve an identity verification document.
[0171] As shown in
[0172] In
[0173] The server or onboard processor acknowledges receipt of correct confirmation code input supported by biometric evidence by displaying, if correctly entered, the virtual wallet. If confirmed, the wallet's clasp 207 will open as shown. The virtual wallet can now be dragged open or for privacy may be dragged closed or opened again without locking it at any time.
[0174] At the conclusion of the owner's use, the virtual wallet 214 is dragged closed and the clasp 207 double tapped or clicked to lock it, at which time another photograph may be taken to memorialize the action. The visual impact of the easily visible clasp position, indicating the security or accessibility of the virtual cards contained therein, is a safety feature that cannot be underestimated, particularly for individuals that may be, in part, visually impaired. Of course all functions that are satisfactorily accomplished may be accompanied by function distinctive vibrations and sounds.
[0175] All transactions for the user's audit benefit can be date time stamped and encrypted within all records that the user chooses to maintain. However, the virtual cards provided by entities other than the virtual wallet owner are not accessible unless the entity provides that authority within the foregoing described process.
[0176] Turning next to
[0177] In
[0178] As with the other examples, the code can be entered by touching the display 220 at those numbers. The transaction can be completed with the provision of a virtual submit button on the display 220 or by any other predetermined combination of image movement or manual activation of the display 220.
[0179] Turning now to
[0180] In
[0181] In
[0182] In
[0183] In
[0184] In
[0185] Turning next to
[0186] For an example, the operator selects an image 2904 from the available menu 2902 which now includes the operator modifications to uniquely differentiate it to the operator from the original image to appear on the screen 2906 of the device.
[0187] Turning to
[0188] The operator's selected indexing elements 3004, as described in
[0189] The operator selects a custom gesture 3008 from a menu 2722, which could be performed on the touch sensitive screen of a device by gesture or by another pointing device. The menu can then provide visual, audible and/or haptic feedback according to operator's settings as confirmation.
[0190] In
[0191] Turning to
[0192]
[0193] In
[0194] Referring back to
[0195] In
[0196] A RSA, ECC PKI or AES cryptographic key 3206 is shown as a two dimensional barcode or matrix form which has been issued by an entity with which the holder has a relationship. This PKI is machine readable in order to effect secure transactions or communication between the individual and the issuing entity. In this reading process the 2D or 3D barcode or matrix would appear on the utilized device's display. A NFC, RF ICC chip 3208 is included to effect transactions by the individual and the issuing entity. On the reverse surface 3204 of card II there is provided either a conventional read-only or reprogrammable magnetic stripe 3210 with onboard processor capabilities, allowing it to reprogram itself after each use.
[0197] Each type of magnetic stripe, matrix, NFC or ICC 3210 is vulnerable to damage and both contain sensitive data related to the holder if copied and accordingly been placed on the protected reverse face of card II. An internal faraday cage 3212 is inserted to the rear or closest to the obverse card surfaces to protect the NFC chip 3208 and the circuitry of the magnetic stripe at 3210 from being compromised by unauthorized access.
[0198] In
[0199] A second NFC RF ICC chip 3220 to effect transactions by the individual and the issuing entity is placed in card I. Also on the reverse face of card I is a second either a conventional read-only or reprogrammable magnetic stripe 3222 with onboard processor capabilities allowing it to reprogram itself after each use. Each type of magnetic stripe is vulnerable to damage and has accordingly been placed on the protected reverse face. An internal faraday cage 3212 component is placed closest to the external or obverse surface to protect the second NFC 3220 and the circuitry of the magnetic stripe 3222 from being compromised by unauthorized access. Due to the location of the NFC chips 3208 and 3220, a partial opening of the Multiface Document is possible; meaning only the desired NFC or RF ICC is unprotected by the faraday cage at any one time during use.
[0200] Such a document does not need to incorporate all of the depicted features, and could also include other features as required by an issuing entity in order to be used retrospectively with legacy equipment. Furthermore, such a document could be used in a tamper evident delivery environment function to issue both Public and Private Key data in a cryptographic environment that, for example, uses a Public Key Infrastructure between individuals or an individual and an issuing entity or to effect the confidential exchange of other symmetric/asymmetric key issues in order to effect trusted digital signatures between parties in lieu of delivery by, for example, diplomatic exchange.
[0201] Referring now to
[0202] Turning now to
[0203]
[0204] At
[0205] At
[0206] The generated mask 3314 for this type of barcode or matrix 3310, when displayed on the screen of the operator's device scanning the code obscures the code itself to prevent it being scanned or copied by a possible third party either by covert device or screenshot. In
[0207]
[0208] Yet another embodiment of the multiface document is shown in
[0209] Obverse Face I and Reverse Face I of the document could potentially be issued by one entity and Obverse Face II and Reverse Face II by a second entity who by agreement intends the functions to be utilized as a co-joined multiface document or capable if used as a companion pair of two individual card or documents would protect each other in like manner as if they were cojoined. Both documents could also be issued by the same entity, for example, to access two or more different services or provide increased functionality over a traditional dualface document. The Obverse 3502 of Document I includes all of the features that would traditionally be included on the two surfaces of a standard dual face document. These include an image of the bearer 3504, NFC logo 3510, a magnetic stripe 3518, a 2D barcode 3408 and NFC or RF chip and its transmitting antenna 3514. A predetermined non-faraday cage protected area 3506 is provided in order that the NFC or RF ICC chip on Reverse II 3552 may be read through Obverse I 3502.
[0210] A faraday cage 3512 is embedded between Obverse I 3502 and Reverse I 3520 and above the containing layer 3526 of electronic circuitry. A concentrated faraday cage screen 3516 is placed above the RF chip and its antenna 3514. Apertures 3524 at points on Reverse I allow unimpeded RF communication through these points only. Circuitry 3526 is laid down by metal ink or deposition applied to surface 3520 to create metal structures. A combined Obverse Reverse of Document I 3530 displays all functions and circuitry from both Faces of the Document.
[0211]
[0212]
[0213] The individual may subsequently indicate a desire to travel to Australia or the USA. Such a desire for example, may be indicated by the purchase of an airline ticket or making an application for a visa. The individual's identification card may be read 42 at this time and the airline ticket would be issued in the name of the person to whom the card was issued.
[0214] At this time the individual's add-on file in the national database would be updated to show that he is authorized to travel to Australia and remain there for a specified period of time. Upon updating of his add-on file the individual may be issued with a suitable receipt or ticket for his own benefit and record although such a receipt would not be used for any official purpose.
[0215] In a preferred embodiment the individual's thermo gram or other biometric data is retrieved from the database or prepared at this time and stored in a departure station database arranged to collate thermograms in respect of individuals ticketed for each particular flight.
[0216] Accordingly, information specific to each person as well as information in regard to authorized length of visit and the like or other information enabling quick and easy access to that information in respect of each person on a particular flight is prepared as a packet of identification data prior to the time of departure. As passengers move towards the departure lounge or through the departure gates, for example, they are scanned by at an ATM or by the associated remote scanner to create a contemporary thermographic data which may be instantly compared with past seen individual data thermographic data previously loaded into the departure station database to both positively identify each passenger and other changed condition data which may reveal a KUI or a UUI. Those passengers positively ATM identified 44 as authorized passengers by a sufficient correlation between the contemporary thermographic and face image data against the departure station database thermographic and face image data are afforded an uninterrupted passage to the departing aircraft 46. Those passengers in respect of whom the correlation is below the requisite level are directed to a designated area for further identification or if suspected KUI/UUI are referred to A-T, C-T command elements responsible for public safety.
[0217] This process is carried out for all persons boarding the aircraft. The departure ATM station may also maintain a database of prohibited KKI & KUI persons which preferably is accessed for comparison with all passengers. Any person who is identified as a prohibited passenger may be prevented from boarding the aircraft.
[0218] With respect to
[0219] First, the national data is compared to the departure data (DPT), the national data is compared to the current arrival data (AVE) at (1), (2) and, at (3), the arrival data (AVE) is compared to the departure (DPT) data transmitted from the departure point. Those persons not positively identified in the short period before boarding and allowed to board are investigated
further during the relatively long period in which the aircraft is in transit. Accordingly, those passengers for whom authorization is eventually established are provided with easy entry 50 to the destination airport and those who have not been positively identified are detained 52 for further identification.
[0220] At the destination airport all passengers proceed past a scanning station where each passenger's identification card is read remotely, thereby enabling the stored thermogram for that card to be retrieved. Each passenger is coincidentally thermogrammed by a remote thermographic scanner focussed on the person carrying the sensed card. The thermograms are compared and where a sufficient correlation is achieved such persons progress to their destination without further interruption by officials through selection gates which may be actuated by the monitoring equipment automatically.
[0221] Suitably the ATM associated selection gates unobtrusively capture unauthorized individuals for safe further investigation. The add-on database may be updated at this time automatically to record the arrival of each passenger in the destination country. Alternatively, the departure airport may package the information contained on the ATM issued identification receipt of individuals on a flight and send this to the arrival destination which compiles the packet of identification data for their use to facilitate free passage of bona fide disembarking travelers.
[0222] Preferably each station and each ATM station which can access the database has an individual station access code and each operator manning such a station has an individual operator's code. Suitably this information is added to the add-on only file each time an access is made or attempted. Suitably, authorization to access the database is provided in a similar manner wherein biometric correlation is required. Accordingly, an audit trail of actions is maintained and a log of authorized movements of each individual is recorded in such a manner that a history report including details of the operator updating the file can be established.
[0223] Foreign travelers in a host country need only carry their Identification cards. If queried as to whether they are authorized to be in the particular country, they only need to accompany a government official to a reading station where a contemporary thermogram can be taken and where their identification cards can be used to access the national database to retrieve each individual's thermo gram and authorized travelling particulars.
[0224] These process steps are broadly indicated in the diagrams of
[0225] The facilitation of movement of shipping containers or motor vehicles are illustrated schematically in
[0226] Containers arriving at a shipping station will be remotely scanned to check for any unauthorized access to each container between the dispatching station of the exporting entity and the shipping station and also for any damage to the seal. Information in respect of all containers to be loaded on a particular ship will be compiled to form a package of data which will be transmitted to the destination port. At the destination port the containers will be unloaded and scanned automatically to determine if the seals have been damaged. The seals and the identification data will be compared with the transmitted packet of data. Visual checking to determine whether the containers have been entered by removal of a remote wall panel of the container may also be carried out. A plurality of sealing assemblies may be applied to suitable parts of the container if necessary. Those containers positively identified (i.e. with a suitable correlation between the transmitted data and the data obtained at the destination) and having the seal intact, (that is the seal sends a valid signal), will be directed from the destination port without further checking. However, those containers which are either not positively identified or whose seal assemblies do not provide a valid signal will be directed to a checking station for further investigation. By use of this method freight forwarded by bona fide exporting entities will be afforded an uninterrupted passage unless an unauthorized party has gained access to the container during shipment or a seal has been accidentally damaged. The method therefore is expected to improve the efficiency of freight movement.
[0227] Turning now to
[0228] When an individual approaches the data collection or access point 96, a radio frequency identity detector (RFID) 98 detects the individual's identification device and cameras 100 and other biometric data gathering devices such as thermal, audio and vapor etc. sensors 102 devices record the individual's respective biometric data. The local application unit 80 associates the card unique description, with one or more pieces of noninvasively obtained biometric data of card holder. The local application unit 80 passes card unique description and biometric data to the network server 84 for comparison. The server application unit 80 requests a search of the watch list database 92 and the condition database 90 for any match or close match of data collected from the RFID reader 98 and the biometric data gathering device 102. The result of any match sends appropriate flags to appropriate authorities. Further, the server application unit 80, on receipt of data from the RFID reader 98 and the biometric data gathering device 102, also requests the linked biometric data from enrollment or first seen and last seen databases 86, 88.
[0229] The first seen database 86 passes back recorded biometric data and authorizes the last seen database 88 to pass back last seen recorded biometric data to the server application 84. The last seen and first seen biometric data are compared to validate the integrity of the first seen and last seen databases 86, 88. Any failure to reach required comparison threshold causes an alert to be transmitted to internal security. The first and last seen data are held until current data is received from the biometric data gathering device 102. Current-seen, last-seen and first-seen biometric data are compared and if identity is confirmed, an enabling signal is sent to an access control device 104 which enables a gate controller 106 to permit passage or access Similarly, if identity is not confirmed, the signal to the access control device 104 results in a different signal to the gate controller 106 and access is denied. If three way biometric data comparison is inconclusive, an appropriate signal is sent to the local application unit 80 and either a request is made for more biometric data or, if a threshold has been reached, a decision can be made to deny access and flag for additional evaluation, which may be a manual investigation. In such an event, the local A-T, C-T or O-C command L1R, L2R and other security detachment phase developed confrontation plan dependent, may be advised and off the incident law enforcement official may be instructed to deny access and possibly detain the individual.
[0230]
[0231] 1) Identification means are carried by the individual through the RFID antenna 99 reading area, wherein the RFID reader device 98 detects the individual's identification means and cameras 100 and other biometric data gathering devices 102 record respective biometric data; or
[0232] 2) Identification means' surface is presented on the fly to the unique description reader device 110 wherein it detects the individual's identification means. The cameras and other devices 100 record respective biometric data; or
[0233] 3) The identification means carried by the individual contains both an RFID microprocessor and a surface mounted unique description. Under this scenario, scanning may be
conducted overtly or covertly, as well as the individual presenting the dual format identification means to the unique description reader device 110 wherein it detects the individual's identification means and the cameras and other devices 100 record the individual's respective biometric data.
[0234] The local application unit 80 associates the retrieved RF Card Unique Description, and/or smart card, with one or more pieces of noninvasively obtained biometric data of card holder. Local application unit 80 passes the card unique description and biometric data to the several servers for comparison. The server application unit 84 requests a search of the watch list database 92 and the individual condition database 90 for any match or close match of the data collected from the individual as in
[0235] Last-seen and first-seen biometric data are compared to validate the integrity of the first seen and last seen databases. Failure to reach required threshold causes an alert signal to be sent to internal security personnel. First and Last-seen data are held until the current data received from the access point 96 data collection devices. Then, current seen, last-seen, and first-seen biometric data are compared. If the three way comparison of the biometric data matches, that result is communicated to the local application unit 80. In the absence of a match, more biometric data can be requested, or, if a threshold value indicated that the data do not match has been reached, either the is an instruction to deny access or, alternatively, to flag for manual evaluation. In this event, internal security or law enforcement officials can be advised and the access control device 104 is instructed to deny access.
[0236]
[0239] When an Individual approaches, the Access Point 96, RFID detects the Individual's Identification Means and cameras and other devices record the individual's respective biometric data. By using an advance local application RF reader 112 of card's unique description for tamper detection, substantial advance processing time is afforded if tampering is detected. Where no tampering is detected, the detected description reaches the server in well in advance of regular data collectors, allowing additional time for all first seen and last seen information to be retrieved from any global location and have the local application unit 80 performs pre-cross check before the now seen or current identification data retrieved.
[0240] On completion of the identification sequence, the local application unit 80 sends all contemporaneously collected biometric data to its own dedicated secure last-seen database 114. The local application unit 80 then advises the server application unit 84 of the new address of this individual's newest last seen biometric data. Such biometric data collecting devices can also be utilized to apprehend an individual without an identification means but with a record in the database, including a medical condition record as a previously KUI or UUI individual commonly referred to as a sleeper. A secure and remote network centric encryption key exchange and metrics (or statistic) reporting and audit module 114, archives all encryption keys used against each piece of equipment and all system operator/s, then completes all metric measurements (or measurable activity) of actions, timings and personnel involved, including complete costing's and then automatically generates governmental required activity reports as well as simultaneously generating invoices for all services performed during each operator's shift and, in encrypted form and via the trusted network centric system, submits each activity report and invoice to the respective government department and civilian operators that utilize each respective system module.
[0241] Turning next to
[0242] A protected individual database 218 is also checked to establish security clearances for individuals that may have been afforded protection under programs such as witness protection or other such programs including Federal Agents and associated family members in order to deny Terrorist or organized criminal elements who can gain access to central reservation systems advance knowledge or warning of their travel movement/s and associated addresses/s and banking details and other such bio-data. Such protected individuals have their ID data changed with the intention to covertly morph the individual in order to prevent discovery of their true identity for national security or other reasons, so that they may have access to restricted areas and restricted assets and information in their changed or morphed identity. A protected individual application unit 220 can be used to reflect the actual assignment and access afforded a particular protected individual which can be reflected in the portable staff record 204 without any routine staff system operators' knowledge. All protected individuals' enrolment and privileges granted are handled by officials at the highest level of a multi-level system, which are capable of enrolling other staff and granting initial staff access. Thereafter, such staff access is granted by an immediate supervisor on a rostered duty and area function. A protected individual application unit 220 can be used to reflect the actual assignment and access afforded a particular individual, which can be reflected in the portable staff record 204.
[0243] The responsibility for overall supervision of the system is given to individuals of proven fidelity and who have the confidence of the highest ranked administrators of the government. These individuals are listed in a system engineer and staff access duty roster and, through a staff authority unit 224 are assigned their privileges and accesses. Once staff assignments are made, a suitably encrypted key is created for each individual who is linked to the level of responsibility, the access that has been afforded and when that access can be achieved, all in a key creation unit 226. All of the information thus created is stored in a staff audit activity database 228.
[0244] Through a staff network server apparatus 230, staff assignments are scheduled in a staff authority device 232. In an operation that is substantially similar for both domestic and international departure and arrival staff, the person presents a staff record to sensing means 234, which may include an RF antenna unit 236. The staff member's biometrics and unique data is obtained from the record and from the staff member and compared to the original biometric database 210, the original condition database 212, the watch list database 214, the last seen locator database 216 and the protected individual database 218. In addition, a departure staff access duty roster database 238 is checked to assure that the staff member has been assigned to this post on this shift. Similarly, the arrival staff undergoes the same process with an arrival staff access and duty roster database 240. Once identity is verified and all other authorizations are in order, the staff member takes the assigned post and awaits travellers.
[0245] In
[0246] In
[0247]
[0248]
[0249]
[0250] Thus there has been disclosed a novel document having a plurality of sides, most of which are normally concealed. The document includes features that are images that are sufficiently degraded so as to defeat facial recognition equipment yet not so degraded as to prevent a human observer to confirm that the image is that of a legitimate bearer of the document. Real images of the bearer on the concealed side are strategically covered with a non transparent official seal that obstructs enough of the image to substantially defeat face recognition techniques but sufficiently exposed to facilitate human confirmation of the holder.
[0251] Other features include masks that can be used with displays to select authorization or confirmation code characters from a matrix of characters. The documents can also include magnetic strips and other types of machine readable lines of text which can store information about the person with whom the document is associated and information strips containing data susceptible to optical scanning.
[0252] The document can have embedded an RFID processor circuit or a plurality of RFID processor circuits, any one or all of which can be interrogated and, alternatively, the RFID processor circuit can be made operable or inoperable by the bearer.
[0253] Moreover, the document need not be a physical document but can exist as a virtual document which possesses the features of the real document and which can be used in a similar fashion in conjunction with computer or other machine displays or with smart cellular telephones or the like. The telephones and displays can have, associated with them, cameras, fingerprint scanners, thermographic infrared sensors and other devices capable of acquiring biometric information about the authorized bearer as well as reading high density data images from other documents in both real and virtual displays.
[0254] All of the foregoing embodiments may utilize computer, smart phone or the like with specific applications that, during the loading sequence, will incorporate the identification data of the device, including its display size and features such as touch sensitive, as well as that of the authorized user or users should there be more than one. This facilitates specific verification and or authentication sequences that will facilitate speedy transactions between different computer-smart phone or the like combinations.
[0255] All of the techniques taught or described herein preferably utilize a four factio test when enabling access to secured data. Such a test is defined by the presence of the following elements:
1. Something one hasa device;
2. Something one recognizesa self formatted and colored spheres or a self modified image or cartoon;
3. Something one knowsa selected sequence of entry locations; and
4. Something one can do or performthe rhythm and consistent timing of a complete data entry sequence.
The above also requires simplicity and memory prompts achieved by the individual's own modification of a presented image and the ability to select it from other similar images
[0256] Further, each specific application embodying this feature will be enabled in such a way as to facilitate its remote decommissioning should it be lost or stolen. Additionally under such circumstances, the specific application that has been decommissioned may be capable of operation in a stolen mode to self report its location via inbuilt GPS functionality as well as gathering biometric data from any attempted uses for evidentiary use in any subsequent legal action.
[0257] Yet another disclosure is an ATM machine that does not need a card transport and security reading mechanism or a keyboard despite its illustrated presence in
[0258] Other embodiments and techniques within the scope of the invention will manifest themselves to those skilled in the art. Therefore, the scope of the invention should only be limited by the claims appended hereto.