EP0075728A2 - System to decrease the rate of rejects in a security and key system using personal characteristics for the verification of the persons wanting access - Google Patents
System to decrease the rate of rejects in a security and key system using personal characteristics for the verification of the persons wanting access Download PDFInfo
- Publication number
- EP0075728A2 EP0075728A2 EP82107769A EP82107769A EP0075728A2 EP 0075728 A2 EP0075728 A2 EP 0075728A2 EP 82107769 A EP82107769 A EP 82107769A EP 82107769 A EP82107769 A EP 82107769A EP 0075728 A2 EP0075728 A2 EP 0075728A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- security
- mms
- key
- features
- feature set
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Definitions
- the present invention relates to a method for reducing the rate of false rejections in a security and key system that uses personal characteristics of the access seeker for verification.
- a redundant set of characteristics is usually compiled from the personal characteristics of the access seeker. While some changes in the personal characteristics of the person appear more or less subconsciously (slight change in language characteristics or the characteristic properties of the signature over time, etc.), there are others that are recognized by the person or even by himself be made, for example, changing the voice due to mood movements or illness, putting on glasses, putting on a ring, etc. Will, for example the hand geometry is measured, the rejection can already be done by wearing a ring that was not worn when the set of characteristics was recorded.
- the present invention has for its object to provide a method for reducing the rate of false rejections in a security and key system that uses personal characteristics of the access seekers for verification.
- the invention has the advantage that the security and key system is not noticeably more sensitive to attempts at forgery, since only a small part of the set of features is omitted for verification.
- such a security and key system 1 which is suitable for carrying out the method according to the invention, essentially consists of one Security and key device 11 and an input device 12.
- the access seeker Z enters information about his personal features IpM into the input device 12, which forwards it to the security and key device 11, if necessary, in a processed form.
- the security and key device 11 all the necessary feature sets MMS of the authorized users are stored.
- an auxiliary input device 2 is provided according to the invention, via which information about the change in characteristics of an access-seeking person can be entered.
- the access seeker Z in which a conscious change in his personal characteristics has occurred in relation to a set of features MMS stored in the security and encryption device 11 and individually assigned to him, in addition to an originally defined information about the personal Features I PM information about the change in features I MV is entered into the security and key system 1 via the auxiliary input device 2.
- the security and key device 11 suppresses the part of the feature set MMS affected by the change in features and, if necessary, releases the access.
- An advantageous development of the invention provides that the security and key device 11 uses a modified feature set MMS ', preferably created by a computer (not shown), instead of the feature set MMS concerned.
- Changes in the characteristic features caused by external conditions can advantageously also be flat if taken into account by such a system using the method according to the invention. For example, changes in signatures that occur due to the writing instrument used (fountain pen, ballpoint pen, pencil) can be compensated for by entering the characteristics of the writing instrument used in each case. The security and key system then uses the corresponding feature set for verification.
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
Die vorliegende Erfindung betrifft ein-Verfahren zur Verringerung der Rate falscher Zurückweisungen in einem Sicherheits- und Schlüsselsystem, das persönliche Merkmale der Zutrittsuchenden zur Verifikation verwendet.The present invention relates to a method for reducing the rate of false rejections in a security and key system that uses personal characteristics of the access seeker for verification.
Werden persönliche Merkmale zur automatischen Verifikation von Personen verwendet, so dürfen diese bei den heute bekannten,Systemen nicht abgeändert werden, da die betreffende Einrichtung nicht mehr genügend Übereinstimmung zwischen dem gespeicherten Merkmalssatz und der zur Verifikation angebotenen Information findet. Veränderungen der persönlichen Merkmale führen demnach zu einer erhöhten Rate von falschen Zurückweisungen (die richtige Person wird als nicht erkannt zurückgewiesen), aufgrund derer solche Sicherungs- und Schlüsseleinrichtungen für viele Anwendungen unattraktiv werden.If personal characteristics are used for the automatic verification of persons, these must not be changed in the systems known today, since the device in question no longer finds sufficient correspondence between the stored characteristic set and the information offered for verification. Changes in personal characteristics therefore lead to an increased rate of false rejections (the right person is rejected as not recognized), which makes such security and key devices unattractive for many applications.
Aus den persönlichen Merkmalen des Zutrittsuchenden wird in aller Regel ein redundanter Merkmalssatz zusammengestellt. Während einige Änderungen der persönlichen Merkmale für die jeweilige Person mehr oder weniger unbewußt auftreten (leichte Änderung der Spracheigenschaften oder die charakteristischen Eigenschaften der Unterschrift im Laufe der Zeit u.a.m.), gibt es andere, die von der jeweiligen Person erkannt werden bzw. von ihr sogar selbst vorgenommen werden, beispielsweise Veränderung der Stimme durch Gemütsbewegungen oder Krankheit, Aufsetzen einer Brille, Anstecken eines Ringes usw.. Wird beispielsweise die Handgeometrie vermessen, so kann die Zurückweisung bereits durch das Tragen eines Ringes, der bei der Aufnahme des Merkmalssatzes nicht getragen wurde, erfolgen.A redundant set of characteristics is usually compiled from the personal characteristics of the access seeker. While some changes in the personal characteristics of the person appear more or less subconsciously (slight change in language characteristics or the characteristic properties of the signature over time, etc.), there are others that are recognized by the person or even by himself be made, for example, changing the voice due to mood movements or illness, putting on glasses, putting on a ring, etc. Will, for example the hand geometry is measured, the rejection can already be done by wearing a ring that was not worn when the set of characteristics was recorded.
Die derzeit bekannten Sicherheits- und Schlüsselsysteme reagieren auf derartige Merkmalsveränderungen sehr empfindlich.The currently known security and key systems are very sensitive to such changes in characteristics.
Der vorliegenden Erfindung liegt die Aufgabe zugrunde, ein Verfahren zur Verringerung der Rate falscher Zurückweisungen in einem Sicherheits- und Schlüsselsystem, das persönliche Merkmale der Zutrittsuchenden zur Verifikation verwendet, zu schaffen.The present invention has for its object to provide a method for reducing the rate of false rejections in a security and key system that uses personal characteristics of the access seekers for verification.
Die der Erfindung zugrundeliegende Aufgabe wird durch ein Verfahren nach dem Oberbegriff des Patentanspruchs 1 gelöst, das durch die in dem kennzeichnenden Teil des Patentanspruchs 1 angegebenen Merkmale charakterisiert ist.The object on which the invention is based is achieved by a method according to the preamble of patent claim 1, which is characterized by the features specified in the characterizing part of patent claim 1.
Die Erfindung bietet den Vorteil, daß das Sicherheits- und Schlüsselsystem gegenüber Fälschungsversuchen nicht merkbar empfindlicher wird, da nur ein geringer Teil des Merkmalssatzes für die Verifizierung entfällt.The invention has the advantage that the security and key system is not noticeably more sensitive to attempts at forgery, since only a small part of the set of features is omitted for verification.
Vorteilhafte Weiterbildungen der Erfindung sind durch die in den Unteransprüchen angegebenen Merkmale gekennzeichnet.Advantageous developments of the invention are characterized by the features specified in the subclaims.
Im folgenden wird die Erfindung anhand einer Figur, die lediglich ein Ausführungsbeispiel für ein Sicherheits-und Schlüsselsystem zur Durchführung des erfindungsgemäßen Verfahrens zeigt, im einzelnen erläutert.The invention is explained in detail below with reference to a figure which shows only one exemplary embodiment of a security and key system for carrying out the method according to the invention.
Wie die Figur zeigt, besteht ein derartiges, zur Durchführung des erfindungsgemäßen Verfahrens geeignetes Sicherheits- und Schlüsselsystem 1 im wesentlichen aus einer Sicherheits- und Schlüsseleinrichtung 11 und einer Eingabeeinrichtung 12. Der Zutrittsuchende Z gibt eine Information über seine persönlichen Merkmale IpM in die Eingabeeinrichtung 12 ein, die diese an die Sicherheits- und Schlüsseleinrichtung 11 ggf. in aufbereiteter Form weiterleitet. In der Sicherheits- und Schlüsseleinrichtung 11 sind alle notwendigen Merkmalssätze MMS der Zutrittsberechtigten gespeichert. Zusätzlich ist neben dem eigentlichen Sicherheits- und Schlüsselsystem 1 erfindungsgemäß eine Hilfseingabeeinrichtung 2 vorgesehen, über die eine Information über die Merkmalsveränderung einer zutrittsuchenden Person eingebbar ist.As the figure shows, such a security and key system 1, which is suitable for carrying out the method according to the invention, essentially consists of one Security and
Für das erfindungsgemäße Verfahren ist vorgesehen, daß von dem Zutrittsuchenden Z, bei dem gegenüber einem in der Sicherheits- und Scblüsseleinrichtung 11 gespeicherten und ihm individuell zugeteilten Merkmalssatz MMS eine ihm bewußte Veränderung seiner persönlichen Merkmale eingetreten ist, zusätzlich zu einer ursprünglich festgelegten Information über die persönlichen Merkmale IPM eine Information über die Merkmalsveränderung IMV in das Sicherheits-und Schlüsselsystem 1 über die Hilfseingabeeinrichtung 2 eingegeben wird. Außerdem ist erfindungsgemäß vorgesehen, daß die Sicherheits- und Schlüsseleinrichtung 11 den von den Merkmalsveränderung betroffenen Teil.des Merknrals-satzes MMS unterdrückt und den Zutritt ggf. freigibt.For the method according to the invention it is provided that the access seeker Z, in which a conscious change in his personal characteristics has occurred in relation to a set of features MMS stored in the security and
Eine vorteilhafte Weiterbildung der Erfindung sieht vor, daß die Sicherheits- und Schlüsseleinrichtung 11 anstelle des betroffenen Merkmalssatzes MMS einen modifizierten, vorzugsweise durch einen Rechner (nicht gezeigt) erstellten Merkmalssatz MMS' verwendet.An advantageous development of the invention provides that the security and
Durch äußere Bedingungen verursachte Änderungen der charakteristischen Merkmale können vorteilhafterweise ebenfalls von einem derartigen System mittels des erfindungsgemäßen Verfahrens berücksichtigt werden. So können beispielsweise Veränderungen von Unterschriften, die aufgrund des verwendeten Schreibgerätes (Füllfederhalter, Kugelschreiber, Bleistift) auftreten, durch Eingabe der Merkmale des jeweils verwendeten Schreibgerätes kompensiert werden. Das Sicherheits- und Schlüsselsystem zieht dann jeweils den entsprechenden Merkmalssatz zur Verifikation heran.Changes in the characteristic features caused by external conditions can advantageously also be flat if taken into account by such a system using the method according to the invention. For example, changes in signatures that occur due to the writing instrument used (fountain pen, ballpoint pen, pencil) can be compensated for by entering the characteristics of the writing instrument used in each case. The security and key system then uses the corresponding feature set for verification.
Claims (4)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19813138710 DE3138710A1 (en) | 1981-09-29 | 1981-09-29 | METHOD FOR REDUCING THE RATE OF INCORRECT REJECTIONS IN A SECURITY AND KEY SYSTEM USING THE PERSONAL CHARACTERISTICS OF THE ACCESSIBLE SEEKERS FOR VERIFICATION |
DE3138710 | 1981-09-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
EP0075728A2 true EP0075728A2 (en) | 1983-04-06 |
EP0075728A3 EP0075728A3 (en) | 1986-02-05 |
Family
ID=6142917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP82107769A Ceased EP0075728A3 (en) | 1981-09-29 | 1982-08-24 | System to decrease the rate of rejects in a security and key system using personal characteristics for the verification of the persons wanting access |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP0075728A3 (en) |
DE (1) | DE3138710A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1991008555A1 (en) * | 1989-11-27 | 1991-06-13 | De La Rue Systems Limited | Improvements relating to verification or authentication processes |
WO2007115448A1 (en) * | 2006-03-31 | 2007-10-18 | Zte Corporation | A method for realizing multimedia message signature service |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3383657A (en) * | 1965-05-28 | 1968-05-14 | Ibm | Personnel security system having personally carried card with fingerprint identification |
US3996450A (en) * | 1975-03-31 | 1976-12-07 | Ncr Corporation | Secret number change routine |
DE2840716A1 (en) * | 1978-09-19 | 1980-03-27 | Siemens Ag | Turnstile intruder protection system - combines press button operated coder with weighing system connected to remote comparison unit |
GB2035645A (en) * | 1978-11-10 | 1980-06-18 | Hajime Industries | Pattern discrimination method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1329966A (en) * | 1969-09-09 | 1973-09-12 | ||
DE2559136A1 (en) * | 1975-12-30 | 1977-07-07 | Diebold Inc | Automatic bank cash dispenser - authorised user identified by code entered on keyboard |
DE2706154C2 (en) * | 1977-02-14 | 1983-01-20 | Diebold, Inc., 44702 Canton, Ohio | Access control device with a central computer and at least one terminal arranged remotely from the computer |
DE3006677A1 (en) * | 1980-02-22 | 1981-08-27 | Franz 4300 Essen Goldkuhle | Security system controlling access to given zones - has identity recording units checking fingerprints and transmitting data to evaluating station |
-
1981
- 1981-09-29 DE DE19813138710 patent/DE3138710A1/en not_active Withdrawn
-
1982
- 1982-08-24 EP EP82107769A patent/EP0075728A3/en not_active Ceased
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3383657A (en) * | 1965-05-28 | 1968-05-14 | Ibm | Personnel security system having personally carried card with fingerprint identification |
US3996450A (en) * | 1975-03-31 | 1976-12-07 | Ncr Corporation | Secret number change routine |
DE2840716A1 (en) * | 1978-09-19 | 1980-03-27 | Siemens Ag | Turnstile intruder protection system - combines press button operated coder with weighing system connected to remote comparison unit |
GB2035645A (en) * | 1978-11-10 | 1980-06-18 | Hajime Industries | Pattern discrimination method |
Non-Patent Citations (1)
Title |
---|
IBM TECHNICAL DISCLOSURE BULLETIN, Band 21, Nr. 1, Juni 1978, Seiten 424-425, New York, US; N.J. ANTHONY et al.: "Supervised adaption for signature verification system" * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1991008555A1 (en) * | 1989-11-27 | 1991-06-13 | De La Rue Systems Limited | Improvements relating to verification or authentication processes |
WO2007115448A1 (en) * | 2006-03-31 | 2007-10-18 | Zte Corporation | A method for realizing multimedia message signature service |
US8069261B2 (en) | 2006-03-31 | 2011-11-29 | Zte Corporation | Method for realizing multimedia message signature service |
Also Published As
Publication number | Publication date |
---|---|
DE3138710A1 (en) | 1983-04-21 |
EP0075728A3 (en) | 1986-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Taylor | Income inequality in the federal civilian government | |
EP1892674A1 (en) | Brain pattern based access control system | |
EP2203900B1 (en) | System for screening people and method for carrying out a screening process | |
DE69702454T2 (en) | SAFETY DEVICES AND SYSTEMS | |
DE19511470C1 (en) | Reference character evaluation on basis of identical patterns | |
EP1065598A1 (en) | Method of protected access to a memory and corresponding memory device | |
CH662193A5 (en) | METHOD FOR CREATING A PRESET NUMBER OF AUTHORIZING ELEMENTS. | |
DE2924325A1 (en) | METHOD AND DEVICE FOR SECRET IDENTIFICATION AND EVALUATION OF MACHINE-READABLE DATA CARRIERS | |
EP0980565B1 (en) | Computer-controlled adaptation of reference data by means of input data | |
EP0075728A2 (en) | System to decrease the rate of rejects in a security and key system using personal characteristics for the verification of the persons wanting access | |
DE4000133C2 (en) | ||
Stuart | Financing self-determination: Federal Indian expenditures, 1975–1988 | |
Keil | Naturalismus und Intentionalität | |
DE69602930T3 (en) | MEMORY CARD AND METHOD FOR INCREASING THE RELIABILITY OF THE ACCESS TO AN APPLICATION | |
DE3822671C2 (en) | ||
DE4231937C1 (en) | Method for ascertaining the identity of the holder of a chip card, in particular a credit card | |
WO2001009845A1 (en) | Biometric recognition method | |
EP0772164A2 (en) | Apparatus and method for protected data transfer | |
McKusick et al. | Uniform jury selection and service act | |
DE102023001761A1 (en) | Procedure for conducting a video conference in a vehicle | |
DE102007051398A1 (en) | Procedure for PIN-based backup of a portable data carrier against unauthorized use | |
Cohen | Legal research issues on aging | |
EP4258228A1 (en) | Method for precise facial recognition and facial image manipulation detection | |
CH685688A5 (en) | Map information carriers and processes for their preparation. | |
Bell | CHANGING ATTITUDES TOWARD AFFIRMATIVE ACTION: A CURRENT ISSUE THAT CALLS FOR ACTION. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Designated state(s): AT CH FR GB LI |
|
17P | Request for examination filed |
Effective date: 19841214 |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Designated state(s): AT CH FR GB LI |
|
17Q | First examination report despatched |
Effective date: 19861222 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 19870911 |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: UNTERBERGER, HANS, DR. |