WO2021181839A1 - Information apparatus, program for information apparatus, and method for preventing unauthorized access to information apparatus - Google Patents

Information apparatus, program for information apparatus, and method for preventing unauthorized access to information apparatus Download PDF

Info

Publication number
WO2021181839A1
WO2021181839A1 PCT/JP2020/049115 JP2020049115W WO2021181839A1 WO 2021181839 A1 WO2021181839 A1 WO 2021181839A1 JP 2020049115 W JP2020049115 W JP 2020049115W WO 2021181839 A1 WO2021181839 A1 WO 2021181839A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user
biometric information
biometric
unit
Prior art date
Application number
PCT/JP2020/049115
Other languages
French (fr)
Japanese (ja)
Inventor
勝誉 福田
Original Assignee
福田 博美
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 福田 博美 filed Critical 福田 博美
Publication of WO2021181839A1 publication Critical patent/WO2021181839A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to an information device, a program for the information device, and a method for preventing unauthorized access to the information device.
  • Patent Document 3 discloses an alarm device that notifies by an alarm sound or the like when a third party detects an act of illegally accessing another person's information device device.
  • the alarm device is equipped with a sensor that responds to external forces, and the alarm device is installed in an information device device or notebook that you do not want others to see, and others pick up the information device device, etc. , The sensor reacts when tilted, and an alarm sound is automatically generated.
  • Patent Document 1 to Patent Document 3 not been no disclosure about a technology for identifying a third party to attempt to gain unauthorized access to the information equipment device.
  • the present invention was devised in view of the above points, and can monitor and identify a third party who attempts to illegally access an information device such as a mobile terminal device to collect information. It is an object of the present invention to provide an information device device, a program for the information device device, and a method for preventing unauthorized access to the information device device.
  • the information device has a display unit in which predetermined information is displayed when the power is on, and a first biometric information about a first user is stored.
  • the receiving unit that receives the operation signal from the second user, and the display unit, and the receiving unit receives the operation signal
  • the second user A camera unit that captures images, a second biological information storage unit that stores a second biological information regarding a second user imaged by the camera unit, the first biological information, and the second biological information. It is provided with a biometric authentication unit for collation.
  • various information such as e-mails and websites acquired through a communication line such as the Internet can be browsed through the display unit.
  • the biometric information face, fingerprint, rope
  • the biometric information face, fingerprint, rope
  • the biometric information face, fingerprint, rope
  • the camera unit when the camera unit receives the operation signal by the receiving unit, the camera unit starts imaging of the second user, triggers the operation signal based on the operation by the second user, and activates the camera unit to activate the information device.
  • the probability that an image can be taken including the face of a second user who operates the device is increased. That is, the possibility of identifying a second user who attempts unauthorized access increases.
  • the second user who has attempted to access the information device device is provided with the second biometric information storage unit that acquires and stores the second biometric information regarding the second user imaged by the camera unit.
  • Biological information face, fingerprint, retina, palm shape, etc. can be stored in the storage unit.
  • the second user who tries to access the information device is a true user (first user). Whether or not it can be determined based on the collation of biometric information.
  • the operation signal received by the receiving unit is an operation signal based on an operation by a second user immediately after the power of the information device in the power-off state or the power saving state is turned on, the operation signal reception state. Based on the above, it is possible to determine whether or not the second user has access to the information device.
  • a temporary password generator that generates a temporary password consisting of a predetermined character string is provided, and an input screen displaying the temporary password is displayed on the display unit, and an operation signal is used for inputting a predetermined character string on the input screen.
  • the signal is based on the signal, it can be used as a trigger for performing the verification determination by the biometric authentication unit described above.
  • an input screen displaying a part of a temporary password (dummy password) for inducing the second user to enter the password is displayed on the display unit. Will be done.
  • a temporary password for inducing the second user to enter the password
  • the collation by the biometric authentication unit can be reliably started based on the operation signal.
  • the purpose of the temporary password here is to receive an operation signal as a trigger for collation by the biometric authentication unit, and it is not necessary to determine whether or not the temporary password is collated.
  • the first biometric information is the first image data including the face of the first user
  • the second biometric information is the second image data including the face of the second user. It is possible to determine whether or not the first user and the second user are the same person based on the facial features that can determine the person as biometric information.
  • the contour of the face for example, the contour of the face, the matching of the detailed shape by each part constituting the face, the relative positional relationship of each part constituting the face, etc. It is possible to combine one or a plurality of collation methods.
  • the information device device program has a camera unit whose lens is pointed in the display direction of the display unit, and stores first biometric information about the first user.
  • the step of storing the second biometric information regarding the second user the step of collating the first biometric information with the second biometric information, and the step of collating the first biometric information with the second biometric information, the first biometric information and the second biometric information are collated.
  • the computer is instructed to take a step of restricting login to the information device.
  • the camera unit has a camera unit whose lens is directed in the display direction of the display unit, and receives an operation signal based on an operation by a second user of the information device device in which the first biometric information about the first user is stored. From a second user to the information device, which stores biometric information (face, fingerprint, retina, palm shape, etc.) about the first user who is the true user of the information device. It is possible to recognize the presence or absence of access.
  • the camera unit is activated by using the operation signal based on the operation by the second user as a trigger to activate the information device.
  • An image including the face of the second user to be operated can be captured.
  • the biometric information (face, fingerprint, etc.) about the second user who tried to access the information device device is provided. (Tuna membrane, palm shape, etc.) can be stored in the storage unit.
  • the biometric information of the first user and the biometric information of the second user are collated by a third party for the information device. It is possible to determine the presence or absence of unauthorized access.
  • the information device device by the second user is provided with a step of restricting login to the information device device.
  • the step of receiving the operation signal is a step of displaying an input screen in which a part of a temporary password (dummy password) composed of a predetermined character string is displayed on the display unit provided in the information device device, and a predetermined step through the input screen.
  • a temporary password dummy password
  • the operation signal of the character string of it can be a trigger for collating the first user and the second user.
  • the method for preventing unauthorized access to the information device has a force melody unit in which the lens is directed in the display direction of the display unit, and is a first method relating to a first user.
  • a step of activating the power supply of the information device device in which biological information is stored a step of receiving an operation signal based on an operation on the information device device by a second user on the information device device, and a step of receiving the operation signal.
  • a step of imaging the second user through the lens a step of storing the second biometric information about the second user imaged by the imaging step, the first biometric information and the second biometric information.
  • the step of collating the biometric information of the above and the step of restricting login to the information device when it is determined that the first biometric information and the second biometric information do not collate in the collating step. Be prepared.
  • the power supply can be turned on.
  • the second user By going from the off state to the on state, the second user to the information device device in which the biological information (face, fingerprint, retina, palm shape, etc.) about the first user who is the true user of the information device device is stored. It is possible to recognize the presence or absence of access from.
  • the operation signal based on the operation of the information device by the second user is triggered.
  • the camera unit can be activated to capture an image including the face of a second user who operates the information device.
  • the biometric information (face, fingerprint, etc.) about the second user who tried to access the information device device is provided.
  • Tuna membrane, palm shape, etc.> can be stored in the storage unit.
  • the biometric information of the first user and the biometric information of the second user are collated by a third party for the information device. It is possible to determine the presence or absence of unauthorized access.
  • the information device device by the second user is provided with a step of restricting login to the information device device.
  • the information device device, the program for the information device device, and the method for preventing unauthorized access to the information device device according to the present invention are a third party who attempts to illegally access the information device device such as a mobile terminal device to collect information. Can be monitored and identified.
  • the information device device 1 is a mobile terminal device that is assumed to be carried by the same user, and is, for example, a smartphone, a tablet terminal, a notebook PC, a wearable terminal, or the like.
  • a smartphone will be described, but all information equipment devices capable of bidirectional communication with an external device via a network are targeted.
  • the information device device 1 has an appearance as shown in FIG. 1, and displays operation buttons for operating the information device device 1, information acquired through an Internet communication line, and information stored in the information device device 1.
  • a camera unit 3 having a display unit 2 composed of a display screen, a display direction of the display unit 2 (in-camera), and a lens oriented in both directions opposite to the display direction (out-camera) is provided. ..
  • the operation buttons do not necessarily have to be the so-called touch panel type displayed on the display unit 2.
  • the display unit 2 and the operation buttons may be arranged separately, or a keypad connected to the information device 1 by wire or wirelessly may be used.
  • the camera unit 3 does not necessarily have to have both an in-camera and an out-camera.
  • at least an in-camera capable of capturing an image of a user who is operating the information device 1 may be provided.
  • the camera unit 3 in the following description means an in-camera.
  • the internal configuration of the information device device 1 includes a control unit 4 for transmitting / receiving data, storing data, and performing arithmetic processing, a first biometric information storage unit 5, and a second. It is composed of a biometric information storage unit 6, a receiving unit 7, a temporary password (dummy password) generating unit 8, a biometric authentication unit 9, and a transmitting unit 10.
  • the control unit 4 is a device that performs arithmetic processing and control processing related to the information device device 1.
  • the control unit 4 includes internal memories such as a CPU, RAM, and ROM. Details of the processing operation by the control unit 4 will be described later.
  • the first biometric information storage unit 5 is a storage medium for storing the biometric information of the true user (first user) of the information device device 1.
  • the biological information all kinds of biological information such as a face image, a fingerprint, a retina, and a palm shape can be stored.
  • the biometric information stored in the first biometric information storage unit 5 is used, for example, for collation with the biometric information of a user (second user) who attempts to log in when the power of the information device device 1 is turned on.
  • the biometric information stored in the first biometric information storage unit 5 is image data including the face of the first user (first image data).
  • the first image data may be image data captured by the camera unit 3 provided in the information device device 1, or may be image data captured by another imaging device.
  • the login method to the information device device 1 does not necessarily have to be the biometric authentication method using the registered biometric information.
  • a method of inputting a character string such as an ID or a password, or a method of inputting biometric information and a character string may be used in combination. That is, it is possible to allow login to the information device device 1 by inputting an ID and a password known only to the first user who is a true user.
  • the second biometric information storage unit 6 is a storage medium for storing the biometric information of the second user who tries to log in when the power of the information device device is turned on. That is, as described later, when the information device device 1 is accessed by the second user, the biometric information (second biometric information) of the second user who tries to log in is acquired, and the first biometric information is obtained. It is collated with the biometric information (first biometric information) of the first user stored in the storage unit 5. At this time, when the first biometric information and the second biometric information are collated, it is assumed that the first user and the second user are the same person, and login to the information device device 1 is permitted, otherwise. Restricts login as unauthorized access.
  • the biometric information stored in the second biometric information storage unit 6 is image data including the face of the second user captured by the camera unit 3 (second). Image data) is not limited to this.
  • the first biometric information is fingerprint information
  • the second biometric information stores the fingerprint information of the second user. That is, the first biometric information and the second biometric information need to be the same kind of information.
  • the receiving unit 7 is a device that receives an operation signal when the user operates the operation button of the information device device 1.
  • the receiving unit 7 can receive not only the operation signal of the operation button but also the on / off signal of the power supply of the information device device 1.
  • the receiving unit 7 and the control unit 4 described above are connected by wire or wirelessly, and when the receiving unit 7 receives an operation signal, the signal is also transmitted to the control unit 4, and the control unit 4 that receives the operation signal
  • the camera unit 3 is activated to start imaging control.
  • the operation signal does not necessarily have to be transmitted to the control unit 4 via the reception unit 7.
  • the operation signal may be directly transmitted to the control unit 4 without going through the reception unit 7.
  • the control unit 4 has a function as a reception unit 7.
  • the temporary password generation unit 8 is a device that generates a temporary password composed of a random character string.
  • the temporary password is generated when the power-on signal of the information device device 1 is received by the receiving unit 7, and is different from the login password described above, and is a dummy for inducing the second user to operate with the operation buttons. It is used as a password.
  • a random character string is generated each time the power of the information device device 1 is turned on, and an input screen is displayed on the display unit 2.
  • the temporary password consists of a character string of 4 characters
  • up to 3 characters which are a part of the temporary password are displayed as hints, and the remaining hidden 1 character is easy to guess. Displayed as a form. If a true password known only to the first user is entered on this input screen, login to the information device 1 is permitted as described above.
  • the temporary password does not necessarily have to generate a random character string each time the power of the information device device 1 is turned on.
  • the fixed temporary password may be stored in the temporary password generation unit 8, and the fixed temporary password may be displayed on the display unit 2 as a hint each time the power is turned on.
  • the display form on the display unit 2 it is not necessary to display a part of the character string constituting the temporary password.
  • a part of the temporary password as a hint, it becomes easier for the second user to guess the character string constituting the password, which can be used as a motivation for the input operation. That is, when the first user and the second user are collated by receiving the operation signal by the second user on the receiving unit 7, the temporary password (dummy password) may motivate the input. Therefore, it is possible to increase the chances of matching the first user with the second user.
  • the biometric authentication unit 9 is a device for collating the first image data stored in the first biometric information storage unit 5 with the second image data stored in the second biometric information storage unit 6. Is. When data other than the face image, for example, a fingerprint is used as the biometric authentication data, the fingerprint data of the first user and the second fingerprint data are collated.
  • control unit 4 does not necessarily have to start the imaging control of the force melody unit 3 based on the operation signal from the reception unit 7.
  • an operation signal based on the operation of the second user may be directly transmitted to the control unit 4.
  • the transmission unit 10 is a device for transmitting the second image data to an e-mail address registered in advance by the first user or a folder existing on the network designated by the first user. As will be described later, when login by the second user is restricted, the second image data is transmitted to the e-mail address registered by the first user or a folder on the network via the transmission unit 10. As a result, the first user can confirm whether or not there is an unauthorized login to the information device device 1 even when he / she is away from home.
  • the operation signal from the second user does not necessarily have to be an operation signal based on the input of the password by the second user.
  • the imaging control may be started based on the operation signal based on the operation of turning on the power of the information device 1.
  • the second biometric information When the second biometric information is acquired in S5, it is collated with the first biometric information (S6). At this time, if it is determined that the first biometric information and the second biometric information are collated, since the first user and the second user are the same person, login to the information device device 1 is permitted. (S7).
  • the face image of the second user is stored in the second biometric information storage unit 6. Therefore, the first user can identify the second user who tried to gain unauthorized access to the information device device 1 by checking the face image stored in the second biometric information storage unit 6.
  • the first user it is also possible to set the first user to send the second biometric information (second image data) to the pre-registered e-mail address or the folder on the network.
  • the second image data is transmitted to the registered e-mail address or the folder on the network in conjunction with it, so that the first user
  • contact when using fingerprint information as biometric information, for example contact can comprise a fingerprint sensor on the display unit 2, it acquires the fingerprint information of the second user operating the display unit 2, first the fingerprint information It may be stored in the biological information storage unit 6 of 2.
  • the control unit 4 takes an image of the camera unit 3. As a result, the face image of the second user can be captured, so that the second user who tried to perform unauthorized access can be identified.
  • the information device device, the program for the information device device, and the method for preventing unauthorized access to the information device device according to the present invention are the first to illegally access the information device device such as the mobile terminal device and collect information. It is possible to monitor and identify the three parties.

Abstract

Provided are an information apparatus, a program for an information apparatus, and a method for preventing unauthorized access to an information apparatus with which it is possible to monitor and identify a third party that attempts to collect information through unauthorized access to an information apparatus such as a mobile terminal device. In this information apparatus, first image data that are biological information of a first user are stored in a first biological information storage unit 5. Immediately after the information apparatus is activated, a tentative password is displayed on a display unit, and once an operation signal from a second user is received, a face image of the second user is captured and stored as second image data in a second biological information storage unit 6. In a biometric authentication unit 9, the first image data are compared with the second image data, and when it is determined that the first image data do not match the second image data, login to the information apparatus is restricted, and the second user who has attempted the unauthorized login can be identified from the second image data.

Description

情報機器装置、情報機器装置用プログラム及び情報機器装置への不正アクセス防止方法Information equipment equipment, information equipment equipment programs, and methods for preventing unauthorized access to information equipment equipment
 本発明は、情報機器装置、情報機器装置用プログラム、及び情報機器装置への不正アクセス防止方法に関する。 The present invention relates to an information device, a program for the information device, and a method for preventing unauthorized access to the information device.
 近年、インターネット等の通信環境が整備され、それを基礎とした電子メールの送受信、広告配信、電子商取引、電子申請等が盛んに行われるようになっている。このような通信環境の発達に伴い、例えば、スマートフォンやブレット端末をはじめとする携帯端末装置、或いはパーソナルコンピュータ(以下、これらを総称して「情報機器装置」という。)には、その情報機器装置の使用者の個人情報、第三者とのメールのやり取り、さらには取引先の情報など重要な秘匿性の高い情報が保存されることが多くなっている。 In recent years, communication environments such as the Internet have been improved, and e-mail transmission / reception, advertisement distribution, electronic commerce, electronic application, etc. based on the communication environment have been actively carried out. With the development of such a communication environment, for example, a portable terminal devices such as smartphones and the tablet terminal, or a personal computer (hereinafter collectively. As "information device system"), the information equipment Important and highly confidential information such as personal information of device users, exchange of emails with third parties, and information of business partners is often stored.
 そして、第三者がこれらの情報機器装置に保存された情報に容易にアクセスできないようにするセキュリティー確保の重要性が高まり、その情報機器装置を所有(使用)する者を認証(個人認証)する認証技術が普及しつつある。一般的に、情報機器装置へのアクセスに際しての個人認証の手段としては、例えばIDやパスワード等を用いたりするものが―般的であるが、その他にも指紋情報や顔情報などといった生体情報を用いて個人を特定する認証方法が知られている(例えば特許文献1や特許文献2)。そして、これらの認証方法に基づいて、その情報機器装置にログイン(使用)できるにユーザーが限定される。 Then, it is becoming more important to ensure security so that a third party cannot easily access the information stored in these information devices, and the person who owns (uses) the information devices is authenticated (individual authentication). Authentication technology is becoming widespread. Generally, as a means of personal authentication when accessing an information device, for example, an ID or a password is generally used-but other biometric information such as fingerprint information and face information is also used. An authentication method for identifying an individual by using it is known (for example, Patent Document 1 and Patent Document 2). Then, based on these authentication methods, the user is limited to be able to log in (use) the information device.
また、特許文献3には、第三者が他人の情報機器装置に不正にアクセスしようとする行為を検知した場合に警報音等により報知する警報装置が開示されている。具体的には、警報装置は外部からの力に反応するセンサを備えており、他人に見られたくない情報機器装置や手帳に警報装置を設置しておき、他人が情報機器装置等を拾い上げたり、傾けたりしたときにセンサが反応して、警報音が自動的に発生されるというものである。 Further, Patent Document 3 discloses an alarm device that notifies by an alarm sound or the like when a third party detects an act of illegally accessing another person's information device device. Specifically, the alarm device is equipped with a sensor that responds to external forces, and the alarm device is installed in an information device device or notebook that you do not want others to see, and others pick up the information device device, etc. , The sensor reacts when tilted, and an alarm sound is automatically generated.
特開2009-159539号公報Japanese Unexamined Patent Publication No. 2009-159539 特開2010-128600号公報Japanese Unexamined Patent Publication No. 2010-128600 特開2011-70619号公報Japanese Unexamined Patent Publication No. 2011-70619
 しかしながら、情報機器装置にIDやパスワードを設定したとしても、近年の情報犯罪の高度化により、それらIDやパスワードを不正に取得される機会が増えている。また、特許文献1や特許文献2に開示の技術ように、指紋情報とかいった生体情報を情報機器装置に登録した場合であっても、本人の睡眠中に第三者により指紋認証されることで容易に情報機器装置へのアクセスを許可してしまうおそれがある。 However, even if an ID or password is set in an information device, the chances of illegally obtaining the ID or password are increasing due to the sophistication of information crimes in recent years. Also, as the technique disclosed in Patent Documents 1 and 2, even when the registered fingerprint information Toka said biometric information in the information equipment device is fingerprint authentication by a third party during his or her sleep As a result, access to information equipment may be easily permitted.
 また、特許文献3に開示の警報装置においては、不正アクセスがあったことを周囲に知らせることができるが、外出時には警報装置を常時持参する必要があるとともに、本人の誤操作により警報音が発信される場合がある等、必ずしも実用的なものとはなっていなかった。 Further, in the alarm device disclosed in Patent Document 3, it is possible to notify the surroundings that there has been an unauthorized access, but it is necessary to always bring the alarm device when going out, and an alarm sound is transmitted due to an erroneous operation by the person himself / herself. It was not always practical, such as in some cases.
 さらに、特許文献1乃至特許文献3に係る技術においては、情報機器装置へ不正アクセスを試みようとする第三者を特定する技術については何ら開示がされてない。 Further, in the technique in the Patent Document 1 to Patent Document 3, not been no disclosure about a technology for identifying a third party to attempt to gain unauthorized access to the information equipment device.
 本発明は、以上の点に鑑みて創案されたものであって、携帯端末装置等の情報機器装置へ不正にアクセスをして情報収集を行おうとする第三者を監視し、特定することができる情報機器装置、情報機器装置用プログラム、及び情報機器装置への不正アクセス防止方法を提供することを目的とするものである。 The present invention was devised in view of the above points, and can monitor and identify a third party who attempts to illegally access an information device such as a mobile terminal device to collect information. It is an object of the present invention to provide an information device device, a program for the information device device, and a method for preventing unauthorized access to the information device device.
 前記の目的を達成するために、本発明に係る情報機器装置は、電源がオン状態により所定の情報が表示される表示部と、第1のユーザーに関する第1の生体情報が記憶された第1の生体情報記憶部と、第2のユーザーからの操作信号を受信する受信部と、前記表示部の表示方向にレンズが向けられ、前記受信部により前記操作信号を受信した際に第2のユーザーを撮像するカメラ部と、前記カメラ部により撮像された第2のユーザーに関する第2の生体情報を記憶する第2の生体情報記憶部と、前記第1の生体情報と前記第2の生体情報を照合する生体認証部と、を備える。 In order to achieve the above object, the information device according to the present invention has a display unit in which predetermined information is displayed when the power is on, and a first biometric information about a first user is stored. When the lens is pointed in the display direction of the biometric information storage unit, the receiving unit that receives the operation signal from the second user, and the display unit, and the receiving unit receives the operation signal, the second user A camera unit that captures images, a second biological information storage unit that stores a second biological information regarding a second user imaged by the camera unit, the first biological information, and the second biological information. It is provided with a biometric authentication unit for collation.
 ここで、電源がオン状態により所定の情報が表示される表示部を備えることにより、表示部を通じてインターネット等の通信回線を通じて取得した電子メール、ウェブサイト等の様々な情報を閲覧することができる。 Here, by providing a display unit that displays predetermined information when the power is on, various information such as e-mails and websites acquired through a communication line such as the Internet can be browsed through the display unit.
 また、第1のユーザーに関する第1の生体情報が記憶された第1の生体情報記憶部を備えることにより、情報機器装置の真のユーザーである第1のユーザーに関する生体情報(顔、指紋、綱膜、掌形等)を記憶させることができる。これにより、生体情報が照合した場合にのみ情報機器装置へのアクセスを許可することができるため、第三者からの不正アクセスの機会を低減することができる。 Further, by providing the first biometric information storage unit in which the first biometric information regarding the first user is stored, the biometric information (face, fingerprint, rope) regarding the first user who is the true user of the information device device is provided. Membrane, palm shape, etc.) can be memorized. As a result, access to the information device can be permitted only when the biometric information is collated, so that the chance of unauthorized access from a third party can be reduced.
 また、表示部の表示方向にレンズが向けられたカメラ部を備えることにより、情報機器装置を操作するユーザーの顔部分を焦点として撮像することができる。 Further, by providing a camera unit in which the lens is pointed in the display direction of the display unit, it is possible to take an image by focusing on the face portion of the user who operates the information device.
 また、カメラ部は、受信部により操作信号を受信すると、第2のユーザーの撮像を開始することにより、第2のユーザーによる操作に基づく操作信号をトリガーとして、カメラ部を起動して、情報機器装置を操作する第2のユーザーの顔を含めて撮像できる確率が高まる。即ち、不正アクセスを試みる第2のユーザーを特定できる可能性が高まる。 Further, when the camera unit receives the operation signal by the receiving unit, the camera unit starts imaging of the second user, triggers the operation signal based on the operation by the second user, and activates the camera unit to activate the information device. The probability that an image can be taken including the face of a second user who operates the device is increased. That is, the possibility of identifying a second user who attempts unauthorized access increases.
 また、前記カメラ部により撮像された第2のユーザーに関する第2の生体情報を取得して記憶する第2の生体情報記憶部を備えることにより、情報機器装置にアクセスを試みた第2のユーザーに関する生体情報(顔、指紋、網膜、掌形等)を記憶部に記憶させることができる。 Further, the second user who has attempted to access the information device device is provided with the second biometric information storage unit that acquires and stores the second biometric information regarding the second user imaged by the camera unit. Biological information (face, fingerprint, retina, palm shape, etc.) can be stored in the storage unit.
 また、第1の生体情報と第2の生体情報とを照合する生体認証部を備えることにより、情報機器装置へのアクセスを試みた第2のユーザーが真のユーザー(第1のユーザー)であるか否かを生体情報の照合に基づいて判定することができる。 Further, by providing a biometric authentication unit that collates the first biometric information with the second biometric information, the second user who tries to access the information device is a true user (first user). Whether or not it can be determined based on the collation of biometric information.
 また、受信部で受信する操作信号は、電源がオフ状態、又は省電力状態にある情報機器装置の電源起動直後の第2ユーザーによる操作に基づく操作信号である場合には、操作信号の受信状態に基づいて、第2のユ-ザーによる情報機器装置へのアクセスの有無を判別することができる。 If the operation signal received by the receiving unit is an operation signal based on an operation by a second user immediately after the power of the information device in the power-off state or the power saving state is turned on, the operation signal reception state. Based on the above, it is possible to determine whether or not the second user has access to the information device.
 また、所定の文字列からなる仮パスワードを生成する仮パスワード生成部を備え、表示部には、仮パスワードを表示した入力画面が表示され、操作信号は入力画面に対する所定の文字列の入力操作に基づく信号である場合には、前記した生体認証部による照合判定を行うためのトリガーとすることができる。 In addition, a temporary password generator that generates a temporary password consisting of a predetermined character string is provided, and an input screen displaying the temporary password is displayed on the display unit, and an operation signal is used for inputting a predetermined character string on the input screen. When the signal is based on the signal, it can be used as a trigger for performing the verification determination by the biometric authentication unit described above.
 即ち、情報機器装置の電源がオンされると、表示部には第2のユーザーに対してパスワードの入カを誘導するための仮パスワード(ダミーパスワード)の一部が表示された入力画面が表示される。このとき、一連の操作として、何らかの文字列を第2のユーザーが入力すると、その操作信号に基づいて生体認証部による照合を確実に開始することができる。なお、ここでの仮パスワードは、生体認証部による照合を行うためのトリガーとしての操作信号を受信することが目的であり、仮パスワードの照合の有無を判定する必要はない。 That is, when the power of the information device is turned on, an input screen displaying a part of a temporary password (dummy password) for inducing the second user to enter the password is displayed on the display unit. Will be done. At this time, when a second user inputs some character string as a series of operations, the collation by the biometric authentication unit can be reliably started based on the operation signal. The purpose of the temporary password here is to receive an operation signal as a trigger for collation by the biometric authentication unit, and it is not necessary to determine whether or not the temporary password is collated.
 また、第1の生体情報は、第1のユーザーの顔を含む第1の画像データであり、第2の生体情報は、第2のユーザーの顔を含む第2の画像データである場合には、生体情報として人物判定が可能な顔の特徴に基づいて、第1のユーザーと第2のユーザーが同一人物であるか否かを判定することができる。 Further, when the first biometric information is the first image data including the face of the first user, and the second biometric information is the second image data including the face of the second user. It is possible to determine whether or not the first user and the second user are the same person based on the facial features that can determine the person as biometric information.
 なお、第1の画像データと第2の画像データの比較においては、例えば顔の輪郭、顔を構成する各パーツによる細部形状の照合、顔を構成する各パーツの相対的な位置関係等のいずれか一つ、或いは複数の照合方法を組み合わせることが可能である。 In the comparison between the first image data and the second image data, for example, the contour of the face, the matching of the detailed shape by each part constituting the face, the relative positional relationship of each part constituting the face, etc. It is possible to combine one or a plurality of collation methods.
 前記の目的を達成するために、本発明に係る情報機器装置用プログラムは、表示部の表示方向にレンズが向けられたカメラ部を有し、第1のユーザーに関する第1の生体情報が記憶された情報機器装置の第2のユーザーによる操作に基づく操作信号を受信するステップと、該操作信号の受信後に、前記レンズを通じて第2のユーザーを撮像するステップと、前記撮像するステップにより撮像された第2のユーザーに関する第2の生体情報を記憶するステップと、前記第1の生体情報と前記第2の生体情報を照合するステップと、該照合するステップにおいて、前記第1の生体情報と前記第2の生体情報が照合しないと判定した場合に、前記情報機器装置へのログインを制限するステップと、をコンピュータに対して指示する。 In order to achieve the above object, the information device device program according to the present invention has a camera unit whose lens is pointed in the display direction of the display unit, and stores first biometric information about the first user. A step of receiving an operation signal based on an operation by a second user of the information equipment device, a step of imaging the second user through the lens after receiving the operation signal, and a step of imaging by the imaging step. In the step of storing the second biometric information regarding the second user, the step of collating the first biometric information with the second biometric information, and the step of collating the first biometric information with the second biometric information, the first biometric information and the second biometric information are collated. When it is determined that the biometric information of the information device is not collated, the computer is instructed to take a step of restricting login to the information device.
 ここで、表示部の表示方向にレンズが向けられたカメラ部を有し、第1のユーザーに関する第1の生体情報が記憶された情報機器装置の第2のユーザーによる操作に基づく操作信号を受信するステップを備えるとことにより、情報機器装置の真のユーザーである第1のユーザーに関する生体情報(顔、指紋、網膜、掌形等)が記憶された情報機器装置への第2のユーザーからのアクセスの有無を認識することができる。 Here, the camera unit has a camera unit whose lens is directed in the display direction of the display unit, and receives an operation signal based on an operation by a second user of the information device device in which the first biometric information about the first user is stored. From a second user to the information device, which stores biometric information (face, fingerprint, retina, palm shape, etc.) about the first user who is the true user of the information device. It is possible to recognize the presence or absence of access.
 また、操作信号を受信するステップの後に、レンズを通じて第2のユーザーを撮像するステップを備えることにより、第2のユーザーによる操作に基づく操作信号をトリガーとして、カメラ部を起動して情報機器装置を操作する第2のユーザーの顔を含む画像を撮像することができる。 Further, by providing a step of imaging the second user through the lens after the step of receiving the operation signal, the camera unit is activated by using the operation signal based on the operation by the second user as a trigger to activate the information device. An image including the face of the second user to be operated can be captured.
 また、前記撮像するステップにより撮像された第2のユーザーに関する第2の生体情報を記憶するステップを備えることにより、情報機器装置へのアクセスを試みた第2のユーザーに関する生体情報(顔、指紋、綱膜、掌形等)を記憶部に記憶することができる。 Further, by providing a step of storing the second biometric information about the second user captured by the imaging step, the biometric information (face, fingerprint, etc.) about the second user who tried to access the information device device is provided. (Tuna membrane, palm shape, etc.) can be stored in the storage unit.
 また、第1の生体情報と第2の生体情報を照合するステップを備えることにより、第1のユーザーの生体情報と第2のユーザーの生体情報を照合して、情報機器装置に対する第三者による不正アクセスの有無を判定することができる。 Further, by providing a step of collating the first biometric information and the second biometric information, the biometric information of the first user and the biometric information of the second user are collated by a third party for the information device. It is possible to determine the presence or absence of unauthorized access.
 また、照合するステップにおいて、第1の生体情報と第2の生体情報が照合しないと判定した場合に、情報機器装置へのログインを制限するステップを備えることにより、第2のユーザーによる情報機器装置への不正アクセスがあったものと判断して、以後の情報機器装置へのアクセスを制限することで、第三者からの不正アクセスを確実に防止することができる。 Further, in the collation step, when it is determined that the first biometric information and the second biometric information do not collate, the information device device by the second user is provided with a step of restricting login to the information device device. By determining that there was unauthorized access to the information device and restricting subsequent access to the information device, it is possible to reliably prevent unauthorized access from a third party.
 また、操作信号を受信するステップは、情報機器装置に備える表示部に、所定の文字列からなる仮パスワード(ダミーパスワード)の一部が表示された入力画面を表示するステップ、及び入力画面を通じて所定の文字列の操作信号を受信するステップを有する場合には、第1のユーザーと第2のユーザーの照合を行うためのトリガーとすることができる。 Further, the step of receiving the operation signal is a step of displaying an input screen in which a part of a temporary password (dummy password) composed of a predetermined character string is displayed on the display unit provided in the information device device, and a predetermined step through the input screen. When it has a step of receiving the operation signal of the character string of, it can be a trigger for collating the first user and the second user.
 即ち、情報機器装置の電源がオンされると、表示部には第2のユーザーに対してパスワードの入カを誘導するための仮パスワード(ダミーパスワード)の一部が表示された入力画面が表示される。このとき、一連の操作として、何らかの文字列を第2のユーザーが入力すると、その操作信号に基づいて生体認証部による照合を確実に開始することができる。 That is, when the power of the information device is turned on, an input screen displaying a part of a temporary password (dummy password) for inducing the second user to enter the password is displayed on the display unit. Will be done. At this time, when a second user inputs some character string as a series of operations, the collation by the biometric authentication unit can be reliably started based on the operation signal.
 前記の目的を達成するために、本発明に係る情報機器装置への不正アクセス防止方法は、表示部の表示方向にレンズが向けられた力メラ部を有し、第1のユーザーに関する第1の生体情報が記憶された情報機器装置の電源を起動する工程と、前記情報機器装置に対する第2のユーザーによる前記情報機器装置に対する操作に基づく操作信号を受信する工程と、該操作信号を受信する工程の後に、前記レンズを通じて第2のユーザーを撮像する工程と、前記撮像する工程により撮像された第2のユーザーに関する第2の生体情報を記憶する工程と、前記第1の生体情報と前記第2の生体情報を照合する工程と、該照合する工程において、前記第1の生体情報と前記第2の生体情報が照合しないと判定した場合に、前記情報機器装置へのログインを制限する工程とを備える。 In order to achieve the above object, the method for preventing unauthorized access to the information device according to the present invention has a force melody unit in which the lens is directed in the display direction of the display unit, and is a first method relating to a first user. A step of activating the power supply of the information device device in which biological information is stored, a step of receiving an operation signal based on an operation on the information device device by a second user on the information device device, and a step of receiving the operation signal. After that, a step of imaging the second user through the lens, a step of storing the second biometric information about the second user imaged by the imaging step, the first biometric information and the second biometric information. In the step of collating the biometric information of the above, and the step of restricting login to the information device when it is determined that the first biometric information and the second biometric information do not collate in the collating step. Be prepared.
 ここで、表示部の表示方向にレンズが向けられたカメラ部を有し、第1のユーザーに関する第1の生体情報が記憶され、情報機器装置の電源を起動する工程を備えることにより、電源がオフ状態からオン状態になることで、情報機器装置の真のユーザーである第1のユーザーに関する生体情報(顔、指紋、網膜、掌形等)が記憶された情報機器装置への第2のユーザーからのアクセスの有無を認識することができる。 Here, by having a camera unit in which the lens is directed in the display direction of the display unit, the first biological information regarding the first user is stored, and a step of activating the power supply of the information device device is provided, the power supply can be turned on. By going from the off state to the on state, the second user to the information device device in which the biological information (face, fingerprint, retina, palm shape, etc.) about the first user who is the true user of the information device device is stored. It is possible to recognize the presence or absence of access from.
 また、第2のユーザーによる操作に基づく操作信号を受信する工程の後に、レンズを通じて第2のユーザーを撮像する工程を備えることにより、第2のユーザーによる情報機器装置の操作に基づく操作信号をトリガーとしてカメラ部を起動して、情報機器装置を操作する第2のユーザーの顔を含む画像を撮像することができる。 Further, by providing a step of imaging the second user through the lens after the step of receiving the operation signal based on the operation by the second user, the operation signal based on the operation of the information device by the second user is triggered. As a result, the camera unit can be activated to capture an image including the face of a second user who operates the information device.
 また、前記撮像する工程により撮像された第2のユーザーに関する第2の生体情報を記憶する工程を備えることにより、情報機器装置へのアクセスを試みた第2のユーザーに関する生体情報(顔、指紋、綱膜、掌形等〉を記憶部に記憶することができる。 Further, by providing a step of storing the second biometric information about the second user captured by the imaging step, the biometric information (face, fingerprint, etc.) about the second user who tried to access the information device device is provided. Tuna membrane, palm shape, etc.> can be stored in the storage unit.
 また、第1の生体情報と第2の生体情報を照合する工程を備えることにより、第1のユーザーの生体情報と第2のユーザーの生体情報を照合して、情報機器装置に対する第三者による不正アクセスの有無を判定することができる。 In addition, by providing a step of collating the first biometric information with the second biometric information, the biometric information of the first user and the biometric information of the second user are collated by a third party for the information device. It is possible to determine the presence or absence of unauthorized access.
 また、照合する工程において、第1の生体情報と第2の生体情報が照合しないと判定した場合に、情報機器装置へのログインを制限する工程を備えることにより、第2のユーザーによる情報機器装置への不正アクセスがあったものと判断して、以後の情報機器装置へのアクセスを制限することで、第三者からの不正アクセスを確実に防止することができる。 Further, in the collation step, when it is determined that the first biometric information and the second biometric information do not collate, the information device device by the second user is provided with a step of restricting login to the information device device. By determining that there was unauthorized access to the information device and restricting subsequent access to the information device, it is possible to reliably prevent unauthorized access from a third party.
 本発明に係る情報機器装置、情報機器装置用プログラム、及び情報機器装置への不正アクセス防止方法は、携帯端末装置等の情報機器装置へ不正にアクセスをして情報収集を行おうとする第三者を監視、特定することができる。 The information device device, the program for the information device device, and the method for preventing unauthorized access to the information device device according to the present invention are a third party who attempts to illegally access the information device device such as a mobile terminal device to collect information. Can be monitored and identified.
本発明の実施形態に係る情報機器装置の全体外観図である。It is an overall external view of the information equipment apparatus which concerns on embodiment of this invention. 本発明の実施形態に係る情報機器装置のブロック図を示す図である。It is a figure which shows the block diagram of the information equipment apparatus which concerns on embodiment of this invention. 本発明の実施形態に係る制御部における演算(処理)フロー図である。It is a calculation (processing) flow diagram in the control part which concerns on embodiment of this invention.
 以下、本発明の実施の形態について、図面を参酌しながら説明し、本発明の理解に供する。 Hereinafter, embodiments of the present invention will be described with reference to the drawings to help understand the present invention.
 本発明の実施形態に係る情報機器装置1は、同一のユーザーが持ち歩くことを想定した携帯端末装置であり、例えばスマートフォン、タブレット端末、ノート型PC、ウェアラブル端末等である。なお、以下では説明の便宜上、スマートフォンを想定して説明するが、ネットワークを通じて外部機器と双方向に通信が可能な情報機器装置の全てが対象となる。 The information device device 1 according to the embodiment of the present invention is a mobile terminal device that is assumed to be carried by the same user, and is, for example, a smartphone, a tablet terminal, a notebook PC, a wearable terminal, or the like. In the following, for convenience of explanation, a smartphone will be described, but all information equipment devices capable of bidirectional communication with an external device via a network are targeted.
 情報機器装置1は、図1に示すような外観からなり、情報機器装置1に対する操作を行うための操作ボタン、或いはインターネット通信回線を通じて取得した情報や情報機器装置1内に記憶された情報を表示するためのディスプレイ画面からなる表示部2、表示部2の表示方向(インカメラ)、及び表示方向とは反対方向(アウトカメラ)の双方向に向けられたレンズを有するカメラ部3を備えている。 The information device device 1 has an appearance as shown in FIG. 1, and displays operation buttons for operating the information device device 1, information acquired through an Internet communication line, and information stored in the information device device 1. A camera unit 3 having a display unit 2 composed of a display screen, a display direction of the display unit 2 (in-camera), and a lens oriented in both directions opposite to the display direction (out-camera) is provided. ..
 ここで、必ずしも、操作ボタンは表示部2に表示される、所謂タッチパネル式である必要はない。例えば表示部2と操作ボタンが分離して配置される形態のものや、情報機器装置1と有線または無線で接続されるキーパッドを使用する形態のものであってもよい。 Here, the operation buttons do not necessarily have to be the so-called touch panel type displayed on the display unit 2. For example, the display unit 2 and the operation buttons may be arranged separately, or a keypad connected to the information device 1 by wire or wirelessly may be used.
 また、必ずしも、カメラ部3はインカメラ、及びアウトカメラの両方を備えている必要はない。本発明の実施形態においては、少なくとも情報機器装置1を操作中のユーザーを撮像可能なインカメラを備えていればよい。なお、以下説明におけるカメラ部3とはインカメラを意味する。 Also, the camera unit 3 does not necessarily have to have both an in-camera and an out-camera. In the embodiment of the present invention, at least an in-camera capable of capturing an image of a user who is operating the information device 1 may be provided. The camera unit 3 in the following description means an in-camera.
 情報機器装置1の内部構成は、図2に示すブロック図のように、データの送受信やデータの記憶、及び演算処理を行うための制御部4、第1の生体情報記憶部5、第2の生体情報記憶部6、受信部7、仮パスワード(ダミーパスワード)生成部8、生体認証部9、及び送信部10から構成されている。 As shown in the block diagram shown in FIG. 2, the internal configuration of the information device device 1 includes a control unit 4 for transmitting / receiving data, storing data, and performing arithmetic processing, a first biometric information storage unit 5, and a second. It is composed of a biometric information storage unit 6, a receiving unit 7, a temporary password (dummy password) generating unit 8, a biometric authentication unit 9, and a transmitting unit 10.
 制御部4は、情報機器装置1に係る演算処理、及び制御処理を行う装置である。制御部4は、例えばCPU、RAM、ROM等の内部メモリを備える。係る制御部4による処理動作の詳細は後記する。 The control unit 4 is a device that performs arithmetic processing and control processing related to the information device device 1. The control unit 4 includes internal memories such as a CPU, RAM, and ROM. Details of the processing operation by the control unit 4 will be described later.
 第1の生体情報記憶部5は、情報機器装置1の真のユーザー(第1のユーザー)の生体情報を記憶しておくための記憶媒体である。生体情報としては、例えば顔画像、指紋、網膜、掌形等、あらゆる生体情報を記憶させることができる。これら第1の生体情報記憶部5に記憶された生体情報は、例えば、情報機器装置1の電源起動時にログインを試みるユーザー(第2のユーザー)の生体情報との照合に使用される。 The first biometric information storage unit 5 is a storage medium for storing the biometric information of the true user (first user) of the information device device 1. As the biological information, all kinds of biological information such as a face image, a fingerprint, a retina, and a palm shape can be stored. The biometric information stored in the first biometric information storage unit 5 is used, for example, for collation with the biometric information of a user (second user) who attempts to log in when the power of the information device device 1 is turned on.
 なお、本発明の実施形態においては、第1の生体情報記憶部5に記憶された生体情報としては、第1のユーザーの顔を含む画像データである(第1の画像データ)。この第1の画像データは、情報機器装置1に備えるカメラ部3で撮像された画像データであってもよく、或いは他の撮像装置で撮像された画像データであってもよい。 In the embodiment of the present invention, the biometric information stored in the first biometric information storage unit 5 is image data including the face of the first user (first image data). The first image data may be image data captured by the camera unit 3 provided in the information device device 1, or may be image data captured by another imaging device.
 ここで、必ずしも、情報機器装置1へのログイン方法としては、登録した生体情報による生体認証方法である必要はない。例えば、IDやパスワードといった文字列を入力する方式のものや、生体情報と文字列を入力する方式のものを併用するものであってもよい。即ち、真のユーザーである第1のユーザーのみが知るIDやパスワードを入力することで情報機器装置1へのログインを許可することもできる。 Here, the login method to the information device device 1 does not necessarily have to be the biometric authentication method using the registered biometric information. For example, a method of inputting a character string such as an ID or a password, or a method of inputting biometric information and a character string may be used in combination. That is, it is possible to allow login to the information device device 1 by inputting an ID and a password known only to the first user who is a true user.
 第2の生体情報記憶部6は、情報機器装置の電源起動時にログインを試みる第2のユーザーの生体情報を記憶するための記憶媒体である。即ち、後記する通り、第2のユーザーによる情報機器装置1へのアクセスがあった場合に、ログインを試みる第2のユーザーの生体情報(第2の生体情報)を取得し、第1の生体情報記憶部5に記憶されている第1のユーザーの生体情報(第1の生体情報)と照合される。この時、第1の生体情報と第2の生体情報が照合する場合には、第1のユーザーと第2のユーザーは同一人物であるとして情報機器装置1へのログインを許可し、そうでない場合は不正アクセスとしてログインを制限する。 The second biometric information storage unit 6 is a storage medium for storing the biometric information of the second user who tries to log in when the power of the information device device is turned on. That is, as described later, when the information device device 1 is accessed by the second user, the biometric information (second biometric information) of the second user who tries to log in is acquired, and the first biometric information is obtained. It is collated with the biometric information (first biometric information) of the first user stored in the storage unit 5. At this time, when the first biometric information and the second biometric information are collated, it is assumed that the first user and the second user are the same person, and login to the information device device 1 is permitted, otherwise. Restricts login as unauthorized access.
 なお、本発明の実施形態においては、第2の生体情報記憶部6に記憶される生体情報としては、カメラ部3で撮像された第2のユーザーの顔を含む画像データである(第2の画像データ)が、これに限定されるものではない。例えば、第1の生体情報が指紋情報である場合には、第2の生体情報は第2のユーザーの指紋情報が記憶されることになる。即ち、第1の生体情報と第2の生体情報は同種の情報である必要がある。 In the embodiment of the present invention, the biometric information stored in the second biometric information storage unit 6 is image data including the face of the second user captured by the camera unit 3 (second). Image data) is not limited to this. For example, when the first biometric information is fingerprint information, the second biometric information stores the fingerprint information of the second user. That is, the first biometric information and the second biometric information need to be the same kind of information.
 受信部7は、ユーザーによる情報機器装置1の操作ボタンを操作した場合の操作信号を受信する装置である。なお、受信部7は操作ボタンの操作信号だけでなく、情報機器装置1の電源のオンオフ信号も受信することが可能である。 The receiving unit 7 is a device that receives an operation signal when the user operates the operation button of the information device device 1. The receiving unit 7 can receive not only the operation signal of the operation button but also the on / off signal of the power supply of the information device device 1.
 受信部7と前記した制御部4は有線、又は無線により接続されており、受信部7が操作信号を受信すると、その信号が制御部4にも送信され、操作信号を受けた制御部4はカメラ部3を起動させ、撮像制御を開始する構成となっている。 The receiving unit 7 and the control unit 4 described above are connected by wire or wirelessly, and when the receiving unit 7 receives an operation signal, the signal is also transmitted to the control unit 4, and the control unit 4 that receives the operation signal The camera unit 3 is activated to start imaging control.
 ここで、必ずしも、操作信号は受信部7を介して制御部4に送信される必要はない。例えば、操作信号が受信部7を介することなく、制御部4に直接送信される構成としてもよい。この場合制御部4が受信部7としての機能を有することになる。 Here, the operation signal does not necessarily have to be transmitted to the control unit 4 via the reception unit 7. For example, the operation signal may be directly transmitted to the control unit 4 without going through the reception unit 7. In this case, the control unit 4 has a function as a reception unit 7.
 仮パスワード生成部8は、ランダムの文字列からなる仮パスワードを生成する装置である。仮パスワードは、情報機器装置1の電源投入の信号を受信部7で受信すると生成され、前記したログイン用のパスワードとは異なり、第2のユーザーに対して操作ボタンによる操作を誘導するためのダミーパスワードとして使用されるものである。 The temporary password generation unit 8 is a device that generates a temporary password composed of a random character string. The temporary password is generated when the power-on signal of the information device device 1 is received by the receiving unit 7, and is different from the login password described above, and is a dummy for inducing the second user to operate with the operation buttons. It is used as a password.
 なお、仮パスワード生成部8で生成される仮パスワードは、情報機器装置1の電源がオンされる都度、ランダムの文字列が生成されるとともに、表示部2に入力画面が表示される。このとき、図1に示すように、例えば仮パスワードが4文字の文字列からなる場合に、その一部である3文字までをヒントとして表示し、残りの非表示の1文字が推測しやすい表示形態として表示される。なお、この入力画面において第1のユーザーのみが知る真のパスワードを入力すると、前記した通り情報機器装置1へのログインが許可される。 For the temporary password generated by the temporary password generation unit 8, a random character string is generated each time the power of the information device device 1 is turned on, and an input screen is displayed on the display unit 2. At this time, as shown in FIG. 1, for example, when the temporary password consists of a character string of 4 characters, up to 3 characters which are a part of the temporary password are displayed as hints, and the remaining hidden 1 character is easy to guess. Displayed as a form. If a true password known only to the first user is entered on this input screen, login to the information device 1 is permitted as described above.
 ここで、必ずしも、仮パスワードは情報機器装置1の電源がオンされる都度、ランダムの文字列が生成される必要はない。例えば、固定の仮パスワードを仮パスワード生成部8に記憶させておき、係る固定の仮パスワードを電源がオンされる都度、ヒントとして表示部2に表示させるようにしてもよい。 Here, the temporary password does not necessarily have to generate a random character string each time the power of the information device device 1 is turned on. For example, the fixed temporary password may be stored in the temporary password generation unit 8, and the fixed temporary password may be displayed on the display unit 2 as a hint each time the power is turned on.
 また、表示部2への表示形態として、仮パスワードを構成する文字列の一部を表示する表示形態である必要はない。但し、仮パスワードの一部をヒントとして表示することで、第2のユーザーにとってはパスワードを構成する文字列を推測し易くなり、入力操作の動機付けとすることができる。即ち、第2のユーザーによる操作信号を受信部7で受信することにより第1のユーザーと第2ユーザーの照合を実施する場合には、仮パスワード(ダミーパスワード)が入力の動機付けを与えることができるため、第1のユーザーと第2のユーザーを照合する機会を増やすことができる。 Further, as the display form on the display unit 2, it is not necessary to display a part of the character string constituting the temporary password. However, by displaying a part of the temporary password as a hint, it becomes easier for the second user to guess the character string constituting the password, which can be used as a motivation for the input operation. That is, when the first user and the second user are collated by receiving the operation signal by the second user on the receiving unit 7, the temporary password (dummy password) may motivate the input. Therefore, it is possible to increase the chances of matching the first user with the second user.
 生体認証部9は、第1の生体情報記憶部5に記憶されている第1の画像データと、第2の生体情報記憶部6に記憶されている第2の画像データを照合するための装置である。なお、生体認証データとして、顔画像以外のデータ、例えば指紋を用いる場合には、第1のユーザーの指紋データと第2の指紋データの照合が行われる。 The biometric authentication unit 9 is a device for collating the first image data stored in the first biometric information storage unit 5 with the second image data stored in the second biometric information storage unit 6. Is. When data other than the face image, for example, a fingerprint is used as the biometric authentication data, the fingerprint data of the first user and the second fingerprint data are collated.
 ここで、必ずしも、制御部4は受信部7からの操作信号に基づいて力メラ部3の撮像制御を開始する必要はない。例えば、第2のユーザーの操作に基づく操作信号が直接制御部4に送信されるようにしてもよい。 Here, the control unit 4 does not necessarily have to start the imaging control of the force melody unit 3 based on the operation signal from the reception unit 7. For example, an operation signal based on the operation of the second user may be directly transmitted to the control unit 4.
 送信部10は、第1のユーザーが予め登録した電子メールアドレス、或いは第1のユーザーが指定したネットワーク上に存在するフォルダに第2の画像データを送信するための装置である。後記する通り、第2のユーザーによるログインが制限された場合に、送信部10を介して、第1のユーザーが登録した電子メールアドレス、或いはネットワーク上のフォルダに第2の画像デーダが送信されることで、第1のユーザーが外出先においても、情報機器装置1への不正ログインの有無を確認することが可能となる。 The transmission unit 10 is a device for transmitting the second image data to an e-mail address registered in advance by the first user or a folder existing on the network designated by the first user. As will be described later, when login by the second user is restricted, the second image data is transmitted to the e-mail address registered by the first user or a folder on the network via the transmission unit 10. As a result, the first user can confirm whether or not there is an unauthorized login to the information device device 1 even when he / she is away from home.
 以上が、本発明の実施形態に係る情報機器装置1の構成である。次に、情報機器装置1の制御部4における処理フローについて図3に基づいて説明する。 The above is the configuration of the information device 1 according to the embodiment of the present invention. Next, the processing flow in the control unit 4 of the information equipment device 1 will be described with reference to FIG.
 <第1の生体情報の登録状況の確認>
まず、第1のユーザーの生体情報が、第1の生体情報として第1の生体情報記憶部5に登録されているか否かが確認される(S1)。第1の生体情報が登録されていない場合には、情報機器装置1へのログイン方法としてIDまたはパスワードのみによるものであるとして、処理を終了する。一方、第1の生体情報が登録されている場合には、制御部4による処理を続行する。
<Confirmation of registration status of the first biometric information>
First, it is confirmed whether or not the biometric information of the first user is registered in the first biometric information storage unit 5 as the first biometric information (S1). If the first biometric information is not registered, it is assumed that the login method to the information device device 1 is only by the ID or password, and the process is terminated. On the other hand, when the first biometric information is registered, the process by the control unit 4 is continued.
 <情報機器装置の電源状態の確認>
情報機器装置1の電源がオフ状態、又は省電力状態からオン状態に移行したか否かが判定される(S2)。電源がオン状態の場合には、既に真のユーザーである第1のユーザーによる正式なログイン操作が行われて情報機器装置1が起動しているものと判断して、処理を終了する。一方、電源がオフ状態からオン状態となったと判定された場合には、第2のユーザーによるログイン操作が行われるものとして、処理を続行する。
<Checking the power status of information equipment>
It is determined whether or not the power supply of the information device device 1 has changed from the off state or the power saving state to the on state (S2). When the power is on, it is determined that the information device device 1 has already been activated by a formal login operation by the first user who is a true user, and the process ends. On the other hand, when it is determined that the power is changed from the off state to the on state, the process is continued assuming that the login operation by the second user is performed.
 <パスワード入力画面の表示>
S2において、電源オフ状態からオン状態に移行したと判定されると、パスワードの入力画面が表示部2に表示される(S3)。このとき、前記した通り、仮パスワード生成部8で生成された仮パスワードの文字列の一部がヒントとして表示され、隠された文字がある程度推測できる表示形態で表示される。
<Display of password input screen>
When it is determined in S2 that the power has changed from the off state to the on state, the password input screen is displayed on the display unit 2 (S3). At this time, as described above, a part of the temporary password character string generated by the temporary password generation unit 8 is displayed as a hint, and the hidden characters are displayed in a display form in which the hidden characters can be guessed to some extent.
 <操作信号の受信確認>
パスワードの入力画面において、第2のユーザーによる入力操作の有無が判定される(S4)。第2のユーザーによるパスワードの入力操作が行われない場合、即ち受信部7にて操作信号の受信が確認されない場合には、ログイン操作が中断されたものとして処理を終了する。一方、受信部7で操作信号を受信した場合には、ログイン操作が行われたものと判断する。
<Confirmation of reception of operation signal>
On the password input screen, it is determined whether or not there is an input operation by the second user (S4). If the password input operation by the second user is not performed, that is, if the reception unit 7 does not confirm the reception of the operation signal, the process is terminated as if the login operation was interrupted. On the other hand, when the receiving unit 7 receives the operation signal, it is determined that the login operation has been performed.
 <撮像制御>
S4において、第2のユーザーからの操作信号が受信部7で受信されると、制御部4によりカメラ部3が起動される。カメラ部3は表示部2を操作する第2のユーザーの顔部分を焦点として撮像を開始する(S5)。撮像された第2のユーザーの顔画像(第2の生体情報)は、第2の生体情報記憶部6に記憶される。
<Image control>
In S4, when the operation signal from the second user is received by the receiving unit 7, the camera unit 3 is activated by the control unit 4. The camera unit 3 starts imaging with the face portion of the second user who operates the display unit 2 as the focal point (S5). The captured second user's face image (second biometric information) is stored in the second biometric information storage unit 6.
 ここで、必ずしも、第2のユーザーからの操作信号として、第2のユーザーによるパスワードの入力に基づく操作信号である必要はない。例えば情報機器装置1の電源をオンする操作に基づく操作信号に基づいて撮像制御を開始するようにしてもよい。 Here, the operation signal from the second user does not necessarily have to be an operation signal based on the input of the password by the second user. For example, the imaging control may be started based on the operation signal based on the operation of turning on the power of the information device 1.
 S5において、第2の生体情報が取得されると、第1の生体情報との照合が行われる(S6)。このとき、第1の生体情報と第2の生体情報が照合すると判定された場合には、第1のユーザーと第2のユーザーは同一人物であるため、情報機器装置1へのログインが許可される(S7)。 When the second biometric information is acquired in S5, it is collated with the first biometric information (S6). At this time, if it is determined that the first biometric information and the second biometric information are collated, since the first user and the second user are the same person, login to the information device device 1 is permitted. (S7).
 一方、第1の生体情報と第2の生体情報が照合しないと判定された場合には、第1のユーザーと第2のユーザーは異なる人物であるため、情報機器装置1に対する不正アクセスがあったものとして、情報機器装1へのログインが制限され、情報機器装置1の操作をロックして処理を終了する。 On the other hand, when it is determined that the first biometric information and the second biometric information do not collate, since the first user and the second user are different persons, there is an unauthorized access to the information device device 1. As a result, login to the information device 1 is restricted, the operation of the information device 1 is locked, and the process ends.
 情報機器装置1へのログインが制限された場合、第2の生体情報記憶部6には第2のユーザーの顔画像が記憶されている。従って、第1のユーザーは第2の生体情報記憶部6に記憶された顔画像を確認することで、情報機器装置1への不正アクセスを行おうとした第2のユーザーを特定することができる。 When login to the information device device 1 is restricted, the face image of the second user is stored in the second biometric information storage unit 6. Therefore, the first user can identify the second user who tried to gain unauthorized access to the information device device 1 by checking the face image stored in the second biometric information storage unit 6.
 このとき、第1のユーザーが予め登録された電子メールアドレス、或いはネットワーク上のフォルダに第2の生体情報(第2の画像データ)が送信されるように設定することもできる。このように、情報機器装置1へのログインが制限された場合に、それに連動して第2の画像データが、登録した電子メールアドレスやネットワーク上のフォルダに送信されることで、第1のユーザーが外出先においても、情報機器装置1への不正ログインがあったことを認識することができる。 At this time, it is also possible to set the first user to send the second biometric information (second image data) to the pre-registered e-mail address or the folder on the network. In this way, when login to the information device device 1 is restricted, the second image data is transmitted to the registered e-mail address or the folder on the network in conjunction with it, so that the first user However, it is possible to recognize that there was an unauthorized login to the information device 1 even when the user is away from home.
 ここで、生体情報として指紋情報を使用する場合には、例えば表示部2に指紋センサを備えてき、表示部2を操作する第2のユーザーの指紋情報を取得し、該指紋情報を第2の生体情報記憶部6に記憶するようにしてもよい。 Here, when using fingerprint information as biometric information, for example contact can comprise a fingerprint sensor on the display unit 2, it acquires the fingerprint information of the second user operating the display unit 2, first the fingerprint information It may be stored in the biological information storage unit 6 of 2.
 なお、生体情報として指紋情報を使用する場合でも、制御部4によりカメラ部3の撮像は行われる。これにより、第2のユーザーの顔画像を撮像することができるため、不正アクセスを行おうとした第2のユーザーを特定することができる。 Even when fingerprint information is used as biometric information, the control unit 4 takes an image of the camera unit 3. As a result, the face image of the second user can be captured, so that the second user who tried to perform unauthorized access can be identified.
 以上、本発明に係る情報機器装置、情報機器装置用プログラム、及び情報機器装置への不正アクセス防止方法は、携帯端末装置等の情報機器装置へ不正にアクセスをして情報収集を行おうとする第三者を監視、特定することができるものとなっている。 As described above, the information device device, the program for the information device device, and the method for preventing unauthorized access to the information device device according to the present invention are the first to illegally access the information device device such as the mobile terminal device and collect information. It is possible to monitor and identify the three parties.
 携帯端末装置等の情報機器装置への不正アクセスをして情報収集を行おうとする第三者を監視、特定することができる情報機器装置、情報機器装置用プログラム、及び情報機器装置への不正アクセス防止方法に適用できる。 Unauthorized access to information equipment, programs for information equipment, and information equipment that can monitor and identify third parties who attempt to collect information by illegally accessing information equipment such as mobile terminal equipment. It can be applied to preventive methods.
1 情報機器装置
2 表示部
3 カメラ部
4 制御部
5 第1の生体情報記憶部
6 第2の生体情報記億部
7 受信部
8 仮パスワード(ダミーパスワード)生成部
9 生体認証部
10 送信部
 
1 Information equipment 2 Display unit 3 Camera unit 4 Control unit 5 First biometric information storage unit 6 Second biometric information storage unit 7 Reception unit 8 Temporary password (dummy password) generation unit 9 Biometric authentication unit 10 Transmission unit

Claims (15)

  1.  電源がオン状態により所定の情報が表示される表示部と、
     第1のユーザーに関する第1の生体情報が記憶された第1の生体情報記憶部と、
     第2のユーザーからの操作信号を受信する受信部と、
     前記表示部の表示方向にレンズが向けられ、前記受信部により前記操作信号を受信した際に第2のユーザーを撮像するカメラ部と、
     前記カメラ部により撮像された第2のユーザーに関する第2の生体情報を記憶する第2の生体情報記憶部と、
     前記第1の生体情報と前記第2の生体情報を照合する生体認証部と、を備え、
     さらに所定の文字列からなり第2のユーザーに対して操作を誘導するためのダミーパスワードである仮パスワードを生成する仮パスワード生成部を有し、
     前記表示部に備えられた入力画面には、前記生成された仮パスワードの一部が表示され、
     前記操作信号は、前記仮パスワードの一部が表示された入力画面に対する所定の文字列の入力操作に基づく信号である
     情報機器装置。
    A display unit that displays predetermined information when the power is on, and
    A first biometric information storage unit in which the first biometric information about the first user is stored, and
    A receiver that receives operation signals from the second user,
    A camera unit that captures a second user when the lens is pointed in the display direction of the display unit and the operation signal is received by the reception unit.
    A second biometric information storage unit that stores a second biometric information about the second user captured by the camera unit, and a second biometric information storage unit.
    A biometric authentication unit that collates the first biometric information with the second biometric information is provided.
    Further, it has a temporary password generation unit that generates a temporary password that is a dummy password for inducing an operation to a second user, which is composed of a predetermined character string.
    A part of the generated temporary password is displayed on the input screen provided in the display unit.
    The operation signal is an information device that is a signal based on an input operation of a predetermined character string on an input screen on which a part of the temporary password is displayed.
  2.  前記入力画面には、ログイン用のパスワードの文字列を推測しやすいように前記仮パスワードの一部がヒントとして表示される請求項1記載の情報機器装置。 The information device according to claim 1, wherein a part of the temporary password is displayed as a hint on the input screen so that the character string of the login password can be easily guessed.
  3.  前記受信部で受信する操作信号は電源がオフ状態、又は省電力状態において電源起動直後の操作信号である
     請求項1又は請求項2に記載の情報機器装置。
    The information device according to claim 1 or 2, wherein the operation signal received by the receiving unit is an operation signal immediately after the power is turned on in a power-off state or a power-saving state.
  4.  前記第1の生体情報は、第1のユーザーの顔を含む第1の画像データであり、
     前記第2の生体情報は、第2のユーザーの顔を含む第2の画像データである
     請求項1から請求項3の何れか一項に記載の情報機器装置。
    The first biometric information is first image data including the face of the first user.
    The information device according to any one of claims 1 to 3, wherein the second biometric information is second image data including a face of a second user.
  5.  前記生体認証部における照合の結果、前記第1の生体情報と前記第2の生体情報が照合しないと判定された場合に、予め登録した電子メールアドレスに前記第2の生体情報を送信する送信部を有する
     請求項1から請求項4の何れか一項に記載の情報機器装置。
    As a result of the collation in the biometric authentication unit, when it is determined that the first biometric information and the second biometric information do not collate, the transmission unit transmits the second biometric information to a pre-registered e-mail address. The information device according to any one of claims 1 to 4.
  6.  前記送信部は、生体認証部における照合の結果、前記第1の生体情報と前記第2の生体情報が照合しないと判定された場合に、特定のネットワーク上のフォルダに前記第2の生体情報を送信する
     請求項5に記載の情報機器装置。
    When it is determined that the first biometric information and the second biometric information do not collate as a result of the collation in the biometric authentication unit, the transmitting unit transmits the second biometric information to a folder on a specific network. The information device according to claim 5 to be transmitted.
  7.  表示部の表示方向にレンズが向けられたカメラ部を有し、第1のユーザーに関する第1の生体情報が記憶された情報機器装置の第2のユーザーによる操作に基づく操作信号を受信するステップと、
     該操作信号の受信後に、前記レンズを通じて第2のユーザーを撮像するステップと、
     前記撮像するステップにより撮像された第2のユーザーに関する第2の生体情報を記憶するステップと、
     前記第1の生体情報と前記第2の生体情報を照合するステップと、
     該照合するステップにおいて、前記第1の生体情報と前記第2の生体情報が照合しないと判定した場合に、前記情報機器装置へのログインを制限するステップと、をコンピュータに対して指示し、
     さらに所定の文字列からなり第2のユーザーに対して操作を誘導するためのダミーパスワードである仮パスワードを生成するステップと、
     前記生成された仮パスワードの一部を入力画面に表示するステップと、をコンピュータに対して指示し、
     前記操作信号は、前記仮パスワードの一部が表示された入力画面に対する所定の文字列の入力操作に基づく信号である
     情報機器装置用プログラム。
    A step of receiving an operation signal based on an operation by a second user of an information device having a camera unit having a lens pointed in the display direction of the display unit and storing a first biometric information about the first user. ,
    After receiving the operation signal, a step of photographing a second user through the lens, and
    A step of storing a second biometric information about the second user captured by the step of imaging, and a step of storing the second biometric information.
    The step of collating the first biometric information with the second biometric information,
    In the collation step, when it is determined that the first biometric information and the second biometric information do not collate, the computer is instructed to perform a step of restricting login to the information device.
    Furthermore, a step of generating a temporary password which is a dummy password for inducing an operation to a second user consisting of a predetermined character string, and
    Instruct the computer to display a part of the generated temporary password on the input screen.
    The operation signal is a program for an information device, which is a signal based on an input operation of a predetermined character string on an input screen on which a part of the temporary password is displayed.
  8.  さらに前記入力画面に、ログイン用のパスワードの文字列を推測しやすいように前記仮パスワードの一部がヒントとして表示されるステップをコンピュータに対して指示する請求項7に記載の情報機器装置用プログラム。 The program for information equipment according to claim 7, further instructing the computer a step in which a part of the temporary password is displayed as a hint on the input screen so that the character string of the login password can be easily guessed. ..
  9.  前記操作信号を受信するステップは、
     前記情報機器装置の電源がオフ状態、又は省電力状態からの電源起動直後の第2のユーザーによる前記仮パスワードの一部が表示された入力画面に対する所定の文字列の入力操作に基づく操作信号を受信するステップをコンピュータに対して指示する
     請求項7又は請求項8に記載の情報機器装置用プログラム。
    The step of receiving the operation signal is
    An operation signal based on an input operation of a predetermined character string on an input screen on which a part of the temporary password is displayed by a second user immediately after the power of the information device is turned off or the power is turned on from the power saving state. The program for an information device according to claim 7 or 8, wherein the receiving step is instructed to the computer.
  10.  前記情報機器装置へのログインが制限されると、第1のユーザーが登録した電子メールアドレスへ前記第2の生体情報が送信されるステップをコンピュータに対して指示する
     請求項7から請求項9の何れか一項に記載の情報機器装置用プログラム。
    Claims 7 to 9 instruct the computer to take steps to transmit the second biometric information to the e-mail address registered by the first user when login to the information device is restricted. The program for information equipment and devices described in any one of the items.
  11.  前記情報機器装置へのログインが制限されると、第1のユーザーが指定したネットワーク上のフォルダに前記第2の生体情報が送信されるステップをコンピュータに対して指示する
     請求項7から請求項10の何れか一項に記載の情報機器装置用プログラム。
    Claims 7 to 10 instruct the computer to take steps to transmit the second biometric information to a folder on the network designated by the first user when login to the information device is restricted. The program for information equipment and devices described in any one of the above.
  12.  表示部の表示方向にレンズが向けられたカメラ部を有し、第1のユーザーに関する第1の生体情報が記憶された情報機器装置の電源を起動する工程と、
     所定の文字列からなり第2のユーザーに対して操作を誘導するためのダミーパスワードである仮パスワードを生成する工程と、
     前記生成された仮パスワードの一部を入力画面に表示する工程と、
     前記情報機器装置に対する第2のユーザーによる前記情報機器装置に対する前記仮パスワードの一部が表示された入力画面に対する所定の文字列の入力操作に基づく操作信号を受信する工程と、
     該操作信号を受信する工程の後に、前記レンズを通じて第2のユーザーを撮像する工程と、
     前記撮像する工程により撮像された第2のユーザーに関する第2の生体情報を記憶する工程と、
     前記第1の生体情報と前記第2の生体情報を照合する工程と、
     該照合する工程において、前記第1の生体情報と前記第2の生体情報が照合しないと判定した場合に、前記情報機器装置へのログインを制限する工程と、を備える
     情報機器装置への不正アクセス防止方法。
    A process of activating the power supply of an information device having a camera unit with a lens pointed in the display direction of the display unit and storing a first biometric information about a first user.
    The process of generating a temporary password, which consists of a predetermined character string and is a dummy password for inducing an operation to a second user, and
    The process of displaying a part of the generated temporary password on the input screen and
    A step of receiving an operation signal based on an operation of inputting a predetermined character string on an input screen on which a part of the temporary password for the information device is displayed by a second user for the information device.
    After the step of receiving the operation signal, a step of imaging a second user through the lens, and
    A step of storing a second biological information about the second user captured by the step of imaging, and a step of storing the second biometric information.
    A step of collating the first biological information with the second biological information,
    Unauthorized access to an information device device including a step of restricting login to the information device device when it is determined that the first biometric information and the second biometric information do not collate in the collation step. Prevention method.
  13.  前記操作信号を受信する工程は、
     前記情報機器装置の電源がオフ状態、又は省電力状態からの電源起動直後の第2のユーザーによる前記情報機器装置に対する前記仮パスワードの一部が表示された入力画面に対する所定の文字列の入力操作に基づく操作信号を受信する工程を有する
     請求項12に記載の情報機器装置への不正アクセス防止方法。
    The step of receiving the operation signal is
    An operation of inputting a predetermined character string on an input screen in which a part of the temporary password for the information device is displayed by a second user immediately after the power of the information device is turned off or the power is turned on from a power saving state. The method for preventing unauthorized access to an information device according to claim 12, further comprising a step of receiving an operation signal based on the above.
  14.  前記情報機器装置へのログインが制限されると、第1のユーザーが登録した電子メールアドレスへ前記第2の生体情報が送信される工程を有する
     請求項12または請求項13に記載の情報機器装置への不正アクセス防止方法。
    The information device device according to claim 12 or 13, further comprising a step of transmitting the second biometric information to the e-mail address registered by the first user when login to the information device device is restricted. How to prevent unauthorized access to.
  15.  前記情報機器装置へのログインが制限されると、第1のユーザーが指定したネットワーク上のフォルダに前記第2の生体情報が送信される工程を有する
     請求項12から請求項14の何れか一項に記載の情報機器装置への不正アクセス防止方法。
     
    Any one of claims 12 to 14, which comprises a step of transmitting the second biometric information to a folder on the network designated by the first user when login to the information device is restricted. The method for preventing unauthorized access to the information equipment described in.
PCT/JP2020/049115 2020-03-12 2020-12-28 Information apparatus, program for information apparatus, and method for preventing unauthorized access to information apparatus WO2021181839A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2020-043047 2020-03-12
JP2020043047A JP6809741B1 (en) 2020-03-12 2020-03-12 Information equipment equipment, information equipment equipment programs, and methods for preventing unauthorized access to information equipment equipment

Publications (1)

Publication Number Publication Date
WO2021181839A1 true WO2021181839A1 (en) 2021-09-16

Family

ID=73993049

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2020/049115 WO2021181839A1 (en) 2020-03-12 2020-12-28 Information apparatus, program for information apparatus, and method for preventing unauthorized access to information apparatus

Country Status (2)

Country Link
JP (1) JP6809741B1 (en)
WO (1) WO2021181839A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2023004852A (en) * 2021-06-25 2023-01-17 福田 博美 Unauthorized access prevention method for information apparatus or communication apparatus
WO2022270114A1 (en) * 2021-06-25 2022-12-29 福田 博美 Method for preventing unauthorized access to information device or communication device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008276345A (en) * 2007-04-26 2008-11-13 Kyocera Corp Electronic device, authentication method, and program
JP2009135700A (en) * 2007-11-29 2009-06-18 Kyocera Corp Portable terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08214355A (en) * 1995-02-02 1996-08-20 Inter Wave:Kk Pager
JP2005115485A (en) * 2003-10-03 2005-04-28 Toshiba Social Automation Systems Co Ltd Authentication system and computer readable storage medium
JP4471898B2 (en) * 2005-07-22 2010-06-02 シャープ株式会社 Portable information terminal device
JP6295534B2 (en) * 2013-07-29 2018-03-20 オムロン株式会社 Programmable display, control method, and program
JP2017021609A (en) * 2015-07-11 2017-01-26 株式会社ナカヨ Information terminal having operator imaging function

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008276345A (en) * 2007-04-26 2008-11-13 Kyocera Corp Electronic device, authentication method, and program
JP2009135700A (en) * 2007-11-29 2009-06-18 Kyocera Corp Portable terminal

Also Published As

Publication number Publication date
JP6809741B1 (en) 2021-01-06
JP2021144498A (en) 2021-09-24

Similar Documents

Publication Publication Date Title
CN101213559B (en) Communication device and communication system
US7278024B2 (en) Session authentication using temporary passwords
Wu et al. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones
US7337466B2 (en) Information hiding through time synchronization
WO2015172515A1 (en) Iris recognition method and device for mobile terminal
WO2021181839A1 (en) Information apparatus, program for information apparatus, and method for preventing unauthorized access to information apparatus
JP5603766B2 (en) Information processing system, information processing method, and program
WO2003088016A1 (en) Information device
JP2004157675A (en) Personal identification system using image
JP2009159539A (en) Electronic appliance
CN108985034A (en) A kind of unlocking method and terminal device
US20170061408A1 (en) Security key input system and method using one-time keypad
KR20110108646A (en) Portable terminal and method for changing owner mode automatically thereof
CN110830262A (en) Authorization management method and electronic equipment
JP5330770B2 (en) Authentication system and portable authentication terminal
JP2005063342A (en) Card user verification system, card user verification method, and program of the same
EP3566163A1 (en) Method for authenticating a first user and corresponding first device and system
WO2010058683A1 (en) Electronic data read device and electronic data read method
JP2003284141A (en) Authentication apparatus for mobile communication terminal
WO2022259569A1 (en) Authentication system, authentication device, authentication method, and program
JP2009135700A (en) Portable terminal
JP2009093399A (en) Information display device
JP5042009B2 (en) Mobile terminal device
CN110837630A (en) Login method, image processing method and electronic device
WO2022270114A1 (en) Method for preventing unauthorized access to information device or communication device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20924802

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20924802

Country of ref document: EP

Kind code of ref document: A1