Biometric security device

A security device and biometric data technology, applied in the field of security devices, can solve the problems of being unsuitable or only conditionally suitable for mobile use, high cost, and damage to biometric sensors

Active Publication Date: 2011-02-16
ASMAG HLDG
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] A disadvantage of the methods known from the prior art is that they are not suitable or only conditionally suitable for mobile use, since the user's hands must be placed in the device, for example
Furthermore, it is disadvantageous that the biometric sensor is integrated in another device - such as a watch
In everyday use, particularly when taking into account the ambient conditions of dirt, dust and higher mechanical loads, damage to the biometric sensor can easily result when the safety device is used in accordance with regulations
But if the biometric sensor is damaged, the entire watch needs to be replaced, which is costly and laborious, since the stored biometric reference values ​​must also be transmitted or re-determined

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biometric security device
  • Biometric security device
  • Biometric security device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] First of all, it should be pointed out that the same parts in the different embodiments described have the same reference signs or the same part numbers, and the disclosure contained in the entire specification can be transferred to the same reference signs or the same parts according to the meaning. Identical parts labeled. Moreover, the position descriptions selected in this specification, such as upper, lower, side, etc., all involve direct description and displayed drawings. These position descriptions can be transferred to a new position according to their meaning when the position changes. In addition, individual features or combinations of features from the shown and described different embodiments for independent, inventive or solutions according to the invention may also be shown.

[0092] All descriptions of the numerical range in the detailed description should be understood as these numerical ranges also include any and all of its sub-regions. For example, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security device (1), which comprises at least one authentication device (17) and a locking device (18), wherein the authentication device (17) comprises at least one sensor (2) and an evaluation and comparison module (10), and wherein a communication connection (21) exists between the locking device (18) and the authentication device (17), wherein the sensor (2) is configured as a thin-film sensor for the detection of biometric data and/or spectral properties of the skin and tissue layers beneath, and wherein the communication connection (21) is configured for the secure, wireless transmission of a distinctive user code determined by the authentication device (17) and in the effective range thereof is limited to a short range, particularly less than 50 cm, and wherein the locking device (18) is deactivated if the user code agrees with an identification code associated with the locking device.

Description

Technical field [0001] The invention relates to a security device for protecting technical devices from unauthorized use or unauthorized access. The safety device at least includes a verification device and a locking device, wherein the verification device at least includes a sensor and an analysis and comparison module, and there is a communication connection between the locking device and the verification device. Background technique [0002] Technical equipment or technical devices-such as security areas, security doors, data processing devices and light weapons (Feuerwaffe)-require protective measures to ensure that only authorized or authorized personnel can use these devices as required, or that only these personnel can access them. Because most of the use of this device manages and / or keeps information that is important for security or to keep secret, or the use of this device poses a special risk to the user or to the environment and other personnel, that is, the security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K9/00G06F21/31G06F21/32
CPCG06K9/0004G07C9/00087A61B5/0075A61B5/1072A61B5/1075A61B5/441A61B5/489A61B5/6803A61B5/6824G06F21/32H04W12/06A61B2562/0261A61B2562/08H04L63/0861G06F21/35G07C9/257Y04S40/20H04W12/61G06V40/1318
Inventor K·施勒特尔
Owner ASMAG HLDG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products