摘要:
A vehicle screening method and system. A vehicle occupant can be identified utilizing one or more biometric identifiers input by or obtained from the vehicle occupant via a biometric input device. A barcode can also be provided by the vehicle occupant from a scanned card or other structure upon which the barcode is maintained. Additionally, a unique identification number can be provided by the user in order to match the unique identification number against a database of identification numbers, thereby permitting the vehicle occupant to be remotely screened and verified for entry into a secure facility based on the biometric identifier(s), the barcode and the unique identification number.
摘要:
A vehicle screening method and system. A vehicle occupant can be identified utilizing one or more biometric identifiers input by or obtained from the vehicle occupant via a biometric input device. A barcode can also be provided by the vehicle occupant from a scanned card or other structure upon which the barcode is maintained. Additionally, a unique identification number can be provided by the user in order to match the unique identification number against a database of identification numbers, thereby permitting the vehicle occupant to be remotely screened and verified for entry into a secure facility based on the biometric identifier(s), the barcode and the unique identification number.
摘要:
A vehicle screening system for screening vehicles and occupants for entrance to a secured facility is disclosed. The system can include a processor and an interface that communicates with the processor, wherein the interface displays identification information extracted from a vehicle occupant associated with a vehicle for processing by the processor. Additionally, a plurality of controls are associated with the interface and the processor, wherein the plurality of controls facilitates the handling and management of the information extracted from the vehicle occupant to either permit or deny the vehicle occupant and the vehicle entry to a secured facility through a security gate.
摘要:
A method and system for selecting and allocating high confidence biometric data. A combination of presented identification information along with gathered biometric data are associated with an entity separated by a sensor trigger. For example, presenting a driver's license in addition to automated gathering and identification of face, iris, voice, or any other combination of biometrics can be implemented in the context of gathering and selecting biometric data. Such a method and system solves the problem of harvesting sensor data from disparate sources together to form a more strongly identified individual user profile with appropriate related identifying information.
摘要:
Systems, methods, and computer-readable and executable instructions are provided for providing a universal access device. Providing a universal access device can include storing access data for each of a number RFID readers, wherein each of the RFID readers accepts a particular RFID protocol. Providing a universal access device can also include selecting a particular RFID protocol for one of the number of RFID readers while the universal access device is within an activation zone of the RFID reader. Furthermore, providing a universal access device can include providing the access data for the particular RFID reader via the particular RFID protocol.
摘要:
A vehicle screening system for screening vehicles and occupants for entrance to a secured facility. The system can include a processor and an interface that communicates with the processor, wherein the interface displays identification information extracted from a vehicle occupant associated with a vehicle for processing by the processor. Additionally, a plurality of controls are associated with the interface and the processor, wherein the plurality of controls permit facilitates the handling and management of the information extracted from the vehicle occupant in order to permit or deny the vehicle occupant and the vehicle entry to a secured facility through a security gate.
摘要:
Devices that receive data while not directly powered and methods of operating devices that receive data while not directly powered are described herein. One or more device embodiments include an interface configured to receive data from an additional device while the device is not directly powered, a memory coupled to the interface and configured to receive the data from the interface while the device is not directly powered and store the data while the device is not directly powered, and a user interface configured to permit a user to interact with the computing device. The computing device is configured to operate in at least two different power modes, wherein the computing device is powered only via the interface while operating in a first power mode and the computing device is powered by a non-radio frequency (non-RF) power source while operating in a second power mode.
摘要:
Systems, methods, and computer-readable and executable instructions are provided for providing a universal access device. Providing a universal access device can include storing access data for each of a number RFID readers, wherein each of the RFID readers accepts a particular RFID protocol. Providing a universal access device can also include selecting a particular RFID protocol for one of the number of RFID readers while the universal access device is within an activation zone of the RFID reader. Furthermore, providing a universal access device can include providing the access data for the particular RFID reader via the particular RFID protocol.
摘要:
Devices that receive data while not directly powered and methods of operating devices that receive data while not directly powered are described herein. One or more device embodiments include an interface configured to receive data from an additional device while the device is not directly powered, a memory coupled to the interface and configured to receive the data from the interface while the device is not directly powered and store the data while the device is not directly powered, and a user interface configured to permit a user to interact with the computing device. The computing device is configured to operate in at least two different power modes, wherein the computing device is powered only via the interface while operating in a first power mode and the computing device is powered by a non-radio frequency (non-RF) power source while operating in a second power mode.
摘要:
Devices, methods, and systems for assured pipeline threat detection are described herein. One method for assured pipeline threat detection includes receiving a first set of data at a firewall from an unsecured network, moving the first set of data from the firewall to a number of virtual machines, performing a number of threat detection analyses on the first set of data in the number of virtual machines that are organized in a first assured pipeline, and sending the first set of data to a secured target network if no threat was detected.