Biometric keyless entry system

ABSTRACT

A system and method employ a wireless remote keyless entry device to provide entry to a remote system via the wireless device. The system provides a level of authorization and eliminates a complex integration with the remote system to which entry is sought. The remote keyless entry device preferably includes a biometric sensor for receiving a biometric input value and a database including a list of authorized users. Each authorized user has a biometric value and a set of command options associate therewith, and each command option has a command code associated therewith. The device and method allow for one-way secure communication with the remote system, and also provide added functionality and tracking features.

FIELD OF THE INVENTION

[0001] The present invention relates generally to a wirelesscommunication system, and more particularly relates to a remote keylessentry system providing user identification.

BACKGROUND OF THE INVENTION

[0002] Many modern vehicles include remote keyless entry systems whichallow users to employ various vehicle commands or functions while spacedsome distance away from the vehicle. These functions typically includelocking and unlocking of vehicle doors, opening of trunks, or evenstarting the engine.

[0003] Unfortunately, these aforementioned systems do not include anyscreening or authorization features for utilization of the remotekeyless entry system. Accordingly, some keyless entry systems have beenproposed which provide a level of authorization to the system. Forexample, some systems require an input of a key code on a touchpadpositioned on a vehicle door, while other systems have suggested the useof biometric sensors which are positioned within the vehicle andrequired for starting of the vehicle. One drawback of these systems isthe fact that the input devices or sensors are intimately tied with thevehicle. In vehicles, sensors can quickly become very hot or colt to thetouch. Such in-vehicle sensors are costly to repair or replace ifdamaged. At the least, some form of two-way communication with theprimary system (i.e., vehicle) is required for authorization andutilization of the system.

BRIEF SUMMARY OF THE INVENTION

[0004] The present invention provides a wireless remote keyless entrydevice and a method for providing entry to a system via the wirelessdevice. The system provides a level of authorization and eliminates acomplex integration with the primary system to which entry is sought.The remote keyless entry device preferably includes a portable powersupply and a biometric sensor for receiving a biometric input value. Thedevice further includes memory and a processor. The memory has adatabase including a list of authorized users. Each authorized user hasa biometric value and a set of command options associate therewith, andeach command option has a command code associated therewith. A biometricinput value is received via the biometric sensor and identifying theauthorized user corresponding to the biometric input value. Theprocessor compares the biometric input value to the biometric values ofauthorized users and loads the associated command options and commandcodes. An input device receives a command request from the user and atransmitter sends the command code corresponding to the receivingsystem.

[0005] According to more detailed aspects of the present invention, thewireless entry device and method may include the provision of presetcommands corresponding to an authorized user, and most preferablycorresponding to a particular combination of authorized user and commandoption or code. For example, when a particular authorized user requestsa command for unlocking a vehicle, additional preset commands may alsobe transmitted such as adjusting the seat position, temperaturecontrols, or radio commands. The remote keyless entry device and methodmay also be employed with numerous systems, including cell phonesystems, internet systems, finance systems or any electronic system towhich a restricted and authorized access is desired. Preferably, thebiometric sensor and the input values it receives are fingerprintimages, although numerous other biometric values may be employed, suchas voice recognition, face recognition, eye recognition, or anycombination thereof.

BRIEF DESCRIPTION OF THE DRAWINGS

[0006] The accompanying drawings incorporated in and forming a part ofthe specification illustrate several aspects of the present invention,and together with the description serve to explain the principles of theinvention. In the drawings:

[0007]FIG. 1 is a flow chart depicting a method for providing entry to asystem via a wireless device constructed in accordance with theteachings of the present invention; and

[0008]FIG. 2 is a schematic depiction of a wireless device for providingentry to a system.

DETAILED DESCRIPTION OF THE INVENTION

[0009] Turning now to the figures, FIG. 1 depicts a schematic of amethod 8 for providing entry to a system 70 (FIG. 2) via a wirelessdevice 50 (FIG. 2). As shown in FIG. 2, the system 70 has a receiver 72for receiving a wireless signal such as a radio frequency (RF) signal orother well-known signals, including infrared, bluetooth, etc. As usedherein, the system 70 generally refers to any electronic system to whichaccess is desired. In a preferred embodiment, the system 70 representsthe electronic system of a motor vehicle.

[0010] The wireless device 50 shown in FIG. 2 includes a transmitter 62for sending signals 64 to the receiver 72. These signals 64 correspondto a command request inputted by a user via an input device 60. Asshown, the input device 60 is a touch-screen device, although any otherhuman machine interfaces (HMIs) can be used, including push-buttons orswitches. The input device 60 could, also be a microphone for receivinga voice command utilizing voice recognition technology.

[0011] The wireless device (preferably a key fob for carrying on one'sperson) 50 also includes a biometric sensor 54 providing an additionalinput to the device 50. The biometric sensor 54 is preferably afingerprint sensor which inputs a fingerprint scan as is known in theart. Alternatively, the biometric sensor 54 may also comprise a lightprint device, a microphone for voice recognition identification, acamera for face recognition, or a camera for eye or iris scan. Hence,the biometric sensor 54 receives data such as a fingerprint image, voiceimage, or eye image. Still further, a combination of these and otherbiometric sensing apparatus may also be imbedded into the device 50. Thebiometric sensor may also be incorporated into the input device, i.e.,the touch screen of the input device 60 may also be employed as thebiometric sensor 54. The biometric sensor 54 is positioned such that auser would naturally provide the necessary input to the sensor whenholding or operating the device.

[0012] The wireless device 50 further includes a portable power supply52, as well as a memory 56 and processor 58. The power supply 52 isoperatively connected to all the electronic components within the device50, namely the biometric sensor 54, memory 56, processor 58, inputdevice 60 and transmitter 62. Preferably, the memory 56 is anon-volatile type memory which will retain the data stored thereon evenif the power supply 52 should be unable to supply power to the memory56. The memory 56 includes a database having a list of authorized users.Each authorized user can be identified by a user ID, and each authorizeduser has a biometric value associated therewith. Accordingly, thewireless device 50 can be programmed to store the unique identifier,i.e., the biometric value, of a number of authorized users on the memory56. Each authorized user also has a set of command options associatedwith their user ID i.e., commands for vehicles or other systems. Othersystems include communication systems such as cell phone or otherwireless communication systems, internet or world wide web systems, orfinance systems such as credit card or debit card charge authorizations,money transfers, or the like.

[0013] Each authorized user may also have a number of pre-set commandsstored on the database in memory 56. The preset commands can be linkeddirectly to a specific authorized user, or may be linked to a specificcombination of authorized user and command request. For example, upon aspecific user initiating an unlock door request to a vehicle, additionalpreset commands may also be employed such as adjusting seat position toa predetermined position, adjusting climate control to a predeterminedsetting, adjusting the audio system to a certain level or specific radiostation or specific compact disc. Safety systems may also be adjusted toaccommodate specific users (i.e., 5th or 95th percentile persons) aswell as other vehicle or ride characteristics that can be automaticallyset to comply with specific user preferences or requirements.

[0014] A unique process 8 for providing entry to the system 70 via thewireless device 50 is described in FIG. 2. The method 8 starts at block10 receives a biometric input value via the biometric sensor 54, asindicated at block 12. A decision is then made as to whether thebiometric input value matches the biometric value of an authorized user,as indicated at block 14. As previously noted, the biometric values arepre-programmed into memory 56.

[0015] If there is no match of the biometric values, the method 8 flowsto its end as indicated at block 16. However, if there is an appropriatematch, the authorized user is identified within the database stored onmemory 56, as indicated at block 18.

[0016] Upon identifying the authorized user, the processor 58 loads thecommand options associated with the authorized user. The processor 58also associates those command options with the input device 60, asindicated at block 20. For example, if the input device 60 comprises aseries of buttons, each button can be linked to specific commandoptions. When the input device 60 is a touch screen, the command optionsmay simply be displayed on the screen. Finally, if the input device 60comprises voice recognition technology employed through a microphone,the command options can be associated with certain voice image values.

[0017] The method 8 then initiates the timer 22 and waits for a commandrequest as indicated by blocks 22 and 24. If a command has not beenreceived, the method checks to see whether the timer has expired asindicated at block 26. If the timer has expired the wireless device 50shuts down and the method flows to its end as indicated at block 16.Once at the end, the method 8 must reinitialize and a biometric inputvalue must be entered which matches the value of an authorized user.

[0018] Upon receiving a command request via the input device 60, themethod then performs several tasks as indicated at block 28.Specifically, the processor 58 loads the command codes associated withthe command request, and also loads preset command codes associated withthe authorized user and the command request. As previously discussed,certain preset commands may be employed when a specific user hasinputted a specific command request. The various command options, aswell as the preset commands, are associated with a command code that isrecognizable by the system 70. That is, the command codes are typicallyencoded or encrypted signals such that the security of the system 70 ismaintained.

[0019] With the command codes and the preset command codes loaded, thecodes are transmitted via the transmitter 62 and received by thereceiver 72 on the system 70. At this point in the process 8, the eventdata (i.e., the user ID, the command codes and/or preset command codestransmitted, the time, the date, and any other desired information) arestored on the memory 56. In the event the memory 56 fills up with data,the oldest events will be automatically removed. As also indicated atblock 32, the timer has been reset and the method flows back throughblock 26 to block 24 where the system 8 is ready to receive a commandrequest. In the event no further commands are desired, the method willflow to its end at block 16 upon expiration of the timer.

[0020] By allowing the memory 56 to have a database storing differentcommand codes, the wireless device 50 may be employed with multiplesystems, as well as multiple vehicles. The present invention thuseliminates dedicated keyless entry systems. The system 8 alsofacilitates automatic enabling of user preferences and requirements suchas driver's seat position, driver's safety system performance as well asclimate control and audio control options. Further, system access orspecific access can be limited for each desired user. Similarly, themonitoring of events also allows individual users to be watched andrecorded. Thus, access to vehicles, digital assistants, or cell phonescan be restricted and tracked by user.

[0021] The present invention also provides a wireless device 50 thatincludes all the necessary authorization and encoding features allowingfor simple one-way communication within the desired system 70. Unlikein-vehicle ID systems, remote ID allows the driver's seat position to beadjusted before the user enters the vehicle. Safety system performancecan also be adjusted or tuned to meet the needs of a particular user.Uniquely, multiple users can use each wireless device 50, and eachwireless device can be used with multiple systems or multiple vehicles.

[0022] The foregoing description of various embodiments of the inventionhas been presented for purposes of illustration and description. It isnot intended to be exhaustive or to limit the invention to the preciseembodiments disclosed. Numerous modifications or variations are possiblein light of the above teachings. The embodiments discussed were chosenand described to provide the best illustration of the principles of theinvention and its practical application to thereby enable one ofordinary skill in the art to utilize the invention in variousembodiments and with various modifications as are suited to theparticular use contemplated. All such modifications and variations arewithin the scope of the invention as determined by the appended claimswhen interpreted in accordance with the breadth to which they arefairly, legally, and equitably entitled.

1. An method for providing entry to a system via a wireless device, thesystem having a receiver, the wireless device having a power supply, aprocessor, memory, a biometric sensor, an input device, and atransmitter, the method comprising the steps of: providing a database onthe memory, the database including a list of authorized users, eachauthorized user having a biometric value and a set of command optionsassociated therewith, each command option having a command codeassociated therewith; receiving a biometric input value via thebiometric sensor; identifying the authorized user corresponding to thebiometric input value; loading the command options corresponding to theauthorized user; receiving a request for one of the command options viathe input device; and transmitting the command code associated with therequested command option to the receiver.
 2. The method of claim 1,further comprising the step of loading preset commands corresponding tothe authorized user.
 3. The method of claim 2, wherein the presetcommands are stored on the database.
 4. The method of claim 2, whereinthe preset commands include vehicle seat adjustment commands.
 5. Themethod of claim 4, wherein the preset commands include moving the seatto a predetermined position.
 6. The method of claim 2, wherein thepreset commands include mirror adjustment commands.
 7. The method ofclaim 2, wherein the preset commands include climate control commands.8. The method of claim 2, wherein the preset commands include radiocommands.
 9. The method of claim 1, wherein the command options includecell phone commands.
 10. The method of claim 1, wherein the commandoptions include internet commands.
 11. The method of claim 1, whereinthe command options include finance commands.
 12. The method of claim 1,wherein the command options include vehicle commands.
 13. The method ofclaim 12, wherein the command options include multiple sets of vehiclecommands for multiple vehicles.
 14. The method of claim 1, wherein thebiometric input value is a fingerprint image.
 15. The method of claim 1,wherein the biometric input value is a voice image.
 16. The method ofclaim 1, wherein the biometric input value is an eye image.
 17. Awireless remote keyless entry device for a user, the device comprising:a portable power supply; a biometric sensor for receiving a biometricinput value; memory having a database stored thereon, the databaseincluding a list of authorized users, each authorized user having abiometric value and a set of command options associated therewith, eachcommand option having a command code associated therewith; a processorfor comparing the biometric input value to the biometric values ofauthorized users and loading the associated command options and commandcodes; an input device for receiving a command request from the user;and a transmitter for sending the command code corresponding to thecommand request.
 18. The method of claim 1, wherein the input device isa touch screen.
 19. The method of claim 18, further comprising the stepof displaying the command options corresponding to the authorized useron the touch screen.
 20. The method of claim 18, wherein the biometricsensor is also the same touch screen forming the input device.