Apparatus, methods and systems for integrated workforce management and access control

ABSTRACT

Apparatus, systems and methods for managing a workforce working from a single or multiple locations through software and hardware components integrated under a modular solution for workforce management tasks, such as worker&#39;s biometric recognition, hiring, enrollment, time and attendance capturing, access control, tracking and managing schedules, overtime, leaves, holidays, absence, breaks, official and personal time-outs, trainings, assets, vehicles and transport, work orders and tasks, payroll and performance management, and reporting.

RELATED APPLICATIONS

This application claims priority to U.S. Provisional Patent ApplicationNo. 61/780,831 filed Mar. 13, 2013, the entire content of which ishereby incorporated by reference.

FIELD

Embodiments of the present invention relate to the field of workforcemanagement and, more specifically, to the field of worker recognition,time and attendance capturing, access control, multi-location tracking,workforce billing and payroll distribution.

BACKGROUND

Workforce management systems strive to integrate employee time andattendance capturing, human resource management, access control andpayroll in one solution. Integrating some of these functionalities canbe tedious and costly. Furthermore, integrating workforce managementproducts from different suppliers create challenges that often do notresult in a satisfactory solution and leave most of the workforcemanagement requirements unaddressed.

SUMMARY

Accordingly, embodiments of the invention provide a combination ofhardware and software tools and processes which interact with a user tosolve workforce management challenges for workforces as small as fiveworkers or as large as tens of hundreds or thousands of workers workingfrom different locations in different time zones, in fixed or rotatingshifts, and during regular time or overtime. The workers may move fromone company location to another or even work from client locations andbelong to all courses of different verticals, professions, ranks andpositions. Workers may be illiterate, digitally challenged or highlyqualified, may speak or read different languages, or may have a physicalor biometric disability.

Embodiments of the invention may be modular and seamlessly integratedinto human resource, payroll, customer relationship, enterprise resourceplanning, banking, supply chain, warehouse, asset, infrastructure,training, access control, production, administration and securitymanagement systems that overlap various components of workforcemanagement.

One embodiment of the invention provides a method of performingworkforce management. The method is performed by a biometric scanningdevice and includes receiving, a plurality of biometric templates,wherein each of the plurality of biometric templates is associated withan individual and storing the plurality of biometric templates to aninternal memory. The method also includes switching to a detection mode,capturing an image of a subject, processing the image to identify aface, and processing the image to identify an eye included in theidentified face. In addition, the method includes comparing theidentified face to at least one of the plurality of biometric templatesstored on the internal memory to identify a first match, comparing theidentified eye to at least one of the plurality of biometric templatesstored on the internal memory to identify a second match, comparing thefirst match and the second match to determine an identify of thesubject, and when an identity of the subject is determined, outputtinginformation.

Another embodiment of the invention provides a system for performingworkforce management. The system includes a biometric scanning deviceincluding a camera and memory and a server. The server stores aplurality of biometric templates and is configured to transmit theplurality of biometric templates to the biometric scanning device. Eachof the biometric templates is associated with a different individual.The biometric scanning device is configured to receive the plurality ofbiometric templates from the server and store the plurality of biometrictemplates to an internal memory. The biometric scanning device is alsoconfigured to switch to a detection mode, capture an image of a subjectusing the camera, process the image to identify a face, and process theimage to identify an eye included in the identified face. In addition,the biometric scanning device is configured to compare the identifiedface to at least one of the plurality of biometric templates stored onthe internal memory to identify a first match, compare the identifiedeye to at least one of the plurality of biometric templates stored onthe internal memory to identify a second match, compare the first matchand the second match to determine an identify of the subject, and whenan identity of the subject is determined, output information.

Yet another embodiment of the invention provides a system for performingworkforce management. The system includes a left eye, right eye, and 3Dface based multi-biometric scanning device and a server. The serverstores a plurality of biometric templates and is configured to transmitthe plurality of biometric templates to the biometric scanning device.Each of the biometric templates is associated with an individual. Thebiometric scanning device is configured to identify an individual basedon the plurality of biometric templates and integrate with at least oneof the following components: a radio frequency identification reader, acomputing device providing a policy override function, a computingdevice displaying a survey, a payroll system, a cash dispensing machine,a vending machine, a metal detector, a mobile telephone transmitting aremote access instruction, a mobile telephone performing videoconferencing, a palm vein reader, one or more proximity sensors fordetecting individuals entering or leaving the area, and a pair ofaugmented-reality glasses.

Additional embodiments of the invention can provide an eyes andthree-dimensional (“3D”) face biometric scanner based access controlsystem that shares the “IN” or “OUT” access status of each user with allbiometric scanning devices on the same network, an eyes and 3D facebiometric scanner based access control system that does not allow thesame user to have multiple “IN” or multiple “OUT” access statuses in arow to prevent tailgating event, an eyes and 3D face biometric scannerbased access control system that prevents tailgating events, a buildingstructure with open passage that prevents sun light from reaching thebiometric scanner to control the lighting conditions, an eyes and 3Dface biometric system that is designed on a TI DaVincci and/or a IntelNUC platform, an eyes and 3D face biometric device, which shifts to a“Face Only” mode when eyes are not accepted, an biometric device inwhich templates can be divided among different scanning groups, an eyesand 3D face biometric device, that integrates with a palm/vein biometricplug-in, an eyes and 3D face biometric device that divides, stores, andsearches the templates based on gender, a biometric device that pushescollected data to a server wherein the server is also configured to pulldata from the device in combined, and combinations thereof.

Other aspects of the invention will become apparent by consideration ofthe detailed description and accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 a schematically illustrates a workforce management system.

FIG. 1 b illustrates access control points used in a workforcemanagement system.

FIG. 1 c illustrates traffic flow and setup of a workforce managementsystem.

FIG. 1 d illustrates a controlled lighting environment design for face,retina, and/or iris scanning

FIG. 2 illustrates a biometric scanning device.

FIG. 3 is an exploded view of the device of FIG. 2.

FIG. 4 schematically illustrates the device of FIG. 2.

FIG. 5 schematically illustrates performing face recognition undersunlight.

FIGS. 6 and 7 are flowcharts illustrating a process for performingworker recognition.

FIG. 8 is a flowchart illustrating a process for extending templategroups used by the device of FIG. 2.

FIG. 9 a schematically illustrates performing palm recognition.

FIG. 9 b is a flowchart illustrating a process for performing palmrecognition.

FIG. 10 a is a flowchart illustrating a data pull method performed bythe device of FIG. 2.

FIG. 10 b is a flowchart illustrating a data push method performed bythe device of FIG. 2.

FIGS. 11 a and 11 b schematically illustrate a height-adjustingbiometric scanning device.

FIG. 11 c schematically illustrates a position-adjusting biometricscanning device.

FIG. 11 d is a flowchart illustrating a height-adjustment processperformed by the devices of FIGS. 11 a and 11 b.

FIG. 11 e is a flowchart illustrating a position-adjustment processperformed by the devices of FIGS. 11 c.

FIG. 12 a illustrates a biometric scanning device connected directly toan electric lock.

FIG. 12 b illustrates a biometric scanning device connected indirectlyto an electric lock through computing device.

FIG. 12 c is a flowchart illustrating a method for checking accesspolicies and rules with the devices of FIGS. 12 a and 12 b.

FIG. 13 is a flowchart illustrating a method for using surveys with thedevices of FIG. 12 b.

FIG. 14 a is a flowchart illustrating a method for performingmulti-status physical access control.

FIG. 14 b is a flowchart illustrating a method for performingmulti-status non-physical access control.

FIG. 14 c illustrates a system for performing multi-status non-physicalaccess control.

FIG. 15 a illustrates a biometric scanning device used to perform assetprotection.

FIG. 15 b is a flowchart illustrating a method for performing assetprotection.

FIG. 16 a illustrates a metal detector combined with a biometricscanning device.

FIG. 16 b is a flowchart illustrating a method of using a metal detectorwith a biometric scanning device.

FIG. 17 is a flowchart illustrating a method of playing a worker's nameafter successful use of a biometric scanning device.

FIG. 18 is a flowchart illustrating an emergency disaster recoverymethod.

FIG. 19 is a flowchart illustrating a method of performing remote lockoperations.

FIGS. 20 and 21 are flowcharts illustrating payment methods performedwith a biometric scanning device.

FIG. 22 is a flowchart illustrating a triggered-reporting method.

FIG. 23 illustrates a vending machine integrated with a biometricscanning device.

FIG. 24 a is a flowchart illustrating a method of performing fieldworker management.

FIG. 24 b schematically illustrates a field biometric scanning device.

FIG. 25 is a flowchart illustrating a method of using a portablebiometric scanning device.

FIG. 26 a is a flowchart illustrating a method of performing visitormanagement.

FIG. 26 b schematically illustrates a visitor management console.

FIG. 27 is a flowchart illustrating a method of performing blacklisteddetection.

FIG. 28 is a flowchart illustrating a method of identifying a user'sstatus.

FIG. 29 a is a flowchart illustrating using augmented-reality glasseswith workforce management.

FIG. 29 b schematically illustrates augmented-reality glasses.

DETAILED DESCRIPTION

Before any embodiments of the invention are explained in detail, it isto be understood that the invention is not limited in its application tothe details of construction and the arrangement of components set forthin the following description or illustrated in the following drawings.The invention is capable of other embodiments and of being practiced orof being carried out in various ways.

It should be noted that a plurality of hardware and software baseddevices, as well as a plurality of different structural components maybe utilized to implement the invention. Furthermore, and as described insubsequent paragraphs, the specific configurations illustrated in thedrawings are intended to exemplify embodiments of the invention and thatother alternative configurations are possible.

As noted above, embodiments of the present invention providecomputer-implemented methods and systems for managing a workforceeffectively. Embodiments may be configured separately or in acombination to reduce operational costs, manage access control, enforceorganizational policies and increase efficiency of the workforce at asingle or multiple locations while minimizing the elements of fraud andinaccuracy. Embodiments may also integrate with existing and alliedsystems, such as human resource (“HR”), payroll, customer relationship,enterprise resource planning, banking, supply chain, warehouse, asset,infrastructure, training, access control, production, administration andsecurity management systems that overlap various components of workforcemanagement.

FIG. 1 a illustrates a workforce management system 10 providingintegrated access control. The system 10 includes a server 12 that hostsserver software and related tools connected over a connection 14, suchas a TCP/IP connection, to one or more access control points 16. Anaccess control point 16 can be installed at a worker entrance of abuilding. For example, in one embodiment, one access control point 16can be used for inward pedestrian worker traffic and another accesscontrol point 16 can be used for outward pedestrian worker traffic. Eachaccess control point 16 includes a biometric scanning device 20(hereinafter referred to as the “device 20”) and anelectromagnetic/electric barrier or gate 22 (hereinafter referred to asthe “turnstile 22”). As described in more detail below, each accesscontrol point 16 (e.g., the device 20) is configured to collectinformation about workers (e.g., time and attendance data) and controlaccess to a particular premises according to administrative, HR, fireand security, payroll, or other policies set by management. As describedin more detail below, the biometric scanning device 20 can be configuredto scan one or more portions of a subject (e.g., using one or morebiometric scanners). For example, the device 20 can include a left eye(iris and/or retina), right eye (iris and/or retina), andthree-dimensional (“3D”) face based multi-biometric scanning device.Different combinations and/or other portions of a subject can also bescanned with the device 20 (e.g., finger prints, veins, etc.).

FIG. 1 b illustrates different types of access control points 16 withdifferent combinations of devices 20 and turnstiles 22. For example, atripod turnstile 22 can be used with one device 20 for both inward andoutward traffic. A tripod turnstile 22 can also be used with a separatedevice 20 for inward and outward traffic (see FIG. 1 b(A)). Asillustrated in FIG. 1 b(B), a full height turnstile 22 can also be usedwith one or more devices 20 (see FIG. 1 b(B)). In other embodiments, abutterfly-wing-gate turnstile 22 can also be used with two passages andfour devices 20 (see FIG. 1 b(C)) or with two passages and two devices20 (see FIG. 1 b(D)). As illustrated in FIGS. 1 b(E) and 1 b(F), aninfrared-door-type turnstile 22 or infrared-pillar-type turnstile 22 canbe used with one or more devices 20. Also, an access-control-door-lockturnstile 22 can be used with one or more devices 20 (see FIG. 1 b(G)).

FIG. lc schematically illustrates an access room 30 used as a passagefor inward and outward pedestrian traffic located at an entrance to anarea 31. The room 30 can be divided in three sections. One section isassigned for inward traffic, one section is assigned for outwardtraffic, and one section is assigned for an office 32. Two or moreaccess control points 16 are installed in the room 30 (e.g., one or morein each passage). For inward traffic, a device 20 can be installed onthe left side of a turnstile 22, and, for outward traffic, a device 20can be installed on the right side of a turnstile 22.

In some embodiments, the walls of the room 30 are constructed withopaque material, and at least a portion of the walls of the office 32(e.g., the walls facing the access control points 16) are transparent orinclude transparent windows. The office 32 provides space for one ormore officers to service queries of workers, such as through a window34, installed on each side of the office 32 (e.g., to cater to bothinward and outward traffic). A door of the office 32 can be installed onthe passage side of the outward traffic.

The room 30 can include four doors. The four doors can be kept open foreasy flow of pedestrian traffic in scheduled traffic times. Other doorsand passages to the area 31 can be locked and not used except foremergencies. In some embodiments, personal areas, such as a cafeteria,washrooms, a locker room, a smoking area, and prayer rooms, are keptoutside the area 31.

The access control points 16 in the room 30 integrate the functions ofaccess control and workforce management. In particular, the points 16automatically capture time, attendance, and access data, whicheliminates the need for a worker to physically clock-in and clock-out,which a worker can otherwise forget to do or can do improperly. Inparticular, every clock-in and clock-out is captured separately by theaccess control points 16, which eliminates human error associated withthis process, such as buddy-punching fraud (i.e., when your “buddy”fraudulently clocks you “IN” or “OUT”). The arrangement of the points 16in the room 30 also implements queue management, provides visibility andcontrol to officers on duty, caters to workers' access-related requests,and offers better ventilation for temperature settings associated withthe system 10.

FIG. 1 d illustrates lighting conditions for the room 30. As illustratedin FIG. 1 d, opaque walls 38 in the room 30 serve as light barriers evenas the sun changes positions to prevent sunlight 39 from reaching theareas where the devices 20 are installed. Therefore, the floor plan ofthe room 30 and the position of the opaque walls 38 efficiently controllighting conditions for the devices 20, which is an important factor forproper functioning of the devices 20 (e.g., when performing face, iris,or retina scanning)

The device 20 is configured to recognize workers through their eyes andface (e.g., 3D facial recognition) to clock-in to and clock-out of theirplace of employment as part of a time and attendance component of thesystem 10. Therefore, workers use the devices 20 to mark theirattendance and gain access to various areas. As illustrated in FIGS.2-3, the device 20 includes a housing front 40 and a housing back 42, adigital signal processing (“DSP”) board 44, a camera board 46, a scannerinfrared illuminator board 48, a keypad 50 (forming part of a userinterface 51 of the device 20), a liquid crystal display (“LCD”) screen52, a radio frequency identification (“RFID”) antenna 54, a speaker 56,and a power light emitting diode (“LED”) 58. The housing back 42 issupported by right and left exhaust window covers 42 a and a bottomexhaust window 42 b.

FIG. 4 schematically illustrates components of the device 20. Asillustrated in FIG. 4, and as previously illustrated in FIGS. 2-3, thedevice 20 includes the DSP board 44, the camera board 46, the scannerinfrared illuminator board 48, the keypad 50, the LCD screen 52, theRFID antenna 54, the speaker 56, and a power LED 58 with a AC/DCconverter 59.

The DSP board 44 contains a plurality of devices connected to anembedded processor 60. The processor 60 performs the processing,communicating, and controlling of the components connected to the board44 and/or included in the device 20. In some embodiments, the processor60 includes a digital signal processor and/or an ARM-based or ×822-basedmicroprocessor. In some embodiments, the processor 60 can also be avariant of a DSP. For example, the processor 60 can include a DSP, suchas the TMS320DM642 or TMS320DM6446 or any single of dual core ARM-basedor ×86-based processor and DSP combination, manufactured by TexasInstruments, ARM licensed manufacturers, and Intel Inc.

The device 20 includes one or more input, output, and auxiliary devicesthat connect to the processor 60. For example, the processor 60 caninterface with an internal flash read-only memory (“ROM”) 61, securedigital (“SD”) random-access memory (“RAM”) 62, and an external SD card63. Flash ROM 61 can contain firmware or operating system code and cancontain face templates for secure non-volatile storage. SDRAM 62 can beused for processing and general-purpose volatile storage of data. SDcard 63 is a detachable storage medium that can be used to store records(e.g., evidence pictures) and data processing.

The camera board 46 is one input device for the processor 60. The cameraboard 46 includes a visible light color CCD/CMOS camera 64 (see FIG. 3)that contains a CCD/CMOS sensor 66, a focus lens 68, and imagingstabilization and preprocessing logic. The camera board 46 also containsan infrared CCD/CMOS camera 70 (see FIG. 3) that contains a CCD/CMOSsensor 72, a focus lens 74, a visible-light-block/infrared-pass filter76, and imaging stabilizing and preprocessing logic. Both cameras 64 and70 are adjusted at an angle suitable for 3D imaging.

Scanner infrared illuminator board 48 is an auxiliary device connectedto the processor 60 and is part of a biometric facial recognitionsystem. The board 48 is used to properly illuminate the face of asubject with infrared light. In some embodiments, the scanner infraredilluminator board 48 consists of an array of infrared LEDs 77 powered byintelligent infrared controller and driver circuitry 78.

The keypad 50 is an input device connected to the processor 60 andprovides part of the user interface 51 of the device 20. The keypad 50includes a capacitive touch pad 79 and is processed by a touchcontroller 80. The touch controller 80 translates touch events to thekeypad key codes for further processing by the processor 60.

The LCD screen 52 is an output device connected to the processor 60 andused to provide a graphical user interface (“GUI”). The LCD screen 52 iscontrolled by an LCD controller 81. In some embodiments, the LCD screen52 is also an input device and includes a touchscreen controlled by atouchscreen controller 82. The touchscreen controller 82 (when used) isalso connected to the processor 60. The touchscreen controller 82translates user interaction with the GUI on the LCD screen 52 forprocessing by the processor 60.

The RFID antenna 54 is controlled by an RFID controller (e.g.,EM/DESFIRE/MIFARE/HID compatible) 83. The RFID antenna 54 and the FRIDcontroller 83 form a RFID proximity reader, which is an input device forthe processor 60. The RFID controller 83 energizes a RFID tag (e.g.,carried by a worker) with the RFID antenna 54 when the tag is presentednear the RFID antenna 54, receives an emitted signal from RFID tag withthe RFID antenna 54, and decodes the emitted signal to a RFID code thatis provided to the processor 60. It should be understood that in someembodiments, the RFID antenna 54 and/or the RFID controller 83 can bepositioned outside of the housing 40 and 42 of the device 20 but can beelectrically connected with the device 20 to exchange data (e.g., seeFIGS. 11 a, b, and c).

To enhance the user experience on the device 20, different audiomessages can be output by the processor 60 for different events at thedevice 20. Audio output is amplified by an amplifier 84 and fed to thespeaker 56. In some embodiments, the device 20 includes multiplespeakers. For example, as illustrated in FIG. 2, the device 20 caninclude a speaker 85 on the housing back 42. Volume control can beprovided by GUI settings that adjust the amplification of the amplifier84 programmatically.

AC Line connecter 86 provides the 100-240 Volts AC (“AlternatingCurrent”) to the AC/DC Converter 59, which converts the high AC voltagesto the low DC (“Direct Current”) voltage. To provide power to theperipherals and devices included in the device 20, the device 20includes a power management controller 87 that intelligently manages thepower of the peripherals and devices, such as a scanner, the IRilluminator, and memory. The power indicator LED 58 displays the statusof the power.

As illustrated in FIG. 4, the device 20 also includes a networkcommunication controller 100 that provides network connectivity on oneor multiple interfaces. For example, the device 20 can include a localarea network (“LAN”) port 102 that provides wired network connectivity,a WIFI radio 104 that provides wireless network connectivity, and/or ageneral packet radio service (“GPRS”) interface that provides wirelessnetwork connectivity over cellular global system for mobilecommunications (“GSM”) with GSM/GPRS radio 106. The GSM/GPRS radio 106can provide long distance connectivity on the TCP/IP protocol. It shouldbe understood that the network communication controller 100 is notlimited to the stated interfaces and can include interfaces toadditional or different networks or communication systems.

To meet industry standards for access control, device 20 provides a monoor bidirectional, configurable Wiegand interface controller 110connected with a W/G port 112 to connect to external access controllers.Configurable Wiegand controller 110 can be configured to the desiredWiegand protocol for external access controllers programmatically orfrom the GUI interface of the device 20.

The device 20 also includes a relay driver and controller 120 thatcontrols an electric relay switch 122, which controls an externalelectric lock 124 via a relay port. Action of the electric relay switch122 is controlled programmatically by the processor 60.

In some embodiments, a universal serial bus (“USB”) flash disk can beconnected to the device 20 through a USB port 130. The port 130 isconnected to a USB controller 132, which is connected to the processor60. USB port 130 can be used to download and upload different kind ofdata to and from the device 20.

A real-time clock (“RTC”) 140 can be connected to the processor 60 tokeep accurate time and date information for processing the date and/ortime of particular events. In some embodiments, the RCT 140 includes abattery backup so it maintains accurate time even when the device 20 ispowered off. Another clock 142 provides a heartbeat to processor 60.General purpose logic 144 provides connectivity between the device 20and all other connected devices and interfaces. As illustrated in FIG.2, the device 20 can include a logo or other brand information 150(e.g., on the housing front 40).

The device 20 is an embedded device and it is designed to performbiometric identification, such as 3D face recognition, by takingadvantage of high-speed DSP processing performed by the single or multicore processor combination included in the processor 60, whicheliminates the need for expensive hardware. The processor 60 can run anoperating system, such as embedded Linux or Android. The processor 60also executes application software that employs customized and enhancedalgorithms for performing biometric identification and recognition whiletaking advantage of the capabilities of the processor 60.

The camera board 46 provides a face scanner that provides two types ofvideo feed: (1) a color feed from the color camera 64 and (2) aninfrared feed from the infrared camera 70. Both feeds are provided tothe processor 60. As noted above, the scanner IR illuminator board 48provides optimal infrared illumination to sample the infrared video fromthe infrared camera 70 of a subject. In some embodiments, due to thestereoscopic nature and the angle between the two cameras 64 and 70, theapplication firmware can perform 3D reconstruction of the face of asubject. In some embodiments, the application software executed by thedevice 20 can provide 1:1 (“one-to-one”) biometric recognition (e.g.,one identified identity of a subject).

The device 20 stores biometric templates (described below) in a securenon-volatile storage, such as the flash ROM 61, and uses the volatileSDRAM 62 to perform software processing. The SD card 63 can be used forthe external storage of the captured frontal pictures of subjects,clock-in and clock-out data, attendance logs, and biometric operationlogs. The USB controller 132 and the USB port 130 provide data transfercapability from memories 61, 62, or 63 to other storage mediums locatedexternal to the device 20, such as a USB flash drive.

FIGS. 5 a, b, and c illustrate using the device 20 in sunlight. Asdiscussed above with respect to FIG. 1 d, improper lighting conditionscan cause the device 20 to malfunction. In particular, face, iris, andretina recognition techniques do not work properly when performed underpartial or complete direct sunlight. Accordingly, as described above,opaque walls 38 without windows or portals can be used to block sunlightto area where the device 20 are installed. In some embodiments, ratherthan using the opaque walls 38, filters can be used to prevent unwantedlight from reaching the device 20. For example, as illustrated in FIG. 5c, direct sunlight has two kinds of light: (1) visible light 300 andinfrared light 301, which directly affects the operation of a device 20.Accordingly, an infrared block/visible-light pass film/coating 302 canbe overlaid on a transparent window or partition 303 positioned next toa sunlit environment. The film/coating 302 blocks the infrared light301, but lets the visible light 300 pass through the window or partition303. Thus, the room containing the device 20 can be lit with visiblelight 300 but the infrared light is blocked out of the room 30.Accordingly, the room containing the device can function as an indoorenvironment for the device 20 while being fully lit with outdoorsunlight through any number of walls or a ceiling made of transparentglass overlaid with the film 302.

Furthermore, as noted above, the filter 76 is overlaid on the infraredcamera 70, which lets infrared light 301 pass but blocks visible light300 from reaching the infrared camera 70. Therefore, visible light 300from sunlight or other sources, like a light bulb 304, is blocked by thefilter 76. As also noted above, the device 20 uses the infraredilluminator board 48 to illuminate the subject's face and eyes withinfrared light 301. This helps the infrared camera 70 obtain qualityinfrared imaging needed for performing facial, iris, and retinalrecognition in singular form or in a combination.

Using the above setup (i.e., the film 302, filter 76, and illuminatorboard 48), allows for facial, iris, and retinal recognition even insunlight, which reduces setup infrastructure costs and helps increasesecurity. Accordingly, an access control point 16 can be located in anenvironment as illustrated in FIG. 5 b (i.e., with a transparent wall orwindow 305) rather than being restricted to an environment asillustrated in FIG. 5 a (i.e., with an opaque wall 38).

FIGS. 6 and 7 are flowcharts illustrating an eyes-and-face recognitionmethod performed by the device 20. In some embodiments, the device 20 isconfigured to shift to an idle mode after a cold boot. A detection mode,such as a face detection mode, however, can be turned on by motiondetected by the camera 64 or when an RFID tag is detected through theRFID reader (i.e., the RFID controller 83 and the RFID Antenna 54). Theface detection mode triggers 3D reconstruction through the stereo visionfeed from both the optical camera 64 and the IR camera 70. The device 20then performs a (1:1):1 recognition of the left eye and the right eyeand the 3D face, as illustrated in FIG. 6.

In some embodiments, the biometric templates of the left eye, right eyeand the 3D face of a worker are stored in separate databases of thedevice 20. Therefore, while matching a face, the left and right eyes canbe detected, extracted, and separated. The device 20 can then run anindex matching routine individually on each component (i.e., the lefteye and the right eye) and compare the results to each other in therespective database to extract possible worker identity matches that arefurther matched with the extracted 3D face matched through the related3D face templates (see FIG. 7). Separately processing these componentsincreases the speed of matching through multiple sources in the samefield-of-view and helps eliminate the need of a card setup used in someexisting recognition systems, which are prone to card loss and theft.Also, in some embodiments, as illustrated in FIG. 6, the device 20 isconfigured to detect a gender of a subject based on a captured image(e.g., based on a face identified in the image). Using the detectedgender, the device 20 can select a subset of the available biometrictemplates (e.g., a particular database) that is associated with thedetected gender. Using gender-specific templates reduces the amount ofprocessing (and associated time) needed to determine a match.

Upon finding a match to all three components, the device 20 plays avisual and/or audio message. The device 20 also generates and storestime stamp data and an evidence picture against the identified workeridentity (e.g., on the SD card 63). In addition, the device 20 cantrigger a lock to allow the worker to pass through the access controlpoint 16 (if allowed for that worker under the employer's policy). Thedevice 20 can also send a Wiegand code to Wiegand readers or the server12 and/or push a record to another device or to the cloud, such as overTCP/IP.

Accordingly, the device 20 acts as a standalone device that saves andmatches biometric templates. However, the device 20 can be configured topush data (see FIG. 10 a) to external devices or systems, whichsimulates server-based recognition functionality. The device 20 is alsospecifically designed to address challenges of workforce managementoverlapping with other verticals. In particular, existing devicesaddress security requirements (e.g., with simple clock-in and clock-outfunctionality) but do not help with other workforce managementfunctions. As noted above, however, the device 20 is configured tointegrate with other systems involving various components of workforcemanagement, such as HR, payroll, customer relationship, enterpriseresource planning, banking and financial transactions, supply chain,warehouse, asset, infrastructure, training, access control, production,administration, security management, voting, and ticketing.

As illustrated in FIG. 7, the device 20 can be configured toautomatically shift to a 1:N (“one to many”) face-only matching modefrom a (1:1):1 eyes-and-face matching mode. For example, the device 20can be configured to shift to the face-only matching mode when eyedetection and/or recognition fails. In some embodiments, the face-onlymatching mode applies the same biometric templates associated with aworker's face as used in the eyes-and-face matching mode. However, inother embodiments, the face-only matching mode can use a separatedatabase of templates.

If a worker has a problem enrolling with the device 20 due to anyproblem with one or both of his or her eyes, the worker can be enrolledwith his or her eyes closed under the face-only matching mode. Afterenrolling with the device 20 with his or her eyes closed, the worker canbe identified by the device by similarly presenting his or her face witheyes closed. For example, in some embodiments, when the device 20detects a face without eyes, the device 20 automatically shifts into theface-only matching mode, which can match a scanned face with templates(e.g., stored in a face-only database). It is estimated that over 8% ofthe world population suffers from various types of eye diseases thatmakes it difficult for them to be enrolled onto an iris-based orretina-based biometric device. However, the process defined above forthe device 20 can be used to both enroll and later identify the workerwithout requiring exception handling or reprogramming. In particular,the ability of the device 20 to automatically shift from capturing onebiometric feature to another increases the efficiency and reliabilityfor worker recognition and workforce management.

FIG. 8 is a flowchart that illustrates template capacity of the device20. In an unlimited-capacity mode, biometric templates are separated andgrouped into multiple databases, and the limit of the template groups isonly limited based on the available data storage on the device 20 (e.g.,size of the SD card 63). In some embodiments, each template groupincludes approximately 1,000 biometric templates. When template groupsare used, the device 20 can be configured to prompt a worker to selecthis or her template group (e.g., on the LCD screen 52). Upon receiving aselection of a template group, the worker's biometric features arematched only in the selected template group database. Accordingly,creating groups of templates helps increase the limit of templatecapacity of the device 20 while keeping the matching speed efficient bylimiting the number of templates the device 20 has to process to performa match.

FIG. 9 a illustrates the device 20 paired with a palm vein reader 400.As illustrated in FIG. 9 a, the device 20 and the reader 400 can both bemounted on a support 402 and can be connected electrically (e.g., by awired connection) that allows the devices to exchange information. Thepalm vein reader 400 and the device 20 can be used to perform apalm-eyes-and-face recognition. In some embodiments, this matchingprocess results in a 1 {(1:1):1} match.

FIG. 9 b illustrates a process for performing a match using the palmvein reader 400. As illustrated in FIG. 9 b, the device 20 can beconfigured to shift to idle mode after a cold boot. However, when aworker hovers his or her hand over the reader 400, the device 20receives notice of this motion from the reader 400 and the device 20automatically shifts to face detection mode. The reader 400 thenperforms a palm-vein matching method to extract the worker'sidentification and the reader pushes the identification to the device20. The device 20 receives the identification and executes the facedetection mode, which triggers 3D reconstruction through the stereovision feed from both the optical camera 64 and the IR camera 70simultaneously. The device 20 then performs an eye-and-face matchingmethod as shown in FIG. 7.

FIG. 10 a is a flowchart illustrating a pull method performed by thedevice 20, and FIG. 10 b is a flowchart illustrating a push methodperformed by the device 20. In some embodiments, both methods can beused to manage time and attendance data captured by the device. Thedevice 20 can be configured to perform two types of simultaneous datatransaction methods to ensure no transaction or data is loss in transitbetween the device 20 and server 12. For example, the two streams can becross-compared before final settlement of data on the server 12. In thepull method illustrated in FIG. 10 a, the server 12 sends requests tothe device 20 over the connection 14, and the device 20 transmits datato the server 12 in response. In the push method illustrated in FIG. 10b, the device 20 pushes the data to the server 12 as the device 20receives the data and/or per the availability of the connection 14.Before, during, and after transmitting the data, the unavailability ofthe connection 14 is considered by the device 20, and the device 20re-transmits the data unless the data is received by the server 12 andthe server 12 sends the confirmation back to device 20. The server 12compares data received by the push and pull methods and, upon finalconfirmation, sends a command to the device 20 to delete (e.g., eraseand/or overwrite) data successfully transmitted to the server 12.Accordingly, the device 20 can eliminate data loss, which is notacceptable for even a single transaction of time and attendance data orother types of transactions, including financial transactions. Existingbiometric devices do not give importance to this matter and are prone todata loss, which causes failures in down-stream workforce managementsystems.

In some embodiments, the device 20 can be installed with an automaticheight control system. For example, as illustrated in FIGS. 11 a, b, andc, the height of the device 20 can be automatically adjusted based onthe height of the worker interacting with the device 20. For example,the device 20 can be fixed on top of a free moving pole 450 controlledby a motor driver. During initialization of the device 20, the pole 450is driven to a default height to cater to a worker of average or mediumheight (e.g., worker 601, illustrated in FIG. 11 a, B). Workers with ashorter-than-average height (e.g., worker 602, illustrated in FIG. 11 a,A) and workers with a taller-than-average height (e.g., worker 603,illustrated in FIG. 11 a, C) can be issued RFID tags 604 a and 604 b. Itshould be understood that in some embodiments all workers can be issuedRFID tags that identify a height code. However, in some embodiments,workers with average heights (e.g., the worker 601), do not need an RFIDtag to use the device 20 at its default position as per the processdiscussed in FIG. 6.

To adjust the device's height, worker 602 shows his or her RFID tag 604a to the RFID antenna 45, which signals an RFID code that is matched toa “short” height code stored in a database (e.g., locally-stored in theRFID controller 83). The height code will then be used to automaticallymove the pole 450 down per “short” height settings associated with the“short” height code. The worker 602 can then use the device 20, and,after the device 20 captures the necessary data regarding the worker602, the pole 450 can be returned to its default height (see, e.g., FIG.11 a, B). A similar process is performed to accommodate the worker 603and drive the pole 450 to a taller height than its default position. Forexample, FIG. 11 d is a flowchart illustrating a process for adjustingthe device 20 height.

It should be understood that the RFID controller 83, motor driver 452,the device 20, or combinations thereof can be configured to control theheight of the pole 450 based on the detected RFID tag. For example, insome embodiments, the RFID antenna 54 is positioned within the turnstile22 and transmits detected tags to the RFID controller 83 included in thedevice 20 (e.g., over a wired connection between the antenna 54 and thedevice 20). The device 20 can process codes identified by the controller83 based on the detected tags, and the device 20 can then issue acommand to the motor driver 452 to position the pole 450 at a particularheight. In other embodiments, a controller position in the turnstile 22with the antenna 54 can be configured to detect and process codesreceived from the RFID tags and issue a command directly to the motordriver 452 without interaction with the device 20.

Furthermore, as noted above and as illustrated in FIGS. 11 a, b, and c,in some embodiments, the RFID antenna 54 can be positioned outside ofthe housing 40 and 42 of the device 20. For example, the antenna 54 canbe positioned at a lower height than the device 20 to allow workers ofall heights (including workers in wheelchairs) to use the antenna 54 toadjust the height of the device 20. Existing biometric devices are ofteninstalled at a fixed height which makes it difficult for short and tallworkers to mark their attendance. Accordingly, the automatic heightadjustment described above solves this problem. Furthermore, the RFIDantenna 54 is a cheaper implementation than providing button control formanually adjusting the height. In some embodiments, the palm vein reader400 can similarly be used to obtain a height or other position code froma worker (e.g., associated with an identification of the worker) and cansend the height data to the motor driver 452.

It should also be understood that in some embodiments, the RFID tags canbe configured with codes that identify not only a height of the device20 but other positions and/or settings. For example, as illustrated inFIG. 11 c, in some embodiments, the device 20 can be installed atapproximately the center of a turnstile 22 so that the same device 20can be used for both inward and outward traffic (e.g., in areas withlight traffic). The device 20 can pivot on top of a pole 460 rotatableby a motor driver 462. One or more buttons can be installed on theturnstile 22 and/or the device 20. For example, the turnstile 22 caninclude a left button and a right button. When the left button ispressed, a command is sent to the motor driver 462 that rotates thedevice 20 to face inward traffic, which sets the status of the device 20to “IN.” When the right button is pressed, a command is sent to themotor driver 462 that rotates the device 20 to face outward traffic,which sets the status of the device 20 to “OUT.” In other embodiments,an RFID antenna on each end of the turnstile 22 can be used to detect adirection of traffic and set a status of the device 20 accordingly.Existing systems typically require two devices 20 to manage both inwardand outward traffic. Accordingly, using the rotatable device 20 asillustrated in FIG. 11 c reduces the costs while preserving data capturefunctionality.

In a standard setup, as illustrated in FIG. 12 a, the device 20 matchesa worker's biometric features and signals the turnstile 22 directly toopen the lock and let the worker enter or exit the area and clock him orher “IN” or “OUT.” In an alternative setup, the device 20 is connectedto a computing device 700, such as an Android-based tablet, that isconnected to the turnstile 22 (see FIG. 12 b). The policies and rulesare set on the server 12 and are pushed to the computing device 700 overthe connection 14. When a worker successfully marks his attendance onthe device 20, an identifier of the worker is sent to the computingdevice 700, which takes further action as per the policies set by theserver 12.

FIG. 12 c is a flowchart illustrating the use of access policies andrules with the device 20. For example, if the policies and rules arematched for the worker (e.g., per a database stored on the computingdevice 700), the computing device 700 signals the turnstile 22 to unlockand let the worker pass. The attendance data can also be stored on thecomputing device 700 and synched with the server 12 as described abovewith respect to FIGS. 10 a and 10 b. If the policies and rules are notmatched for the worker, the computing device 700 will prompt the worker(e.g., on a screen of the computing device 700) for additionalinformation based on a worker level associated with the worker (e.g.,per the database stored on the computing device 700). If the workerlevel is set as “manager,” the device 700 will allow the worker tooverride the policy and enter on his or her own decision. If the workerlevel is set as “staff,” the worker will have an option to requestaccess (associated with selectable reasons for the request). If therequest is granted, the worker will be notified (e.g., over a textmessage to a cellular telephone) of a code that the worker can enterinto the device 700 to gain access. If the worker level is set as“labor,” the worker is not provided any further options and must acceptthe denial of access. Existing systems are only able to match a workerand clock the worker “IN” or “OUT.” Accordingly, the device 20 canperform additional functionality to enforce HR, security,administrative, overtime and other policies and provide decision supportfor the enforcement of the policies.

FIG. 13 is a flowchart that illustrates the use of surveys with thedevice 20 and the computing device 700. Surveys for individual workerscan be created (e.g., with supported text and graphics) and stored onthe server 12, which are then synched over the connection 14 with thecomputing device 700. When a worker marks his attendance on a device 20connected to the computing device 700, the device 700 displays thesurvey created for him or her (e.g., on a touchscreen of the computingdevice), which the worker completes using the computing device 700(e.g., the touchscreen). Upon completing the survey, the computingdevice 700 passes a signal to the turnstile 22 to unlock and let theworker pass. The survey input is stored in the database of the computingdevice 700 and is synched with the server 12 over the connection 14.Survey questions may vary from “Would you like to have the meal today?”which may help the kitchen to know how many meals to be prepared, or“Which drink would you prefer at the cafeteria, Pespi or Coke?” toidentify suppliers to contract with. Similarly, the computing device 700can act as a voting system to know worker choices and make better HRpolicies for the workers.

FIG. 14 a is a flowchart that illustrates the use of multi-statusphysical access control with the device 20 or any RFID device. In thisconfiguration, special sensors are integrated into the turnstile 22 toget additional data to determine if a worker actually entered or exitedafter clocking “IN” or “OUT.” For example, in some embodiments,attendance records stored on the device 20 can have one of three levels:(1) The worker was able to successfully mark his attendance; (2) Theturnstile 22 opened and/or a tripod was rotated; and (3) The workercrossed the other end of turnstile 22. This fraud prevention method isused to determine if a worker clocked-in on a device 20 but did notactually enter the work area. The server 12 can be configured todetermine whether to accept a clock-in or not based on the status of theclock attempt.

Similarly, FIG. 14 b is a flowchart that illustrates the use ofmulti-status non-physical access control with a device 20 or any RFIDdevice. As illustrated in FIG. 14 c, a combination of proximity sensors730, laser light source and associated sensors 732, and a projector 734can be installed in a turnstile 22. In some embodiments, however, thedevices 730, 732, and 734 can be controlled by an intelligent controllerwithout any tangible turnstile 22. The proximity sensors 730 are capableof motion detection in both directions. Laser light source andassociated sensors 732 are used to mimic a barrier or gate and are alsoused for intrusion detection. The projector 734 is used to displaydifferent signs 736 on the floor for access control (e.g., “Stop” or“Go”). The device 20 and/or the separate intelligent controller isresponsible for control and communication between the different devices.

Using the devices 730, 732, and 734 allows the access control point 16to perform intrusion detection, bi-directional movement sensing, andsensing the numbers of people passing through (e.g. if only one personis allowed to pass but more than one person attempts to pass, an alarmwill be issued and the event will be saved). Accordingly, themulti-status non-physical access control can provide three types ofstatus information: (1) clock-in and clock-out information; (2)intrusion detection; and (3) a number of people passing through. Themulti-status non-physical access control can maintain a batter-backedcalendar, a real-time clock, and an event counter to provide accuratestatus information. The modular design of the multi-status non-physicalaccess control aids integration with other components of the system 10.Multi-status non-physical access control also is an effective andcost-cutting discipline enforcement solution.

FIG. 15 a is an exemplary illustration of a device 20 used with assetprotection. Similarly, FIG. 15 b is a flowchart that illustrates the useof asset protection with the device 20. To perform asset protection,asset tags 750 are attached to expensive assets, such as laptops andmobile phones and are assigned to a particular worker's profile on theserver 12. A tag reader (e.g., medium range) 752 is attached to thedevice 20. If a worker brings an asset with a tag 750, such as a laptopor a mobile phone, in the proximity of the tag reader 752, informationcollected from the tag 750 is passed to the device 20 and the device 20matches the information with the worker attempting to gain access. Ifthe asset tag 750 matches the identified worker's profile, the device 20grants the worker access. If the asset tag 705 does not match with theworker's profile, the device 20 prevents the worker from passing throughthe turnstile 22. In some embodiments, if the asset tag 750 does notmatch, the device 20 is also configured to trigger an alarm ornotification. Accordingly, the asset protection adds a layer ofprotection of assets, which reduces the asset theft cases, and,consequently, can reduce insurance costs.

In some embodiments, a device 20 can be integrated with a metaldetector, such as a walk-through metal detector 800, as illustrated inFIG. 16 a. FIG. 16 b is a flowchart that illustrates the use of themetal detector integrated with the device 20. The device 20 can beintegrated into the ceiling of a walk-through metal detector 800 and isconnected to the server 12 over the connection 14. With thisconfiguration, the worker must look up while walking through thedetector 800. If the worker attempted and is granted access, a first(e.g., green) light 802 on the detector 800 can flash, which informs theworker that he or she can walk-through the detector 800 where the workerand the contents he or she carries will be scanned. Data gathered by thedetector 800 can be stored in a database. For example, metal contentsallowed in with a worker can be stored in a database and compared withmetal contents carried by the worker at the time of exiting. If a workeris not identified by the device 20, a second (e.g., red) light 804 willflash and, in some embodiments, a security alarm will be triggered.

FIG. 17 is a flowchart that illustrates using a name method executed bythe device 20. Names of workers are saved in text and audio form on theserver 12, which are synched with the device 20. When a worker uses thedevice 20 to successfully mark his or her attendance, the device 20plays the corresponding name audio file. If there is no audio fileavailable for a particular worker, the device 20 executes atext-to-speech engine to convert the text of the worker's name intoaudio. Some existing systems play a fixed sound whenever a usersuccessfully uses a biometric device. If there are a large number ofsuch devices installed in close proximity, however, the sounds canconfuse a user because a user does not know if the sound they heard wasfrom the device they were using or a different device. Accordingly,configuring the device 20 to play the worker's own name increases theefficiency of the system 10 and the confidence of the worker.

FIG. 18 is a flowchart that illustrates an emergency disaster recoverymethod executed by the device 20. As noted above, biometric templatesand applicable policies are synched between the device 20 and the server12. If the device 20 fails to function, the device 20 can be replacedwith a new device assigned the same IP address as the failing device.Therefore, the new device 20 will be automatically synched with the samebiometric templates and applicable policies from the server 12.Accordingly, automatically re-synching a new device from the server 12offers a painless recovery of the system 10.

In some embodiments, there are two types of problems that may ariseduring the normal functionality of the system 10: (1) data corruption ofsecured data storage included in the device 20; and (2) replacement of adevice 20 with a new device 20. Two types of data are stored in thedevice 20: (1) biometric templates and (2) clock-in and clock-out andother log files. To download and upload data from and to a device 20 ineither of the above situations, a system administrator can choose adirect connection or a network connection. For direct data transfersfrom a device 20, a system administration can use a SanDisk orKingston-compatible USB flash disk (i.e., a USB thumb drive) on USB port130 of the device 20.

FIG. 19 is a flowchart that illustrates video conference and remote lockoperations executed by the device 20. These operations are implementedby a combination of a mobile device (e.g., a smart phone, capable ofutilizing the TCP/IP services with a WIFI/3G/LTE or GSM/GPRS radio) anda front facing camera. In particular, a software application isinstalled on both the device 20 and the remote mobile device. Theapplication provides audio and/or video streaming on both devices. Whena call button is pushed on the device, if the status is set to a “BELL”mode, the device 20 will play a sound (e.g., a door bell sound).Otherwise, if the status is set to a “PHONE” mode, the device 20attempts to connect the remote mobile device and initiate a call (e.g.,a voice-over-IP (“VOIP”) call). On accepting the call, the remote mobiledevice queries the device 20 for the hardware capabilities of the device20. If the device 20 is connected to an electric lock 124, an “OpenLock” button may appear in a graphical user interface (“GUI”) displayedby the software application installed on the mobile device. In someembodiments, audio and/or video streaming is also automatically startedon both devices after the call is accepted. Accordingly, the user of themobile device can see and, optionally talk to the worker interactingwith the device 20. If the “Open Lock” Button is pressed on the mobiledevice, the mobile device verifies a code (e.g., a PIN input by the userof the mobile device or stored in the mobile device). After verifyingthe code, the mobile device sends a signal to the device 20 to open theconnected electric lock. Therefore, the device 20 allows not only remoteaccess of the electric lock 124 but also ensures security and maintainsa history record or log of the events related to the device 20 performedthrough the mobile device. This integration offers convenience to a userto talk to and see the person trying to access a particular area throughthe device 20 and gives the user power to allow access if required evenif the user is located remote from the device 20. For example, thisintegration can be used in residential towers and buildings, such aswhen a dog walker, nanny, or other individuals needs access to alocation when the residence owner is away from home (e.g., at work or onvacation).

FIG. 20 is a flowchart that illustrates the use of a payment methodexecuted by the device 20. For example, the payment method integrationwith a device 20 at a cashier window helps to speed up a paymentprocedure performed at the window and keep transactions secure. Forexample, the device 20 recognizes the worker's face, and the device 20pushes the identifier of the worker to a payroll server (e.g., theserver 12 or a separate server). The payroll server translates theidentifier to payroll-related information, which is displayed on adisplay screen of the cashier and allows the cashier to securely conductfinancial transactions with the worker.

FIG. 21 is a flowchart that illustrates the use of a cash dispenser withthe device 20. Integration of the cash dispenser with the device 20allows robust and more secure financial transactions through anautomated teller machine (“ATM”). In particular, ATM card informationand a PIN collected through the ATM can be cross-matched against therecognized worker's biometric identity by the device 20. An identifierof the identified worker is pushed from the device 20 to a payrollserver (e.g., the server 12 and/or a separate server) where theidentifier is translated to payroll-related information. Thisinformation is used to allow the worker to withdraw funds based on thepayroll-related information (as a regular payroll payment or as anadvance payment) through the ATM. Accordingly, this integrationincreases the reliability and security of cash transactions with workersby mitigating identity-theft frauds.

FIG. 22 is a flowchart that illustrates a triggered-reporting methodintegrated with the system 10. The triggered-reporting method is animplementation of a “management by exception” policy for work forcemanagement. In particular, a reporting engine executed by the device 20determines the level of exception to be reported to management bycross-examining predefined values of variables during the processing ofvarious reports. The triggered reports are then pushed on differentmediums of communication enforced by a triggered reporting policy. Incontrast to existing reporting solutions, the triggered-reporting methodhelps to produce more meaningful and essential reports for work forcemanagement. Moreover, the triggered-reporting method can be employed forFacebook and other check-in and loyalty management programs andapplications.

FIG. 23 illustrates a vending machine (e.g., a coffee vending machine)830 integrated with the device 20. The integration of the vendingmachine 830 with the device 20 is a unique combination that allowsautomated biometric-controlled vending (e.g., a personalized cup ofcoffee). In particular, the device 20 can push a recognized identity ofa worker to the server 12, which translates the identity to personalizedoptions for the vending machine 830 (e.g., personalized options ofcoffee recipes). The options can then be displayed on the device 20and/or the machine 830 (e.g., a touch screen display), and the workercan select one of the options. The device 20 and/or the machine 830 cankeep a record of the selections of the workers, which can be used toanalyze moods of the work force, which may help calculate trends orperformance of the work force. In some embodiments, the vending machine830 and the device 20 can be further integrated with a payroll system toallow workers to purchase items from the vending machine 830 from theirsalary (see, e.g., FIGS. 20 and 21 above).

FIG. 24 a is a flowchart that illustrates using a field workermanagement system. The system allows a field worker to mark attendanceand receive work orders based on the worker's current geographiclocation. For example, a field biometric scanning device 850 isillustrated in

FIG. 24 b. The field device 850 is a combination of a camera 852 (e.g.,an infrared camera), fingerprint reader 854, global positioning system(“GPS”) receiver, and a GSM/GPRS modem. The field device 850 connects toa mobile device 856, such as a laptop or tablet computer via a wiredconnection 857, such as a USB connection. The GPS receiver acquires ageographic location (e.g., latitude and longitude) from at least one GPSsatellite 858. The GSM/GPRS modem provides a connection to the server 12(e.g., a TCP/IP connection) over a cellular network. The mobile device856 receives video captured by the camera 852 and fingerprint datacaptured by the fingerprint reader 854. Biometric algorithms performedby software executed by the mobile device 856 determines the biometricfacial and fingerprint identifications and sends the identifications tothe server 12 along with a geographic location from the GPS receiverthrough the GSM/GPRS modem. The server 12 identifies a worker based onthe transmitted identifications and translates the geographic locationto a client location where the worker was expected to work, and marksthe attendance with the geographic location and time information.

In some embodiments, after processing the location of an identifiedworker at an identified client location, the server 12 produces a workorder 860 with one or more tasks the worker should conduct at the clientlocation. The work order 860 is downloaded to and displayed on themobile device 856 from which the request was generated through the fielddevice 850. As the worker progresses through the tasks, the mobiledevice 850 notifies the server 12 (e.g., in approximately real-time).Accordingly, although matching field workers and task management atmultiple client locations with a large workforce is a challenging job,the field worker management system, including the field device 850,manages these working arrangements and can be integrated with payrolland other systems as described above for the device 20. By trackingindividual tasks on a work order 860, the field worker management systemcan pay workers on a per task basis, which enhances performance of theworkforce.

FIG. 25 is a flowchart that illustrates using a portable biometricscanning device (“portable BSD”) that integrates with the system 10. Theportable BSD can be similar to the field device 850 and mobile device856 described above with respect to FIGS. 24 a and 24 b. For example,the portable BSD includes a portable mobile device with a built-inbattery (e.g., a smart phone, tablet computer, laptop computer, etc.)connected with an iris and/or infrared camera, a fingerprint reader, orboth. The portable BSD also includes a GPS receiver and a GSM/GPRSmodem.

A user interface provided by the portable device contains a “clock-in”button (e.g., a push button), an electromagnetic speaker for audio, and,optionally, a display for user interactions. The GPS receiver acquires ageographic location (i.e., latitude and longitude), and the GSM/GPRSmodem provides connection servers (e.g., TCP/IP services) over acellular network. On pressing the clock-in button, iris images from thecamera and a fingerprint data from the fingerprint reader are capturedand sent to the server 12 via the GSM/GPRS modem along with thegeographic location from the GPS receiver and timestamp information.Biometric algorithm software executed by the server 12 recognizes thebiometric iris and/or fingerprint and identifies the worker. Thesoftware also translates the geographic location to a work locationand/or work zone where the worker was expected to work. Furthermore, thesoftware marks the worker's attendance after verifying the biometricidentifiers with the geographic location. The server 12 sends resultsback to the portable BSD. If the result of the request is granted (theworker and his or her location was verified by the server 12), theportable BSD plays a verification sound (e.g., a beep) through thespeaker. Otherwise, the portable BSD plays an error sounds. Existingportable workforce systems do not collect biometric and geographic datathat is tightly integrated with workforce management system.

Accordingly, the portable BSD helps to manage a remote workforce, suchas traffic police, report their location and time while working fromanywhere. In some embodiments, real-time GPS tracking of the portableBSD can be turned on and off, such as by issuing a command from theserver 12.

FIG. 26 a is a flowchart that illustrates a visitor management systemintegrated with the system 10. In some embodiments, the visitormanagement system is a combination of a customized hardware and softwaresolution. For example, a visitor management console 900 (hereinafterreferred to as “console 900”) is illustrated in FIG. 26 b. The console900 includes a camera 902 for capturing a front picture of the face of avisitor 903, a card scanner 904, and an RFID card reader 906. Theconsole 900 is connected to a computing device 910 (e.g., a tabletcomputer or laptop computer), via a connection 912, such as a USBconnection. The computing device 910 includes a screen 913 forinteracting with an operator and managing visitor information.

When the visitor 903 approaches the console 900, an operator asks for aregistration number if the visitor 903 visited previously. If thevisitor 903 did not previously visit, a registration number isautomatically generated. The visitor 603 is then asked to produce anidentification card 914, such as a national identity card, a driver'slicense, a social security card, etc., and stand in front of console900. The console 900 then automatically captures a front face photo ofthe visitor 903, scans the card 914, and issues a visitor RFID card 920.The RFID access code associated with the new card 920 is also broadcastto one or more access control points 16 (e.g., a RFID-driven device 20and/or turnstile 22). Likewise, if the visitor 903 is carrying personalitems, the items are documented and corresponding RFID tags are issued.

When the visitor 903 departs, the visitor management system unregistersthe visitor RFID card 902 and any other RFID tags issued for the visitor903 from the system and access control points and updates the history atthe server 12. Visitor management integrated with the system 10 isbeneficial for a workforce management system because it provides data onwhich workers are getting external visitors and how much time theexternal visitors are consuming of such workers. This kind of data isnot available with existing visitor management systems.

In some embodiments, the visitor management system can also enforcevisitor polices, such as meeting timings, number of visitors, timelimits, frequent visits, group visits, etc. The visitor managementsystem can also be configured to send notifications regarding visitors,such as text messages.

FIG. 27 is a flowchart that illustrates the use of blacklisted-workerdetection performed with the system 10. For example, to prevent entryand/or enrollment of particular workers (i.e., “blacklisted workers”),the device 20 pushes recognized biometric identifiers to the server 12,which cross-checks the biometric identifiers with a “blacklist” to allowor restrict access or enrollment.

FIG. 28 is a flowchart that illustrates the use of very-important-person(“VIP”) management integrated with the device 20. In particular, thedevice 20 recognizes and pushes biometric identifiers to the server 12,which identifies the person's status. If a person's status is set to“VIP,” the server 12 pushes the details to a manager or assigned officerof the business to inform him or her of the VIP's presence. If policyallows, the server 12 may also push the information to a cateringsection of the business to offer personalized catering (e.g.,refreshments) for the VIP. VIP management also keeps records of theVIPs, which can be used for analysis and trend calculations for futurebusiness planning

FIG. 29 a is a flowchart that illustrates the use of augmented-realityglasses integrated with the system 10. For example, FIG. 29 billustrates a possible arrangement of such integration. The hardware ofthe glasses 950 (e.g. Google Glass) is capable of capturing real-timevideo with an integrated camera 952 and sending the captured video tothe server 12. The server 12 recognizes the person viewed by the wearerof the glasses 950 (i.e., using facial recognition as described above),transmits data to the glasses 950 (e.g., providing an identity of theviewed person) in approximately real-time. The returned data or at leasta portion thereof is displayed on the glasses 950 themselves or heads updisplay (“HUD”) 954. In some embodiments, the server 12 produces areport based on the identified person viewed by the glasses wearer(e.g., suitable for making quick decisions). The report is thentransmitted back to the glasses 950. This integrated can be designed forbusy managers who work with large workforces and can increase worker andtask management.

Thus, embodiments of the invention provide, among other things,biometric scanning devices configured to collect biometric informationfrom a worker and integrating the collected information with variousworkforce management systems, such as HR, payroll, security, workorders, task management, asset management, trend analysis, etc. Itshould be understood that the term “worker” as used in the presentapplication can include any individual attempting to access a particulararea or mark their presence at a particular location. Therefore, theterm “worker” as used herein should be construed as being limited toemployees of an employer.

Various features of the invention are set forth in the following claims.

What is claimed is:
 1. A method of performing workforce management, themethod comprising: receiving, by a biometric scanning device, aplurality of biometric templates, wherein each of the plurality ofbiometric templates is associated with an individual; storing, by thebiometric scanning device, the plurality of biometric templates to aninternal memory; switching, by the biometric scanning device, to adetection mode; capturing, by the biometric scanning device, an image ofa subject; processing, by the biometric scanning device, the image toidentify a face; processing, by the biometric scanning device, the imageto identify an eye included in the identified face; comparing, by thebiometric scanning device, the identified face to at least one of theplurality of biometric templates stored on the internal memory toidentify a first match; comparing, by the biometric scanning device, theidentified eye to at least one of the plurality of biometric templatesstored on the internal memory to identify a second match; comparing, bythe biometric scanning device, the first match and the second match todetermine an identity of the subject; and when an identity of thesubject is determined, outputting, by biometric scanning device,information.
 2. The method of claim 1, wherein shifting to the detectionmode includes shifting to the detection mode upon detection of at leastone selected from the group comprising motion and a radio frequencydevice.
 3. The method of claim 1, wherein capturing the image of asubject includes capturing a first image of the subject from a firstcamera and capturing a second image of the subject from a second camera.4. The method of claim 3, wherein capturing the first image of thesubject from the first camera includes capturing the first image from acolor camera and wherein capturing the second image of the subject fromsecond camera includes capturing the second image from an infraredcamera.
 5. The method of claim 1, wherein processing the image toidentify a face includes performing three-dimensional reconstruction ofthe face.
 6. The method of claim 1, further comprising detecting agender of the identified face and identifying a subset of the pluralityof biometric templates stored on the internal memory as applicable forthe identified face.
 7. The method of claim 1, wherein comparing theidentified face to the at least one of the plurality of biometrictemplates includes comparing the identified face to a first subset ofthe plurality of biometric templates and wherein comparing theidentified at least one eye to the at least one of the plurality ofbiometric templates includes comparing the identified at least one eyeto a second subset of the plurality of biometric templates, wherein thefirst subset is different than the second subset.
 8. The method of claim1, wherein comparing the identified at least one eye to the at least oneof the plurality of biometric templates includes comparing theidentified at least one eye to the at least one of the plurality ofbiometric templates at the same time as comparing the identified face toat least one of the plurality of biometric templates.
 9. The method ofclaim 1, further comprising: processing, by the biometric scanningdevice, the image to identify a second eye included in the identifiedface; and comparing, by the biometric scanning device, the identifiedsecond eye to at least one of the plurality of biometric templatesstored on the internal memory to identify a third match.
 10. The methodof claim 9, wherein comparing the at least one first match and thesecond match to determine an identity of the subject includes:determining if the second match and the third match are the same; whenthe second match and the third match are the same, determining if thefirst match is the same as the second match and the third match; andwhen the first match is the same as the second match and the thirdmatch, determining the identity of the subject based on at least one ofthe first match, the second match, and the third match.
 11. The methodof claim 1, wherein comparing the identified face to at least one of theplurality of biometric templates stored on the internal memory toidentify the first match includes comparing the identified face to atleast one of the plurality of biometric templates to identify aplurality of first matches.
 12. The method of claim 12, whereincomparing the first match and the second match to determine an identityof the subject includes: determining if the second match is the same asone of the plurality of first matches; and when the second match is thesame as one of the plurality of first matches, determining the identityof the subject based on the second match.
 13. The method of claim 1,wherein outputting the information includes outputting the informationto at least one selected from the group comprising a display, a speaker,and a light emitting diode.
 14. The method of claim 1, whereinoutputting the information includes transmitting the information over atleast one network.
 15. The method of claim 1, wherein outputting theinformation includes transmitting the information to an externalattendance system.
 16. The method of claim 1, wherein outputting theinformation includes transmitting a control signal to a barrier, thecontrol signal instructing the barrier to allow the subject to pass. 17.The method of claim 1, wherein outputting the information includesstoring the image to a removable memory included in the biometricscanning device.
 18. A system for performing workforce management, thesystem comprising: a biometric scanning device including a camera andmemory; and a server storing a plurality of biometric templates andconfigured to transmit the plurality of biometric templates to thebiometric scanning device, wherein each of the biometric templates isassociated with a different individual, wherein the biometric scanningdevice is configured to receive the plurality of biometric templatesfrom the server, store the plurality of biometric templates to aninternal memory, switch to a detection mode, capture an image of asubject using the camera, process the image to identify a face, processthe image to identify an eye included in the identified face, comparethe identified face to at least one of the plurality of biometrictemplates stored on the internal memory to identify a first match,compare the identified eye to at least one of the plurality of biometrictemplates stored on the internal memory to identify a second match,compare the first match and the second match to determine an identity ofthe subject, and when an identity of the subject is determined, outputinformation.
 19. The system of claim 18, wherein the biometric scanningdevice is configured to output information by transmitting controlsignals to at least one barrier.
 20. The system of claim 19, wherein theat least one barrier includes at least one selected from the groupcomprising an electromagnetic gate and an electric gate.
 21. The systemof claim 18, wherein the biometric scanning device is configured tooutput information by transmitting the identity and a time to a remoteattendance system.
 22. The system of claim 18, wherein the cameraincludes a color camera and an infrared camera.
 23. The system of claim22, wherein the biometric scanning device further includes a filteroverlaid on the infrared camera, the filter allowing infrared light topass but blocks visible light.
 24. The system of claim 22, wherein thebiometric scanning devices includes an infrared illuminator for use withthe infrared camera.
 25. The system of claim 24, wherein the infraredilluminator includes at least one infrared light emitting diode.
 26. Thesystem of claim 18, wherein the biometric scanning device includes aradio frequency identification antenna, and wherein the biometricscanning device is configured to shift to the detection mode upondetecting a radio frequency device.
 27. The system of claim 18, whereinthe biometric scanning device is configured to output information byoutputting information on at least one selected from the groupcomprising a display screen, a speaker, and a light emitting diode. 28.The system of claim 18, wherein the biometric scanning device furtherincludes a motion detector and wherein the biometric scanning device isconfigured to switch to the detection mode when the motion detectordetects motion.
 29. The system of claim 18, wherein the biometricscanning device is configured to compare the identified face to at leastone of the plurality of biometric templates stored on the internalmemory to identify a plurality of first matches when the second match isnot identified.
 30. A system for performing workforce management, thesystem comprising: a left eye, right eye, and three-dimensional facebased multi-biometric scanning device; and a server storing a pluralityof biometric templates and configured to transmit the plurality ofbiometric templates to the biometric scanning device, wherein each ofthe biometric templates is associated with an individual, wherein thebiometric scanning device is configured to identify an individual basedon the plurality of biometric templates and integrate with at least oneselected from the group comprising: a radio frequency identificationreader, a computing device providing a policy override function, acomputing device displaying a survey, a payroll system, a cashdispensing machine, a vending machine, a metal detector, a mobiletelephone transmitting a remote access instruction, a mobile telephoneperforming video conferencing, a palm vein reader, one or more proximitysensors for detecting individuals entering or leaving the area, and apair of augmented-reality glasses.