Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUSRE42038 E1
Publication typeGrant
Application numberUS 12/604,814
Publication dateJan 18, 2011
Filing dateOct 23, 2009
Priority dateMay 30, 2003
Fee statusPaid
Also published asCA2527826A1, CA2527826C, CA2527829A1, CA2527836A1, CA2527836C, CA2724292A1, CA2737868A1, CA2857208A1, EP1629408A2, EP1629408A4, EP1629460A2, EP1629460A4, EP1629624A2, EP1629624A4, EP1629624B1, US7420546, US7525537, US7587611, US7688314, US7783892, US8327152, US8495382, US8788813, US20040239648, US20050081040, US20050093834, US20050160042, US20080317302, US20090213087, US20100005314, US20100182125, US20100318803, US20130111575, US20130305056, WO2004109454A2, WO2004109454A3, WO2004109455A2, WO2004109455A3, WO2004109455A8, WO2005001611A2, WO2005001611A3
Publication number12604814, 604814, US RE42038 E1, US RE42038E1, US-E1-RE42038, USRE42038 E1, USRE42038E1
InventorsDavid S. Abdallah, Barry W. Johnson, Kristen R. O. Riemenschneider
Original AssigneePrivaris, Inc.
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Man-machine interface for controlling access to electronic devices
US RE42038 E1
Abstract
The invention disclosed herein describes a man-machine interface device for controlling access to electronic devices. The man-machine interface device comprises an electronic display unit including a transparent finger touch sensor region that is seated above the display apparatus, which is responsible for determining the presence and absence of a finger and for generating fingerprint images when a finger is detected. The man-machine interface device also includes a controller unit that is coupled to the display apparatus, the finger touch sensor region, and at least one electronic device. The method of the invention describes a process for authenticating individuals and verifying their security privileges to access sensitive data, based on a finger-touch selection of an icon presented on the display apparatus of the man-machine interface device.
Images(4)
Previous page
Next page
Claims(37)
1. A processor-readable medium storing code representing instructions to cause a processor to perform a process, the code comprising code to:
receive a biometric input from a first user at a location of a touch screen, the location of the touch screen being associated with an icon, the icon being associated with a function;
determine a security privilege uniquely associated with the icon and the biometric input of the first user based collectively on the icon and the biometric input of the first user;
permit access to the function associated with the icon when the security privilege uniquely associated with the icon and the biometric input of the first user permits access to that function;
receive a biometric input from a second user at the location of the touch screen;
determine a security privilege uniquely associated with the icon and the biometric input of the second user based collectively on the icon and the biometric input of the second user; and
inhibit access to the function associated with the icon when the security privilege uniquely associated with the icon and the biometric input of the second user does not permit access to that function.
2. The processor-readable medium of claim 1, wherein the code to permit access to the function for the first user is configured to permit full access to the function by the first user when the security privilege associated with the icon and the biometric input of the first user is configured to permit full access to that function.
3. The processor-readable medium of claim 1, wherein the code to permit access to the function for the first user is configured to permit limited access to the function by the first user when the security privilege associated with the icon and the biometric input of the first user is configured to permit limited access to that function.
4. The processor-readable medium of claim 1, the code further comprising code to:
before access to the function is permitted for the first user, inhibit access to the function by the first user when the security privilege associated with the icon and the biometric input of the first user does not permit access to that function.
5. The processor-readable medium of claim 1, wherein the location of the touch screen is a first location of the touch screen, the icon is a first icon, the function is a first function, the code further comprising code to:
receive the biometric input from the first user at a second location of the touch screen, the second location of the touch screen being associated with a second icon, the second icon being associated with a second function different than the first function;
determine a security privilege uniquely associated with the second icon and the biometric input of the first user based collectively on the second icon and the biometric input of the first user; and
permit access to the second function associated with the second icon when the security privilege uniquely associated with the second icon and the biometric input of the first user permits access to the second function.
6. The processor-readable medium of claim 1, wherein the location of the touch screen is a first location of the touch screen, the icon is a first icon, the function is a first function, the code further comprising code to:
receive the biometric input from the second user at a second location of the touch screen, the second location of the touch screen being associated with a second icon, the second icon being associated with a second function different than the first function;
determine a security privilege uniquely associated with the second icon and the biometric input of the second user based on the second icon and the biometric input of the second user; and
permit access to the second function associated with the second icon when the security privilege uniquely associated with the second icon and the biometric input of the second user permits access to the second function.
7. The processor-readable medium of claim 1, the code further comprising code to:
before access to the function is permitted for the first user, determine whether the biometric input of the first user is authentic based on a biometric template of the first user, the biometric input of the first user being uniquely associated with the biometric template of the first user.
8. The processor-readable medium of claim 1, wherein the function is a software program.
9. An apparatus, comprising:
a memory configured to store a plurality of biometric templates, each biometric template from the plurality of biometric templates being associated with a security privilege from a plurality of security privileges, each security privilege from the plurality of security privileges being associated with a function from a plurality of functions;
a touch screen having a biometric sensor configured to receive a biometric input at a location within the touch screen, the touch screen configured to display a plurality of icons, each icon from the plurality of icons being associated with a function from the plurality of functions; and
a processor coupled to the memory and the biometric sensor, the processor configured to permit access to a function associated with an icon from the plurality of icons when biometric input is received at a location within the touch screen associated with that icon and when the security privilege for that icon and for the biometric template from the plurality of biometric templates associated with the biometric input permits access to that icon.
10. The apparatus of claim 9, wherein the processor is configured to authenticate a biometric input based on at least one biometric template from the plurality of biometric templates, the processor configured to permit access to the function when the biometric input is authenticated.
11. The apparatus of claim 9, wherein the processor is configured to inhibit access to the function when the biometric input does not match any biometric template from the plurality of biometric templates.
12. The apparatus of claim 9, wherein the processor is configured to inhibit access to the function when the security privilege uniquely associated with the function and associated with the biometric template for that function does not permit access to that function.
13. The apparatus of claim 9, wherein the processor is configured to permit limited access to the function when the security privilege uniquely associated with the function and associated with the biometric template for that function is configured to permit limited access to that function.
14. The apparatus of claim 9, wherein the processor is configured to permit access to the function when the location within the touch screen is independent of any security privilege.
15. The apparatus of claim 9, wherein the function is a software program.
16. A processor-readable medium storing code representing instructions to cause a processor to perform a process, the code comprising code to:
receive a biometric input at a location of a touch screen from a user, the location of the touch screen being associated with an icon, the icon being associated with a function;
determine a security privilege of the user for that function based on the icon associated with the function and a biometric template that matches the biometric input of the user, the biometric template being from a plurality of biometric templates, the security privilege of the user for that function being from a plurality of security privileges; and
permit access to the function associated with the icon based on the security privilege of the user for that function.
17. The processor-readable medium of claim 16, wherein the user is a first user, the code further comprising code to:
receive a biometric input from a second user at the location of the touch screen; and
inhibit access to the function associated with the icon when no biometric template from the plurality of biometric templates match the biometric input of the second user.
18. The processor-readable medium of claim 16, wherein the user is a first user, the biometric template from the plurality of biometric templates is a first biometric template from the plurality of biometric templates and is associated with the first user, the code further comprising code to:
receive a biometric input from a second user at the location of the touch screen;
determine a security privilege of the second user for that function based on the icon associated with the function and a second biometric template that matches the biometric input of the second user, the second biometric template being from the plurality of biometric templates and being associated with the second user; and
permit access to the function associated with the icon based on the security privilege of the second user for that function.
19. The processor-readable medium of claim 16, wherein the user is a first user, the biometric template from the plurality of biometric templates is a first biometric template from the plurality of biometric templates and is associated with the first user, the access to the function includes full access to the function, the code further comprising code to:
receive a biometric input from a second user at the location of the touch screen;
determine a security privilege of the second user for that function based on the icon associated with the function and a second biometric template that matches the biometric input of the second user, the second biometric template being from the plurality of biometric templates and being associated with the second user; and
permit limited access to the function associated with the icon based on the security privilege of the second user for that function, functionality associated with the limited access to the function being less than functionality associated with the full access to the function.
20. The processor-readable medium of claim 16, the code further comprising code to:
before access to the function is permitted, inhibit access to the function associated with the icon when no biometric template from the plurality of biometric templates match the biometric input.
21. The processor-readable medium of claim 16, the code further comprising code to:
before access to the function is permitted, inhibit access to the function associated with the icon when the security privilege of the user for that function does not permit access to the function.
22. The processor-readable medium of claim 16, wherein the function is a software program.
23. A processor-readable medium storing code representing instructions to cause a processor to perform a process, the code comprising code to:
receive a biometric input from a user at a location of a touch screen, the location being associated with an icon, the icon being associated with a function;
determine whether the biometric input of the user is authentic based on at least one biometric template from a plurality of biometric templates; and
determine a security privilege of the user for the function from a plurality of security privileges based on the icon associated with the function and the biometric input of the user when the biometric input of the user is authentic, the security privilege being uniquely associated with the icon and that biometric template.
24. The processor-readable medium of claim 23, the code further comprising code to:
after the security privilege is determined, inhibit access by the user to the function associated with the icon when the security privilege of the user for the function does not permit access to that function.
25. The processor-readable medium of claim 23, the code further comprising code to:
before the security privilege is determined, inhibit access by the user to the function associated with the icon based on the biometric template from the plurality of biometric templates that is authentic.
26. The processor-readable medium of claim 23, wherein the user is a first user, the code further comprising code to:
receive a biometric input from the second user at the touch screen location;
determine whether the biometric input of the second user is authentic based on at least one biometric template from the plurality of biometric templates; and
determine a security privilege of the second user for the function from the plurality of security privileges based on the icon associated with the function and the biometric input of the second user when the biometric input of the second user is authentic.
27. The processor-readable medium of claim 23, the code further comprising code to:
permit access by the user to the function associated with the icon based on the security privilege of the user for the function.
28. The processor-readable medium of claim 23, the code further comprising code to:
inhibit access by the user to the function associated with the icon when the security privilege of the user for the function does not permit access to that function.
29. The processor-readable medium of claim 23, the code further comprising code to:
permit limited access by the user to the function associated with the icon when the security privilege of the user for the function permits limited access to the function.
30. The processor-readable medium of claim 23, wherein the function is a software program.
31. The processor-readable medium of claim 1, the code further comprising code to:
determine, before the security privilege of tire first user is determined, at least one of the function associated with the location of the touch screen at which the biometric input of the first user is received or the icon associated with the location of the touch screen at which the biometric input of the first user is received.
32. The processor-readable medium of claim 1, wherein the biometric input of the first user is received at a first screen including the icon, the security privilege is determined before displaying a second screen different from the first screen.
33. The apparatus of claim 9, wherein the biometric sensor is a first biometric sensor, the touch screen has a plurality of biometric sensors including the first biometric sensor, each biometric sensor from the plurality of biometric sensors being configured to receive the biometric input at a location of the touch screen, the location of each biometric sensor being associated with an icon from the plurality of icons.
34. The apparatus of claim 9, wherein the processor is configured to determine the icon from the plurality of icons based on the location of the touch screen at which the biometric input is received.
35. The processor-readable medium of claim 16, the code further comprising code to:
determine, before the security privilege is determined, at least one of the function associated with the location of the touch screen at which the biometric input is received or the icon associated with the location of the touch screen at which the biometric input is received.
36. The processor-readable medium of claim 16, wherein the biometric input is received at a first screen and the security privilege is determined before displaying a second screen different from the first screen.
37. The processor-readable medium of claim 23, wherein the biometric input is received at a first screen and the security privilege is determined before displaying a second screen different from the first screen.
Description
RELATED U.S. APPLICATION DATA

This application is a divisional of U.S. patent application Ser. No. 10/858,290, filed Jun. 1, 2004, now abandoned entitled, “Man-Machine Interface for Controlling Access to Electronic Devices,” which claims priority to U.S. Patent Application No. 60/474,750 entitled “Secure Biometric Identification Devices and Systems for Various Applications,” filed May 30, 2003; each of which is hereby incorporated by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention relates generally to the field of electronic device user interfaces and authorization techniques, and more specifically to the field of fingerprint imaging sensors and touch screen display apparatuses.

2. Necessity of the Invention

Modern electronic devices have developed a myriad of functionalities and associated user interfaces. Many electronic devices use a display screen, such as a monitor or display apparatus, to provide feedback to the user. Handheld devices, such as the personal digital assistant and the cell phone, have an important user interface constraint—form factor. In both devices, manufacturers desire to minimize the size and weight of the device; as one means to accomplish this, the display is small and buttons are placed close together.

In recent years, manufacturers of many electronic devices have substituted touch screen technology for the traditional display. Touch screens have the same appearance and style of a traditional screen, but have the added ability to determine the location of applied pressure. This allows individuals to use a stylus in a similar manner as a person uses a mouse to point to icons on a monitor—the individual may touch the screen at the location of a particular icon. Software running on the device determines the location of the touch and determines the associated software function, such as opening an address book. Because the additional button control interface can be eliminated, manufacturers can make the display larger and simpler to use.

As the functionality of electronic devices expands, individuals may wish to protect certain data stored within the device. For example, the owner of a personal digital assistant may choose to use his PDA to send and receive private e-mail. If the data is particularly sensitive, a simple password or PIN combination may not be considered adequate security and the individual may desire to use biometric authentication on the device. The most common form of biometric authentication, fingerprint scanning, requires a hardware module that is typically the size of a postage stamp. On a device where size and weight are limited, the addition of this module can be costly.

Digital Fingerprint Capture Technologies

There are three common types of fingerprint capture technologies: optical, capacitive, and ultrasonic. Each of the three technologies combines its associated hardware capture mechanism, which varies from type to type, and typically a software or firmware controller. This controller is often responsible for analyzing the captured image, extracting minutia points, and creating a final template. Minutiae are points that represent all of the unique characteristics of a fingerprint—one example is the location of an intersection of ridges or valleys in the print. A template is typically composed of thirty minutiae and can be used to uniquely identify a fingerprint. This allows the scanner or other storage device to store only the requisite data points without storing the entire image.

Of the three types of fingerprint capture technologies, optical scanners are the oldest and most common, and they are composed of a glass or plastic plate with a light source and a charge coupled device (CCD) beneath. The light source is typically an array of light emitting diodes (LEDs), and the CCD is an array of light-sensitive diodes. When the finger is placed on top of the plate, the LEDs illuminate the finger and each diode of the CCD records the light that touched it, creating an image in which the ridges are dark and the valleys are light. Optical scanners are fairly resistant to temperature fluctuations, and can provide an image quality of approximately 500 dots per inch (dpi). One major concern of this technology is that latent prints—“left over” fingerprints on the plate—can cause a superpositioning effect and create error. Additionally, these types of scanners are susceptible to “gummi bear attacks”, in which a fingerprint is lifted from a glass or other object, placed on a pliable and sticky material, such as a gummi bear, and can provide a false acceptance. One other point of note is that the plate must be quite large; this creates ease of use but may take unavailable real estate on a board.

Capacitive sensors are much newer than optical scanners, and are composed of an array of cells; each cell has two adjacent conductor plates, which are embedded within an insulating layer. The insulating layer is typically a glass plate. When the linger is placed on top of the insulating layer, it creates a subsequent electric field between the finger and the conductor plates, creating capacitance. Because the surface of a finger is a succession of ridges and valleys, the electric field varies over the face of the finger as the distance from the plate to the finger varies. The capacitance or voltage may be determined from the electric field, and is commonly translated into an 8-bit grayscale image with approximately 200 to 300 grid points in both the x- and y-plane. This creates more detailed data than the optical sensor. Capacitive scanners are typically smaller than optical sensors because the cells are composed of semiconductor devices, rather than a CCD unit.

While capacitive scanners are cheaper and smaller than optical sensors, their durability is unknown due to their short time in use, and the small size can make it more difficult for an individual to enroll and authenticate properly. Most fingerprint sensors use direct current (DC) coupling, although a few companies are beginning to use alternating current (AC) coupling to penetrate to the live layer of the skin. Because the capacitive scanner is dependent on the electric field and capacitance between a finger and the glass plate, the scanner cannot be fooled by the “gummi bear attack” as described above; the dielectric constant for the finger is much different from a gummi bear, and so the capacitance will vary significantly.

The most accurate but least common finger-scanning technology is ultrasound imaging. In this type of sensor, two transducers are placed on the x- and y- axes of a plate of glass—one each for receiving and transmitting—for propagating ultrasound waves through a glass plate; when the finger is placed on top of the glass, the finger impedes the waves and the receiving transducer can measure the alteration in wave patterns. This type of scanner is very new and largely untested in a variety of conditions, but initial results show promise for the technology. It combines the large plate size and ease of use of the optical scanners with the ability to pervade dirt and residue on the scanner, an advantage of capacitive scanners.

Touch Screen Technologies

Touch screens are quite similar to the fingerprint scanners described above. They recognize a finger pressure on the screen and typically calculate the center or peak point of the pressure. Current touch screen technologies fall under five different types of technology: analog resistive, capacitive, infrared, acoustic wave, and near field imaging. The analog resistive, capacitive and acoustic wave technologies are the most commonplace due to their clarity and endurance under a variety of conditions. Infrared is very sensitive to a light touch and may be impractical, while near field imaging is very new, suitable for very harsh conditions, and frequently cost-prohibitive. For these reasons only the first three technologies are examined in much detail. Similarly to the fingerprint scanning technology there is typically an associated software or firmware controller to perform requisite data analysis.

The analog resistive technology is composed of a glass plate and a plastic plate slacked over a flat-panel screen or display. Both the glass and plastic plates are coated with a transparent conductive material, such that the conductive material is sandwiched between the two plates. Tiny separator dots keep the two plates from touching under normal conditions, but when pressure is applied to the plastic plate, the dots move and the two surfaces come together to conduct electricity. An electronic controller instantly calculates the x- and y-coordinates, allowing resistive touch screen technologies to have very high precision and resolution. This also allows an individual to have relative freedom when selecting an object as a stylus; the individual may use a pen, finger, or other convenient utility.

Capacitive coupled technologies require the use of a conductive stylus—this may be a finger, but not a gloved hand because the cloth will prevent the conduction of charge. Capacitive technologies use a flat-panel display with a single glass plate resting on top. The glass plate is covered in a transparent metal oxide on the exterior surface; when the finger or alternate stylus comes into contact with the conductive surface; capacitive coupling occurs at the point of contact and draws electrical current. The controller registers the change in current and the x- and y-coordinates can be determined. As mentioned above, because the technology requires use of a conductive stylus, non-conductive surfaces will prevent the change in electrical current and will not have any effect on the touch screen. Furthermore, the exposed glass surface in this technology makes it susceptible to scratches and can inhibit correct operation of the screen.

Acoustic wave touch screens are more complicated than the capacitive and resistive technologies. There are two types of acoustic wave technologies: guided acoustic wave (GAW) and surface acoustic wave (SAW). Both use a single plate of glass placed on top of a flat-panel display, with a similar transducer arrangement as described above for the ultrasound imaging. GAW screens transmit a wave through the glass panel (using the glass as a waveguide), while SAW screens transmit the wave on the surface of the glass; in both technologies, transducers detect a dampening of the wave that occurs when pressure is applied to the glass, which is translated into x- and y- coordinates. Similarly to the capacitive coupled screens, SAW screens have stylus limitations; the stylus must be soft and able to absorb energy in order to dampen the wave, and are generally only practical in instances where the stylus is a finger. These types of touch screens also have the glass surface limitation described above.

Description of the Related Art

A multitude of single-purpose display apparatuses, fingerprint sensors and touch screens are available commercially. Furthermore, several companies offer commercial products that embed fingerprint-scanning hardware within display apparatus technology. One such example, Ethentica and Philips FDS' (a wholly owned subsidiary of Philips Corporation) joint venture TactileSense™ finger scanning hardware, comprises a transparent optical sensor that can be embedded into a pane of glass. The TactileSense optical sensor comprises several a unique TactileSense polymer, a silicon glass camera/CCD, and a control ASIC. The TactileSense polymer is placed on top of the silicon camera, which is embedded within glass to provide hardness and durability. The TactileSense polymer is the heart of the sensor, comprising five layers: insulating, black-coat, transparent conductive, light-emitting phosphor, and base. The insulating and black-coat layers enhance the performance of the sensor by preventing liquid or other particles from entering the sensor, and by preventing sunlight from entering the sensor. The chief layers are the transparent conductive and light-emitting phosphor layers, which serve to supply current to the polymer and to illuminate the fingerprint. When a finger is placed on the TactileSense polymer, the polymer illuminates the fingerprint and creates an image. The silicon camera detects the illumination, and the ASIC converts it to digital format for processing.

U.S. Pat. No. 6,327,376 to Harkin describes a fingerprint sensor comprised of an array of sensing elements. The sensing elements use both capacitive and optical techniques to generate the image; the device is constructed using a transparent conductive material for the electrodes contained within. However, despite the inclusion of the sensor within a display apparatus, there is little discussion of using the display as a touch screen or user navigation interface.

U.S. Pat. No. 6,501,846 to Dickinson et al. discloses a method and system for computer access and cursor control using a relief object image generator. The relief object image generator is capable of capturing a 2-D image based on the 3-D relief of an object, such as a finger. The apparatus of Dickinson's invention can be used to simultaneously authenticate an individual's fingerprint, and move a cursor on a screen or perform other control-related functions related to the movement of the individual's finger. This application is targeted primarily at replacing mice, function keys, and other control mechanisms on devices where space is limited. However, Dickinson does not address use of biometric recognition incorporated with touch screen user navigation.

DigitalPersona also offers fingerprint-scanning hardware that is transparent and can be placed over display apparatuses, marketed as U.are.U Crystal™. This hardware is also comprised of an optical sensor that uses completely transparent materials. It is ultra-thin, enabling it to be placed in mobile or other electronic devices where real estate is a significant concern. Again, however, this product does not demonstrate any of the touch screen properties as exhibited in the current invention.

BRIEF SUMMARY OF THE INVENTION

The invention disclosed herein describes a man-machine interface device for controlling access to electronic devices. The man-machine interface device comprises an electronic display apparatus that is capable of presenting graphic text, images, icons, and other data typically shown on a screen, while further including a transparent finger touch sensor region that is seated above the display apparatus. This finger touch sensor region is responsible for determining the presence and absence of a finger, and is further responsible for generating fingerprint images when a finger is detected. The man-machine interface device also includes a controller unit that is coupled to the display apparatus, the finger touch sensor region, and at least one electronic device. The controller unit is capable of controlling data flow between the display apparatus, the finger touch sensor region and the electronic device, and for calculating finger touch locations based on a fingerprint image generated by the transparent finger touch sensor region. It can receive text from the electronic device, which is intended for presentation on the display apparatus, or conversely send a fingerprint image to the electronic device, among other functions.

The method of the invention describes a process for authenticating individuals and verifying their security privileges to access sensitive data, based on a finger-touch selection of an icon presented on the display apparatus of the man-machine interface device.

BRIEF DESCRIPTION OF DRAWINGS Master Reference Numeral List

FIG. 1: Apparatus

100 Apparatus

101 Finger touch sensor region

102 Display apparatus

103 Controller

FIG. 2: Apparatus, based on optical sensor technology

102 Display apparatus

201 Charge coupled device

202 Glass or plastic plate

203 Light source

FIG. 3: Apparatus, based on capacitive sensor technology

102 Display apparatus

302 Glass plate, coated with transparent metal oxide

303 Electric field

FIG. 4: Apparatus, based on ultrasonic/acoustic wave technology

102 Display apparatus

402 Glass plate

403 Ultrasonic/acoustic wave generator

FIG. 5: Authenticating to the apparatus

501 Human thumb

502 E-mail icon

503 PDA

FIG. 6: Method for authenticating

601 Is there a finger present?

602 Create a fingerprint image

603 Calculate the location of the finger touch

604 Is there an icon at the finger touch location?

605 Is there a function associated with the icon?

606 Does the function require fingerprint authentication?

607 Does the fingerprint match a stored fingerprint?

608 Determine access rights for matched fingerprint

609 Allow user access to function?

610 Authorize user access to function

611 Quit

FIG. 1 is a schematic view of the apparatus of the invention.

FIG. 2 is a schematic view of the apparatus of the invention, when optical sensing technology is used.

FIG. 3 is a schematic view of the apparatus of the invention, when capacitive sensing technology is used.

FIG. 4 is a schematic view of the apparatus of the invention, when ultrasonic/acoustic wave technology is used.

FIG. 5 is a schematic view of the apparatus of the invention being used to authenticate to a PDA.

FIG. 6 is a flow chart of the method of the invention.

DETAILED DESCRIPTION OF THE INVENTION

The apparatus of the invention is a primary man-machine interface device that incorporates biometric authentication into a touch-sensitive display. Juxtaposing these two technologies provides a simple user interface, and additionally, an economy of space for handheld or portable devices that require ease-of-use along with biometric authentication; devices can use the functionality of a display, control keys or buttons, and a fingerprint sensor, by replacing them with the man-machine interface device of this invention.

Fingerprint scanning typically requires more detail, precision, and data analysis then touch screen technology. The most common use of fingerprint scanning is comparison between a new, “live” fingerprint, and an older stored fingerprint, where the comparison is typically between minutiae points calculated for both fingerprints. This can be used to verify or identify an individual who has already been entered into a system. If the fingerprint scanner fails to accurately analyze a print, the scanner may provide a false acceptance—reporting that the new fingerprint is the same as the old, when they actually are not—or false rejection—reporting that the two fingerprints are different when they are not. However, if a touch screen registers a touch location incorrectly, it is only a minor inconvenience to recalibrate the touch screen and renavigate the user interface.

The primary embodiment of the man-machine interface device 100 incorporates a transparent finger touch sensor region 101, an electronic display apparatus 102, and a controller 103, as seen in FIG. 1. The finger touch sensor region 101 is layered on top of the display apparatus 102, and is capable of determining the presence and absence of finger touches. It can additionally generate fingerprint images, which are transmitted to, and used by, the controller 103. The display apparatus 102 must be capable of presenting graphic data, text, images, icons and other information, and may range from a cathode ray tube display, such as a television or monitor, to a liquid crystal display. The controller 103 is coupled to the finger touch sensor region 101 and the display apparatus 102, as well as peripheral electronic devices, such as a PDA.

One alternate embodiment of the apparatus 100 is based on optical fingerprint scanner technology, and can be seen in FIG. 2. A plate 202 is placed over the display apparatus 102, with a light source 203 and a CCD 201 between the two. The light source 203, the plate 202, and the CCD 201 must all be transparent, or items would not be viewable on the display apparatus 102.

FIG. 3 shows an alternate embodiment of the present invention, which is based on a capacitive fingerprint sensor and a capacitive touch screen. A glass plate 302 coated with transparent metal oxide is placed on top of the display apparatus 102. When the finger is placed on the glass plate of the finger touch sensor region 101, an electric field 303 is created and the finger touch location and fingerprint can be determined.

Another alternate embodiment of the apparatus 100 is based on the ultrasonic imaging fingerprint sensor and the acoustic wave touch screen. This can be seen in FIG. 4. Again a glass panel 402 is placed on the display apparatus 102. Ultrasonic waves 405 are propagated by means of an ultrasonic or acoustic wave generator 403 either through or on top of the glass panel 402, using it as a wave guide. When a finger is placed on the finger touch sensor region 101 it interferes with the traveling wave, generating the fingerprint or touch location. Because the wave guide is based on the principle of total internal reflection, the angle of incidence of the propagating wave 405 must be such that it doesn't interfere with the optical properties of the display apparatus 102 behind it. This is affected by the thickness of the glass panel 402 and the frequency of the propagating wave 405.

Regardless of the embodiment of the apparatus 100, the controller 103 must be capable of receiving data from a peripherally-connected electronic device and displaying it on the display apparatus 102. The controller 103 must also be able to receive fingerprint images from the finger touch sensor region 101, and to calculate the location of finger touch events from these images. Additionally, the controller 103 is responsible for calculating minutiae points of a fingerprint associated with a finger touch on the finger touch sensor region 101. Any calculated data, such as a location or minutiae, can be transmitted from the controller 103 back to the peripheral device. If required, the controller 103 may be capable of storing fingerprint minutiae points, and/or comparing fingerprint minutiae points. In one preferred embodiment of the invention, the location can be determined by extrapolating the center point of the finger touch on the finger touch sensor region 101. However, the algorithmic choice does not fall within the scope of this invention; the location can be determined by any appropriate method.

The peripherally-connected electronic device referred to above is the device using the man-machine interface device. For example, if the man-machine interface device were to be used as a replacement for the touch screen and buttons on a personal digital assistant (PDA), the PDA would be considered the peripherally-connected electronic device. It is responsible for sending data to the controller 103 for display on the display apparatus 102, and for requesting and receiving finger touch data. Additionally, the peripherally-connected electronic device is responsible for maintaining the association between icons or text pictured on the display apparatus 102, and accessing rights for said functions. The method of the invention provides fingerprint authentication for functions represented by an icon on a display. In the primary embodiment, the method is employed while using the man-machine interface device 100 installed in a PDA, but can be used with other suitable technology; examples explained herein will employ both. The method is intended to replace traditional user interface and authentication methods. For example, the PDA may receive e-mail, which the intended recipient wishes to keep secure. The PDA stores a registered fingerprint for the intended recipient that is associated with the security privileges of the e-mail program. Additionally, the PDA displays an icon on the display apparatus 102 that accesses the e-mail program on selection.

FIG. 5 shows an individual 501 using the man-machine interface device 100 of the present invention, to touch the finger touch sensor region 101 over the icon 502 displayed on the display apparatus 102 of the PDA 503—in this example, the e-mail icon. As seen in the flow chart of FIG. 6, the finger touch sensor region 101 detects the presence of the finger (step 601), and generates an image of the fingerprint (step 602), which is passed to the controller 103. The controller 103 calculates the finger touch location (step 603), and determines if there is an icon displayed on the display apparatus 102 at that location (step 604). If an icon exists, the PDA determines which function is associated with the icon (step 605) and if the function requires fingerprint authentication (step 606).

If the function does not require authentication, the PDA directly authorizes access to the function. However, in this example with e-mail, the function does require fingerprint authentication. The PDA examines stored fingerprints, verifying the new image against the stored images (step 607), until a match is found. If a match is found, the PDA determines the security privileges associated with the fingerprint (step 608) and determines if the e-mail function is among these privileges (step 609). If not, the method terminates (step 611); if it is, the PDA allows access to the e-mail function (step 610), and then terminates the authentication method (step 611).

While the description above refers to particular embodiments of the present invention, it will be understood that many modifications may be made without departing from the spirit thereof. The accompanying claims are intended to cover such modifications as would fall within the true scope and spirit of the present invention.

Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US4353056Jun 5, 1980Oct 5, 1982Siemens CorporationCapacitive fingerprint sensor
US4993068Nov 27, 1989Feb 12, 1991Motorola, Inc.Unforgeable personal identification system
US5053608Aug 16, 1988Oct 1, 1991Senanayake Daya RPersonal identification system
US5131038Nov 7, 1990Jul 14, 1992Motorola, Inc.Portable authentification system
US5280527Apr 14, 1992Jan 18, 1994Kamahira Safe Co., Inc.Biometric token for authorizing access to a host system
US5325442Feb 19, 1993Jun 28, 1994U.S. Philips CorporationFingerprint sensing device and recognition system having predetermined electrode activation
US5420936Mar 29, 1994May 30, 1995International Business Machines CorporationMethod and apparatus for accessing touch screen desktop objects via fingerprint recognition
US5469506Jun 27, 1994Nov 21, 1995Pitney Bowes Inc.Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic
US5526428Dec 29, 1993Jun 11, 1996International Business Machines CorporationAccess control apparatus and method
US5591949Jan 6, 1995Jan 7, 1997Bernstein; Robert J.Automatic portable account controller for remotely arranging for payment of debt to a vendor
US5613012May 17, 1995Mar 18, 1997Smarttouch, Llc.Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5615277Nov 28, 1994Mar 25, 1997Hoffman; NedTokenless security system for authorizing access to a secured computer system
US5799098Apr 3, 1997Aug 25, 1998Calspan CorporationUseful in comparing one fingerprint to another
US5805719Mar 18, 1997Sep 8, 1998SmarttouchFor rapid search of previously stored biometric samples
US5838812Jul 25, 1996Nov 17, 1998Smarttouch, LlcTokenless biometric transaction authorization system
US5852670Dec 30, 1997Dec 22, 1998Harris CorporationFingerprint sensing apparatus with finger position indication
US5856824Jun 25, 1996Jan 5, 1999International Business Machines Corp.Method for directing a computer system
US5857028May 15, 1997Jan 5, 1999Frieling; EdwardComputer access control by finger anatomy and comprehension testing
US5870723Aug 29, 1996Feb 9, 1999Pare, Jr.; David FerrinTokenless biometric transaction authorization method and system
US5920640May 16, 1997Jul 6, 1999Harris CorporationFingerprint sensor and token reader and associated methods
US5933134Jun 25, 1996Aug 3, 1999International Business Machines CorporationMethod for directing a computer system
US5943043Dec 5, 1996Aug 24, 1999International Business Machines CorporationTouch panel "double-touch" input method and detection apparatus
US5952641Nov 21, 1996Sep 14, 1999C-Sam S.A.Security device for controlling the access to a personal computer or to a computer terminal
US5952998Jan 15, 1997Sep 14, 1999Compaq Computer CorporationTransparent touchpad with flat panel display for personal computers
US5963679Jan 26, 1996Oct 5, 1999Harris CorporationElectric field fingerprint sensor apparatus and related methods
US5991408May 16, 1997Nov 23, 1999Veridicom, Inc.Identification and security using biometric measurements
US6028950Feb 10, 1999Feb 22, 2000The National Registry, Inc.Fingerprint controlled set-top box
US6037882Sep 30, 1997Mar 14, 2000Levy; David H.Method and apparatus for inputting data to an electronic system
US6038666Dec 22, 1997Mar 14, 2000Trw Inc.Remote identity verification technique using a personal identification device
US6041410Dec 22, 1997Mar 21, 2000Trw Inc.Personal identification fob
US6084968Oct 29, 1997Jul 4, 2000Motorola, Inc.Security token and method for wireless applications
US6154879Feb 5, 1999Nov 28, 2000Smarttouch, Inc.Tokenless biometric ATM access system
US6167517Apr 9, 1998Dec 26, 2000Oracle CorporationTrusted biometric client authentication
US6181328Mar 2, 1998Jan 30, 2001International Business Machines CorporationMethod and system for calibrating touch screen sensitivities according to particular physical characteristics associated with a user
US6181803Sep 30, 1996Jan 30, 2001Intel CorporationApparatus and method for securely processing biometric information to control access to a node
US6182221Oct 21, 1999Jan 30, 2001Trw Inc.Remote identity verification technique using a personal identification device
US6185316Nov 12, 1997Feb 6, 2001Unisys CorporationSelf-authentication apparatus and method
US6219793Sep 8, 1997Apr 17, 2001Hush, Inc.Method of using fingerprints to authenticate wireless communications
US6256022Nov 6, 1998Jul 3, 2001Stmicroelectronics S.R.L.Low-cost semiconductor user input device
US6268788Sep 15, 1998Jul 31, 2001Litronic Inc.Apparatus and method for providing an authentication system based on biometrics
US6282304May 14, 1999Aug 28, 2001Biolink Technologies International, Inc.Biometric system for biometric input, comparison, authentication and access control and method therefor
US6282649Jul 14, 1998Aug 28, 2001International Business Machines CorporationMethod for controlling access to electronically provided services and system for implementing such method
US6292173Sep 11, 1998Sep 18, 2001Stmicroelectronics S.R.L.Touchpad computer input system and method
US6317834Jan 29, 1999Nov 13, 2001International Business Machines CorporationBiometric authentication system with encrypted models
US6327376Dec 3, 1998Dec 4, 2001U.S. Philips CorporationElectronic apparatus comprising fingerprint sensing devices
US6353889May 13, 1998Mar 5, 2002Mytec Technologies Inc.Portable device and method for accessing data key actuated devices
US6366682Oct 30, 1998Apr 2, 2002Indivos CorporationTokenless electronic transaction system
US6367017Oct 7, 1998Apr 2, 2002Litronic Inc.Apparatus and method for providing and authentication system
US6466781Oct 23, 2000Oct 15, 2002Siemens AktiengesellschaftBiometric authentication technology for wireless transceiver activation
US6484260Apr 24, 1998Nov 19, 2002Identix, Inc.Personal identification system
US6487662Nov 3, 1999Nov 26, 2002Jurij Jakovlevich KharonBiometric system for biometric input, comparison, authentication and access control and method therefor
US6490680Dec 4, 1998Dec 3, 2002Tecsec IncorporatedAccess control and authorization system
US6498861Jul 18, 2000Dec 24, 2002Activcard Ireland LimitedBiometric security encryption system
US6501846Apr 24, 1998Dec 31, 2002Ethentica, Inc.Method and system for computer access and cursor control using a relief object image generator
US6529885Sep 24, 1999Mar 4, 2003Oracle CorporationMethods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts
US6532298Sep 14, 1999Mar 11, 2003Iridian Technologies, Inc.Portable authentication device and method using iris patterns
US6581161Mar 2, 1999Jun 17, 2003International Business Machines CorporationSystem, apparatus and method for controlling access
US6603462May 2, 2001Aug 5, 2003Multidigit, Inc.System and method for selecting functions based on a finger feature such as a fingerprint
US6609198Aug 5, 1999Aug 19, 2003Sun Microsystems, Inc.Log-on service providing credential level change without loss of session continuity
US6615264Apr 9, 1999Sep 2, 2003Sun Microsystems, Inc.Method and apparatus for remotely administered authentication and access control
US6618806Jul 6, 1999Sep 9, 2003Saflink CorporationSystem and method for authenticating users in a computer network
US6636973Sep 8, 1998Oct 21, 2003Hewlett-Packard Development Company, L.P.Secure and dynamic biometrics-based token generation for access control and authentication
US6657538Nov 7, 1997Dec 2, 2003Swisscom Mobile AgMethod, system and devices for authenticating persons
US6662166Jun 11, 2001Dec 9, 2003Indivos CorporationTokenless biometric electronic debit and credit transactions
US6668332Feb 15, 2000Dec 23, 2003International Business Machines CorporationFunctional clock observation controlled by JTAG extensions
US6671808Mar 30, 1999Dec 30, 2003Rainbow Technologies, Inc.USB-compliant personal key
US6681034Jul 15, 1999Jan 20, 2004Precise BiometricsMethod and system for fingerprint template matching
US6719200Jul 11, 2000Apr 13, 2004Precise Biometrics AbChecking of right to access
US6728881Oct 1, 1999Apr 27, 2004The United States Of America As Represented By The Secretary Of The ArmyFingerprint and signature identification and authorization card and pen
US6735695Dec 20, 1999May 11, 2004International Business Machines CorporationMethods and apparatus for restricting access of a user using random partial biometrics
US6751734Mar 21, 2000Jun 15, 2004Nec CorporationAuthentication executing device, portable authentication device, and authentication method using biometrics identification
US6757411Oct 1, 2001Jun 29, 2004Liska Biometry Inc.Method and system for fingerprint encoding and authentication
US6765470Feb 5, 2001Jul 20, 2004Fujitsu LimitedMobile electronic apparatus having function of verifying a user by biometrics information
US6766040Oct 2, 2000Jul 20, 2004Biometric Solutions, LlcSystem and method for capturing, enrolling and verifying a fingerprint
US6775776Jun 27, 2000Aug 10, 2004Intel CorporationBiometric-based authentication in a nonvolatile memory device
US6786397Nov 12, 2002Sep 7, 2004Silverbrook Research Pty LtdComputer system control via interface surface with coded marks
US6819219Oct 13, 2000Nov 16, 2004International Business Machines CorporationMethod for biometric-based authentication in wireless communication for access control
US6832317May 11, 2001Dec 14, 2004Advanced Micro Devices, Inc.Personal computer security mechanism
US6836843Jun 29, 2001Dec 28, 2004Hewlett-Packard Development Company, L.P.Access control through secure channel using personal identification system
US6839688Aug 19, 2002Jan 4, 2005Diebold, IncorporatedMethod of using an automated banking machine
US6844660Jul 21, 2003Jan 18, 2005Cross Match Technologies, Inc.Method for obtaining biometric data for an individual in a secure transaction
US6848052Mar 21, 2001Jan 25, 2005Activcard Ireland LimitedHigh security personalized wireless portable biometric device
US6850147Apr 1, 2002Feb 1, 2005Mikos, Ltd.Personal biometric key
US6850252Oct 5, 2000Feb 1, 2005Steven M. HoffbergIntelligent electronic appliance system and method
US6853739May 13, 2003Feb 8, 2005Bio Com, LlcIdentity verification system
US6857073Oct 16, 2002Feb 15, 2005Equifax Inc.System and method for authentication of network users
US6862443Dec 17, 2001Mar 1, 2005Ford Global Technologies, LlcRemote communication system for use with a vehicle
US6870946Jul 30, 1999Mar 22, 2005Secugen CorporationCompact optical fingerprint capturing and recognition system
US6870966May 23, 2000Mar 22, 2005Silverbrook Research Pty LtdSensing device
US6871193May 30, 2001Mar 22, 2005Verizon Corporate Services GroupMethod and system for partitioned service-enablement gateway with utility and consumer services
US6871287Jan 21, 2000Mar 22, 2005John F. EllingsonSystem and method for verification of identity
US6871784Feb 7, 2001Mar 29, 2005Trijay Technologies International CorporationSecurity in mag-stripe card transactions
US6876757May 28, 2002Apr 5, 2005Geometric Informatics, Inc.Fingerprint recognition system
US6877097Mar 21, 2001Apr 5, 2005Activcard, Inc.Security access method and apparatus
US6879243Feb 14, 2002Apr 12, 2005Penco Products, Inc.Electronically-controlled locker system
US6879710Apr 5, 2000Apr 12, 2005Sharp Kabushiki KaishaAuthentication apparatus using a display/fingerprint reader
US6879966Mar 22, 2001Apr 12, 2005Indivos CorporationTokenless biometric electronic financial transactions via a third party identicator
US6880749Aug 29, 2002Apr 19, 2005Diebold, IncorporatedAutomated transaction system and method
US6880750Aug 16, 2002Apr 19, 2005Randolph M. PentelRemote ordering device
Non-Patent Citations
Reference
1English translation of Office Action for Japanese Patent Application No. 2006-533547, mailed on Aug. 14, 2008, 1 page.
2English translation of Office Action for Japanese Patent Application No. 2009-533547, mailed on Nov. 25, 2006, 3 pages.
3International Search Report and Written Opinion for PCT/US04/17270, mailed on Dec. 1, 2004; 6 pages.
4Office Action for Canadian Patent Application No. 2,527,829, mailed on Apr. 1, 2010; 4 pages.
5Office Action for U.S. Appl. No. 12/201,568, mailed on Oct. 2, 2008; 6 pages.
6Office Action for U.S. Appl. No. 12/430,702, mailed on Jun. 24, 2009; 6 pages.
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US8111243 *Mar 30, 2006Feb 7, 2012Cypress Semiconductor CorporationApparatus and method for recognizing a tap gesture on a touch sensing device
US8610686Feb 7, 2012Dec 17, 2013Cypress Semiconductor CorporationApparatus and method for recognizing a tap gesture on a touch sensing device
US20070229466 *Mar 30, 2006Oct 4, 2007Cypress Semiconductor CorporationApparatus and method for recognizing a tap gesture on a touch sensing device
WO2013007573A1Jul 4, 2012Jan 17, 2013Robert Bosch GmbhAn electronic device providing different accesses to different users through single user interface
Classifications
U.S. Classification345/173, 345/156
International ClassificationG06F3/041, G07C9/00
Cooperative ClassificationG06F21/32, G06F21/85, G06F21/6209, G06K9/00013, H04L9/3231, H04L63/0823
European ClassificationG06K9/00A1, G06F21/32, G06F21/62A, G06F21/85
Legal Events
DateCodeEventDescription
Aug 2, 2013ASAssignment
Owner name: APPLE INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PRIVARIS INC.;REEL/FRAME:030935/0054
Effective date: 20121219
Jul 2, 2013ASAssignment
Owner name: APPLE INC., CALIFORNIA
Effective date: 20121219
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PRIVARIS INC.;REEL/FRAME:030726/0268
Dec 10, 2012ASAssignment
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PRIVARIS, INC.;REEL/FRAME:029433/0371
Effective date: 20080430
Owner name: HARBERT VENTURE PARTNERS, LLC, VIRGINIA
Mar 14, 2012SULPSurcharge for late payment
Mar 14, 2012FPAYFee payment
Year of fee payment: 4
Mar 8, 2011CCCertificate of correction
Jan 26, 2011ASAssignment
Free format text: SECURITY AGREEMENT;ASSIGNOR:PRIVARIS, INC.;REEL/FRAME:025700/0888
Effective date: 20071108
Owner name: HARBERT VENTURE PARTNERS, LLC, VIRGINIA