System and apparatus for biometric identification of a unique user and authorization of the unique user

ABSTRACT

A verification device provides an approach to identification and authorization by requiring an authorized biometric presence before permitting the input of a sequence of signals. Furthermore, the device may be configured to recognize incorrect inputs, and to respond by transmitting an alert code while providing limited functionality to convince an unauthorized user that access has been granted until a location of the device has been determined.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of priority to U.S. patentapplication Ser. No. 15/061,036, filed Mar. 4, 2016, U.S. ProvisionalPatent Application No. 62/131,032, dated Mar. 10, 2015, which are herebyincorporated by reference in their entirety.

TECHNICAL FIELD

This disclosure relates to systems and devices configured to identifythe identity of a user uniquely using a biometric input from the userand to then authorize the user to access a device, apparatus, or system.

BACKGROUND

Devices exist that authorize a user to gain access to a building, alocation, a device, an apparatus, etc., ranging from combination locks,key codes, passwords, etc. More recently, biometric inputs have beenused to identify the identity of an authorized person, includingfingerprints and eye scans.

SUMMARY

The present disclosure provides a verification device comprising atleast one fingerprint sensor pad and a plurality of pressure sensitivesensors. At least one first pressure sensitive sensor is positioned on afirst side of the at least one fingerprint sensor pad, and at least onesecond pressure sensitive sensor is positioned on a second side of theat least one fingerprint sensor pad from the at least one first pressuresensitive sensor. The at least one first pressure sensitive sensor andthe at least one second pressure sensitive sensor are positioned suchthat a finger positioned in contact with the at least one fingerprintsensor pad actuates only the at least one first pressure sensitive pador only the at least one second pressure sensitive pad by a rollingmotion in the direction of the at least one first pressure sensitive pador in the direction of the at least one second pressure sensitive pad.

This disclosure also provides a system comprising a verification deviceand a processor. The verification device includes at least onefingerprint sensor pad and at least one sensor. The verification deviseis configured to identify a user from fingerprint data received by theat least one fingerprint sensor pad and to actuate the at least onesensor based on the identification. The at least one sensor ispositioned to identify movement of a finger. The verification device isfurther configured to transmit signals that include the fingerprint dataand signals from the at least one sensor. The processor is configured toreceive the fingerprint data, to provide the user identification basedon the fingerprint data, to determine whether signals from the at leastone sensor authorize a user access to the system, and to enable suchaccess upon determining that the signals correspond to an authorizedaccess code.

This disclosure also provides a biometric authentication system,comprising a processor, a biometric input apparatus, and an input codedevice. The biometric input apparatus is configured to accept abiometric input from a user and to transmit the biometric input to theprocessor. The processor is configured to determine an identity of theuser from the biometric input. The input code device is configured toaccept a code from the identified user, and to provide at least onefunction based on the identification and the code.

Advantages and features of the embodiments of this disclosure willbecome more apparent from the following detailed description ofexemplary embodiments when viewed in conjunction with the accompanyingdrawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a plan view of a verification device in accordance with anexemplary embodiment of the present disclosure.

FIG. 2 shows a first end view of the verification device of FIG. 1 .

FIG. 3 shows a second end view of the verification device of FIG. 1 .

FIG. 4 shows a perspective view of the verification device of FIG. 1 .

FIG. 5 shows a view of a plurality of pressure sensor inputs inaccordance with an exemplary embodiment of the present disclosure.

FIG. 6 shows a plan view of an electronic device incorporating averification device in accordance with an exemplary embodiment of thepresent disclosure.

FIG. 7 shows a side view of the electronic device of FIG. 6 .

FIG. 8 shows an end view of the electronic device of FIG. 6 .

FIG. 9 shows a perspective view of the electronic device of FIG. 6

FIG. 10 shows a plan view of another electronic device incorporatingverification device in accordance with as exemplary embodiment of thepresent disclosure.

FIG. 11 shows a process flow of a verification device in accordance withan exemplary embodiment of the present disclosure.

FIG. 12 shows a perspective view of a verification in accordance withanother exemplary embodiment of the present disclosure.

FIG. 13 shows a block diagram of a system incorporating a verificationdevice in accordance with an exemplary embodiment of the presentdisclosure.

FIG. 14 shows a process flow of a verification device in accordance withanother exemplary embodiment of the present disclosure.

FIG. 15 shows a delay process of the process flow of FIG. 14 inaccordance with an exemplary embodiment of the present disclosure.

FIG. 16 shows a plan view of a verification device in accordance with anexemplary embodiment of the present disclosure.

FIG. 17 shows a sectional view of the verification device of FIG. 16along the lines 17-17.

FIG. 18 shows a further view of the verification device of FIG. 16 .

FIG. 19 shows a sectional view of the verification device of FIG. 18along the lines 19-19.

FIG. 20 shows a yet further view of the verification device of FIG. 16 .

FIG. 21 shows a sectional view of the verification device of FIG. 20along the lines 21-21.

FIG. 22 shows a plan view of a verification device in accordance with anexemplary embodiment of the present disclosure.

FIG. 23 shows a sectional view of the verification device of FIG. 22along the lines 23-23.

FIG. 24 shows a further view of the verification device of FIG. 22 .

FIG. 25 shows a sectional view of the verification device of FIG. 24along the lines 25-25.

FIG. 26 shows a yet further view of the verification device of FIG. 22 .

FIG. 27 shows a sectional view of the verification device of FIG. 26along the lines 26-26.

FIG. 28 shows a plan view of a verification device in accordance with anexemplary embodiment of the present disclosure.

FIG. 29 shows a sectional view of the verification device of FIG. 28along the lines 29-29

FIG. 30 shows a system incorporating a verification device in accordancewith an exemplary embodiment of the present disclosure.

FIG. 31 shows a view of the verification device of FIG. 30 .

FIG. 32 shows a further view of an alert apparatus or device of FIG. 30.

FIG. 33 shows a view of a system incorporating a verification device inaccordance with an exemplary embodiment of the present disclosure.

FIG. 34 shows a view of the verification device of FIG. 33 .

FIG. 35 shows a view of a system incorporating a verification device inaccordance with an exemplary embodiment of the present disclosure.

FIG. 36 shows a view of the verification device of FIG. 35 .

FIG. 37 shows a view of another system incorporating a verificationdevice in accordance with an exemplary embodiment of the presentdisclosure.

FIG. 38 shows a view of the verification device of FIG. 37 .

FIG. 39 shows a view of yet another system incorporating a verificationdevice in accordance with an exemplary embodiment of the presentdisclosure.

FIG. 40 shows a plan view of a verification device in accordance with anexemplary embodiment of the present disclosure.

FIG. 41 shows a sectional view of the verification device of FIG. 40 .

FIG. 42 shows a further sectional view of the verification device ofFIG. 41 .

FIG. 43 shows a plan view of a verification device in accordance with anexemplary embodiment of the present disclosure.

FIG. 44 shows a view of the verification device of FIG. 43 .

FIG. 45 shows a further view of the verification device of FIG. 43 .

FIG. 46 shows a view of a further system incorporating a verificationdevice in accordance with an exemplary embodiment of the presentdisclosure.

FIG. 47 shows a view of the verification device of FIG. 46 .

FIG. 48 shows a view of a verification device in accordance with anexemplary embodiment of the present disclosure.

FIG. 49 shows a view of the verification device of FIG. 48 .

FIG. 50 shows a further view of the verification device of FIG. 48 .

FIG. 51 shows a yet further view of the verification device of FIG. 48 .

FIG. 52 shows a view of a verification device in accordance with anexemplary embodiment of the present disclosure.

FIG. 53 shows a further view of the verification device of FIG. 52 .

FIG. 54 shows a yet further view of the verification device of FIG. 52 .

FIG. 55 shows a view of a verification device in accordance with anexemplary embodiment of the present disclosure.

FIG. 56 shows a further view of the verification device of FIG. 55 .

FIG. 57 shows a yet further view of the verification device of FIG. 55 .

FIG. 58 shows a view of a fuel gauge in accordance with an exemplaryembodiment of the present disclosure.

FIG. 59 shows a view of a vehicle in accordance with an exemplaryembodiment of the present disclosure.

FIG. 60 shows a view of another vehicle in accordance with an exemplaryembodiment of the present disclosure.

FIG. 61 shows a view of another verification device in accordance withan exemplary embodiment of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

Various devices have been proposed to provide identification of anindividual while authorizing their access to a document, a device, alocation, a building, a financial transaction, a purchase, etc.Identification has been provided by fingerprints, voice prints, and eyescans, and authorization upon identification has been provided by, forexample, passwords, combinations, etc. However, identification cansometimes be spoofed by, for example, transferring a fingerprint to animage or a simulacrum, and authorization can be hacked. The verificationdevices of the present disclosure provides an improved approach toidentification and authorization, replacing conventional identificationand authorization such as passwords, combinations, access to rooms, andaccess to buildings, including houses, etc., by requiring an authorizedbiometric presence while or prior to providing a sequence of signals.Because the verification devices disclosed herein require a combinationof a unique biometric input, such as a fingerprint, retinal scan, handprint, etc., and an input from the brain of the user, the verificationdevices described herein can be described as biometric verificationdevices. Further, because the verification devices disclosed hereinfunction to identify a unique user, and to then authenticate theidentification, the verification devices disclosed herein canalternatively be described as, authentication devices. In addition toidentification and authentication, the disclosed devices may beconfigured to recognize incorrect inputs, and to respond by transmittingan alert code while providing limited functionality to convince anunauthorized user that access has been granted until a security entity,such as the police, FBI, military, security forces, etc., are able torespond to the alert code.

Applicant is a medical doctor who has treated many seriously harmedpatients with injuries as serious as a skull cracked open as a result ofrobberies. Such robberies include an assailant who waits for a victim toreceive money from an ATM machine. Thus, one of the objects of thepresent disclosure is to provide an identification verification systemthat helps to protect an authorized user against an assailant when theauthorized user is withdrawing money from an ATM machine. Another objectof the disclosure is to provide a system to reduce the need for carryingcash, and thus to become less of a target for robbery. The systems ofthe present disclosure include a limited functionality mode that willshow a reduced amount of cash available to an authorized user. Byshowing a reduced amount of cash, the assailant will still take someamount of money, though less money than the assailant might otherwisehave received without the disclosed limited functionality modes, and byreceiving some money will be less likely to hurt the victim.Furthermore, the victim receives a measure of protection because of thereduced amount of cash or money taken by the assailant or robber. Forexample, once limited functionality is activated the authorized useraccount that actually had $10,000 available appears to have only $1,500available (or any predetermined amount the authorized user decidesshould be displayed with entry of the proper inputs). As anotherexample, the dispensing entity, such as a bank, credit union, savingsand loan, or other financial institution, can automatically reduceavailable funds to 10% of total funds when limited functionalityoperation has been actuated by the authorized user.

The verification devices of the present disclosure are configured toprovide identification of a body and a person. A biometric device (suchas, by way of example, fingerprint, voice print, eye scanner, and thelike) identify the body, but to identify the person or authorized user,i.e., that the brain of the identified body is present, a cognitivefunction must be performed, such as series of steps or codes known tothat person or authorized user. A series of responses from theauthorized user can be generated, and three exemplary outputs are: i)regular operation, in which the associated device or system performs theexpected function(s), ii) alert operation, in which an output includesan alert, for example to the police, and iii) limited functionality, inwhich expected operation is performed but with limited or reducedfunctionality, which will become more apparent in view of the disclosureprovided herein.

FIGS. 1-4 are views of a verification device in accordance with anexemplary embodiment of the present disclosure, indicated generally at10. Device 10 is configured to include at least one fingerprint sensorpad 12, a plurality of pressure sensors 14, and one or more indicators.It should be understood that a variety of sensors can be used instead ofpressure sensors or in conjunction with pressure sensors, such asoptical sensors and LED's, motion sensors, vibration sensors, oxygensensors, temperature sensors, sweat sensors, chemical sensors, and thelike. Each one of said sensors are activated in a certain way by theauthorized user to identify the authorized user (i.e., the brain of theauthorized user). In an exemplary embodiment, the one or more indicatorsinclude a positive verification indicator 16, an unconfirmedverification indicator 18, and a negative verification indicator 20. Itshould be understood that other indicators may replace indicators 16,18, and 20, such as audible indicators, tactile indicators, mechanicalindicators, etc. Verification device 10 may also include a plug,connector, connection, or output 22 to permit connection of verificationdevice 10 to another device, such as a personal computer, tablet, cellphone, television, audio device, vehicle ignition, vehicle controlsystem, etc., though such connection may also be through a wirelessdevice (not shown).

Device 10 operates by placing a finger in each available fingerprintsensor pad 12. It should be understood that device 10 may be configuredto include more fingerprint sensor pads 12 than are shown. It shouldalso be understood that in an alternative embodiment, not allfingerprint sensor pads 12 need to receive a finger. For example, device10 could include three fingerprint sensor pads 12, but only requirepositive verification from two fingerprints. Once fingers (not shown)are placed in fingerprint sensor pads 12, device 12 gathers fingerprintdata and compares the data to data stored in a non-transitory memory todetermine the identity of the person to whom the fingerprints belong. Ifthe fingerprints belong to an authorized person, device 10 may provide abrief indication by, for example, illuminating positive verificationindicator 16 either briefly or with a first color, such as, for example,blue. The initial indication is a communication with a user that device10 is now ready to accept pressure sensor input via pressure sensors 14.It should be understood that device 10 can further include one or moredevices to determine that a user is alive, and may provide additionalidentification information. Such devices can include, for example, apulsimeter, an oxygen sensor, a temperature sensor, a sweat sensor, achemical sensor, and/or an infrared sensor.

In order to actuate or activate pressure sensors 14, a user rocks orrolls their fingers, or moves their fingers side-to-side, whilemaintaining contact with fingerprint sensor pads 12, and contactingpressure sensors 14 on each side of each fingerprint sensor pad 12. Forexample, as shown in FIG. 5 , such rocking motion can be a combinationof left and right rolling, rocking, or side-to-side motions. If fingersfrom the same hand are used, it is anticipated that both left and rightpressure sensors 14 will be actuated at approximately the same time.Motions can include: a plurality of actuations on one side, followed bya plurality of actuations on another side, followed by more actuationson the one side; and alternating patterns of actuations, such as left,right, left, left right, etc. Additionally, device 10 can accept inputsfrom fingers on two different hands, which permits individual rocking,rolling, or side-to-side motions by each finger individually, or nearlysimultaneously, to create a complex and difficult-to-break sequence.Further, device 10 can also be configured to sense pressure levels andthe time of pressure levels. It should be understood that the pluralityof pressure sensors can be described as an input code device, as canother input devices that accept a code as described herein. As anexample, a full authorization sequence could be: left low pressure forless than one second; right high pressure (without any timerequirement); right, high pressure for two seconds; left low pressure(without any time requirement). Of course, such combinations areunlimited, with varying lengths of time, varying pressure levels, andvarying numbers of actuations, all while requiring the presence ofauthorized fingerprints. It should be understood that in an exemplaryembodiment fingerprint recognition occurs as a first step followed bythe authorization sequence, and the authorization sequence may occurafter the finger is removed from the fingerprint sensor.

A verification device can be configured as an integral part of anotherdevice, such as an ATM, a point-of-sale device, a credit card reader,etc. For example, as shown in FIGS. 6-9 , a mobile communication device,indicated generally at 100, includes a verification device 102 inaccordance with an exemplary embodiment of the present disclosure.Similar to verification device 10, device 100 includes fingerprintsensor pads 104 and pressure sensors 106, indicators can be configuredas small lighted portions on device 100, to include a positiveverification indicator 108, an unconfirmed verification indicator 110,and a negative verification indicator 112. However, it should beunderstood that a single indicator may include a plurality of colors toindicate the functions provided by a plurality of functions, or device100 can be configured to include a display 116 to provide theverification indicator functions. Device 100 may further include, forexample, a connector or output/input 114 for connection to anotherdevice, a wireless communication device (not shown), an audio speaker oroutput 118, etc. It should be understood that the present device 100 canoperate without positive verification indicator 108, unconfirmedverification indicator 110, and/or negative verification indicator 112.In an embodiment without indicators 108, 110, and 112 successfuloperation such as unlocking a door indicates a positive verification,and lack of proper function (such as not unlocking the door afterentering a verification code) indicates negative verification orunconfirmed verification.

FIG. 10 shows a view of another device in which a verification devicecan be configured as an integral part of the device in accordance withan exemplary embodiment of the present disclosure, indicated generallyat 200. Device 200 may be a laptop or other personal computer, whichincludes a verification device 202. Similar to verification devices 10and 100, device 202 includes fingerprint sensor pads 204 and pressuresensors 206. Computing device 200 is configured to include a display 216that can be used to provide display of verification indicators similarin function or capability to verification indicators 16, 18, and 20 ofdevice 10. Alternatively, computing device 200 includes a device body118 that can be configured to include separate lights (not shown) toprovide the functionality of verification indicators 16, 18, and 20.Device 200 may further include, for example, one or more connectors oroutputs/inputs (not shown) for connection to another device, a wirelesscommunication device (not shown), an audio speaker or output 120, etc.

Many aspects of the disclosure are described in terms of sequences ofactions to be performed by elements of a computer system or otherhardware capable of executing programmed instructions, for example, ageneral purpose computer, special purpose computer, workstation, orother programmable data processing apparatus. It will be recognized thatin each of the embodiments including active or electronic elements, thevarious actions could be performed by specialized circuits (e.g.,discrete logic gates interconnected to perform a specialized function),by program instructions (software), such as logical blocks, programmodules etc. being executed by one or more processors (e.g., one or moremicroprocessors, a central processing unit (CPU), and/or applicationspecific integrated circuit), or by a combination of both. For example,embodiments can be implemented in hardware, software, firmware,middleware, microcode, or any combination thereof. The instructions canbe program code or code segments that perform necessary tasks and can bestored in a non-transitory, machine-readable medium such as a storagemedium or other storage(s). A code segment may represent a procedure, afunction, a subprogram, a program, a routine, a subroutine, a module, asoftware package, a class, or any combination of instructions, datastructures, or program statements. A code segment may be coupled toanother code segment or a hardware circuit by passing and/or receivinginformation, data, arguments, parameters, or memory contents.

The non-transitory machine-readable medium additionally be considered tobe embodied within any tangible form of computer readable carrier, suchas solid-state memory, magnetic disk, and optical disk containing anappropriate set of computer instructions, such as program modules, anddata structures that would cause a processor to carry out the techniquesdescribed herein. A computer-readable medium may include the following:an electrical connection having one or more wires, magnetic diskstorage, magnetic cassettes, magnetic tape or other magnetic storagedevices, a portable computer diskette, a random access memory (RAM), aread-only memory (ROM) an erasable programmable read-only memory (e.g.,EPROM, EEPROM, or Flash memory), or a any other tangible medium capableof storing information.

It should be noted that the systems of the present disclosure areillustrated and discussed herein as having various modules and units,which perform particular functions. It should be understood that thesemodules and units are merely schematically illustrated based on theirfunction for clarity purposes, and do not necessarily represent specifichardware or software. In this regard these modules, units and othercomponents may be hardware and/or software implemented to substantiallyperform their particular functions explained herein. The variousfunctions of the different components can be combined or segregated ashardware and/or software modules in any manner, and can be usefulseparately or in combination. Input/output or I/O devices or userinterfaces including but not limited to keyboards, displays, pointingdevices, and the like can be coupled to the system either directly orthrough intervening I/O controllers. Thus, the various aspects of thedisclosure may be embodied in many different forms, and all such formsare contemplated to be within the scope of the disclosure.

The ability to authorize the use of a device, or even software of adevice, can be accomplished by many different processes. FIG. 11includes a verification process in accordance with an exemplaryembodiment of the present disclosure, indicated generally at 300.Verification process 300 begins with a start process 302, which caninclude providing power to a device, such as device 10, device 100, ordevice 200, initiating software, initiating input/output processes, etc.Once start process 302 is complete, control passes to a detectfingerprint process 304.

In detect fingerprint process 304, one or more fingerprint sensor pads,such as fingerprint sensor pads 12, 104, and 204, determine whether afingerprint is present. If a fingerprint is present, it is analyzed.Control then passes from detect fingerprint process 304 to a fingerprintauthorized decision process 306.

In fingerprint authorized decision process 306, verification process 300determines whether a fingerprint is actually present; i.e., if an objectis detected on the fingerprint sensor pad, does that object have afingerprint. Additionally, fingerprint authorized decision process 306determines whether the fingerprint corresponds to an authorizedfingerprint. If the object does not include a fingerprint, or thefingerprint is not authorized, control passes from fingerprintauthorized decision process 306 to an end process 316, whereverification process 300 ends. If authorized decision process 306detects an authorized fingerprint, control passes from authorizeddecision process 306 to an accept pressure input process 308.

In accept pressure input process 308, inputs from a pressure sensor,such as pressure sensors 14, 106, or 206, is accepted. Once the input isaccepted, control passes from accept pressure input process 308 to afingerprint presence decision process 310, which determines whether thevalid fingerprint is still present on the fingerprint pad. If the validfingerprint has been removed, control passes from fingerprint presencedecision process 310 to end process 316. If the valid fingerprint isstill present, control passes from fingerprint presence decision process310 to code match decision process 312.

In code match decision process 312, verification process 300 determineswhether the inputs received thus far from the pressure sensors matches apredetermined pressure code, which can include combinations of left andright pressure sensor inputs, pressure level variations, and pressureinputs for varying lengths of time. If the inputs tentatively match aknown or predetermined code, control passes from code match decisionprocess 312 to a code complete decision process 314.

In code complete decision process 314, a determination of whether anentire input pressure code has been received. If the entire code has notbeen received, control returns to accept pressure input process 308, andverification process 300 continues as previously described. If theentire pressure code has been received, control passes from codecomplete decision process 314 to an alert code decision process 326.

In alert code decision process 326, a determination of whether thepredetermined pressure code is an alert code is determined. An alertcode is a predetermined code that can be created prior to purchase by anend user, programmable by an end user, or downloadable by an end user.An alert code can be, for example, a code to inform the police that theuser is being forced to unlock or provide authorization to the device,along with identification information that can include GPS information.If the predetermined pressure code is an alert code, control passes fromalert code decision process 326 to a transmit alert process 322,described in more detail hereinbelow. If the predetermined pressure codeis not an alert code, control passes to an authorize device process 328,where the associated device is fully unlocked because the user has beenverified and authorized to use the device. Control then passes fromauthorized device process 328 to end process 316.

Returning to code match decision process 312, if the pressure code doesnot match any known code, control passes from code match decisionprocess 312 to a display acceptance process 318. Display acceptanceprocess 318 provides an authorized user an option to ignore a falselyentered code because this process occurs only in the event of anincorrect code. Control then passes to an input accepted decisionprocess 320.

In input accepted decision process 320, if the user did not accept theinput, i.e., the incorrectly entered pressure code, control passes frominput accepted decision process 320 to end process 316. If the incorrectpressure code is not accepted, control passes to transmit alert process322.

In transmit alert process 322, an alert corresponding to a predeterminedalert code is transmitted, without providing notification to the user.For example, if the predetermined alert code is to notify the policethat the user is being forced to unlock a device, an alert, which mayinclude a text message, a computer file, predetermined voice recording,etc., is transmitted to the police by one or more of internet, Wi-Fi,landline, wireless, etc. Such transmission may include locationinformation, identification information, GPS information, etc. In somecircumstances, an open transmission line to the alerted authority may beopened so that the events at the device may be monitored during responseto the alert. Once the alert is transmitted, control passes fromtransmit alert process 322 to a provide limited functionality process324.

In limited functionality process 324, the device is enabled to providelimited functionality that does not include access to sensitiveinformation stored on the device, such as computer files, and may limitthe ability to access wireless and internet services. For a system suchas a vehicle, limited functionality could indicate a false low or nofuel reading, an engine warning light, a service engine light, thuspreventing a would be kidnapper or carjacker from using the vehicle totransport the victim. The benefit of such limited functionality is thatit encourages an unauthorized user to continue to use the device whilean alerted authority responds to the alert provided in transmit alertprocess 322. Once the limited functionality has been provided, controlpasses from provide limited functionality process 324 to end process316. It should be understood that verification process 300 can beperformed again to restore fully functionality to an associated device.

FIG. 12 shows a perspective view of a verification device, showngenerally at 350, in accordance with another exemplary embodiment of thepresent disclosure. Verification device 350 includes a casing, housing,or body 352. Body 352 supports at least one interface location 354configured to receive a finger. Interface location 354 can include aconformal shape 356 formed in body 352 that is approximately the sameshape as a human finger. Located on the surface of conformal shape 356is a fingerprint sensor 358 and a control, input, or sensor 360.Control, input, or sensor 360 can be, for example, an optical or lightsensor, which can be actuated by blocking light, a motion type sensorcapable of sensing movement, a button or switch, or another deviceconfigured to sense movement of the user's finger. Verification device350 is configured to receive a user's fingerprint information, which, asdescribed further herein, is transmitted to a processor for comparisonwith a baseline fingerprint. Once the fingerprint has been verified, theuser can enter a code by way of control, input, or sensor 360 while thefingerprint is monitored.

It should be understood that in another embodiment the fingerprint canbe acquired by fingerprint sensor 358 and verified as a first step, andthen fingerprint sensor 358 is deactivated. In a second step that isinitiated after positive verification of the fingerprint, sensor 360 isactivated, and the authorized user can then enter a code by way ofcontrol input or sensor 360.

Verification device 350 can further include one or more indicators 362that are configured to provide an indication of the status ofidentification and an alert transmission, described in more detailelsewhere herein. Indicator 362 can include a plurality of lights or adisplay. In the embodiment of FIG. 12 , indicator 362 includes threeconcentric illuminated features, 364, 366, and 368. Illuminators 364,366, and 368 can be configured to provide indications of the status ofverification device 350 and associated functions. For example, during afingerprint acquisition and identification phase, illuminator 364 can beturned on. Such illuminator can be configured to include a color, suchas yellow, to indicate identification. If identification fails,illuminator 364 can illuminate red, or all three illuminators 364, 366,and 368 can illuminate red, or another color, and can flash. Ifidentification of the fingerprint is successful, illuminator 364 canturn to green or blue, and illuminator 366 can turn to yellow,indicating that verification device 350 is awaiting entry of a code. Ifthe correct code is entered, illuminator 366 can turn to green. If theincorrect code is entered, illuminator 366 can turn to red, as canilluminator 368, and one or both illuminators can flash red to indicatethe code was incorrect while maintaining a green light on illuminator364. If an alert code, described in more detail elsewhere herein, isentered, illuminator 368 can turn, green, indicating that the alert codewas recognized and a message to authorities was successfullytransmitted. Alternatively, if the alert code was recognized, butauthorities were not alerted due to a malfunction, illuminator 368 caninitially illuminate with yellow or red light, and then either turn offor turn to another color, such as blue, continuing to indicate thatwhile the alert code was received, authorities were not alerted for somereason. It should be understood that illuminator 368 may be programmedto illuminate green when an alert code is entered, thereby the assailantis tricked into thinking that all is well, but in reality tire policewas called because an alert code was entered. If the red codeilluminates, an assailant can become upset and harm the victim, thusonce alert code is entered the green light will be illuminated and, forinstance, a safe is unlocked.

FIG. 13 is a block diagram of a system, indicated generally at 400,incorporating a verification device in accordance with an exemplaryembodiment of the present disclosure. System 400 is exemplary of, forexample, an ATM, a mobile communication device, a computer such as alaptop, a vehicle, etc. System 400 includes a casing, housing, or body402 used to support or contain certain elements of system 400, and averification device 404, which can be any verification device disclosedherein or any verification device constructed according to theprinciples of the present disclosure. System 400 further includes aprocessor 406, non-transitory memory 408, a landline modem or interface410, a cable modem or internet interface 412, a transceiver ortransmitter 414, and an antenna 416. System 400 can further include orcontrol one or more auxiliary devices or systems, such as an audiooutput device 418, one or more cameras 420, and other devices 422, suchas lights, a display, etc.

Verification device 404 is configured to provide a plurality of outputsignals to processor 406. For example, the output of one or moresensors, such as the fingerprint sensor, is transmitted to processor406. In addition, codes entered by a user are transmitted to processor406. Processor 406 also communicates with non-transitory memory foraccess to software and stored data, as well as storing data. Processor406 further communicates with one or more devices for remotecommunication, such as landline modem or interface 410 for communicationover conventional telephone lines, cable modern or internee interface412 for communication by way of the internet, and transceiver ortransmitter 414 for wireless communication. It should be understood thatwireless communication is a term that includes near field and far fieldwireless communication, including satellite communication.

Processor 406 may also control other devices, such as audio device 418for providing voice or tonal output, which may be co-located withverification device 404 to provide verbal confirmation of entries orassistance for visually impaired persons. Processor 406 can also controlor turn on and receive data from one or more cameras 420, includingcameras co-located with verification device 404. If data is receivedfrom cameras 420, it can be processed for determination of risk to auser, or determination that the user is not authorized. Such data can bestored in non-transitory memory 408, which can be co-located with system400, or can be remotely located, for example, in cloud storage. Inaddition, processor 406 can control other devices 422, which may includeadditional lights, alarms, locking systems, etc.

FIG. 14 shows a view of a process flow, indicated generally at 450, of averification device in accordance with another exemplary embodiment ofthe present disclosure. Process 450 can be used in conjunction with anyverification device constructed according to the principles of thepresent disclosure and incorporated as part of a system having thefeatures of process 450.

Process 450 begins with a start process 452, where software may beloaded, or firmware access, registers may be cleared, indicators, suchas illuminators 364, 366, and/or 368, are actuated to indicator startupis in progress. Once start process 452 is complete, control passes fromstart process 452 to a receive user biometric process 454.

In receive user biometric process 454, the user's fingerprint is scannedand transmitted by the verification device to the processor for analysisand determination of the user's identity. Once the analysis is complete,control passes from receive user biometric process 454 to a userauthenticated decision process 456. If the user was not authenticated,control passes from user authenticated decision process 456 to aindicate user not authorized process 458, where an indicator, such asilluminators 364, 366, and/or 368 provide an indication that the userwas not authenticated. Control then passes from user not authenticatedprocess 458 to an end process 460, which terminates process flow 450.Returning to user authenticated decision process 456, if the user isauthenticated, control passes from process 456 to an input first codeelement process 462.

In input first code element process 462, a first user code input intothe verification device is transmitted to the processor, which holds thecode for later verification. Control then passes from input first codeelement process 462 to a code complete decision process 464. If a codeis, for example, six code entries, then the code is not complete with asingle entry, and control will pass from code complete decision process464 to receive user biometric 454, and process 450 functions aspreviously described. If a complete input sequence has been received,control passes from code complete decision process 464 to a properaccess code decision process 466.

In proper access code decision process 466, a determination of whetherthe code is a proper access code is determined. In this context, theterm proper means an access code that provides full access to the useras authorized by such a code. If the entered code is a proper accesscode, control passes from proper access code decision process 466 to apermit access/authorization process 468, where predetermined access isprovided to the user. Once access is provided, process 450 is completeand control passes to an end process 460. In an actual device, endprocess 460 is only an end of process 450, and other processes willcontinue to operate.

Returning to proper access code decision process 466, if the access codeis not a proper access code control passes from proper access codedecision process 466 to an alert code decision process 470, where adetermination is made as to whether the code is an alert code. If thecode is not an alert code, control passes from alert code decisionprocess 470 to a display incorrect code process 472, which displays,such as by illuminators 364, 366, and/or 368, an indication that anincorrect code was entered. Control then passes from display incorrectcode process 472 to a re-enter code decision process 474. If the user isgoing to try again, control passes from re-enter code decision process474 to process 454, described hereinabove. If the user is not going totry again, control passes from re-enter code decision process 474 to endprocess 460, also described hereinabove.

Returning to alert code decision process 470, if the user entered codeis an alert code, control can pass to a delay process 476, described inmore detail elsewhere herein. Once delay process 476 is finished,control passes from delay process 476 to end process 460, describedelsewhere herein.

FIG. 15 shows delay process 476 of the process flow of FIG. 14 inaccordance with an exemplary embodiment of the present disclosure. Afterprocess 450 identifies a user entered code as an alert code, controlpasses to a transmit alert process 468, where an alert is transmittedto, for example, a police agency, the FBI, Homeland Security, or otherappropriate authority, indicating that the user is under active threatat the location of the verification device. Such alert can betransmitted via landline, internet, and/or wireless communication. Oncean alert is transmitted, control passes from transmit alert process 478to an activate secondary device process 480.

In activate secondary device process 480, a device such, as a camera,warning lights, or other device associated with an alert can beactuated, activated, or operated. It should be understood that this stepmay not exist or provide functionality in all systems. Once activatesecondary device process 480 is complete, control passes from activatesecondary device process 480 to a set event counter process 482, whichset the event counter to an initial value, such “1.” Control then passesset event counter process 482 to a delay tactic process 484.

The purpose of delay tactic process 484 is to provide properauthorities, as police, FBI, Homeland Security, etc., time to respond tothe location of the authentication device. The delays are intended touse as much clock time, such clocks being integral to the process of,for example, system 400, or available via internet, landline, orwireless communication, as possible. The delays are chosen to berealistic, and are also chosen to minimize the risk of alarming ormaking a hostile individual who might be coercing the user angry andprone to violence. The potential delays can be, for example, a displayindication to re-enter an authorization code, an insufficient fundsindication—even though the associated account has a higher amountavailable, an indication that a transaction is not possible at this timeor is temporarily unavailable, such as might occur with an ATM machinethat is out of money or is malfunctioning, an erroneous display that thetransaction is complete, even though no transaction took place, etc. Asnoted hereinabove, the goal is to delay a suspect as long as possible,trying to make such delays consistent with actual operating occurrencesto reduce the risk that a suspect or coercing individual realizes thatan alert code has been entered. As process 476 is recursive orrepetitive, as should be apparent from the present disclosure, suchdelays are randomly chosen, and can be logically ordered to besequential. For example, one delay may be that communication with theinternet is down and the transaction is not possible at this time. Asubsequent delay could be that an unknown malfunction has occurred and atransaction is not possible at this time. In other words, once aspecific delay is chosen, subsequent delays can be chosen to belogically related to the previous delay. Once a delay tactic is randomlychosen and implemented, control passes from delay tactic process 484 toan event counter decision process 486.

In event counter decision process 486, a determination of whether apredetermined number of events or delays have been reached is made. Suchpredetermination can be a set number, can be randomly chosen upon entryinto process 476, or can be modified based on a randomly chosen delay.Regardless of how the determination of predetermined number of delays ismade, if the number of events has not been reached, control passes to anincrement event counter process 488, where the event counter isincremented by one. Control then passes from increment event counterprocess 488 to delay tactic process 484, which functions as describedhereinabove.

Returning to event counter decision process 486, if the predeterminednumber of events or delays has been reached, control passes to a limitedfunctionality process 490, where limited functionality of a system, suchas system 400, is indicated on a display. Control then passes from eventcounter decision process 486 to an optional requirement for a companionidentification process 492.

In companion identification process 492, if system 400 determines bycamera or other input that a second individual is near the user, and analert code has been entered, system 400 can indicate or display arequirement for the other individual to either move away by apredetermined distance, such as 10 feet, or to move closer to a camerafor companion identification. If a display is available, a more thoroughrequirement can be displayed, again requiring time and indicating to thecoercing individual that the user is not at fault. It should beunderstood that companion identification process 492 is an optionalprocess that can permit the user more privacy, or can potentially gainthe opportunity to identify the coercing individual for laterapprehension. Once companion identification process 492 is complete,control passes to a permit limited functionality process 494.

In permit limited functionality process 494, as the title indicates,limited functionality of, for example, system 400, is provided and maybe indicated on a display, including illuminators 364, 366, and/or 368.Such limited functionality can be, for example, the ability to access alimited amount of money from an ATM, the ability to access a portion offiles on a laptop, the ability to start a vehicle, an indication thatfuel is low or that engine maintenance is required in a vehicle, etc.The goal of limited functionality process 490 is to convince a coercingindividual that the user is trying their best to comply with theirdemands, but the system or apparatus is clearly not operating correctly.Control then passes from process 490 of process 476 to end process 460,as described hereinabove with respect to FIG. 14 .

It should be understood that the present disclosure includes systems inwhich a verification device operates cooperatively with a second device.By way of example, one such system could be a verification device incombination with a fuel pump or fuel line of a vehicle, wherein the fuelpump or fuel line is configured to stop or cutoff fuel flow an alertcode is transmitted. In such an embodiment the assailant can attempt totake the car but the fuel can be shut off immediately to preventoperation, or can be programmed to shut off after a few miles to allowthe victim to find safety while the assailant is stopped miles away fromthe victim, unable to operate the vehicle further. Thus, such anembodiment includes providing limited functionality, as previouslydescribed.

FIGS. 16-21 show views of a verification device, indicated generally at500, in accordance with an exemplary embodiment of the presentdisclosure. Verification device 500 includes a device body 502, whichcan include a housing or casing. Verification device 500 furtherincludes a fingerprint scanner or sensor 504 and a motion sensor 506. Itshould be understood that verification device 500 will either include anintegral processor and non-transitory memory, or will be attached,through a direct connection, by a cable or wire, or wirelessly, to adevice, apparatus, or system that includes a processor andnon-transitory memory, such as system 400 shown in FIG. 13 . In anexemplary process, a finger 508 is positioned on fingerprint scanner orsensor 504, as shown in FIGS. 18 and 19 , and verification device 500reads the fingerprint of finger 508. Verification device 500, or asystem to which verification device 500 is connected or attached,determines whether the fingerprint is that of an authorized user. Anindication that the fingerprint is authorized or accepted, such as thosedescribed elsewhere herein, is provided to the user. The user, now anauthorized user, then positions finger 508 over motion sensor 506, asshown in FIGS. 20 and 21 . Motion of finger 508, which can beside-to-side as shown FIG. 20 or up and down as shown in FIG. 21 , isidentified, and a code or sequence of movement, including the length oftime between movements, is read by motion sensor 506. It should beunderstood that the type of motion depends on the type of motion sensorused. For example, a capacitive type sensor can identify up and downmovement. In another example, one or more optical sensors can identifyside-to-side movement. Once motion sensor 506 receives a completed code,e.g., such as indicated by code complete decision process 464 describedwith respect to FIG. 14 , then the type of code, including alert,limited functionality, and proper authorization for full access, isdetermined. Thus, verification device 500 can operate as previouslydescribed, for example, in FIGS. 14 and 15 .

FIGS. 22-27 show views of a verification device, indicated generally at520, in accordance with an exemplary embodiment the present disclosure.Verification device 520 includes a device body 522, which can include ahousing or casing. Verification device 520 further includes afingerprint scanner or sensor 524, a motion sensor 526, which can beidentical to fingerprint scanner or sensor 504 and motion sensor 506,respectively, and a pressure sensor 528. It should be understood thatverification device 520 will either include an integral processor andnon-transitory memory, or will be attached, through a direct connection,by a cable or wire, or wirelessly, to a device, apparatus, or systemthat includes a processor and non-transitory memory, such as system 400shown in FIG. 13 . In an exemplary process, finger 508 is positioned onfingerprint scanner or sensor 524, as shown in FIGS. 24 and 25 , whilealso pressing on pressure sensor 528, and verification device 520 readsthe fingerprint of finger 508. Verification device 520, or a system towhich verification device 520 is connected or attached, determineswhether the fingerprint is that of an authorized user. An indicationthat the fingerprint is authorized or accepted, such as those describedelsewhere herein, is provided to the user. The user, now an authorizeduser, then positions finger 508 over motion sensor 526, as shown inFIGS. 26 and 27 . Motion of finger 508, which can be side-to-side asshown in FIG. 26 or up and down as shown in FIG. 27 , is identified, anda code or sequence of movement, including the length of time betweenmovements, is read by motion sensor 506. It should be understood thatthe type of motion depends on the type of motion sensor used. Forexample, a capacitive type sensor can identify up and down movement. Inanother example, one or more optical sensors can identify side-to-sidemovement. Pressure sensor 528 can be contacted or pressed or may not becontacted or pressed during motion of finger 508. Furthermore, pressureon pressure sensor 528 may or may not form part of an input code toverification device 520. For example, an input code sequence may be afirst left-right movement while pressing pressure sensor 528, followedby releasing pressing from pressure sensor 528 while performing one ormore additional left-right finger 508 movements. Once motion sensor 526,and in some embodiments, pressure sensor 528, receives a completed code,e.g., such as indicated by code complete decision process 464 describedwith respect to FIG. 14 , then the type of code, including alert,limited functionality, and proper authorization for full access, isdetermined. Thus, verification device 520 can operate as previouslydescribed, for example, in FIGS. 14 and 15 .

FIGS. 28 and 29 show views of a verification device, indicated generallyat 540, in accordance with an exemplary embodiment of the presentdisclosure. Verification device 540 includes a device body 542, whichcan include a housing or casing. Verification device 540 furtherincludes a fingerprint scanner or sensor 544 and a touch sensitive panelof LED's 546. It should be understood that verification device 540 willeither include an integral processor and non-transitory memory, or willbe attached, through a direct connection, by a cable or wire, orwirelessly, to a device, apparatus, or system that includes a processorand non-transitory memory, such as system 400 shown in FIG. 13 . In anexemplary process, finger 508 is positioned on fingerprint scanner orsensor 544, similar to the process described with respect to FIGS. 18and 19 , and verification device 540 reads the fingerprint of finger508. Verification device 540, or a system to which verification device540 is connected or attached, determines whether the fingerprint is thatof an authorized user. An indication that the fingerprint is authorizedor accepted, such as those described elsewhere herein, is provided tothe user. The user, now an authorized user, then contacts individualLED's, each of which is associated with a touch sensitive switch andeach of which is provided with a color, such as red, green, and blue, tofacilitate memorization of an input code. An input code using LED's 548can include input LED 548 position and/or the colors or LED's 548.Verification device 540 receives a sequence of inputs to LED's 548. Oncea completed code is input using LED's 548, e.g., such as indicated bycode complete decision process 464 described with respect to FIG. 14 ,then the type of code, including alert, limited functionality, andproper authorization for full access, is determined. Thus, verificationdevice 540 can operate as previously described, for example, in FIGS. 14and 15 .

FIGS. 30-32 show views of a verification and alert system, indicatedgenerally at 560, incorporating a verification device, indicatedgenerally at 562, in accordance with an exemplary embodiment of thepresent disclosure. Verification device 562 can be included in or on afirst house 564. System 560 further includes an alert station 566positioned or located on or in a second house 568. Verification device562 includes a fingerprint scanner 572 and an ID pad 574. ID pad 574 canbe a keypad or other input device. In the exemplary embodiment of FIG.31 , ID pad 574 includes a plurality of color coded buttons 576. Alertstation 566 includes an alert station body 578, which can include ahousing or casing, a signal light 580, an audible alarm 582, and atransmitter 584. After the authorized user scans their fingerprint usingfingerprint scanner 572, the authorized user is able to enter an alertcode using color coded buttons 576. It should be noted that theauthorized user will not receive any indication that an alert code hasbeen entered, thus an unauthorized person trying to coerce the homeownerinto disarming an alarm or other system by way of verification device562 will be unaware that an alert code is being transmitted.Verification device 562 can be connected to alert station 566 located atsecond house 568 by a wired connection or a wireless connection. Alertstation 566 can actuate signal light 580 and audible alarm 582 as wellas automatically contacts appropriate authorities, such as police,sheriff, etc., by way of, for example, transmitter 584.

FIGS. 33-34 show views of an ATM 600 incorporating a verification device602 in accordance with an exemplary embodiment of the presentdisclosure. Verification device 602 includes a fingerprint scanner 604and an input keypad 606, which can include touch sensitive buttons thatincorporate LED's. As with other embodiments described herein, a userscans a finger. Once the finger is authenticated, the user isauthenticated, and is then able to enter an alert code into input keypad606 without an unauthorized user being aware of the alert code. Thealert code can be transmitted as shown in FIG. 13 and described inassociated text.

FIGS. 35-38 show views of a system incorporating a verification device,indicated generally at 430, in accordance with an exemplary embodimentof the present disclosure. Verification device 430 is connected via, forexample, an intranet (not shown) to a programmable coding apparatus,indicated generally at 432, in accordance with an exemplary embodimentof the present disclosure. Verification device 430 includes afingerprint scanner 434 and a keypad 436, both of which can function asdescribed elsewhere herein. Programmable coding apparatus 432 includes afingerprint scanner 438, a keypad that can be identical to the keypad onverification device 430, a camera 438, and a display 440. Programmablecoding apparatus 432 can be located at, for example, a front desk 442.When a user checks into a hotel or motel, or other establishment, theuser scans their fingerprint using programmable coding apparatus 432.Camera 438 can take a picture of the user as well. Once programmablecoding apparatus 432 acquires a fingerprint, the user becomes anauthenticated user and can enter one or more codes into keypad 436 ofprogrammable coding apparatus 432. In an exemplary embodiment, theauthorized user selects at least 2 codes, one for regular operation andone for alert, and preferably one for limited functionality. The codesare associated by a clerk with a hotel room number, and the informationentered by the authorized user is stored, for example, in non-transitorymemory 408. If the authorized user sees suspicious activities or anassailant follows the user, and attempts to force entry, the authorizeduser then inputs the alert code chosen by the user, which despiteopening the door, will also contact security at the hotel (indicatinghotel guest at risk), and if the limited functionality code is entered,there is a delay in opening the door, which may provide sufficient timeto allow security to arrive before assailant enters the hotel room.Thus, verification device 430 and programmable coding apparatus 432 incombination form a security system for the authorized user.

FIG. 39 shows a view of yet another system in the form of a safe,indicated generally at 620, incorporating a verification device 622 inaccordance with an exemplary embodiment of the present disclosure.Verification device 622 includes a fingerprint scanner 624 and an inputkeypad 626, both of which function similar to fingerprint scanners andinput keypads described elsewhere herein. As with other embodiments, analert code entered into input keypad 626 can send a signal, wirelesslyor by wired connection, to authorities or a security service. It shouldbe apparent that any system that includes a processor, as does system620, includes an internal clock 628. In one embodiment, a limitedfunctionality code input can delay-opening of system 620 by apredetermined interval to provide time for a security or policeresponse.

FIGS. 40-42 show views of a verification device, indicated generally at640, in accordance with an exemplary embodiment of the presentdisclosure. Verification device 640 includes a fingerprint scanner 642or other biometric device, and a sensor 644 configured to identifygestures, such as a camera or touch sensitive array. Fingerprint scanner642 can function as described elsewhere herein. Sensor 644 is configuredto identity a gesture corresponding to a letter. In an exemplaryembodiment, the letter could be C for safe (normal operation), letter Dfor limited functionality, and letter E for alert.

FIGS. 43-45 show views of a verification device, indicated generally at650, in accordance with an exemplary embodiment of the presentdisclosure. Verification device 650 includes a palm prim reader orscanner 652 and a sensor 654 configured to identify gestures and/orshapes. Sensor 654 can be, for example, a camera or other input device.To authenticate a user, the user first places a hand 656 over palm printreader or scanner 652. The grooves and lines on the palm of hand 656provide unique biometric identification of the user. Once the user isidentified, the user makes one or more gestures, such as forming a shapewith hand 656 or positioning hand 656 in a predetermined arrangement orconfiguration. Verification device 650 thus uses the biometricidentification of hand 656 in combination with a user-defined gesture,hand shape, or hand configuration to authenticate the user. In addition,the user can predefine gestures, hand shapes, or hand configurations toindicate regular operation, alert, or limited functionality. While palmprint reader or scanner 652 and sensor 654 are shown as two separateelements, it should be understood that reading a palm print and readinga gesture, hand shape, or hand configuration can be performed by thesame device, in which case only one sensing element can be used.Furthermore, it should be understood that while authentication isperformed as sequential steps of identifying a palm print followed by ahand gesture, hand shape, or hand configuration, both functions can beperformed simultaneously, with the palm print of one hand being scannedwhile a hand gesture, hand shape, or hand configuration of the otherhand is input. It should also be understood that either the left hand orthe right hand or both can be used for purposes of scanning a palm printand inputting a hand gesture, hand shape, or hand configuration.

FIGS. 46 and 47 show views of a further system, indicated generally at670, incorporating a verification device in accordance with an exemplaryembodiment of the present disclosure. System 670 is configured as apoint-of-purchase system incorporating biometric authentication.Point-of-purchase system 670 includes a payment device or apparatus 672,such as a cash register or an automated self-checkout payment stationthat accepts cash and credit cards, and a communication network 674,which can be wireless or wired, that connects to a financial institution682, which can be a virtual institution or a physical, brick-and-mortarinstallation. Point-of-purchase system 670 further includes a biometricverification device 676. Biometric verification device 676 includes afingerprint scanner 678 and an input keypad 680. As with previouslydescribed embodiments, a user first places a finger on fingerprintscanner 678. Once biometric verification device 676 identities the user,then input keypad 680 is activated. In an exemplary embodiment, inputkeypad 680 includes a touch sensitive surface 684 that also functions asa display. In the exemplary embodiment of FIG. 46 , touch sensitivesurface/display 684 is activated and four shapes 686 appear. The usertouches one or more shapes in a sequence that corresponds, for example,to regular operation. If biometric authentication or verification device676 is able to authenticate the user and operation is in normal,regular, or fully functional mode, point-of-sale system 670 communicateswith financial institution 682 by way of communication network 674 toconfirm funds are available for purchase.

FIGS. 48-51 show views of a verification device, indicated generally at700, in accordance with an exemplary embodiment of the presentdisclosure. Biometric verification device 700 includes a fingerprintscanner 702. In contrast to using a fingerprint followed by input via akeypad, as described in some embodiments described herein, the sequenceof fingers or a specific finger scanned determines how biometricverification device 700 operates. For example, when an index finger 704is scanned, as shown in FIG. 49 , verification device 700 activates analert mode, which can function in a manner similar to alert modesdescribed elsewhere herein. In another example, when a middle finger 706is scanned, as shown in FIG. 50 , verification device 700 activates aregular, normal, or fully functional operation mode, which can operatein a manner similar to regular, normal, or fully functional operationmodes described elsewhere herein. In yet another example, when a ringfinger 708 is scanned, as shown in FIG. 51 , verification device 700activates a limited functionality mode, which can operate in a mannersimilar to limited functionality modes described elsewhere herein. Itshould be understood that any of the five fingers alone or incombination can be used, such as index finger 704 followed by ringfinger 708 to indicate a certain operation, or middle finger 706followed by index finger 704 to indicate another operation, and thelike. It should also be understood that the combination of fingers canincludes fingers from either or both hands.

A human face can provide unique identification and be used as abiometric input for identification. FIGS. 52-54 show views of a facialidentification and expression recognition device, indicated generally at720, in accordance with an exemplary embodiment of the presentdisclosure that relies upon a combination of facial recognition andfacial expressions. Biometric authentication device 720 includes acamera 722 or other similar device for acquiring images of a face 724.Facial expressions can include, fair example, a grimace, as, shown inFIG. 53 , and a smile, as shown in FIG. 54 , each of which correspond toa predetermined or predefined mode of operation. In an exemplaryembodiment, a relaxed or no facial expression, such as that shown inFIG. 52 , can indicate an alert mode, a duck or angry expression, suchas that shown in FIG. 53 , can indicate a normal, regular, or fullyfunctional mode of operation, and a smiling face, such as that shown inFIG. 54 , can indicate a limited functionality mode. Each of these modescan be as described elsewhere herein. To avoid an assailant recognizingthe facial expression, biometric authentication device 720 can includean automated computer system that sends to email or text to the user atpredetermined intervals, such as daily, weekly, monthly, etc.,indicating the facial expressions associated with regular mode, alertmode, and limited functionality mode. An additional camera (not shown)and software can be incorporated in biometric authentication device 720and adapted to identify other facial expressions, such as grimaces.

FIGS. 55-60 show views of a verification device, indicated generally at730, and a system incorporating the verification device in accordancewith an exemplary embodiment of the present disclosure. Verificationdevice 730 includes a fingerprint scanner 732 and an input keypad 734.Input keypad 734 includes a plurality of pressure sensitive switches orbuttons 736. Verification device 730 is positioned in a vehicle 738 andis configured to operate with one or more vehicle 738 systems. Tooperate vehicle 738, a user first places a finger 740 on fingerprintscanner 732. After verification device 730 identifies the user, the useractuates one or more pressure sensitive inputs 736 to complete theauthentication process. If a code corresponding to limited functionalityis input, a processor, such as processor 406 described elsewhere herein,can be configured to show a false reduced or no fuel level on a fuelgauge 742, such as that shown in FIG. 58 . In addition, a fuel lowwarning light (not shown) can be actuated, potentially causing anunwanted passenger to abandon the vehicle. In addition, the processorcan be programmed to shut off a fuel pump or stop flow through a fuelline after a predetermined interval. In an exemplary embodiment, aspecialized light 744, which is positioned on vehicle 738 in a locationthat is not visible by the driver or a passenger, can be illuminated,indicating vehicle 738 is being robbed or a kidnapping is in progress.In another exemplary embodiment, combinable with one or more previouslydescribed embodiments, a reduced functionality code input intoverification device 730 can cause a valve 746 installed in an exhaustsystem 748 to close, blocking the exhaust from exiting exhaust system748, which eventually causes an engine of vehicle 738 to stall and ceaseoperation. It should be apparent that valve 746 can be closed slowlysuch that performance of vehicle 738 becomes increasingly worse beforestalling completely.

FIG. 61 shows a view of a verification device, indicated generally at770, in accordance with an exemplary embodiment of the presentdisclosure. Verification device 770 includes an iris, retina, or ocularscanner 772 and a camera 774, which can be a digital camera, positionedin a device body 776. Thus, verification device 770 can be described asan ocular verification device. Though camera 774 is shown, it should beunderstood from the description hereinbelow that camera 774 could bereplaced with an infrared scanner, a motion sensor, or other deviceconfigured to identify blinking. In addition, ocular verification device770 can include features from other embodiments described herein, suchas lights to indicate various operation modes. In a manner similar tofingerprint verification device embodiments, ocular verification device770 includes ocular, iris, or retina scanner 772 to identify the user,i.e., body identification, and once the body is positively identified,which can be indicated by a light such as an LED, ocular verificationdevice 770 activates camera 774 to monitor the eye for a predeterminedperiod. During the predetermined period, the user blinks voluntarily, orpreferably the user closes the eye completely voluntarily. For example,to initiate a normal, regular, or fully functional mode of operation theuser can closes a single 778 three times in a row sequentially, i.e.,non-stop. For an alert mode or a limited functionality mode, the usercan close eye 778 four times, with each closure spaced 5 seconds apart.Ocular verification device 770 is configured to identify the blinkingcode(s) for a user and to provide instructions, from opening the safe tocalling the police, as disclosed in other embodiments. In an alternativeembodiment, a motion sensor coupled to a processor or controller andadapted to identify motion within predetermined period can be used in asimilar manner. Likewise, an infrared imaging detector can be adapted toidentify changes in temperature over time, and in this embodiment abaseline thermal image of the face, and in particular the eye iscaptured. The cornea of the eyeball has a distinct temperature, and withclosure of the eye (i.e., blinking), the thermal image of the corneadisappears indicating closure of the eye or blinking. The infrareddetector coupled to a processor or controller is adapted to identifychanges to thermal image within certain period of time, and instructionsprovided in a similar manner, as for fingerprint verification device.

It should be understood that in appropriate embodiments presentedhereinabove, a numerical touch screen or key pad can be combined with abiometric device. In this alternative embodiment, the fingerprint isscanned, which activates the numerical keypad, and three codes representthree modes. For example, pressing number 1 indicates normal, regular,or fully functional operation, pressing number 5 indicates an alertmode, and pressing number 8 indicates limited functionality, inaccordance to the principles of the present disclosure. It shouldfurther be understood that while a single digit is used as an example,two or more digits can be used for each code.

It should also be understood that a numerical touch screen or key pad,without biometric device, can be used as an authorizing device, and inthis alternative embodiment three codes represent three modes. Forexample, pressing 1 and 3 indicates normal, regular, or fully functionaloperation, pressing 5 alone indicates an alert mode, and pressing 7 and8 indicates a limited functionality mode, in accordance to theprinciples of the present disclosure.

It should be further understood that a combination of an ID card andfingerprint scanning can be used, and the sequence of identificationevents activate a certain mode. By way of example, if the user placesfirst his ID card in the reader and then the fingerprint is scanned, andthen the card is scanned again indicates regular operation, but if theuser places his finger first and then followed by the ID card indicatesalert mode, and if the user scan the ID card twice activates limitedfunctionality mode.

Though certain embodiments disclosed herein describe a pressure sensor,it should be apparent that other sensors could be used in place of apressure sensor, though without the ability to measure pressure level.For example, motion sensors could indicate movement of a body part, oran optical sensor could detect light levels that occur by a body partblocking and unblocking an input. It should also be apparent thatpressure sensors can include piezoelectric type sensors. Thus, anycombination of sensors and biometric devices capable of measuring orreceiving a human input are within the scope of the invention.

It should also be apparent that if verification and authentication aredenied that an embodiment with a camera can be configured to acquire animage of the unauthorized user.

While various embodiments of the disclosure have been shown anddescribed, it is understood that these embodiments are not limitedthereto. The embodiments may be changed, modified, and further appliedby those skilled in the art. Therefore, those embodiments are notlimited to the detail shown and described previously, but also includeall such changes and modifications.

I claim:
 1. A method for biometrically identifying and authenticating aunique user comprising: a. contacting a first fingerprint sensor with adistal end of a first finger on a first hand and contacting a secondfingerprint sensor with a distal end of a second finger on the firsthand, a first pressure sensor positioned on a left side of the firstfingerprint sensor and a second pressure sensor positioned on a rightside of the first fingerprint sensor, a third pressure sensor positionedon a left side of the second fingerprint sensor, and a fourth pressuresensor positioned on a right side of the second fingerprint sensor suchthat the second and third pressure sensors are positioned directlybetween the first fingerprint sensor and the second fingerprint sensorwhen viewed from a direction perpendicular to the first fingerprintsensor and the second fingerprint sensor, each of the distal ends of thetwo fingers contacting a respective one of the first fingerprint sensorand the second fingerprint sensor, acquiring a fingerprint from each ofthe first fingerprint sensor and the second fingerprint sensor, anddetermining and authenticating an identity of a person from thefingerprints, and b. performing at least one of, as follows, rocking ormoving from a left side to a right side the two fingers on the firsthand while maintaining contact of the distal ends of the first fingerand the second finger with the first fingerprint sensor and the secondfingerprint sensor, the at least one of the rocking, or moving from aleft side to a right side, causing contact of the two fingers on thefirst hand in a predetermined sequence with at least one of the firstpressure sensor, the second pressure sensor, the third pressure sensor,and the fourth pressure sensor to activate the contacted at least one ofthe first pressure sensor, the second pressure sensor, the thirdpressure sensor, and the fourth pressure sensor, wherein when thepredetermined sequence indicates the presence of an unauthorized user,an alert is sent to a security entity as a result of entry of thepredetermined sequence, and wherein the rocking or the moving from aleft side to a right side is performed along a pair of curvilinearsurfaces, each of the curvilinear surfaces including a respective one ofthe first and second fingerprint sensors and a respective pair of thefirst pressure sensor, the second pressure sensor, the third pressuresensor, and the fourth pressure sensor.
 2. The method of claim 1,further comprising, in addition to performing the at least one of therocking or the moving from a left side to a right side, performing theother of the rocking or the moving from a left side to a right side, andperforming the rocking and the moving the two fingers from the left sideto the right side in combination.
 3. The method of claim 1, furthercomprising using a second hand.
 4. The method of claim 1, wherein therocking and the moving from a left side to a right side are bothperformed, and the actuating occurs in an alternative pattern from theperformance of the rocking and the moving the two fingers from the leftside to the right side from the first hand.
 5. The method of claim 3,wherein the rocking and the moving from a left side to a right side areboth performed, and the actuating occurs in an alternative pattern fromthe performance of the rocking and the moving the two fingers from theleft side to the right side from the first hand, and at least one fingerfrom the second hand on a first, left side and a second, right side. 6.The method of claim 1, further comprising sensing of an applied pressurefrom the first hand on a first, left side.
 7. The method of claim 3,further comprising sensing of an applied pressure from the first handand the second hand on a second, right side.
 8. The method of claim 1,wherein authorizing of the unique user occurs when the two fingers fromthe first hand are removed from the two fingerprint sensors.
 9. Themethod of claim 3, wherein authorizing of the unique user occurs whenthe two fingers from the first hand and the two fingers from the secondhand are removed from corresponding fingerprint sensors on a first, leftside and a second, right side.
 10. The method of claim 1, wherein eachof the first pressure sensor and each of the second pressure sensor arepositioned at a location that is a spaced distance vertically above arespective fingerprint sensor when the fingerprint sensors are orientedhorizontally and facing upwardly, the vertical direction being adirection perpendicular to a surface containing the fingerprint sensor.11. A method for biometrically identifying and authenticating a uniqueuser comprising: contacting a fingerprint sensor facing in a firstdirection with a finger, the fingerprint sensor positioned in adepression that extends from an edge of a device, the first directionbeing a direction that is perpendicular to a center of a contact pad ofthe fingerprint sensor, acquiring a fingerprint from the fingerprintsensor, determining and authenticating an identity of a person from thefingerprint, moving the finger to contact a first pressure sensor thatfaces in a second direction that is angled toward the first direction,the second direction being a direction that is perpendicular to acontact surface of the first pressure sensor, and then moving the fingerto contact a second pressure sensor that faces in a third direction thatis angled toward the first direction and the second direction, the thirddirection being a direction that is perpendicular to a contact surfaceof the second pressure sensor, wherein when the first pressure sensorand the second pressure sensor are contacted in a predetermined sequenceindicating the presence of an unauthorized user, an alert is sent to asecurity entity as a result of entry of the predetermined sequence, andwherein movement of the finger is along a curvilinear surface thatincludes the fingerprint sensor, the first pressure sensor, and thesecond pressure sensor.
 12. The method of claim 11, wherein the fingermaintains contact with the fingerprint sensor while contacting the firstpressure sensor and the finger maintains contact with the fingerprintsensor while contacting the second pressure sensor.
 13. The method ofclaim 11, wherein when contacting the first pressure sensor and thesecond pressure sensor in the predetermined sequence indicates thepresence of an authorized user, access is authorized.
 14. The method ofclaim 13, wherein the access is authorized to one of a room, a building,a device, an apparatus, a system, a document, a financial transaction, apurchase, wireless services, internet services, and a vehicle.
 15. Themethod of claim 11, wherein the predetermined sequence provides limitedaccess of limited functionality of one or more of a building, device,apparatus, system, document, financial transaction, purchase, wirelessservice, internet service, and a vehicle.
 16. A method for biometricallyidentifying and authenticating a unique user comprising: contacting afingerprint sensor with a distal end of a finger and determining andauthenticating an identity of a person from the fingerprint located onthe distal end of the finger, the fingerprint sensor located in a recessand extending longitudinally in a first direction to accommodate thefinger along the first direction, moving the finger to contact a firstpressure sensor positioned only to a first side of the fingerprintsensor while maintaining contact of the distal end of the finger withthe fingerprint sensor, the first pressure sensor positioned on a firstcurvilinear surface forming a first side of the recess, and moving thefinger to contact a second pressure sensor positioned only to a second,opposite side of the fingerprint sensor from the first side of thefingerprint sensor such that the fingerprint sensor is positioneddirectly between the first pressure sensor and the second pressuresensor, wherein the contact of the finger with the second pressuresensor is performed while maintaining contact of the distal end of thefinger with the fingerprint sensor, the second pressure sensorpositioned on a second curvilinear surface forming a second side of therecess opposite to the first side of the recess, wherein when the firstpressure sensor and the second pressure sensor are contacted in apredetermined sequence indicating presence of an unauthorized user, analert is sent to a security entity as a result of entry of thepredetermined sequence, and wherein each of the first pressure sensorand the second pressure sensor protrudes from directly adjacent surfacesof a respective curvilinear surface.
 17. The method of claim 1, whereinthe first fingerprint sensor extends along a first direction, the firstdirection being a direction that is parallel to a direction of the firstfingerprint sensor configured to receive the first finger and thatextends through a midpoint between the first pressure sensor and thesecond pressure sensor, and the second fingerprint sensor extends alonga second direction that is non-parallel with the first direction, thesecond direction being a direction that is parallel to a direction ofthe second fingerprint sensor configured to receive the second fingerand that extends through a midpoint between the third pressure sensorand the fourth pressure sensor.