Abstract: A method of unauthorized person identification in a particular area of an entity includes maintaining a database of identification data specific to the person and condition of entries and time period, providing a unique description for each person enabling access to the person identification data in the database. The automated face recognition system uses a new face-finding and an automated eye- finding approach combined with an intelligent metric. This allows templates to be placed on any size chip or into two-dimensional (2-D) barcodes for selfauthenticating documents, as well as for quick easy transmission over the internet, wireless devices, or Ethernet (i.e., LAN, WAN, etc.). A biometric and identity enrollment camera for collecting personal data includes a slidable main module and at least one modifiable section removable coupled to the main module. The main module includes a processor and one or more biometric sensing devices coupled to the processor. Methods of detecting authorized person identity, differentiating between users of a computerized service, and detecting an unauthorized person. The data management facility may be geographically distributed at a plurality of data management sites and the data storage nodes may exist inside and outside of a particular area of the first person.
Read full abstract