WO2002023359A1 - Systeme d'autorisation/authentification de fonctionnement d'un dispositif - Google Patents
Systeme d'autorisation/authentification de fonctionnement d'un dispositif Download PDFInfo
- Publication number
- WO2002023359A1 WO2002023359A1 PCT/JP2000/006229 JP0006229W WO0223359A1 WO 2002023359 A1 WO2002023359 A1 WO 2002023359A1 JP 0006229 W JP0006229 W JP 0006229W WO 0223359 A1 WO0223359 A1 WO 0223359A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- operator
- permission
- fingerprint
- face
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2139—Recurrent verification
Definitions
- the present invention relates to a device operation permission authentication system that authenticates operation permission based on biometric information of an operator in order to limit the operator of the device to a specific person.
- Landscape technology
- Fig. 17 is a functional block diagram showing a conventional device operation permission authentication system based on fingerprint collation.
- f 1 is a fingerprint sensor that reads a fingerprint image
- f 2 is an image processing feature extraction unit that performs image processing on the fingerprint image from the fingerprint sensor f 1 to extract features
- f 4 is an image processing feature extraction unit.
- fingerprint registration means for registering fingerprint data extracted by f 2
- f 5 registration from fingerprint registration means f 4
- fingerprint database for managing fingerprint data
- f 3 fingerprint database:
- Fingerprint matching means for comparing the fingerprint data managed in step 5 with the fingerprint data from the image processing feature extraction unit f2 at the time of matching to perform matching processing
- h5 is the illumination of the fingerprint matching means f3;
- This is an operation permission authentication unit that performs permission authentication of device operation start based on the result.
- step h51 when an operator wants to start operating the device (step h51), the fingerprint image is read from the fingerprint sensor f1, and the fingerprint image is extracted by the image processing feature extraction unit f2. Then, the fingerprint is compared with the fingerprint data in the fingerprint database f5 by the fingerprint matching means f3 to perform fingerprint matching (procedure h52). Then, when the fingerprint collation becomes OK, the operator is confirmed by the operation permission authenticating means h5 and the operation of the device is started (steps h53 to h54).
- the present invention has been made in view of the above points, and it is possible to maintain convenience and enhance security without repeating a cumbersome operation similar to the collation at the start of operation when continuing operation of a device.
- the purpose of the present invention is to provide an operation permission authentication system for devices that can perform operations.
- the device operation permission authentication system reads the first biometric information of the operator prior to operation of the device, compares the first biometric information with information stored in advance, and obtains the comparison result.
- Operation start authentication means for performing authentication of permission to start the operation based on the information stored in advance by reading non-contact second biometric information different from the first biometric information of the operator during operation of the device
- an operation continuation authentication means for performing operation continuation permission authentication based on the collation result.
- the operation start authentication unit and the operation continuation authentication unit include: a detection unit that reads biometric information of an operator; a storage unit that stores biometric information; a detection data by the detection unit; Collating means for identifying the operator by collating the stored data stored in the means, and permission authentication means for performing permission authentication for starting or continuing operation of the device based on the result of the collation by the collating means. It is characterized by having.
- the operation start authentication means includes: a fingerprint sensor as the detection means for reading an operator's fingerprint image as the first biometric information prior to operation of a device; and the storage means in which fingerprint data is recorded.
- Fingerprint data storage means as A fingerprint collation unit as the collation unit for identifying an operator by collating the fingerprint data by the fingerprint sensor with the fingerprint data stored in the fingerprint data storage unit, and a collation result by the fingerprint collation unit.
- a first permission authentication means as the permission authentication means for performing permission authentication for starting operation of the device.
- the operation and continuous authentication means includes: a camera as the detection means for reading a face image of the 11 writer as the second biometric information during operation of the device; and A face data storage unit as a storage unit, and a face data stored by the camera and a face data stored in the face data storage unit are collated to identify an operator.
- Face matching means as matching means
- second permission authentication means as permission authentication means for performing permission authentication of continuation of operation of the device based on the result of the matching by the face matching means. Is what you do.
- the operation continuation authentication unit includes a microphone as the detection unit that reads an operator's voice as the second biometric information during operation of the device, and a storage unit that stores a voiceprint data.
- a second permission authentication means as the permission authentication means for authenticating the continuation of the operation of the device based on the combined result.
- the permission authentication means of the operation start authentication means and the operation continuation authentication means is formed as one body.
- the facial data storage means temporarily stores the latest facial data of the operator by the camera when the fingerprint collation by the fingerprint collating means is OK, and the facial collation means comprises facial data by the camera. The operator is identified by comparing the facial data with the facial data temporarily stored in the facial data storage means.
- the operation continuation authentication means repeats the authentication of the operation continuation based on the verification by reading the second biometric information at predetermined time intervals after the operation start of the device is permitted.
- the operation continuation authentication means always reads the second biometric information, and when the collation does not match by reading the second biometric information, It is characterized in that the operation is interrupted and the authentication of the continuation of the operation based on the collation by reading the second biometric information is repeated.
- FIG. 1 is a functional block diagram showing a device operation authentication system according to Embodiments 1 to 3 of the present invention
- FIG. 2 is a flowchart illustrating the operation of the device operation authentication system according to the first embodiment of the present invention.
- FIG. 3 is a flowchart for explaining the operation of the device operation authentication system according to Embodiment 2 of the present invention.
- FIG. 4 is a flowchart for explaining the operation of the device operation authentication system according to Embodiment 3 of the present invention.
- FIG. 5 is a functional block diagram showing a device operation authentication system according to Embodiments 4 to 6 of the present invention.
- FIG. 6 is a flowchart for explaining the operation of the device operation authentication system according to Embodiment 4 of the present invention.
- FIG. 7 is a flowchart illustrating the operation of the device operation authentication system according to Embodiment 5 of the present invention.
- FIG. 8 is a flowchart illustrating the operation of the device operation authentication system according to Embodiment 6 of the present invention.
- FIG. 9 is a functional block diagram showing a device operation authentication system according to Embodiments 7 to 9 of the present invention.
- FIG. 10 is a flowchart illustrating the operation of the device operation authentication system according to Embodiment 7 of the present invention.
- FIG. 11 is a flowchart illustrating the operation of the device operation authentication system according to Embodiment 8 of the present invention.
- FIG. 12 is a flowchart illustrating the operation of the device operation authentication system according to Embodiment 9 of the present invention.
- FIG. 13 is a diagram showing a device operation authentication system according to Embodiments 10 to 12 of the present invention. Function block diagram showing the system,
- FIG. 14 is a flowchart illustrating the operation of the device operation authentication system according to Embodiment 10 of the present invention.
- FIG. 15 is a flowchart illustrating an operation of the device operation authentication system according to Embodiment 11 of the present invention.
- FIG. 16 is a flowchart illustrating the operation of the device operation authentication system according to Embodiment 12 of the present invention.
- FIG. 17 is a functional block diagram showing a conventional device operation permission authentication system based on fingerprint collation.
- FIG. 18 is a flowchart illustrating the operation of a conventional device operation permission authentication system based on fingerprint collation.
- FIG. 5 is a functional block diagram showing the device operation permission authentication system according to the first embodiment of the present invention.
- the device operation permission authentication system shown in Fig. 1 includes a camera i1 that reads a face image and a camera i1 as a new component in addition to the operation start authentication means similar to the conventional example that performs operation start permission authentication.
- Image processing feature extraction unit i2 which extracts image features by processing the face image from the camera, face registration means i4, which registers the face data from the face image processing feature extraction unit i2, and face registration
- face database i5 for managing the registered face data from the means i4, the face data stored in the face data i5 and the face image processing feature extraction unit i
- the operation permission authentication means h1 for performing the authentication is provided.
- the device operation permission authentication system reads the fingerprint as the operator's first biometric information before operating the device, checks the fingerprint against information stored in advance, and based on the matching result.
- Operation start to perform operation start permission authentication The authentication means, and reading the face image as the second biometric information different from the fingerprint information of the operator during the operation of the device in a non-contact manner, collating it with prestored information, and continuing the operation based on the collation result.
- Operation continuation authentication means for performing authorization authentication is provided ⁇
- the operation start authentication unit and the operation continuation authentication unit are a detection unit that reads the biometric information of the operator, a storage unit that stores the biometric information, a detection data obtained by the detection unit, and the storage unit.
- Matching means for identifying the operator by comparing the stored data stored in the storage device, and permission authentication means for performing permission authentication for starting or continuing operation of the device based on the result of the matching by the matching means. It is.
- the operation start authentication means includes a fingerprint sensor fl, an image processing feature extraction unit: f2, a fingerprint collation means; f3, a fingerprint registration means: f4, a fingerprint data base f5,
- the configuration of the operation permission authentication means h1 corresponds to the operation continuation authentication means.
- the operation continuation authentication means includes a camera i1, a face image processing feature extraction unit i2, a face matching means i3, a face registration means i4, and a face data.
- the configuration of the operation permission authentication means hi corresponds to the configuration of the operation permission authentication means h1. It is constituted integrally as.
- step hi1 when an operator wants to start operating the device (step hi1), a fingerprint image is read from the fingerprint sensor f1, and the fingerprint image is converted into fingerprint data by the image processing feature extraction unit f2. The fingerprint is converted and compared with the fingerprint data in the fingerprint database f5 using the fingerprint matching means f3 to perform fingerprint matching (step hi2). If the fingerprint collation is OK, the operator is confirmed by the operation permission authentication means h1 and the operation of the device is started (step h13 ⁇ 14).
- the face image is read from the force camera i 1, and the face image is extracted by the face image processing feature extraction unit i 2.
- the data is converted to data, and the procedure hi in the face database i5 is performed by the face matching means i3.
- step h i 6 Perform face matching by comparing with the face of the operator confirmed in step 4 (step h i 6)
- step hi7 If the face matching is OK (step hi7), the operation permission authentication means hi The above-mentioned operator is succeeded and the operation of the above-mentioned device is allowed to continue (step hi8).
- the face image is read in a non-contact manner and the permission of the continuation of the operation of the device is authenticated by the face matching.
- This has the effect of compensating for the problem of security degradation due to anyone being able to operate the device when the operation is continued.
- face matching is performed by non-contact matching means, there is no need to perform finger placement during device operation unlike fingerprint matching, and convenience is not sacrificed.
- FIG. 3 is a flowchart illustrating the operation according to the second embodiment, corresponding to the flowchart illustrated in FIG. 2 for explaining the operation according to the first embodiment described above. Note that the configuration of the device operation permission authentication system according to the second embodiment has the same configuration as the functional block diagram shown in FIG. : '
- the built-in timer mechanism determines whether a predetermined time interval has elapsed, and performs verification by reading the facial data at predetermined time intervals.
- a person who is permitted to operate a particular personal computer is moved away from the seat of the personal computer to a different place for some reason.
- the face matching function based on the face image by the camera i1 will be activated at predetermined intervals, and the face Will be executed. For this reason, if the comparison results do not match because the face is different from the authorized person of the PC operation, a message to the effect that the PC operation will be terminated is output on the PC screen at that point and the PC operation will be interrupted .
- FIG. 4 is a flowchart illustrating the operation according to the third embodiment, corresponding to the flowchart illustrated in FIG. 2 and illustrating the operation according to the first embodiment.
- the configuration of the device operation permission authentication system according to the third embodiment has the same configuration as the functional block diagram shown in FIG.
- the flow chart according to the third embodiment shown in FIG. 4 is different from the flowchart according to the first embodiment shown in FIG.
- the operation of the device is to be continued (step hi 5.)
- the operator's face image is always read by the camera i1.
- the authentication of the continuation of the operation based on the verification by reading the face image is repeated (step h15h16 ⁇ h.17 ⁇ T2 ⁇ h16).
- the third embodiment for example, when a person permitted to operate a specific personal computer has been moved to a different place away from the front of the operating seat of the personal computer for some reason.
- the face matching function based on the face image by the camera i1 is always performed. For this reason, even if another user who is not permitted to operate the computer tries to operate the personal computer, the face comparison is always performed, and the unauthorized person does not match the verification result, and the computer operation at that point
- the operation of the computer can be interrupted and the security of the operation of the computer by a specific operator can be increased.
- FIG. 5 is a functional block diagram showing a device operation permission authentication system according to Embodiment 4 of the present invention.
- i 6 is the face registration means i of the first embodiment.
- a facial temporary registering means for registering the facial data; i7 is a facial temporary storage unit provided in place of the facial data table of the first embodiment;
- h2 indicates an operation permission authentication unit according to the fourth embodiment.
- face matching is a non-contact matching means, there is no need to perform finger placing operations during device operation unlike fingerprint matching, and convenience is not sacrificed. Furthermore, since the face data obtained at 0 K of the fingerprint matching is used as a comparison for the face matching, relatively stable matching can be performed even in the face matching using a face image with a large change with time. In particular, since the latest facial image of the operator obtained by the camera at the time of fingerprint collation matching is temporarily stored and the facial collation is performed, collation can be performed using the latest facial image just a few seconds ago. Compared with the facial data 5 or 6 months or 1 year ago at the time of registration, highly accurate facial matching can be performed. Embodiment 5
- FIG. 7 corresponds to the flowchart shown in FIG. 6 for explaining the operation according to the fourth embodiment described above, and is a flowchart for explaining the operation according to the fifth embodiment. It is. Note that the configuration of the device operation permission authentication system according to the fifth embodiment has the same configuration as the functional block diagram shown in FIG.
- the flow chart according to the fifth embodiment shown in FIG. 7 differs from the flowchart according to the fourth embodiment shown in FIG. 6 in that an operation permission authenticating means h2 allows a certain operator to start operation of a device after permission to start operation of the device. If the user attempts to continue operating the device (step hi5), the built-in timer mechanism determines whether a predetermined time interval has elapsed, and reads the face data at predetermined time intervals. The operation continuation authentication based on collation is repeated (procedure h15 ⁇ hl ⁇ h16 to h18 ⁇ h15)
- a person who is permitted to operate a specific personal computer is moved away from the front of the operating seat of the personal computer to a different place for some reason.
- the face matching function based on the face image by the camera i.1 will be activated at predetermined intervals. The face matching will be performed. For this reason, if the comparison result does not match because the face is different from the authorized person of the operation of the personal computer, a message to the effect that the operation of the personal computer will be terminated is output on the personal computer screen at that point, and the personal computer operation is interrupted. Thereby, the security of the personal computer operation by the specific operator can be enhanced.
- FIG. 8 is a flowchart illustrating the operation according to the sixth embodiment, corresponding to the flowchart illustrated in FIG. 6 illustrating the operation according to the fourth embodiment described above. Note that the configuration of the device operation permission authentication system according to the sixth embodiment has the same configuration as the functional block diagram shown in FIG.
- the flowchart according to the sixth embodiment shown in FIG. 8 is different from the flowchart according to the fourth embodiment shown in FIG. 6 in that, after the operation start authenticating means h2 permits the start of the operation of the device, an operator operates the device. If you try to continue the operation (step hi).
- the sixth embodiment for example, when a person who is permitted to operate a specific personal computer is moving away from the seat of the personal computer to a different place for some reason.
- the face matching function based on the face image by the camera i1 is always performed. For this reason, even if another user who is not authorized to operate attempts to operate the personal computer, the face comparison is always performed, and the unauthorized person does not match the collation result, and the operation of the personal computer is interrupted at that point Is displayed on the screen and the PC operation is interrupted. Thereby, the security of the personal computer operation by the specific operator can be enhanced. 'Embodiment 7.
- FIG. 9 is a functional block diagram showing a device operation permission authentication system according to Embodiment 7 of the present invention.
- the components 1 to f5 are the same as in the conventional example, and the description is omitted.
- the microphone V 1 for reading the voice the voice processing of the voice from the microphone V 1, the voice processing feature extraction unit V 2 for extracting the features, and the voiceprint data from the voice processing feature extraction unit V 2 are registered.
- An operation permission authentication means h3 for performing authentication of the user is provided.
- the flow chart according to the fourth embodiment shown in FIG. 10 is different from the flow chart according to the first embodiment shown in FIG. 2 in that the operator is determined by fingerprint collation when starting operation of the device.
- Steps hi 1 to hi 4 In addition, if a certain operator attempts to continue operating the device, the voice of the operator is read by the microphone V 1.
- the voice processing feature extraction unit v2 converts the above voice into voiceprint data
- the voiceprint matching means V3 compares the voiceprint data of the operator determined in the procedure h14 in the voiceprint database V5 with the voiceprint data. To perform voiceprint collation (step T 4). If the voiceprint verification is OK in step T5, the process proceeds to step hi8, the operation permission authenticating means h3 determines the inheritance of the operator, and permits continuation of the operation of the device.
- FIG. 11 is a flowchart illustrating the operation according to the eighth embodiment, corresponding to the flowchart illustrated in FIG. 10 and illustrating the operation according to the seventh embodiment described above.
- the configuration of the device operation permission authentication system according to the eighth embodiment has the same configuration as the functional block diagram shown in FIG.
- the flow chart according to the eighth embodiment shown in FIG. 11 differs from the flow chart according to the seventh embodiment shown in FIG. 10 in that an operation permission authenticating means h3 allows a certain operator to start operation of a device after permission. If the user attempts to continue operating the device (step hi5), the built-in timer mechanism determines whether a predetermined time interval has elapsed, and continues the operation based on verification by reading voiceprint data at predetermined time intervals. (Steps h 15 ⁇ ⁇ ⁇ 4 ⁇ ⁇ 5 ⁇ 18 ⁇ 15) o
- the voiceprint collation function based on the voice reading by the microphone V1 will be activated at predetermined intervals, and the voiceprint collation will be executed. Will be done. For this reason, if the voiceprint differs from the person authorized to operate the personal computer, and the verification results do not match, a message to the effect that the operation of the personal computer will be terminated at that point is output on the personal computer screen, and the personal computer operation is interrupted. As a result, the security of the personal computer operation by a specific operator can be improved.
- FIG. 12 is a flowchart corresponding to the flowchart shown in FIG. 10 illustrating the operation according to the seventh embodiment described above, and is a flowchart illustrating the operation according to the ninth embodiment. .
- the configuration of the device operation permission authentication system according to the ninth embodiment has the same configuration as the functional block diagram shown in FIG.
- the flow chart according to the ninth embodiment shown in FIG. 12 differs from the flowchart according to the seventh embodiment shown in FIG. 10 in that the operation permission authenticating means h3 permits the start of the operation of the device.
- the voice of the operator is read by the microphone V1
- a message indicating that the subsequent operation is interrupted is displayed.
- the authentication of the continuation of the operation based on the collation by reading is repeated (step h15 14 ⁇ ⁇ 5 ⁇ ⁇ 2 ⁇ ⁇ 4).
- the ninth embodiment for example, when a person who is permitted to operate a specific personal computer is moving away from the seat of the personal computer to a different place for some reason.
- the voiceprint collation function based on the sound from the microphone V1 is always performed. For this reason, even if another user who is not permitted to operate attempts to operate the personal computer, voiceprint verification is always performed, and the injustice does not match the verification result. Outputs a message to the effect on the screen to suspend operation of the PC. As a result, the security of personal computer operation by a specific operator can be improved.
- the operation of the mobile phone reads the voice with a microphone. Since the function is always performed, when an unauthorized person operates the mobile phone, the voiceprint of the unauthorized person is not that of the authorized user, but the voiceprint When the collation results in a mismatch, the mobile phone outputs a message such as aborting the operation of the mobile phone at that point, interrupts the phone operation, and reduces the security of the specified operator by operating the mobile phone. Raise system.
- FIG. 13 is a functional block diagram showing a device operation permission authentication system according to Embodiment 10 of the present invention.
- v6 is provided in place of the voiceprint registration means v4 of Embodiment 7, and is a voiceprint for temporarily registering the voiceprint data from the voice processing feature extraction unit V2.
- the temporary registration means is shown, and v7 is a face temporary storage unit provided in place of the face data pace of the seventh embodiment, and is used by the microphone V1 at the time of fingerprint matching by the voiceprint matching means V3.
- the operator is identified by comparing the voiceprint data and the voiceprint data temporarily stored in the voiceprint temporary storage unit V7 with the voiceprint verification means V3.
- Embodiment 1 shown in FIG. 10 is different from the flow chart according to the seventh embodiment shown in FIG. 10 in that the operator is determined by fingerprint collation when starting operation of the device (steps hi1 to hi4). Further, the latest voiceprint data of the operator by the microphone V1 is stored in the voiceprint temporary storage unit V7 (procedure T6), and thereafter, the voiceprint in the voiceprint temporary storage unit V7 is output by the voiceprint verification unit V3. The voiceprint comparison is performed in comparison with the overnight, and if the voiceprint comparisons match, the operator is succeeded and confirmed by the operation permission authentication means !! ⁇ h18).
- Embodiment 10 even after the operation start of the device is permitted by fingerprint matching, the operation of the device is permitted by voiceprint matching. Security by enabling operations This has the effect of compensating for the problem of reduced sex.
- voiceprint collation is performed by non-contact collation means, there is no need to perform finger placement during device operation as in fingerprint collation, and convenience is not sacrificed. Since the voiceprint data obtained at times is used as a comparison for voiceprint verification, relatively stable verification can be performed even in voiceprint verification using voiceprint data that changes with time. In particular, since the latest voiceprint data of the operator obtained by the microphone at the time of voiceprint verification matching is temporarily stored and voiceprint verification is performed, verification can be performed using the latest voiceprint data just a few seconds ago, and the registration time is 5, 6 It is possible to perform voiceprint matching with higher accuracy compared to one month or one year ago. Embodiment 11 1.
- FIG. 15 is a flowchart corresponding to the flow chart shown in FIG. 1 '4 for explaining the operation according to the above-described' Embodiment 10 ', and is a flow chart explaining the operation according to the' 11st embodiment. is there. It should be noted that the configuration of the device operation permission authentication system according to Embodiment 11 has the same configuration as that of the functional block diagram shown in FIG.
- the flowchart according to the embodiment 11 shown in FIG. 15 differs from the flowchart according to the embodiment 10 shown in FIG. 14 in that the operation permission authenticating means h4 is used after the operation start of the device is permitted.
- the built-in timer mechanism determines whether or not a predetermined time interval has elapsed, and reads the voiceprint data at predetermined time intervals.
- the authentication of the continuation of the operation based on the verification is repeated (procedure h15T1 ⁇ 4 ⁇ ⁇ 5h18: h15).
- Embodiment 11 for example, a PC operation permitted person who is permitted to operate a specific PC moves away from the front of the PC to a different place for some reason. Even if another user who is not authorized to operate the computer attempts to operate the personal computer, the voiceprint collation function based on the sound from the microphone V1 is activated at predetermined intervals, and the voiceprint is activated. Will be performed. For this reason, the voiceprint is different from the authorized person who operates the PC. If the results do not match, a message to the effect that the PC operation will be terminated is output on the PC screen at that point, and the PC operation is interrupted. Thereby, the security of the personal computer operation by the specific operator can be enhanced. Embodiment 1 2.
- FIG. 16 is a flowchart corresponding to the flowchart shown in FIG. 14 illustrating the operation according to Embodiment 10 described above, and is a flowchart illustrating the operation according to Embodiment 12 of the present invention.
- the configuration of the device operation permission authentication system according to Embodiment 12 has the same configuration as the functional block diagram shown in FIG. '
- the flowchart according to the embodiment 12 shown in FIG. 16 differs from the flowchart according to the embodiment 10 shown in FIG. 14 in that the operation permission authenticating means h4 is used after the operation start of the device is permitted.
- the operation permission authenticating means h4 is used after the operation start of the device is permitted.
- the voice of the operator is always read by the microphone vl, and if the voiceprint verification does not match due to the reading,-the display indicates that the subsequent operation will be interrupted.
- the authentication of the continuation of the operation based on the voiceprint verification by reading the voice is repeated (step h15 "T4-> T5T2T4).
- a PC operation permitted person who is permitted to operate a specific personal computer moves away from the seat of the personal computer to a different place for some reason.
- the voiceprint collation function based on the sound from the microphone V1 is always performed even when the voiceprinting is performed. For this reason, even if another user who is not authorized to operate attempts to operate the personal computer, voiceprint verification is always performed, and the unauthorized person does not match the verification result, and the operation of the personal computer is interrupted at that point Is displayed on the screen and the PC operation is interrupted. Thereby, the security of the personal computer operation by the specific operator can be enhanced.
- the first biometric information of the operator is read and collated with information stored in advance, and based on the collation result, operation start permission authentication is performed.
- the first biometry of the operator during the operation of The second biometric information which is different from the communication information, is contactlessly read and collated with the pre-stored information, and based on the collation result, the operation continuation permission is authenticated, so that the operation of the device is continued.
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00957122A EP1318459B1 (en) | 2000-09-12 | 2000-09-12 | Device operation permitting/authenticating system |
JP2002503060A JPWO2002023359A1 (ja) | 2000-09-12 | 2000-09-12 | 機器の操作許可認証システム |
PCT/JP2000/006229 WO2002023359A1 (fr) | 2000-09-12 | 2000-09-12 | Systeme d'autorisation/authentification de fonctionnement d'un dispositif |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2000/006229 WO2002023359A1 (fr) | 2000-09-12 | 2000-09-12 | Systeme d'autorisation/authentification de fonctionnement d'un dispositif |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002023359A1 true WO2002023359A1 (fr) | 2002-03-21 |
Family
ID=11736453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2000/006229 WO2002023359A1 (fr) | 2000-09-12 | 2000-09-12 | Systeme d'autorisation/authentification de fonctionnement d'un dispositif |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1318459B1 (ja) |
JP (1) | JPWO2002023359A1 (ja) |
WO (1) | WO2002023359A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009223651A (ja) * | 2008-03-17 | 2009-10-01 | Nec Saitama Ltd | 顔認証装置、方法、プログラム及び携帯端末装置 |
US9280702B2 (en) | 2013-10-22 | 2016-03-08 | Fujitsu Limited | Image processing device and image processing method |
JP2018109879A (ja) * | 2017-01-05 | 2018-07-12 | 株式会社島津製作所 | 分析装置の制御システム、制御方法、制御プログラムおよび分析システム |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7318050B1 (en) * | 2000-05-08 | 2008-01-08 | Verizon Corporate Services Group Inc. | Biometric certifying authorities |
CA2552987C (en) | 2004-03-26 | 2013-05-28 | Bce Inc. | Security system and method |
US9454657B2 (en) * | 2004-12-03 | 2016-09-27 | Bce Inc. | Security access device and method |
JP4685532B2 (ja) * | 2005-07-14 | 2011-05-18 | 日立オムロンターミナルソリューションズ株式会社 | 生体認証システム |
CN102428405A (zh) * | 2009-06-16 | 2012-04-25 | 英特尔公司 | 手持装置中的摄像机应用 |
GB201011146D0 (en) * | 2010-07-02 | 2010-08-18 | Vodafone Ip Licensing Ltd | Mobile computing device |
JP2013191135A (ja) * | 2012-03-15 | 2013-09-26 | Fujitsu Ltd | 認証システム,処理装置及びプログラム |
WO2014169287A1 (en) * | 2013-04-12 | 2014-10-16 | Sciometrics Llc | The identity caddy: a tool for real-time determination of identity in the mobile environment |
WO2014209272A1 (en) * | 2013-06-25 | 2014-12-31 | Thomson Licensing | Secure, uninterrupted operation of mobile devices |
JP6199221B2 (ja) * | 2014-03-27 | 2017-09-20 | セコム株式会社 | 認証システム及び認証器 |
DE102014104755A1 (de) * | 2014-04-03 | 2015-10-08 | Bundesdruckerei Gmbh | Verfahren zum Authentifizieren eines Benutzers eines Mobilgerätes |
US10002242B2 (en) | 2015-08-17 | 2018-06-19 | Qualcomm Incorporated | Electronic device access control using biometric technologies |
US9826083B2 (en) | 2015-09-29 | 2017-11-21 | Google Inc. | Automatic delegation control for device sharing |
US9858403B2 (en) | 2016-02-02 | 2018-01-02 | Qualcomm Incorporated | Liveness determination based on sensor signals |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS59128637A (ja) * | 1983-01-11 | 1984-07-24 | ジエロ−ム、レメルソン | コンピユ−タ安全装置およびコンピユ−タのメモリに対して情報の記録と再生を行う方法 |
US5229764A (en) | 1991-06-20 | 1993-07-20 | Matchett Noel D | Continuous biometric authentication matrix |
JPH09134428A (ja) * | 1995-11-09 | 1997-05-20 | Hitachi Vlsi Eng Corp | 個人識別方法および個人識別装置 |
JPH09297735A (ja) * | 1996-03-08 | 1997-11-18 | Toshiba Corp | セキュリティ装置及びセキュリティ実現方法 |
EP0923018A2 (en) | 1997-12-10 | 1999-06-16 | Nec Corporation | Personal authentication system |
US6111517A (en) | 1996-12-30 | 2000-08-29 | Visionics Corporation | Continuous video monitoring using face recognition for access control |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04130908A (ja) * | 1990-09-21 | 1992-05-01 | Matsushita Electric Ind Co Ltd | 情報処理装置 |
JPH04199409A (ja) * | 1990-11-29 | 1992-07-20 | Matsushita Electric Ind Co Ltd | 情報処理装置 |
WO1995026013A1 (en) * | 1994-03-24 | 1995-09-28 | Minnesota Mining And Manufacturing Company | Biometric, personal authentication system |
JPH1063844A (ja) * | 1996-08-15 | 1998-03-06 | Nec Corp | 指紋読取機能付携帯端末 |
-
2000
- 2000-09-12 WO PCT/JP2000/006229 patent/WO2002023359A1/ja active Application Filing
- 2000-09-12 EP EP00957122A patent/EP1318459B1/en not_active Expired - Lifetime
- 2000-09-12 JP JP2002503060A patent/JPWO2002023359A1/ja active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS59128637A (ja) * | 1983-01-11 | 1984-07-24 | ジエロ−ム、レメルソン | コンピユ−タ安全装置およびコンピユ−タのメモリに対して情報の記録と再生を行う方法 |
US5229764A (en) | 1991-06-20 | 1993-07-20 | Matchett Noel D | Continuous biometric authentication matrix |
JPH09134428A (ja) * | 1995-11-09 | 1997-05-20 | Hitachi Vlsi Eng Corp | 個人識別方法および個人識別装置 |
JPH09297735A (ja) * | 1996-03-08 | 1997-11-18 | Toshiba Corp | セキュリティ装置及びセキュリティ実現方法 |
US6111517A (en) | 1996-12-30 | 2000-08-29 | Visionics Corporation | Continuous video monitoring using face recognition for access control |
EP0923018A2 (en) | 1997-12-10 | 1999-06-16 | Nec Corporation | Personal authentication system |
Non-Patent Citations (2)
Title |
---|
IBM TECHNICAL DISCLOSURE BULLETIN |
See also references of EP1318459A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009223651A (ja) * | 2008-03-17 | 2009-10-01 | Nec Saitama Ltd | 顔認証装置、方法、プログラム及び携帯端末装置 |
US9280702B2 (en) | 2013-10-22 | 2016-03-08 | Fujitsu Limited | Image processing device and image processing method |
JP2018109879A (ja) * | 2017-01-05 | 2018-07-12 | 株式会社島津製作所 | 分析装置の制御システム、制御方法、制御プログラムおよび分析システム |
Also Published As
Publication number | Publication date |
---|---|
EP1318459B1 (en) | 2012-04-11 |
EP1318459A1 (en) | 2003-06-11 |
JPWO2002023359A1 (ja) | 2004-12-16 |
EP1318459A4 (en) | 2009-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2002023359A1 (fr) | Systeme d'autorisation/authentification de fonctionnement d'un dispositif | |
CN105468950B (zh) | 身份认证方法、装置、终端及服务器 | |
US8296573B2 (en) | System and method for remote self-enrollment in biometric databases | |
EP3646247B1 (en) | User authentication based on rfid-enabled identity document and gesture challenge-response protocol | |
US20100263031A1 (en) | Communication device and communication system | |
JP4596026B2 (ja) | 認証装置及び認証システム | |
WO2018225391A1 (ja) | 画像情報検証装置 | |
EP1873729A1 (en) | Portable terminal, settlement method, and program | |
EP3096507A1 (en) | Patchwork fingerprint processing method based on mobile terminal and mobile terminal | |
WO2008083535A1 (fr) | Procédé de cryptage/décryptage d'un document électronique basé sur l'identification d'un visage humain | |
JP6163239B1 (ja) | 認証システム | |
JP2019525310A (ja) | 生体認証装置 | |
WO2014166189A1 (zh) | 一种近距离无线通讯交易认证方法和系统 | |
JP7079730B2 (ja) | ユーザの生体測定を分析するための方法および指紋感知システム | |
JP4142982B2 (ja) | 画像読み取り装置 | |
JP2007219731A (ja) | 個人認証方法及び個人認証装置 | |
JP4571426B2 (ja) | 認証システム | |
JP2010204829A (ja) | 認証装置、認証方法及び利用者認証システム | |
DE50010985D1 (de) | Verfahren zur authentisierung eines benutzers und eines endgeräts | |
JP4915169B2 (ja) | 認証システムおよび認証方法 | |
JP2000076450A (ja) | 認証装置および認証方法 | |
JP2020040571A (ja) | 車載装置、車載システムおよび車載装置の制御方法 | |
JP2007293396A (ja) | 行動体操作管理システム,ゲートの入退出管理システムおよびこれに使用する携帯端末 | |
JP2000306090A (ja) | 個人認証装置、方法及び記録媒体 | |
JP3790153B2 (ja) | Icカード認証システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2002 503060 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000957122 Country of ref document: EP |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 2000957122 Country of ref document: EP |