Method and system for providing gated access for a third party to a secure entity or service

ABSTRACT

A security system for providing gated access for a third party to a secure entity or service and a method for operating the same is disclosed. The security system comprises a portable biometric device and a receiving module connected over a transmission channel. Biometric data in dependence upon a biometric characteristic such as a fingerprint of an authorized person is stored in memory of the portable biometric device. Biometric information of the person is captured, encoded and biometric data in dependence thereupon is provided to a processor. Using the processor the captured biometric data is then compared with the stored biometric data to produce a comparison result. If the comparison result is indicative of a match the first person is enabled to initiate provision of a gating signal for enabling signals provided by the third party to access the secure entity or service. The gating signal is received at a port of the secure entity or service. In response to the gating signal, a processor within a locking mechanism of the secure entity or service sets a flag for use in gating received signals provided by a third party for controlling access to the secure entity or service. The flag is set such that in a first state the locking mechanism is non-responsive to the signals and in a second other state the locking mechanism is responsive to the signals provided by the third party. If the first designated user has set the flag into the second other state access is provided to the secure entity or service by the third party upon receipt of a signal from the third party.

FIELD OF THE INVENTION

This invention relates generally to automated security for permittingaccess to a service or a predefined area by a designated person orpersons and more particularly relates to a biometric security system forproviding gated access for a third party to a secure entity or service.

BACKGROUND OF THE INVENTION

Access to most any secure entity or service is commonly limited by useof a security system. The use of security systems is generally wellknown. Their use is increasing with greater availability of digitalelectronic components at a relatively low cost. Such systems are knownfor securing buildings, banks, automobiles, computers and many otherdevices.

For example, U.S. Pat. No. 4,951,249 discloses a computer securitysystem, which protects computer software from unauthorized access byrequiring the user to supply a name and a password during the operatingsystem loading procedure (“boot-up”) of a personal computer (PC). ThisPC security system, utilizing password protection, is typical of manysystems that are currently available. Password protection requires auser's name and a password associated with that user's name. Only oncean associated password is detected for a valid user's name does the PCcomplete the boot-up routine. Though passwords may be useful in someinstances, they are inadequate in many respects. For example, anunauthorized skilled user with a correct password in hand, can gainentry to such a processor based system. Yet another undesirable featureof the foregoing system is that passwords on occasion are forgotten; andfurthermore, and more importantly, passwords have been known to bedecrypted.

As of late one of the most ubiquitous electronic components is thedigital processor. Multi-purpose and dedicated processors of varioustypes control devices ranging from bank machines, to cash registers andautomobiles. With ever-increasing use of these processor-based devices,there is greater concern that unauthorized use will become moreprevalent. Thus, the verification and/or authentication of authorizedusers of processor based systems is a burgeoning industry.

Alarms and security systems to warn of unauthorized use of automobilesand other processor controlled systems are available, however, thesesecurity systems have been known to be circumvented. Unfortunately, manycommercially available solutions aimed at preventing theft orunauthorized use of automobiles have also been circumvented. As of late,initiatives have been underway in the security industry, to providebiometric identification systems to validate users of electronic andother systems that are to have restricted access. A biometricidentification system accepts unique biometric information from a userand identifies the user by matching the information against informationbelonging to registered users of the system. One such biometricidentification system is a fingerprint recognition system.

In a fingerprint input transducer or sensor, the finger underinvestigation is usually pressed against a flat surface, such as a sideof a glass plate; the ridge and valley pattern of the finger tip issensed by a sensing means such as an interrogating light beam.

Various optical devices are known which employ prisms upon which afinger whose print is to be identified is placed. The prism has a firstsurface upon which a finger is placed, a second surface disposed at anacute angle to the first surface through which the fingerprint is viewedand a third illumination surface through which light is directed intothe prism. In some cases, the illumination surface is at an acute angleto the first surface, as seen for example, in U.S. Pat. Nos. 5,187,482and 5,187,748. In other cases, the illumination surface is parallel tothe first surface, as seen for example, in U.S. Pat. Nos. 5,109,427 and5,233,404. Fingerprint identification devices of this nature aregenerally used to control the building-access or information-access ofindividuals to buildings, rooms, and devices such as computer terminals.

U.S. Pat. No. 4,353,056 in the name of Tsikos issued Oct. 5, 1982,discloses an alternative kind of fingerprint sensor that uses acapacitive sensing approach. The described sensor has a two dimensional,row and column, array of capacitors, each comprising a pair of spacedelectrodes, carried in a sensing member and covered by an insulatingfilm. The sensors rely upon deformation to the sensing member caused bya finger being placed thereon so as to vary locally the spacing betweencapacitor electrodes, according to the ridge/trough pattern of thefingerprint, and hence, the capacitance of the capacitors. In onearrangement, the capacitors of each column are connected in series withthe columns of capacitors connected in parallel and a voltage is appliedacross the columns. In another arrangement, a voltage is applied to eachindividual capacitor in the array. Sensing in the respective twoarrangements is accomplished by detecting the change of voltagedistribution in the series connected capacitors or by measuring thevoltage values of the individual capacitances resulting from localdeformation. To achieve this, an individual connection is required fromthe detection circuit to each capacitor.

Before the advent of computers and imaging devices, research wasconducted into fingerprint characterisation and identification. Today,much of the research focus in biometrics has been directed towardimproving the input transducer and the quality of the biometric inputdata. Fingerprint characterization is well known and can involve manyaspects of fingerprint analysis. The analysis of fingerprints isdiscussed in the following references which are hereby incorporated byreference:

-   -   a) Xiao Qinghan and Bian Zhaoqi: An approach to Fingerprint        Identification By Using the Attributes of Feature Lines of        Fingerprint,” IEEE Pattern Recognition, pp 663, 1986;    -   b) C. B. Shelman, “Fingerprint Classification—Theory and        Application,” Proc. 76 Carnahan Conference on Electronic Crime        Countermeasures, 1976;    -   c) Feri Pernus, Stanko Kovacic, and Ludvik Gyergyek, “Minutaie        Based Fingerprint Registration,” IEEE Pattern Recognition, pp        1380, 1980;    -   d) J. A. Ratkovic, F. W. Blackwell, and H. H. Bailey, “Concepts        for a Next Generation Automated Fingerprint System,” Proc. 78        Carnahan Conference on Electronic Crime Countermeasures, 1978;    -   e) K. Millard, “An approach to the Automatic Retrieval of Latent        Fingerprints,” Proc. 75 Carnahan Conference on Electronic Crime        Countermeasures, 1975;    -   f) Moayer and K. S. Fu, “A Syntactic Approach to Fingerprint        Pattern Recognition,” Memo Np. 73–18, Purdue University, School        of Electrical Engineering, 1973;    -   g) Wegstein, An Automated Fingerprint Identification System, NBS        special publication, U.S. Department of Commerce/National Bureau        of Standards, ISSN 0083–1883; no. 500–89, 1982;    -   h) Moenssens, Andre A., Fingerprint Techniques, Chilton Book        Co., 1971; and,    -   i) Wegstein and J. F. Rafferty, The LX39 Latent Fingerprint        Matcher, NBS special publication, U.S. Department of        Commerce/National Bureau of Standards; no. 500–36, 1978.

In the field of digital and analog communications, wireless devices arebecoming more commonplace. Inexpensive computer systems are currentlycommercially available wherein printers communicate with computers whichin turn communicate with other computers via infrared transmitters andreceivers. Other devices, using other optical communication systems,such as data transmitting/receiving wrist watches are now available indepartment stores at substantially affordable prices; these wristwatches include processors and software for communication with acomputer and for downloading and uploading small amounts of data asrequired.

Biometric security identification systems, such as fingerprint scanningand input devices are becoming more commonplace as the need to validateauthorized users of computers, databases, and secure spaces grows. Ascomputers become more miniaturized, so too are other communication andsecurity devices decreasing in size. One of the more important reasons,however, to miniaturize electronic devices is to lessen the burden ofporting them.

One biometric security identification system provides each user with ahand-held portable fingerprint recognition and transmission device, forexample, as disclosed in U.S. Pat. No: 6,111,977 to Scott et al. Theirdevice includes a fingerprint scanner that encodes a fingerprint andsends the encoded fingerprint, via an infrared or a radio frequencytransmitter, to a receiver in the secure item, facility or area. It isnonetheless necessary to have a central computer that analyzes theencoded fingerprint to allow recognition and authorization of anindividual.

Generally, present electronic security systems are very inflexible intheir functionality providing either full access to an authorized useror denying access if user authorization fails. It would be advantageousto have a handheld biometric identification device allowing anauthorized user to provide gated access for a third party to a secureentity or service. For example, a stockbroker wants to provide access toa computer network for his assistants only during his presence. Usingjust a handheld biometric identification device he provides a gatingsignal to the security system enabling the system to respond to a signalprovided by his assistant. The assistant is then able to send a signalrequiring access to the security system using his handheld biometricidentification device.

It is, therefore, an object of the invention to use the progress inminiaturization of processors and biometric sensors for enabling anauthorized user of a secure entity or service to provide gated accessfor a third party to the secure entity or service.

SUMMARY OF THE INVENTION

In accordance with the present invention there is provided a method forproviding gated access for a third party to a secure entity or servicecomprising the steps of: storing biometric data in dependence upon abiometric characteristic of a first designated user of the secure entityor service other than the third party; capturing biometric informationrepresentative of a biometric characteristic and providing biometricdata in dependence thereupon; comparing the captured biometric data withthe stored biometric data to produce a comparison result; and, if thecomparison result is indicative of a match: providing a wireless gatingsignal for enabling wireless signals provided by the third party toaccess the secure entity or service.

In accordance with the present invention there is further provided amethod of providing gated access for a third party to a secure entity orservice comprising the steps of: receiving the gating signal at thesecure entity or service; in response to the wireless gating signal,setting a flag within the secure entity or service, the flag for use ingating received wireless signals for controlling access to the secureentity or service such that in a first state the secure entity orservice is non responsive to the wireless signals and in a second otherstate the secure entity or service is responsive to the wireless signalsprovided by the third party.

In accordance with an aspect of the present invention there is provideda method for providing gated access for a third party to a secure entityor service comprising the steps of: storing biometric data in dependenceupon a biometric characteristic of a first designated user of the secureentity or service other than the third party; storing biometric data independence upon a biometric characteristic of the third party; capturingbiometric information representative of a biometric characteristic andproviding biometric data in dependence thereupon; comparing the capturedbiometric data with the stored biometric data of the first designateduser to produce a comparison result; and, if the comparison result isindicative of a match: providing a wireless gating signal for enablingwireless signals provided by the third party to access the secure entityor service; receiving the gating signal at the secure entity or service;and, in response to the wireless gating signal, setting a flag withinthe secure entity or service, the flag for use in gating receivedwireless signals for controlling access to the secure entity or servicesuch that in a first state the secure entity or service is nonresponsive to the wireless signals and in a second other state thesecure entity or service is responsive to the wireless signals providedby the third party.

In accordance with the aspect of the present invention there is furtherprovided a method for providing gated access for a third party to asecure entity or service comprising the steps of: capturing biometricinformation representative of the biometric characteristic of the thirdparty and providing biometric data in dependence thereupon; comparingthe captured biometric data with the stored biometric data of the thirdparty to produce a comparison result; and, if the comparison result isindicative of a match: providing a wireless signal to the secure entityor service.

In accordance with another aspect of the present invention there isfurther provided a method for providing gated access for a third partyto a secure entity or service comprising the steps of: providing to afirst designated user other than the third party a first portablebiometric device operable to capture biometric information presentedthereto, the portable biometric device having stored biometric data independence upon a biometric characteristic of the first designated user;providing the third party with a second other portable biometric deviceoperable to capture biometric information presented thereto, theportable biometric device having stored biometric data in dependenceupon a biometric characteristic of the third party; capturing biometricinformation representative of a biometric characteristic in response tothe first designated user presenting said information to the firstportable biometric device and providing biometric data in dependencethereupon; comparing the captured biometric data with the storedbiometric data in the first portable biometric device to produce acomparison result; and, if the comparison result is indicative of amatch, performing the steps of: providing a wireless gating signal fromthe first portable biometric device for enabling wireless signalsprovided by the third party to access the secure entity or service;receiving the gating signal at a port of the secure entity or service;and, in response to the wireless gating signal, setting a flag within alocking mechanism of the secure entity or service, the flag for use ingating received wireless signals for controlling access to the secureentity or service such that in a first state the locking mechanism isnon responsive to the wireless signals and in a second other state thelocking mechanism is responsive to the wireless signals provided by thethird party.

In accordance with the other aspect of the present invention there isfurther provided a method for providing gated access for a third partyto a secure entity or service comprising the steps of: capturingbiometric information representative of a biometric characteristic inresponse to the third party presenting said information to the secondportable biometric device and providing biometric data in dependencethereupon; comparing the captured biometric data with the storedbiometric data in the second portable biometric device to produce acomparison result; if the comparison result is indicative of a match,performing the steps of: capturing biometric information representativeof the biometric characteristic of the third party and providingbiometric data in dependence thereupon; comparing the captured biometricdata with the stored biometric data of the third party to produce acomparison result; and, if the comparison result is indicative of amatch: transmitting a wireless signal from the second portable biometricdevice to a port of the secure entity or service.

In accordance with yet another aspect of the present invention there isprovided a security system for securing an entity or a service fromindiscriminate access and for providing gated access for a third party,the security system comprising: at least a portable biometric device,the device comprising: a biometric sensor for capturing biometricinformation representative of a biometric characteristic in response toa person presenting said information to the portable biometric device;an encoder for digitally encoding the captured biometric information andproviding biometric data in dependence thereupon; memory for storingbiometric data indicative of a biometric characteristic of a firstdesignated user; a processor for comparing the captured biometric datawith stored biometric data to produce a comparison result, and if thecomparison result is indicative of the first designated user forproviding a wireless gating signal for enabling wireless signalsprovided by the third party to access the secure entity or service, andif the comparison result is indicative of the third party for providinga wireless signal; and, a transmitter for wireless transmission of thewireless gating signal or the wireless signal; at least a port forreceiving the wireless gating signal and the wireless signal from theportable biometric device; and, a locking mechanism for securing theentity or service, the locking mechanism comprising a processor forsetting a flag in response to the wireless gating signal, the flag foruse in gating received wireless signals for controlling access to thesecure entity or service such that in a first state the lockingmechanism is non responsive to the wireless signals and in a secondother state the locking mechanism is responsive to the wireless signalsprovided by the third party.

BRIEF DESCRIPTION OF FIGURES

Exemplary embodiments of the invention will now be described inconjunction with the following drawings, in which:

FIG. 1 is a simplified block diagram illustrating a biometric securitysystem according to the invention;

FIG. 2 a is a simplified flow diagram illustrating a method of operationaccording to the invention of the biometric security system shown inFIG. 1;

FIG. 2 b is a simplified flow diagram illustrating a continuation of themethod of operation according to the invention shown in FIG. 2 a;

FIG. 3 is a simplified flow diagram illustrating another embodiment of amethod of operation according to the invention of the biometric securitysystem shown in FIG. 1;

FIG. 4 a is a simplified flow diagram illustrating yet anotherembodiment of a method of operation according to the invention of thebiometric security system shown in FIG. 1; and,

FIG. 4 b is a simplified flow diagram illustrating a continuation of themethod of operation according to the invention shown in FIG. 4 a.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

FIG. 1 illustrates the block diagram of a biometric security system 100for securing an entity or service from indiscriminate access accordingto the invention. The system 100 comprises at least a portable biometricdevice 102 and at least a receiving module 104 connected over atransmission channel. For simplicity, only one portable biometric device102 and one receiving module 104 is shown in FIG. 1, but it is obviousthat the invention is not limited thereto. Preferably, the systemcomprises a plurality of portable biometric devices 102, one for a firstdesignated user and one for each person of a third party. Furtherpreferably, the at least a portable biometric device 102 and the atleast a receiving module 104 are connected over a wireless transmissionchannel such as infrared transmission or radio frequency transmissionfor user convenience. The portable biometric device 102 comprises abiometric sensor 106 for capturing biometric information representativeof a biometric characteristic in response to a person presenting saidinformation. In a preferred embodiment the biometric sensor 106comprises a capacitive fingerprint imager for its compact design, butobviously the invention is not limited thereto. An encoder 108 digitizesor otherwise converts the analog signal into a signal format, whichprovides an encoded description of the biometric characteristic,suitable for processing. A processor 110 compares the captured biometricdata with biometric data of the first designated user stored in memory112 to produce a comparison result. Preferably, the memory 112 is anon-volatile memory. If the comparison result is indicative of a match agating signal for enabling signals provided by the third party to accessthe secure entity or service is provided to a transmitter 114 fortransmitting the signal to a port 120 of the receiving module 104. Inresponse to the gating signal, a processor 124 of a locking mechanism122 sets a flag for use in gating received signals from the third partyfor controlling access to the secure entity or service. The flag is setsuch that in a first state the locking mechanism 122 is non-responsiveto the signals and in a second other state the locking mechanism 122 isresponsive to the signals provided by the third party. If the comparisonresult is other than a match a signal indicating a request from a thirdparty is provided.

Alternatively biometric data in dependence upon a biometriccharacteristic of the third party is stored in memory of the portablebiometric device 102. This allows restricting the access of a thirdparty to designated persons of the third party.

Optionally, the locking mechanism comprises memory 126 for storing dataindicative of access privileges. Further optionally, for each designatedperson of the third party a different signal is provided. This allowsprovision of various levels of access privileges to the secure entity orservice for different persons of the third party.

Further optionally, the signals provided by different persons may bereceived at different ports 120. For example, a supervisor of a computerlab may provide one gating signal to one port for a plurality ofcomputers. Each student is then enabled to access his respectivecomputer providing a signal requiring access to the respective computer.

The portable biometric device 102 can be manufactured as a smallhandheld device such as a remote control, a watch, or a pendantcomprising a transmitter 114 for wireless transmission such as infraredor radio frequency transmission. Alternatively, the portable biometricdevice 102 comprises a smart card, which is to be interfaced with theport 120 of the receiving module 104.

The flow diagrams in FIGS. 2 a and 2 b illustrate a method for providinggated access for a third party according to the invention using theportable biometric device 102 in conjunction with the receiving module104. A first designated person is provided with a portable biometricdevice. Biometric data in dependence upon a biometric characteristicsuch as a fingerprint of the first person is stored in memory of theportable biometric device. The portable biometric device ispreauthorized for use with a particular security system and personalizedfor use by a particular person. Prior to operation an administratorinitializes the portable biometric device with the assistance of eithera central computer or a personal computer. Alternatively, a first userof the portable biometric device providing biometric information to thesensor after fabrication is designated as authorized user and biometricdata in dependence upon the captured biometric characteristic are storedin memory. Further alternatively, a plurality of persons may beauthorized as first persons having same full access privileges.

A following function block starts the process in response, for example,to a touch of a person's digit to a fingerprint imager. The biometricinformation of the person is captured, encoded and biometric data independence thereupon is provided to the processor. Using the processorthe captured biometric data is then compared with the stored biometricdata to produce a comparison result. If the comparison result isindicative of a match the first person is enabled to initiate provisionof a gating signal for enabling signals provided by the third party toaccess the secure entity or service.

The gating signal is received at a port of the secure entity or service.In response to the gating signal, a processor within a locking mechanismof the secure entity or service sets a flag for use in gating receivedsignals provided by a third party for controlling access to the secureentity or service. The flag is set such that in a first state thelocking mechanism is non-responsive to the signals and in a second otherstate the locking mechanism is responsive to the signals provided by thethird party.

If the first designated user has set the flag into the second otherstate access is provided to the secure entity or service by the thirdparty upon receipt of the signal form the third party.

The first designated user can return the flag by providing a gatingsignal. Optionally, the flag is returned to the first state after apredetermined amount of time, thus providing a time limitation of theaccess to the secure entity or service by the third party.

Further optionally, the locking mechanism comprises memory for storingdata determining access privileges comprising functional limitations ofthe secure entity or service for the third party.

The invention provides security and flexibility for users in manyapplications. For example, using the portable biometric device in theform of a TV remote control allows parents to limit TV access of theirchildren in their absence to selected channels and/or times. Biometricdata in dependence upon a biometric characteristic of the parents asfirst designated users is stored in memory of the remote control. Uponprovision of, for example, a fingertip to a biometric sensor of theremote control the parents are identified as first designated usershaving full access privileges. The remote control provides a signalidentifying them as authorized users allowing them to access allchannels of the TV at any time. Furthermore, they are able to setfunctional limitations such as pre-selected channels and a timelimitation for accessing the TV by their children. When the childrenpress their fingertip on the biometric sensor of the remote control thecomparison result is not indicative of a match identifying them as athird party and an according signal is provided. While the parents areat home the flag is set in a first state and the TV is not responsive tothe signal provided by the children. Before leaving the parents justprovide a gating signal using the remote to set the flag into a secondstate. Now the children are able to access the TV according to thepreset access limitations.

In some applications it is not desirable to provide limited access toany other person but only to predetermined persons of a third partyhaving limited access privileges. For such applications biometric datain dependence upon a biometric characteristic of one or more persons ofa third party may be stored in memory of the portable biometric deviceas illustrated in the simplified flow diagram of FIG. 3. In dependenceupon a recognized biometric characteristic a signal will be providedsuch as a signal indicating a first authorized user or a signalindicating a person of the third party.

FIGS. 4 a and 4 b illustrate simplified flow diagrams of anotherpreferred embodiment of a method for providing gated access for a thirdparty according to the invention. Here, a first designated user isprovided with a first portable biometric device having stored biometricdata in dependence upon a biometric characteristic of the firstdesignated user. A third party is provided with a second other portablebiometric device having stored biometric data in dependence upon abiometric characteristic of the third party. The first designated useris able to provide a gating signal to the locking mechanism of a secureentity or service by providing, for example, a fingerprint to the firstportable biometric device. The gating signal is received at a port ofthe secure entity or service and a processor set a flag for gatingsignals provided by the third party. A person of the third partyprovides a fingerprint to the second portable biometric device and if acomparison result is indicative of a match a signal is provided from thesecond portable biometric device to a port of the secure entity orservice. If the flag is set in a second state access is provided for thethird party. The third party may comprise a plurality of persons eachhaving a portable biometric device, or groups of persons are sharing aportable biometric device wherein biometric data of a biometriccharacteristic of each person of the group of persons is stored inmemory of the device.

Optionally, different persons of the plurality of persons have differentpredetermined access privileges and the portable biometric deviceprovides a respective signal associated with the person.

The security system according to the invention and the method operatingit provides secure access and flexibility to a secure entity or servicein numerous applications. For example, a stockbroker wants to provideaccess to a computer network for his staff only during his presence.Using just a handheld biometric identification device he provides agating signal to the security system enabling the system to respond to asignal provided by a member of his staff. Each staff member is then ableto access the computer network using a workstation by providing afingerprint to a respective portable biometric device, which can besomething like a remote control or something as inconspicuous as apendant. Furthermore, he can determine access privileges for differentmembers of his staff. For example, clerical staff members may beprevented from performing financial transactions. Numerous otherapplications can be found in securing buildings, hazardous areas andmaterials, vehicles, etc.

Numerous other embodiments of the invention will be apparent to personsskilled in the art without departing from the spirit and scope of theinvention as defined in the appended claims.

1. A method for providing gated access for a third party to a secureentity or service comprising: storing biometric data in dependence upona biometric characteristic of a first designated user of the secureentity or service other than the third party; capturing biometricinformation representative of a biometric characteristic and providingbiometric data in dependence thereupon; comparing the captured biometricdata with the stored biometric data to produce a comparison result; and,if the comparison result is indicative of a match: providing a wirelessgating signal for enabling wireless signals provided by the third partyto access the secure entity or service said access provided for apredetermined, limited period of time.
 2. A method of providing gatedaccess for a third party to a secure entity or service as defined inclaim 1, comprising: receiving the gating signal at the secure entity orservice; in response to the wireless gating signal, setting a flagwithin the secure entity or service, the flag for use in gating receivedwireless signals for controlling access to the secure entity or servicesuch that in a first state the secure entity or service is nonresponsive to the wireless signals and in a second other state thesecure entity or service is responsive to the wireless signals providedby the third party.
 3. A method for providing gated access for a thirdparty to a secure entity or service as defined is claim 2, wherein theflag is returned to the first state after a predetermined amount oftime.
 4. A method for providing gated access for a third party to asecure entity or service comprising: storing biometric data independence upon a biometric characteristic of a first designated user ofthe secure entity or service other than the third party; storingbiometric data in dependence upon a biometric characteristic of thethird party; capturing biometric information representative of abiometric characteristic and providing biometric data in dependencethereupon; comparing the captured biometric data with the storedbiometric data of the first designated user to produce a comparisonresult; and, if the comparison result is indicative of a match:providing a wireless gating signal for enabling wireless signalsprovided by the third party to access the secure entity or service;receiving the gating signal at the secure entity or service; and, inresponse to the wireless gating signal, setting a flag within the secureentity or service, the flag for use in gating received wireless signalsfor controlling access to the secure entity or service such that in afirst state the secure entity or service is non responsive to thewireless signals and in a second other state the secure entity orservice is responsive to the wireless signals provided by the thirdparty, the flag supporting a timing function such that the flag once setto the second other state returns to the first state after apredetermined, limited period of time absent additional comparisonresults indicative of a match.
 5. A method for providing gated accessfor a third party to a secure entity or service as defined in claim 4,comprising: capturing biometric information representative of thebiometric characteristic of the third party and providing biometric datain dependence thereupon; comparing the captured biometric data with thestored biometric data of the third party to produce a comparison result;and, if the comparison result is indicative of a match: providing awireless signal to the secure entity or service.
 6. A method forproviding gated access for a third party to a secure entity or serviceas defined in claim 5, comprising providing access to the secure entityor service by the third party if the flag is in the second other state.7. A method for providing gated access for a third party to a secureentity or service as defined in claim 5, wherein the third partycomprises a plurality of persons.
 8. A method for providing gated accessfor a third party to a secure entity or service as defined in claim 7,wherein different persons of the plurality of persons have differentpredetermined access privileges.
 9. A method for providing gated accessfor a third party to a secure entity or service as defined in claim 8,comprising a plurality of different wireless signals associated withdifferent persons of the third party having different access privileges.10. A method for providing gated access for a third party to a secureentity or service as defined in claim 8, wherein the differentpredetermined access privileges comprise functional limitations of thesecure entity or service.
 11. A method for providing gated access for athird party to a secure entity or service comprising: providing to afirst designated user other than the third party a first portablebiometric device operable to capture biometric information presentedthereto, the portable biometric device having stored biometric data independence upon a biometric characteristic of the first designated user;providing the third party with a second other portable biometric deviceoperable to capture biometric information presented thereto, the secondportable biometric device having stored biometric data in dependenceupon a biometric characteristic of the third party; capturing biometricinformation representative of a biometric characteristic in response tothe first designated user presenting said information to the firstportable biometric device and providing biometric data in dependencethereupon; comparing the captured biometric data with the storedbiometric data in the first portable biometric device to produce acomparison result; and, if the comparison result is indicative of amatch, performing: providing a wireless gating signal from the firstportable biometric device for enabling wireless signals provided by thethird party to access the secure entity or service; receiving the gatingsignal at a port of the secure entity or service; and, in response tothe wire less gating signal, setting a flag within a locking mechanismof the secure entity or service, the flag for use in gating receivedwireless signals for controlling access to the secure entity or servicesuch that in a first state the locking mechanism is non responsive tothe wireless signals and in a second other state the locking mechanismis responsive to the wireless signals provided by the third party.
 12. Amethod for providing gaited access for a third party to a secure entityor service as defined in claim 11, comprising: capturing biometricinformation representative of a biometric characteristic in response tothe third party presenting said information to the second portablebiometric device and providing biometric data in dependence thereupon;comparing the captured biometric data with time stored biometric data inthe second portable biometric device to produce a comparison result; ifthe comparison result is indicative of a match, performing: capturingbiometric information representative of the biometric characteristic ofthe third party and providing biometric data in dependence thereupon;comparing the captured biometric data with the stored biometric data ofthe third party to produce a comparison result; and, if the comparisonresult is indicative of a match: transmitting a wireless signal from thesecond portable biometric device to a port of the secure entity orservice.
 13. A method for providing gated access for a third party to asecure entity or service as defined in claim 12, comprising providingaccess to the secure entity or service by the third party if the flag isin the second other state.
 14. A method for providing gated access for athird party to a secure entity or service as defined in claim 12,wherein the wireless gating signal from the first portable biometricdevice and the wireless signal from the second portable biometric deviceare received at different ports of the secure entity or service.
 15. Asecurity system for securing an entity or a service from indiscriminateaccess and for providing gated access for a third party, the securitysystem comprising: at least a portable biometric device, the devicecomprising: a biometric sensor for capturing biometric informationrepresentative of a biometric characteristic in response to a personpresenting said information to the portable biometric device; an encoderfor digitally encoding the captured biometric information and providingbiometric data in dependence thereupon; memory for storing biometricdata indicative of a biometric characteristic of a first designateduser; a processor for comparing the captured biometric data with storedbiometric data to produce a comparison result, and if the comparisonresult is indicative of the first designated user for providing awireless gating signal for enabling wireless signals provided by thethird party to access the secure entity or service, and if thecomparison result is indicative of the third party for providing awireless signal; a transmitter for wireless transmission of the wirelessgating signal or the wireless signal; at least a port for receiving thewireless gating signal and the wireless signal from the portablebiometric device; and, a locking mechanism for securing the entity orservice, the locking mechanism comprising a processor for setting a flagin response to the wireless gating signal, the flag for use in gatingreceived wireless signals for controlling access to the secure entity orservice such that in a first state the locking mechanism is nonresponsive to the wireless signals and in a second other state thelooking mechanism is responsive to the wireless signals provided by thethird party.
 16. A security system for securing an entity or a servicefrom indiscriminate access as defined in claim 15, wherein the portablebiometric device comprises memory for storing biometric data indicativeof a biometric characteristic of the third party.
 17. A security systemfor securing an entity or a service from indiscriminate to access asdefined in claim 16, wherein the security system comprises a firstportable biometric device for use by the first designated user and asecond other portable biometric device for use by the third party.
 18. Asecurity system for securing an entity or a service from indiscriminateaccess as defined in claim 15, wherein the biometric sensor comprises afingerprint imager.
 19. A security system for securing an entity or aservice from indiscriminate access as defined in claim 18, wherein thefingerprint imager comprises a capacitive fingerprint imager.
 20. Asecurity system for securing an entity or a service from indiscriminateaccess as defined in claim 15, wherein the locking mechanism comprisesmemory for storing data indicative of access privileges.