EP0075728A2 - System to decrease the rate of rejects in a security and key system using personal characteristics for the verification of the persons wanting access - Google Patents

System to decrease the rate of rejects in a security and key system using personal characteristics for the verification of the persons wanting access Download PDF

Info

Publication number
EP0075728A2
EP0075728A2 EP82107769A EP82107769A EP0075728A2 EP 0075728 A2 EP0075728 A2 EP 0075728A2 EP 82107769 A EP82107769 A EP 82107769A EP 82107769 A EP82107769 A EP 82107769A EP 0075728 A2 EP0075728 A2 EP 0075728A2
Authority
EP
European Patent Office
Prior art keywords
security
mms
key
features
feature set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP82107769A
Other languages
German (de)
French (fr)
Other versions
EP0075728A3 (en
Inventor
Hans Dr. Unterberger
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Publication of EP0075728A2 publication Critical patent/EP0075728A2/en
Publication of EP0075728A3 publication Critical patent/EP0075728A3/en
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Definitions

  • the present invention relates to a method for reducing the rate of false rejections in a security and key system that uses personal characteristics of the access seeker for verification.
  • a redundant set of characteristics is usually compiled from the personal characteristics of the access seeker. While some changes in the personal characteristics of the person appear more or less subconsciously (slight change in language characteristics or the characteristic properties of the signature over time, etc.), there are others that are recognized by the person or even by himself be made, for example, changing the voice due to mood movements or illness, putting on glasses, putting on a ring, etc. Will, for example the hand geometry is measured, the rejection can already be done by wearing a ring that was not worn when the set of characteristics was recorded.
  • the present invention has for its object to provide a method for reducing the rate of false rejections in a security and key system that uses personal characteristics of the access seekers for verification.
  • the invention has the advantage that the security and key system is not noticeably more sensitive to attempts at forgery, since only a small part of the set of features is omitted for verification.
  • such a security and key system 1 which is suitable for carrying out the method according to the invention, essentially consists of one Security and key device 11 and an input device 12.
  • the access seeker Z enters information about his personal features IpM into the input device 12, which forwards it to the security and key device 11, if necessary, in a processed form.
  • the security and key device 11 all the necessary feature sets MMS of the authorized users are stored.
  • an auxiliary input device 2 is provided according to the invention, via which information about the change in characteristics of an access-seeking person can be entered.
  • the access seeker Z in which a conscious change in his personal characteristics has occurred in relation to a set of features MMS stored in the security and encryption device 11 and individually assigned to him, in addition to an originally defined information about the personal Features I PM information about the change in features I MV is entered into the security and key system 1 via the auxiliary input device 2.
  • the security and key device 11 suppresses the part of the feature set MMS affected by the change in features and, if necessary, releases the access.
  • An advantageous development of the invention provides that the security and key device 11 uses a modified feature set MMS ', preferably created by a computer (not shown), instead of the feature set MMS concerned.
  • Changes in the characteristic features caused by external conditions can advantageously also be flat if taken into account by such a system using the method according to the invention. For example, changes in signatures that occur due to the writing instrument used (fountain pen, ballpoint pen, pencil) can be compensated for by entering the characteristics of the writing instrument used in each case. The security and key system then uses the corresponding feature set for verification.

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Lock And Its Accessories (AREA)

Abstract

According to the invention, the person seeking access, in whom there has been a variation of personal features of which he is aware in relation to a feature set stored in a security encoding device and assigned individually to him, enters in the security encoding system, in addition to originally fixed information on the personal features, information on the feature variation. The security encoding device cancels the part of the feature set to which the feature variation relates and, if appropriate, allows access. <IMAGE>

Description

Die vorliegende Erfindung betrifft ein-Verfahren zur Verringerung der Rate falscher Zurückweisungen in einem Sicherheits- und Schlüsselsystem, das persönliche Merkmale der Zutrittsuchenden zur Verifikation verwendet.The present invention relates to a method for reducing the rate of false rejections in a security and key system that uses personal characteristics of the access seeker for verification.

Werden persönliche Merkmale zur automatischen Verifikation von Personen verwendet, so dürfen diese bei den heute bekannten,Systemen nicht abgeändert werden, da die betreffende Einrichtung nicht mehr genügend Übereinstimmung zwischen dem gespeicherten Merkmalssatz und der zur Verifikation angebotenen Information findet. Veränderungen der persönlichen Merkmale führen demnach zu einer erhöhten Rate von falschen Zurückweisungen (die richtige Person wird als nicht erkannt zurückgewiesen), aufgrund derer solche Sicherungs- und Schlüsseleinrichtungen für viele Anwendungen unattraktiv werden.If personal characteristics are used for the automatic verification of persons, these must not be changed in the systems known today, since the device in question no longer finds sufficient correspondence between the stored characteristic set and the information offered for verification. Changes in personal characteristics therefore lead to an increased rate of false rejections (the right person is rejected as not recognized), which makes such security and key devices unattractive for many applications.

Aus den persönlichen Merkmalen des Zutrittsuchenden wird in aller Regel ein redundanter Merkmalssatz zusammengestellt. Während einige Änderungen der persönlichen Merkmale für die jeweilige Person mehr oder weniger unbewußt auftreten (leichte Änderung der Spracheigenschaften oder die charakteristischen Eigenschaften der Unterschrift im Laufe der Zeit u.a.m.), gibt es andere, die von der jeweiligen Person erkannt werden bzw. von ihr sogar selbst vorgenommen werden, beispielsweise Veränderung der Stimme durch Gemütsbewegungen oder Krankheit, Aufsetzen einer Brille, Anstecken eines Ringes usw.. Wird beispielsweise die Handgeometrie vermessen, so kann die Zurückweisung bereits durch das Tragen eines Ringes, der bei der Aufnahme des Merkmalssatzes nicht getragen wurde, erfolgen.A redundant set of characteristics is usually compiled from the personal characteristics of the access seeker. While some changes in the personal characteristics of the person appear more or less subconsciously (slight change in language characteristics or the characteristic properties of the signature over time, etc.), there are others that are recognized by the person or even by himself be made, for example, changing the voice due to mood movements or illness, putting on glasses, putting on a ring, etc. Will, for example the hand geometry is measured, the rejection can already be done by wearing a ring that was not worn when the set of characteristics was recorded.

Die derzeit bekannten Sicherheits- und Schlüsselsysteme reagieren auf derartige Merkmalsveränderungen sehr empfindlich.The currently known security and key systems are very sensitive to such changes in characteristics.

Der vorliegenden Erfindung liegt die Aufgabe zugrunde, ein Verfahren zur Verringerung der Rate falscher Zurückweisungen in einem Sicherheits- und Schlüsselsystem, das persönliche Merkmale der Zutrittsuchenden zur Verifikation verwendet, zu schaffen.The present invention has for its object to provide a method for reducing the rate of false rejections in a security and key system that uses personal characteristics of the access seekers for verification.

Die der Erfindung zugrundeliegende Aufgabe wird durch ein Verfahren nach dem Oberbegriff des Patentanspruchs 1 gelöst, das durch die in dem kennzeichnenden Teil des Patentanspruchs 1 angegebenen Merkmale charakterisiert ist.The object on which the invention is based is achieved by a method according to the preamble of patent claim 1, which is characterized by the features specified in the characterizing part of patent claim 1.

Die Erfindung bietet den Vorteil, daß das Sicherheits- und Schlüsselsystem gegenüber Fälschungsversuchen nicht merkbar empfindlicher wird, da nur ein geringer Teil des Merkmalssatzes für die Verifizierung entfällt.The invention has the advantage that the security and key system is not noticeably more sensitive to attempts at forgery, since only a small part of the set of features is omitted for verification.

Vorteilhafte Weiterbildungen der Erfindung sind durch die in den Unteransprüchen angegebenen Merkmale gekennzeichnet.Advantageous developments of the invention are characterized by the features specified in the subclaims.

Im folgenden wird die Erfindung anhand einer Figur, die lediglich ein Ausführungsbeispiel für ein Sicherheits-und Schlüsselsystem zur Durchführung des erfindungsgemäßen Verfahrens zeigt, im einzelnen erläutert.The invention is explained in detail below with reference to a figure which shows only one exemplary embodiment of a security and key system for carrying out the method according to the invention.

Wie die Figur zeigt, besteht ein derartiges, zur Durchführung des erfindungsgemäßen Verfahrens geeignetes Sicherheits- und Schlüsselsystem 1 im wesentlichen aus einer Sicherheits- und Schlüsseleinrichtung 11 und einer Eingabeeinrichtung 12. Der Zutrittsuchende Z gibt eine Information über seine persönlichen Merkmale IpM in die Eingabeeinrichtung 12 ein, die diese an die Sicherheits- und Schlüsseleinrichtung 11 ggf. in aufbereiteter Form weiterleitet. In der Sicherheits- und Schlüsseleinrichtung 11 sind alle notwendigen Merkmalssätze MMS der Zutrittsberechtigten gespeichert. Zusätzlich ist neben dem eigentlichen Sicherheits- und Schlüsselsystem 1 erfindungsgemäß eine Hilfseingabeeinrichtung 2 vorgesehen, über die eine Information über die Merkmalsveränderung einer zutrittsuchenden Person eingebbar ist.As the figure shows, such a security and key system 1, which is suitable for carrying out the method according to the invention, essentially consists of one Security and key device 11 and an input device 12. The access seeker Z enters information about his personal features IpM into the input device 12, which forwards it to the security and key device 11, if necessary, in a processed form. In the security and key device 11, all the necessary feature sets MMS of the authorized users are stored. In addition to the actual security and key system 1, an auxiliary input device 2 is provided according to the invention, via which information about the change in characteristics of an access-seeking person can be entered.

Für das erfindungsgemäße Verfahren ist vorgesehen, daß von dem Zutrittsuchenden Z, bei dem gegenüber einem in der Sicherheits- und Scblüsseleinrichtung 11 gespeicherten und ihm individuell zugeteilten Merkmalssatz MMS eine ihm bewußte Veränderung seiner persönlichen Merkmale eingetreten ist, zusätzlich zu einer ursprünglich festgelegten Information über die persönlichen Merkmale IPM eine Information über die Merkmalsveränderung IMV in das Sicherheits-und Schlüsselsystem 1 über die Hilfseingabeeinrichtung 2 eingegeben wird. Außerdem ist erfindungsgemäß vorgesehen, daß die Sicherheits- und Schlüsseleinrichtung 11 den von den Merkmalsveränderung betroffenen Teil.des Merknrals-satzes MMS unterdrückt und den Zutritt ggf. freigibt.For the method according to the invention it is provided that the access seeker Z, in which a conscious change in his personal characteristics has occurred in relation to a set of features MMS stored in the security and encryption device 11 and individually assigned to him, in addition to an originally defined information about the personal Features I PM information about the change in features I MV is entered into the security and key system 1 via the auxiliary input device 2. In addition, it is provided according to the invention that the security and key device 11 suppresses the part of the feature set MMS affected by the change in features and, if necessary, releases the access.

Eine vorteilhafte Weiterbildung der Erfindung sieht vor, daß die Sicherheits- und Schlüsseleinrichtung 11 anstelle des betroffenen Merkmalssatzes MMS einen modifizierten, vorzugsweise durch einen Rechner (nicht gezeigt) erstellten Merkmalssatz MMS' verwendet.An advantageous development of the invention provides that the security and key device 11 uses a modified feature set MMS ', preferably created by a computer (not shown), instead of the feature set MMS concerned.

Durch äußere Bedingungen verursachte Änderungen der charakteristischen Merkmale können vorteilhafterweise ebenfalls von einem derartigen System mittels des erfindungsgemäßen Verfahrens berücksichtigt werden. So können beispielsweise Veränderungen von Unterschriften, die aufgrund des verwendeten Schreibgerätes (Füllfederhalter, Kugelschreiber, Bleistift) auftreten, durch Eingabe der Merkmale des jeweils verwendeten Schreibgerätes kompensiert werden. Das Sicherheits- und Schlüsselsystem zieht dann jeweils den entsprechenden Merkmalssatz zur Verifikation heran.Changes in the characteristic features caused by external conditions can advantageously also be flat if taken into account by such a system using the method according to the invention. For example, changes in signatures that occur due to the writing instrument used (fountain pen, ballpoint pen, pencil) can be compensated for by entering the characteristics of the writing instrument used in each case. The security and key system then uses the corresponding feature set for verification.

Claims (4)

1. Verfahren zur Verringerung der Rate falscher Zurückweisungen in einem Sicherheits- und Schlüsselsystem, das persönliche Merkmale der Zutrittsuchenden zur Verifikation verwendet, dadurch gekennzeichnet , daß von dem Zutrittsuchenden (Z), bei dem gegenüber einem in einer Sicherheits- und Schlüsseleinrichtung (11) gespeicherten und ihm individuell zugeteilten Merkmalssatz (MMS) eine ihm bewußte Veränderung seiner persönlichen Merkmale eingetreten ist, zusätzlich zu einer ursprünglich festgelegten Information über die persönlichen Merkmale (IPM) eine Information über die Merkmalsveränderung (IMV) in das Sicherheits- und Schlüsselsystem (1) eingegeben wird und daß vorgesehen ist, daß die Sicherheits-und Schlüsseleinrichtung (11) den von der Merkmalsänderung betroffenen Teil des Merkmalssatzes (MMS) unterdrückt und den Zutritt ggf. freigibt.1. A method for reducing the rate of false rejections in a security and key system that uses the personal characteristics of the access seeker for verification, characterized in that the access seeker (Z), in relation to one stored in a security and key device (11) and an individually assigned feature set (MMS), a conscious change in his personal features has occurred, in addition to an originally defined information about the personal features (I PM ), information about the feature change (I MV ) in the security and key system (1) is entered and it is provided that the security and key device (11) suppresses the part of the feature set (MMS) affected by the feature change and, if necessary, enables access. 2. Verfahren nach Anspruch 1, dadurch gekennzeichnet , daß die Sicherheits- und Schlüsseleinrichtung (11) anstelle des betroffenen Merkmalssatzes (MMS) einen modifizierten, vorzugsweise durch einen Rechner erstellten Merkmalssatz (MMS') verwendet.2. The method according to claim 1, characterized in that the security and key device (11) instead of the affected feature set (MMS) uses a modified, preferably created by a computer, feature set (MMS '). 3. Verfahren nach Anspruch 2, dadurch gekennzeichnet ,daß der modifizierte Merkmalssatz (MMS') mit Hilfe des Zutrittsuchenden (Z) dahingehend erstellt wird, daß er Merkmale des Merkmalssatzes (MMS), von denen ihm bewußt ist, daß sie vorübergehend nicht gültig sind, durch Eingabe über eine Hilfseingabeeinrichtung (2) markiert, so daß die Sicherheits- und Schlüsseleinrichtung (11) aus dem redundanten Merkmalssatz (MMS) einen relevanten modifizierten Merkmalssatz (MMS') zusammenstellen kann.3. The method according to claim 2, characterized in that the modified set of features (MMS ') is created with the help of the access seeker (Z) in such a way that he features of the set of features (MMS) of which he is aware that they are temporarily not valid , marked by input via an auxiliary input device (2) so that the security and key device (11) can compile a relevant modified feature set (MMS ') from the redundant feature set (MMS). 4. Einrichtung zur Durchführung des Verfahrens nach Anspruch 1 bis 3, dadurch gekennzeichnet , daß zusätzlich zu einer in dem Sicherheits- und Schlüsselsystem (1) enthaltenen Eingabeeinrichtung (12), über die die Information über die persönlichen Merkmale (IPM) mittels einer Eingabe- und/oder Erkennungsvorrichtung eingegeben wird, eine Hilfseingabeeinrichtung (2) vorgesehen ist, über die die Information über die Merkmalsveränderung (IMV) in das Sicherheits- und Schlüsselsystem (1) eingebbar ist.4. Device for performing the method according to claim 1 to 3, characterized in that in addition to an in the security and key system (1) contained input device (12), via which the information about the personal characteristics (I PM ) by means of an input - And / or recognition device is entered, an auxiliary input device (2) is provided, via which the information about the change in characteristics (I MV ) can be entered into the security and key system (1).
EP82107769A 1981-09-29 1982-08-24 System to decrease the rate of rejects in a security and key system using personal characteristics for the verification of the persons wanting access Ceased EP0075728A3 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19813138710 DE3138710A1 (en) 1981-09-29 1981-09-29 METHOD FOR REDUCING THE RATE OF INCORRECT REJECTIONS IN A SECURITY AND KEY SYSTEM USING THE PERSONAL CHARACTERISTICS OF THE ACCESSIBLE SEEKERS FOR VERIFICATION
DE3138710 1981-09-29

Publications (2)

Publication Number Publication Date
EP0075728A2 true EP0075728A2 (en) 1983-04-06
EP0075728A3 EP0075728A3 (en) 1986-02-05

Family

ID=6142917

Family Applications (1)

Application Number Title Priority Date Filing Date
EP82107769A Ceased EP0075728A3 (en) 1981-09-29 1982-08-24 System to decrease the rate of rejects in a security and key system using personal characteristics for the verification of the persons wanting access

Country Status (2)

Country Link
EP (1) EP0075728A3 (en)
DE (1) DE3138710A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1991008555A1 (en) * 1989-11-27 1991-06-13 De La Rue Systems Limited Improvements relating to verification or authentication processes
WO2007115448A1 (en) * 2006-03-31 2007-10-18 Zte Corporation A method for realizing multimedia message signature service

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3383657A (en) * 1965-05-28 1968-05-14 Ibm Personnel security system having personally carried card with fingerprint identification
US3996450A (en) * 1975-03-31 1976-12-07 Ncr Corporation Secret number change routine
DE2840716A1 (en) * 1978-09-19 1980-03-27 Siemens Ag Turnstile intruder protection system - combines press button operated coder with weighing system connected to remote comparison unit
GB2035645A (en) * 1978-11-10 1980-06-18 Hajime Industries Pattern discrimination method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1329966A (en) * 1969-09-09 1973-09-12
DE2559136A1 (en) * 1975-12-30 1977-07-07 Diebold Inc Automatic bank cash dispenser - authorised user identified by code entered on keyboard
DE2706154C2 (en) * 1977-02-14 1983-01-20 Diebold, Inc., 44702 Canton, Ohio Access control device with a central computer and at least one terminal arranged remotely from the computer
DE3006677A1 (en) * 1980-02-22 1981-08-27 Franz 4300 Essen Goldkuhle Security system controlling access to given zones - has identity recording units checking fingerprints and transmitting data to evaluating station

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3383657A (en) * 1965-05-28 1968-05-14 Ibm Personnel security system having personally carried card with fingerprint identification
US3996450A (en) * 1975-03-31 1976-12-07 Ncr Corporation Secret number change routine
DE2840716A1 (en) * 1978-09-19 1980-03-27 Siemens Ag Turnstile intruder protection system - combines press button operated coder with weighing system connected to remote comparison unit
GB2035645A (en) * 1978-11-10 1980-06-18 Hajime Industries Pattern discrimination method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
IBM TECHNICAL DISCLOSURE BULLETIN, Band 21, Nr. 1, Juni 1978, Seiten 424-425, New York, US; N.J. ANTHONY et al.: "Supervised adaption for signature verification system" *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1991008555A1 (en) * 1989-11-27 1991-06-13 De La Rue Systems Limited Improvements relating to verification or authentication processes
WO2007115448A1 (en) * 2006-03-31 2007-10-18 Zte Corporation A method for realizing multimedia message signature service
US8069261B2 (en) 2006-03-31 2011-11-29 Zte Corporation Method for realizing multimedia message signature service

Also Published As

Publication number Publication date
DE3138710A1 (en) 1983-04-21
EP0075728A3 (en) 1986-02-05

Similar Documents

Publication Publication Date Title
Taylor Income inequality in the federal civilian government
EP1892674A1 (en) Brain pattern based access control system
EP2203900B1 (en) System for screening people and method for carrying out a screening process
DE69702454T2 (en) SAFETY DEVICES AND SYSTEMS
DE19511470C1 (en) Reference character evaluation on basis of identical patterns
EP1065598A1 (en) Method of protected access to a memory and corresponding memory device
CH662193A5 (en) METHOD FOR CREATING A PRESET NUMBER OF AUTHORIZING ELEMENTS.
DE2924325A1 (en) METHOD AND DEVICE FOR SECRET IDENTIFICATION AND EVALUATION OF MACHINE-READABLE DATA CARRIERS
EP0980565B1 (en) Computer-controlled adaptation of reference data by means of input data
EP0075728A2 (en) System to decrease the rate of rejects in a security and key system using personal characteristics for the verification of the persons wanting access
DE4000133C2 (en)
Stuart Financing self-determination: Federal Indian expenditures, 1975–1988
Keil Naturalismus und Intentionalität
DE69602930T3 (en) MEMORY CARD AND METHOD FOR INCREASING THE RELIABILITY OF THE ACCESS TO AN APPLICATION
DE3822671C2 (en)
DE4231937C1 (en) Method for ascertaining the identity of the holder of a chip card, in particular a credit card
WO2001009845A1 (en) Biometric recognition method
EP0772164A2 (en) Apparatus and method for protected data transfer
McKusick et al. Uniform jury selection and service act
DE102023001761A1 (en) Procedure for conducting a video conference in a vehicle
DE102007051398A1 (en) Procedure for PIN-based backup of a portable data carrier against unauthorized use
Cohen Legal research issues on aging
EP4258228A1 (en) Method for precise facial recognition and facial image manipulation detection
CH685688A5 (en) Map information carriers and processes for their preparation.
Bell CHANGING ATTITUDES TOWARD AFFIRMATIVE ACTION: A CURRENT ISSUE THAT CALLS FOR ACTION.

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Designated state(s): AT CH FR GB LI

17P Request for examination filed

Effective date: 19841214

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Designated state(s): AT CH FR GB LI

17Q First examination report despatched

Effective date: 19861222

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 19870911

RIN1 Information on inventor provided before grant (corrected)

Inventor name: UNTERBERGER, HANS, DR.