CN1299103A - User certification system and method performed by bio-information in network - Google Patents
User certification system and method performed by bio-information in network Download PDFInfo
- Publication number
- CN1299103A CN1299103A CN00128764A CN00128764A CN1299103A CN 1299103 A CN1299103 A CN 1299103A CN 00128764 A CN00128764 A CN 00128764A CN 00128764 A CN00128764 A CN 00128764A CN 1299103 A CN1299103 A CN 1299103A
- Authority
- CN
- China
- Prior art keywords
- user
- biological intelligence
- biological
- intelligence
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims description 17
- 238000012795 verification Methods 0.000 claims description 8
- 230000008676 import Effects 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 230000000052 comparative effect Effects 0.000 claims description 2
- 230000008447 perception Effects 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005755 formation reaction Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/128—Restricting unauthorised execution of programs involving web programs, i.e. using technology especially used in internet, generally interacting with a web browser, e.g. hypertext markup language [HTML], applets, java
Abstract
To enable user authentication for necessary fields of electronic commerce or a building or home guard system.This system comprises a system for obtaining body features information on the fingerprint, iris, shape, voice, etc., of a user, a transmitting means which transmits the body features information obtained by the mentioned system through a network, a user authentication part which authenticates the user by comparing the transmits information from the transmitting means with a stored database of body features information, and the database of body features information wherein body features information of registered users and the authentication of the users are set.
Description
The present invention relates to a kind of user's Verification System and method, relate in particular to a kind of user's Verification System and method of under network environment, being undertaken by individual biological intelligence.
Recently, people extremely pay close attention on the internet application of ecommerce in the relevant online service.In the application of this type of ecommerce, especially to the purchase problem, utilize report such as newspapers and periodicals, paper, the reimbursement of expense problem during information such as real estate information has perhaps been carried out a lot of research and development by the mode of payment that commodity are bought in the internet.
Payment Methods in the past have: the user, after the affirmation commodity price converges payment for goods to seller's account by the internet indent goods, and then confirms whether to import; The online security server input credit card number of utilizing of user is paid the bill based on the number of oneself input then.Recently, along with the appearance of this notion of electronic money, also can buy the electronic money of certain amount of money earlier, and then pay and this amount equal amount payment.Can also use the mode of prepaying the card payment.
But, must input credit card number and password when utilizing this Credit Card Payments mode.If in this process, leaked information such as the credit card number and the term of validity, then can cause other people may use the problem of this credit card.
On the other hand, not only aspect electronic cash, and,, develop and used various locking devices and user's authenticate device in order to prevent external intrusion in all places such as family, company, buildings that needs security system.But this locking device major part realizes by the input password, therefore leaks password easily, should not be used in the place that needs security personnel.Because there are the problems referred to above in this mode, so need to entrust separately security personnel's matters.This is its shortcoming.
In order to address the above problem, United States Patent (USP) the 5th, 280 has disclosed a kind of usefulness in No. 527 and has stored the digital coin of biological intelligence or the method that magnetic card visits system.But, this authentication method only a kind of based on single biological intelligence authentication user system and oneself.It remains the danger of losing magnetic card or digital coin, does not only solve problem in the past fully, and because of it should not upgrade biological intelligence, so be not suitable for security system completely.
The objective of the invention is to, fundamentally solve user's Verification System, the place needing the user to authenticate such as the security system of ecommerce or building residence, house security system etc. authenticates the user and is able to possibility.
Other purposes of the present invention are, utilize an above biological intelligence to carry out the user and authenticate, and reduce the error of biological intelligence, correctly carry out the user and authenticate.
Further purpose of the present invention is, can be easy to upgrade the biological intelligence with storage change, remains correct user and authenticates.
To achieve these goals, the invention provides a kind of system, this system comprises: the device that is used to obtain biological intelligences such as user's fingerprint, iris, image, sound; Transmit the conveyer of the biological intelligence of obtaining by said apparatus by network; Be used for the information that above-mentioned conveyer is transmitted and compare, thereby carry out user's authenticate device that the user authenticates with the biological intelligence database of having stored; The biological intelligence database that comprises the data of biological intelligence that can authentic user and each user's access rights.
The present invention also provides a kind of said system of utilizing to carry out the method that the user authenticates, and it is characterized in that, may further comprise the steps:
Import the biological intelligence of oneself;
Transmit the biological intelligence that oneself is transfused to;
The biological intelligence that is transmitted is compared with the biological intelligence that is recorded;
According to comparative result, carry out the user and authenticate.
And above-mentioned user's authentication method also is included in and has compared after biological intelligence that is transmitted and the biological intelligence that is recorded, and stores this fiducial value step.
Fig. 1 is a block scheme, shows the structure according to user's Verification System of the present invention;
Fig. 2 is a process flow diagram, shows according to the present invention to carry out the method that the user authenticates.
Below, describe the present invention in detail according to attached chart.
As shown in Figure 1, the device that is used to obtain user's biological intelligence is made of importation (10) and conversion fraction (20), wherein importation (10) are used to obtain user's biological intelligences such as fingerprint, iris, image, sound, and conversion fraction (20) is used for user's biological intelligence with above-mentioned input importation and is transformed into the data that transmission may form.
The importation may be following various sensing module: be used for the acoustic intelligence sensing module (1) that perception is transfused to user's sound; By according to the CHARGE DISTRIBUTION of fingerprint or the fingerprint detecting sensor of pressure gap perception fingerprint, perhaps be used for the fingerprint information sensing module (2) of the formations such as camera of perception fingerprint shape; By iris information sensing module (3) that camera constituted of the image shape that is used for the perception iris etc.
As required, the biological intelligence that conversion fraction is obtained acoustic intelligence sensing module, fingerprint information sensing module, iris information sensing module etc. is transformed into the data of transmission possibility form, perhaps plays compression.Thereby, become the independent applying portion of implementing that can be contained in computer and so on.
Preferably also comprise conveyer (30) in the system, it can use methods such as parallel communications, serial communication, infrared communication to transmit data.When using computer, it can become communicators such as network card or modulator-demodular unit.
Biological intelligence database (40) has name and the required information of user that authenticates the user, and has the information of relevant this user's biological intelligence.Also have, above-mentioned biological intelligence database can optionally comprise more new database (41) of a kind of biological intelligence, and the biological intelligence that it is transmitted by storage is followed the tracks of the track of the biological intelligence that changes, and follows the tracks of and upgrade the degree of its variation.
User's authentication section (50) is compared the biological intelligence that network transport unit branch transmits with the biological intelligence database, authenticate the user.
Fig. 2 shows and utilizes user's Verification System of the present invention to authenticate user's process.The user must import the above biological intelligence of self in order to obtain authentication, for example, and iris and fingerprint etc.Iris of being imported and finger print data are sent to server by network, compare with biological intelligence in the past then.As consistent, then authenticate by the user with the biological intelligence of being deposited.
By the invention process, following strong point is arranged: authenticate because of the biological intelligence with the individual is used for the user, so can significantly improve the accuracy of authentication.Need not to use keyword or identifier etc. separately, also can obtain the user to authenticate, thus easy to use.
Claims (4)
1. user's Verification System of being undertaken by individual biological intelligence under network environment is characterized in that described system comprises the device that is used to obtain biological intelligences such as user's fingerprint, iris, image, sound; Transmit the conveyer of the biological intelligence that obtains by described acquisition device by network; Be used for the information that described conveyer is sent and compare, thereby carry out user's authenticate device that the user authenticates with the biological intelligence database of having stored; The biological intelligence database that comprises the data of biological intelligence that can authentic user and each user's access rights.
2. user's Verification System as claimed in claim 1 is characterized in that, described biological intelligence database storing the biological intelligence that is transfused to for access authentication.
3. the user's authentication method that is undertaken by individual biological intelligence under network environment is characterized in that, may further comprise the steps:
Import an above biological intelligence;
The biological intelligence that transmission is transfused to;
Described biological intelligence that is transmitted and oneself biological intelligence of record are compared; And
According to comparative result, carry out the user and authenticate.
4. user's authentication method as claimed in claim 3 is characterized in that, describedly carries out step that the user authenticates and comprises compare with the biological intelligence that the is recorded step of back storage fiducial value of the biological intelligence that will be transmitted.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019990054955A KR100341147B1 (en) | 1999-12-03 | 1999-12-03 | A user Authentication system and control method using Bio-Information in Internet/Intranet environment |
KR199954955 | 1999-12-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1299103A true CN1299103A (en) | 2001-06-13 |
Family
ID=19623585
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN00128764A Pending CN1299103A (en) | 1999-12-03 | 2000-09-14 | User certification system and method performed by bio-information in network |
Country Status (3)
Country | Link |
---|---|
JP (1) | JP2001175871A (en) |
KR (1) | KR100341147B1 (en) |
CN (1) | CN1299103A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7287273B2 (en) | 2002-02-15 | 2007-10-23 | Science Park Corporation | Individual authentication method using input characteristic of input apparatus by network, program thereof, and recording medium containing the program |
WO2008022585A1 (en) * | 2006-08-18 | 2008-02-28 | Huawei Technologies Co., Ltd. | A certification method, system, and device |
CN100405387C (en) * | 2003-04-25 | 2008-07-23 | 日本电气株式会社 | Fingerprint identification system and method thereof |
CN101923678A (en) * | 2010-07-30 | 2010-12-22 | 武汉天喻信息产业股份有限公司 | Data security protection method of enterprise management software |
CN101174949B (en) * | 2006-10-30 | 2011-04-20 | 华为技术有限公司 | Biological authentication method and system |
CN103455746A (en) * | 2013-09-10 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | Head-wearing display equipment |
CN103544423A (en) * | 2013-10-23 | 2014-01-29 | 合山市科学技术情报研究所 | Intelligence peripheral device and program |
CN103761463A (en) * | 2014-01-13 | 2014-04-30 | 联想(北京)有限公司 | Information processing method and electronic device |
CN106407842A (en) * | 2016-09-29 | 2017-02-15 | 广州鹤互联网科技有限公司 | Approval and issuance initiating user management method and equipment |
WO2018001371A1 (en) * | 2016-06-30 | 2018-01-04 | 北京七鑫易维信息技术有限公司 | Method and apparatus for identity recognition |
CN108470118A (en) * | 2018-03-20 | 2018-08-31 | 广州大学 | A kind of anti-ablation device being embedded in inside artificial intelligence behavior body |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000064050A (en) * | 2000-08-18 | 2000-11-06 | 김태준 | Method to provide service of warranty on electronic commerce |
JP2002288141A (en) * | 2001-03-26 | 2002-10-04 | Yoshimitsu Kagiwada | Personal identification system and terminal for the system |
KR20020089901A (en) * | 2001-05-25 | 2002-11-30 | 리얼아이디테크놀러지 주식회사 | Bio-authentication system using information communication network and management method therefore |
KR20020096258A (en) * | 2001-06-19 | 2002-12-31 | 주식회사 루나테크 | Method for certification on the internet |
KR100442118B1 (en) * | 2001-07-31 | 2004-07-27 | 김유진 | Method of user authentication based on the web using biometrics technology |
KR20030016611A (en) * | 2001-08-21 | 2003-03-03 | 대민전자 주식회사 | The fingerprint recognition system which uses a unique point |
KR20030052194A (en) * | 2001-12-20 | 2003-06-26 | 한국전자통신연구원 | A system for user verification using biometric information, a method for registering certificates in the system and a user verification method |
KR20020023310A (en) * | 2002-01-15 | 2002-03-28 | 장학선 | Method and apparatus for settlementing using biometrics |
KR20070023022A (en) * | 2005-08-23 | 2007-02-28 | 주식회사 아이디테크 | Method For Updating A Biological Information |
CN104346547A (en) * | 2013-07-26 | 2015-02-11 | 宁夏新航信息科技有限公司 | Intelligent identity identification system |
KR101808809B1 (en) | 2016-05-25 | 2018-01-18 | (주)씨유박스 | Method for transmitting feature data, user authentication method and system using feature data |
KR101956286B1 (en) * | 2017-12-05 | 2019-03-08 | (주)에이텍티앤 | Automatic get off payment system of public transport by image recognition and method thereof |
-
1999
- 1999-12-03 KR KR1019990054955A patent/KR100341147B1/en not_active IP Right Cessation
-
2000
- 2000-09-14 JP JP2000280648A patent/JP2001175871A/en active Pending
- 2000-09-14 CN CN00128764A patent/CN1299103A/en active Pending
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100541471C (en) * | 2002-02-15 | 2009-09-16 | 科学园株式会社 | Use the individual discrimination method and the network system of the input feature vector of based on network input media |
US7287273B2 (en) | 2002-02-15 | 2007-10-23 | Science Park Corporation | Individual authentication method using input characteristic of input apparatus by network, program thereof, and recording medium containing the program |
CN100405387C (en) * | 2003-04-25 | 2008-07-23 | 日本电气株式会社 | Fingerprint identification system and method thereof |
WO2008022585A1 (en) * | 2006-08-18 | 2008-02-28 | Huawei Technologies Co., Ltd. | A certification method, system, and device |
CN101174949B (en) * | 2006-10-30 | 2011-04-20 | 华为技术有限公司 | Biological authentication method and system |
CN101923678A (en) * | 2010-07-30 | 2010-12-22 | 武汉天喻信息产业股份有限公司 | Data security protection method of enterprise management software |
CN103455746B (en) * | 2013-09-10 | 2016-10-05 | 百度在线网络技术(北京)有限公司 | head-mounted display apparatus |
CN103455746A (en) * | 2013-09-10 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | Head-wearing display equipment |
CN103544423A (en) * | 2013-10-23 | 2014-01-29 | 合山市科学技术情报研究所 | Intelligence peripheral device and program |
CN103761463A (en) * | 2014-01-13 | 2014-04-30 | 联想(北京)有限公司 | Information processing method and electronic device |
WO2018001371A1 (en) * | 2016-06-30 | 2018-01-04 | 北京七鑫易维信息技术有限公司 | Method and apparatus for identity recognition |
US10891507B2 (en) | 2016-06-30 | 2021-01-12 | Beijing 7Invensun Technology Co., Ltd. | Method and device for recognizing identity |
CN106407842A (en) * | 2016-09-29 | 2017-02-15 | 广州鹤互联网科技有限公司 | Approval and issuance initiating user management method and equipment |
CN106407842B (en) * | 2016-09-29 | 2019-06-14 | 恒大智慧科技有限公司 | A kind of sign-off initiates user management method and equipment |
CN108470118A (en) * | 2018-03-20 | 2018-08-31 | 广州大学 | A kind of anti-ablation device being embedded in inside artificial intelligence behavior body |
CN108470118B (en) * | 2018-03-20 | 2021-02-26 | 广州大学 | Anti-excision device capable of being embedded into artificial intelligence behavior body |
Also Published As
Publication number | Publication date |
---|---|
JP2001175871A (en) | 2001-06-29 |
KR100341147B1 (en) | 2002-07-13 |
KR20010054240A (en) | 2001-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1299103A (en) | User certification system and method performed by bio-information in network | |
US20220237593A1 (en) | System and method for authenticating electronic money | |
US8600895B2 (en) | Information record infrastructure, system and method | |
US7587368B2 (en) | Information record infrastructure, system and method | |
AU2006275920B2 (en) | Methods and systems for improved security for financial transactions through a trusted third party entity | |
US20040024709A1 (en) | System and method for determining the identity of a party associated with a transaction | |
CN105703907B (en) | For the devices, systems, and methods registered and verified handwritten signature and achieved to hand-written information | |
CN1285560A (en) | System and method for making online business using single used payment equipment | |
CN1184546A (en) | Electronic payment method for purchase-related transactions over a computer network | |
JP2003099693A (en) | Electronic settlement method | |
CN101496024A (en) | Net settlement assisting device | |
CN111640014A (en) | Receivable and debt right financing system and method based on block chain technology | |
JPH10154192A (en) | Electronic money system and recording medium | |
US20210406902A1 (en) | Standardized identifiers for multiple transaction authorizations | |
CN110163619A (en) | Method of payment, server and self-service cashier terminal device based on recognition of face | |
JPH10124604A (en) | Electronic money system | |
CN202694414U (en) | System for authenticating payment information of IC social security card | |
KR20080104211A (en) | System and method for managing fund for goal attainment and program recording medium | |
AU2005242991B2 (en) | Improved ticketing scheme | |
JPH10134126A (en) | Electronic money system | |
KR100444254B1 (en) | The System & Method for Bill Management in Bank | |
Chiasson et al. | Electronic commerce universal access device-the knowledge-acquiring layered infrastructure (KALI) project | |
KR20090001869A (en) | System and method for asset backed securitization investment process and program recording medium | |
KR20070074540A (en) | System and method for processing apartment management expenses | |
KR20040092667A (en) | Physical examination card using electronic card, system and method for medical service thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |