EP1062641A1 - Method and device for verifying a biometric characteristic - Google Patents
Method and device for verifying a biometric characteristicInfo
- Publication number
- EP1062641A1 EP1062641A1 EP99916819A EP99916819A EP1062641A1 EP 1062641 A1 EP1062641 A1 EP 1062641A1 EP 99916819 A EP99916819 A EP 99916819A EP 99916819 A EP99916819 A EP 99916819A EP 1062641 A1 EP1062641 A1 EP 1062641A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- data carrier
- terminal
- refdatal
- reference values
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/26—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
Definitions
- the invention relates to a method and a device for testing a biometric feature.
- Biometric features are used, among other things, to identify or verify authorized persons in connection with access or access controls and to carry out financial transactions. With the help of biometric features, for example, it can be ensured that a data carrier, such as a chip card, which is used as part of the above-mentioned controls or transactions, can only be used by the authorized person, i.e. only the authorized person will have access or access is released or only the authorized person can carry out the transaction.
- a biometric feature such as a fingerprint, a voice test or the design of the fundus etc., is recorded using measurement technology, and access or access is only possible if the measured values are compared with reference values stored on the data carrier or the transaction of the data carrier is released.
- the use of the data carrier usually takes place in connection with a terminal with which the data carrier communicates.
- the comparison of the biometric data recorded by measurement technology with stored reference values can in principle take place both in the data carrier and in the terminal device. Since the biometric measurement data is often very extensive and the evaluation of this data also requires complex computing operations, this requires a high computing power and a lot of storage space. These requirements cannot or only to a limited extent be met by data carriers available today, so that the evaluation of the biometric measurement data is generally carried out in the terminal and the data carrier only serves as a memory for the reference values.
- Such a terminal is known from DE 4439 593 C2.
- a device for access and access control is disclosed, which has a microphone for voice detection and a reading device for chip cards.
- a speech sample is recorded and reduced to typical language parameters in a speech analysis unit.
- the speech parameters are compared in an evaluation unit with reference values which are stored on the chip card and are transmitted from the chip card to the device for access control for the purpose of comparison.
- reference values stored on the chip card are given to the outside, and there could therefore be a risk that unauthorized third parties will become aware of these reference values.
- the device for access control passes on the speech parameters determined from a speech sample to the chip card and the chip card compares the transmitted speech parameters with stored reference values.
- This procedure has the advantage that the stored reference values do not leave the chip card, and there is therefore no risk that they could be intercepted by unauthorized third parties.
- the measured values for the speech parameters have to be transmitted between the device and the chip card, there is a risk that the measured values will be listened to by an unauthorized third party instead of the reference values.
- a knowledge of the measured values of the authorized user by an unauthorized third party is just as explosive as a knowledge of the reference values.
- the invention is based on the object of specifying a method and a device for testing a biometric feature which offer the highest possible security standard and at the same time can be implemented with reasonable effort.
- the biometric feature is checked by the data carrier itself and not by the end device with which the data carrier is used as part of its intended use communicates.
- the sensor or sensors for detecting the biometric feature is or is usually attached to the terminal, and the measured values therefore have to be transmitted from the terminal to the data carrier.
- the computing and storage capacity of data carriers commonly used today, e.g. Chip cards are generally not sufficient to carry out a reliable comparison with reference values in an acceptable time based on the measured values of the biometric feature.
- the invention solves these problems in that, on the one hand, all security-relevant operations are carried out within the data carrier and computer-intensive operations are outsourced, as far as security is not impaired, and on the other hand in
- the data carrier specifies which data are transmitted in what form from the terminal to the data carrier. Instead of sending the complete set of measured values to the data carrier each time, the terminal device pre-evaluates the measured values, in -.4.
- the outsourcing of computation-intensive and non-security-relevant operations from the data carrier to the end device thus has the advantage that the greatest part of the computing effort is incurred in the end device, which can be equipped accordingly, and only a fraction of the data carrier itself has to be carried out without it there is a reduction in the safety standard.
- linking the measured values with data from the data carrier before the transfer from the terminal to the data carrier has the advantage that attempts at manipulation by means of intercepted data are made considerably more difficult.
- the data carrier can systematically or randomly vary its specifications for the linkage and thereby prevent manipulation by replaying the interrogated linkage results.
- the data carrier can also be used to select a varying subset of the pre-evaluated measured values, so that a potential attacker could only ever get knowledge of some of the measured values, and may also not know which part was just selected by the data carrier.
- biometric feature “fingerprint” for a system consisting of a chip card and a terminal - 5 -
- the exemplary embodiment represents only one of many implementation options.
- the invention can also be used for any other biometric features, such as language, fundus, etc.
- the details of the implementation e.g. which characteristics of the biometric feature are selected and how these
- a fingerprint is first acquired by measurement technology, and the characteristics of the fingerprint are determined from the measured values by means of a suitable extraction function.
- the characteristics can consist, for example, of coordinates and the type of the minutiae of the fingerprint.
- the minutiae are characteristic points or shapes, etc. of the fingerprint lines, such as line branches or line end points.
- the chip card gives the terminal e.g. the coordinates of the minutiae determined from the measured values for which the minutiae types are to be evaluated.
- the terminal then links the specified coordinates with the data material for the minutiae determined from the measured values, determines the type of the minutiae determined at the specified coordinates, and forwards the result to the chip card.
- the chip card checks the transmitted minute data and determines whether the biometric feature comes from an authorized user. This check can be carried out, for example, by comparison with reference values previously stored on the chip card.
- 1 is a chip card in supervision
- FIG. 2 shows a block diagram of the integrated circuit of the chip card from FIG. 1,
- FIG. 3 is a block diagram of a terminal
- Fig. 7 shows the method according to the invention
- the chip card 1 shows a chip card 1 as an example of a data carrier under supervision.
- the chip card 1 consists of a card body 2 and a chip module 3, which is arranged in a recess in the card body 2.
- the chip module 3 consists of a contact field 4 and an integrated circuit 5, which is arranged below the contact field 4.
- the dimensions of chip card 1 are defined by ISO standard 7810 and the
- the functioning of the integrated circuit 5 is compatible with the ISO standard 7816.
- the chip card 1 can be provided, for example, as an ID for access control to a building or as an authorization card for access to an electrical device, for example a computer. - 7 -
- the chip card 1 can be a bank card, a credit card, a check card or the like, with the aid of which financial transactions can be carried out.
- the invention can also be used in connection with other chip cards or any other data carriers which are capable of storing data.
- FIG. 2 shows a block diagram of the integrated circuit 5 of the chip card 1 shown in FIG. 1.
- the integrated circuit 5 is a microprocessor which is capable of carrying out calculations independently.
- the integrated circuit 5 consists of a central processing unit 6, a memory 7 and an input / output unit 8.
- the central processing unit 6 is connected both to the memory 7 and to the input / output unit 8 for the purpose of data exchange.
- the central unit 6 controls the
- the memory 7 can be designed as a non-volatile memory, as a rule ROM or EEPROM or as a volatile memory, RAM. As a rule, both volatile and non-volatile memory are available at the same time.
- the commands executed by the central unit 6 are usually stored in ROM, in some cases also in the EEPROM.
- the reference values for the PIN or for the biometric feature and other data required for the application are also stored in the EEPROM.
- the RAM serves as a working memory in which the data that is currently required is temporarily stored.
- the data exchange between the integrated circuit 5 and the outside world takes place via the input / output unit 8, which represents, for example, a serial interface, and with that for the input / output of data provided contact of the contact field 4 is electrically conductively connected.
- the input / output unit 8 represents, for example, a serial interface
- the contact field 4 it is not absolutely necessary for the data exchange between the integrated circuit 5 and the outside world to be carried out via the contact field 4.
- a contactless chip card can also be used, in which the data exchange does not take place via the contact field 4, but instead, for example, via an antenna coil or via electrical coupling surfaces.
- the chip card 1 can have a fingerprint sensor for measuring the fingerprint. This sensor would then be attached to a suitable location on the card body 2. As a rule, however, the fingerprint sensor will be attached to the terminal, as shown in FIG. 3, since fingerprint sensors suitable for integration into chip cards 1 are currently not or only to a very limited extent available.
- FIG. 3 shows a block diagram of a terminal 9 with which the chip card 1 enters into data exchange.
- the terminal 9 has an integrated circuit 10 and a fingerprint sensor 11, a keyboard 12 and a display 13.
- the fingerprint sensor 11 can be omitted in the variant of the invention in which the chip card has its own fingerprint sensor.
- the integrated circuit 10 of the terminal 9 has a central unit 14 which is connected to a memory 15 and an input / output unit 16.
- the central unit 14 is also connected to the fingerprint sensor 11, the keyboard 12 and the display 13.
- a fingerprint of the user can be recorded by measurement.
- the data determined in this way can then be saved in - 9 -
- the central unit 14 can be processed further and the result of this processing can be transmitted via the input / output unit 16 to the corresponding input / output unit 8 of the integrated circuit 5 of the chip card 1.
- the central unit 14 can likewise receive data from the integrated circuit 5 of the chip card 1 via the two input / output units 8 and 16. The user can manually enter the data required for the respective application via the keyboard 12. Which data entry is required in each case can be shown on the display 13.
- the chip card 1 can only be used after positive identification or verification of a biometric feature of the user, in the following example the fingerprint , possible.
- Identification via a biometric feature replaces or supplements the user authentication that is customary with chip cards 1 by entering a secret personal identification number (PIN).
- PIN personal identification number
- a reference value for this identification number is stored in the memory 7 of the integrated circuit 5 inaccessible from the outside and is compared with the entered identification number.
- reference values for the biometric feature are stored in the memory 7 of the integrated circuit 5 in the invention, which reference values are used when the measured values are checked. If the PIN comparison or the check of the biometric feature is positive, the chip card 1 is released for use. Otherwise, a certain number of further attempts are generally permitted and if these attempts are also unsuccessful, the chip card is blocked. - 10 -
- the fingerprint is made up of a series of more or less strongly curved lines that run as a continuous line within the section shown, branch or have an end point.
- the coordinates of the branches and the end points can be used as characteristics to be checked, since such a data set represents an individual characteristic of the person from whom the fingerprint originates.
- the section of the fingerprint shown in FIG. 4 was provided with a coordinate system, and the coordinates xl and yl of a line branch 17 and the coordinates x2 and y2 of a line end point 18 were drawn in by way of example.
- a complete data set for a fingerprint consists of a whole series of such coordinate pairs, for which the type of characteristic (branching, end point, possibly further) is also given. The structure of such a data record is shown in FIG. 5.
- FIG. 5 shows a possible structure of a data record refdata, which represents the characteristics of a fingerprint.
- the first line of the number matrix shown in FIG. 5 indicates the sequential number of the individual coordinate pairs.
- the second and third lines list the x and y coordinates for determining the positions of the characteristics of the fingerprint.
- a value z for the individual coordinate pairs indicates the type of the characteristics of the fingerprint, ie whether it is a branch or an end point, etc.
- the data record consists of a total of n entries, each entry comprising four values (sequential number, x coordinate, y coordinate, type of characteristic). - 11 -
- FIG. 6 shows the method according to the invention for checking a fingerprint.
- the method steps that are carried out in the terminal 9 are shown on the left-hand side of FIG. 6 and the processing steps that are carried out in the data carrier and thus in the chip card 1 in the present example are shown on the right-hand side.
- the arrows between the left and right side of FIG. 6 indicate a data transport between terminal 9 and chip card 1.
- the actual checking process begins with the acquisition of the cardholder's fingerprint by the terminal device 9.
- a finger for example the index finger
- the separation between the initialization and the test in the narrower sense is illustrated in FIG. 6 by a horizontal line.
- the measured values of the fingerprint determined as part of the fingerprint acquisition are represented by the data record sens.
- the format and exact appearance of this data set sens is irrelevant for further consideration. It is only important that the terminal 9 has a function calc, with which a data record verdata can be determined from the measurement data record sens, the structure of which - 12 -
- the chip card 1 transmits a data record refdatal to the terminal.
- the data record refdatal was previously determined, just like a data record ref data2, from the data record refdata by applying an extraction function extrl or extr2 to the data record refdata.
- Refdata 1 and refdata2, but in particular refdata, are usually stored in encrypted form.
- a distinction must be made between two embodiments of the invention.
- the data set ref data is completely stored in the chip card 1.
- This data record was generated, for example, in advance by the card-issuing body from measurement data of the fingerprint of the future cardholder and stored in the memory 7 of the chip card 1.
- the extraction functions extrl and extr2 are always applied to the data set refdata if the data set refdatal or ref data2 is required and is not already available.
- the data set refdatal describes the coordinates x and y of the characteristics of the fingerprint that are to be checked.
- the data set refdata2 describes the type of characteristics for the individual coordinates.
- the dataset refdatal has lines 1 to 3 of the dataset refdata shown in FIG. 5 and the dataset refdata2 lines 1 and 4.
- the dataset refdatal and as a result also the dataset refdata2 in the - 13 -
- the data records refdatal and refdata2 each represent only a subset of the individual characteristics of the fingerprint provided with a serial number in the data record refdata. This is of great importance for the method according to the invention described below, since the data record refdatal can be used to select which characteristics of the fingerprint are to be checked.
- the data set refdata is not stored in the chip card 1. Instead, only the data records refdatal and refdata2 derived from it are stored in the memory 7 of the chip card 1. In this case, however, the stored data records refdatal and refdata2 will generally include all consecutive numbers of the data record refdata, and a subset of the complete data records refdatal and refdata2 is only selected for the check when the fingerprint is checked.
- the data records refdatal and refdata2 can thus be provided both according to the first embodiment by extracting and forming subsets from the stored data record refdata and, according to the second embodiment, by forming subsets from the stored data records refdatal and refdata2.
- the datasets refdatal and refdata2 used for the further process are the subsets that resulted from the selection of certain serial numbers and are therefore generally no longer datasets that have all serial numbers.
- the transmission of the data record refdatal from the chip card 1 to the terminal 9 means that the chip card 1 - 14 -
- the selection of the characteristics to be checked can be carried out according to different criteria. In order to test as efficiently and reliably as possible, an attempt can be made to select particularly significant or clearly recognizable characteristics. Furthermore, the selection can be varied depending on the circumstances or according to a secret system in order to prevent misuse by listening to the transmitted data by unauthorized third parties, or at least to make it more difficult. Furthermore, the selection can also depend on the current application, so that, for example, in the case of an application in which only small amounts of money are transferred and therefore only a small amount of damage can be caused in the event of fraud, a smaller number of characteristics is selected than in one case where higher amounts are transferred. In this way, the effort involved can be very well adapted to the required security standard. In order to make an attack more difficult in general, it is of course also possible in all cases for the data record refdatal and also further data transmitted between the chip card 1 and the terminal 9 to be transmitted in encrypted form.
- the transmitted data record refdatal is linked to the data record verdata with the aid of a function f and in this way a data record verdata2 is generated.
- the type of characteristic of the fingerprint is determined for each of the coordinate pairs transmitted with the dataset refdatal.
- the data record verdata2 determined in this way thus specifies the type of characteristic found or a specific type of coding for the given coordinates.
- the data record verdata2 is then transmitted from the terminal 9 to the chip card 1.
- the chip card 1 checks the data record verdata2 and, depending on the result of this check, the fingerprint is accepted as an authentic biometric feature or not.
- the check can be, for example, a comparison of the data record verdata2 determined from the measurement with the reference data record ref data2. This comparison can be carried out in such a way that for each serial number of the reference data record refdata2 the type of the characteristic of the fingerprint is compared with the corresponding value of a data record verdata2 determined from the measured values.
- the measured fingerprint can then be accepted as authentic if, on the one hand, the number of characteristics found in the data record verdata2 either exceeds a predefinable threshold value in absolute or percentage terms and, on the other hand, the correspondence between the data records verdata2 and ref data2 exceeds a further predefinable threshold value.
- the comparison operations required for this can be carried out with relatively little computation and storage effort and can therefore be handled easily by the chip card 1.
- a large number of other evaluation methods can also be used. For example, the evaluation of the number of characteristics found can be completely omitted, and only the correspondence between the data records verdata2 and refdata2 can be checked. - 16 -
- the method according to the invention can also be used for other biometric features, for example for checking speech samples or measurements of the fundus etc.
- the norm can also be formed using positively definite matrices, and in this way the vector x of the measured values can be compared with the vector y of the reference values.
- the difference vector z is first formed from the vectors x and y and then the norm of the vector z according to the formula
- the matrix A serves to weight the individual components of the difference vector z to different extents. - 17 -
- the matrix A is split into an orthogonal matrix T and a diagonal matrix D, so that:
- the method according to the invention is carried out by specifying the matrix A for the weighting and the vector y for the reference values. From this, the orthogonal matrix T, the product of the orthogonal matrix T and the reference vector y and the diagonal matrix D are determined by suitable functions and stored in the data carrier 1.
- FIG. 7 The procedure for checking the biometric feature is shown in FIG. 7. According to FIG. 6, the steps carried out in the terminal 9 are also shown in FIG. 7 on the left side of the image and the steps carried out in the data carrier on the right side of the image. requirement - 18 -
- the matrices T and D and the product of the matrix T and the reference vector y were previously stored in the data carrier 1.
- the actual test procedure begins with the biometric feature being recorded by the terminal 9.
- the result of this data acquisition is the data record sens.
- the vector x of the measured values is determined from the data set sens with the aid of a suitable function calc.
- the data carrier 1 then transmits the orthogonal matrix T to the terminal 9.
- the product is formed from the matrix T and the vector x and transmitted to the data carrier 1.
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19811332 | 1998-03-16 | ||
DE19811332A DE19811332A1 (en) | 1998-03-16 | 1998-03-16 | Method of checking a biometric characteristic satisfies very high safety standard and can be implemented at supportable cost |
PCT/EP1999/001691 WO1999048056A1 (en) | 1998-03-16 | 1999-03-15 | Method and device for verifying a biometric characteristic |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1062641A1 true EP1062641A1 (en) | 2000-12-27 |
Family
ID=7861046
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99916819A Ceased EP1062641A1 (en) | 1998-03-16 | 1999-03-15 | Method and device for verifying a biometric characteristic |
Country Status (5)
Country | Link |
---|---|
US (1) | US6798334B1 (en) |
EP (1) | EP1062641A1 (en) |
AU (1) | AU3517399A (en) |
DE (1) | DE19811332A1 (en) |
WO (1) | WO1999048056A1 (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2382042A1 (en) * | 1999-08-06 | 2001-02-15 | Precise Biometrics Ab | Checking of right to access |
DE10007285A1 (en) * | 2000-02-17 | 2001-08-23 | Orga Kartensysteme Gmbh | Chip card for recording measurement data and a chip card system with such a chip card |
ATE350721T1 (en) * | 2000-04-28 | 2007-01-15 | Precise Biometrics Ab | BIOMETRIC IDENTITY VERIFICATION |
JP2001344213A (en) | 2000-05-31 | 2001-12-14 | Hitachi Ltd | Living body certification system |
GB0023904D0 (en) * | 2000-09-29 | 2000-11-15 | Rue De Int Ltd | Verification system and method |
US7254711B2 (en) * | 2001-04-05 | 2007-08-07 | Nippon Telegraph And Telephone Corporation | Network authentication system, method, and program, service providing apparatus, certificate authority, and user terminal |
DE10126369A1 (en) * | 2001-05-30 | 2002-12-05 | Giesecke & Devrient Gmbh | Procedure for checking a fingerprint |
WO2002103681A1 (en) * | 2001-06-15 | 2002-12-27 | Schlumberger Systemes Sa | System for automatic verification of biometric data signals, especially generated by a speaker |
US8266451B2 (en) * | 2001-08-31 | 2012-09-11 | Gemalto Sa | Voice activated smart card |
US7237115B1 (en) * | 2001-09-26 | 2007-06-26 | Sandia Corporation | Authenticating concealed private data while maintaining concealment |
DE10207056A1 (en) * | 2002-02-20 | 2003-09-04 | Giesecke & Devrient Gmbh | Procedure for proving a person's authorization to use a portable data carrier |
US6788605B2 (en) * | 2002-07-15 | 2004-09-07 | Hewlett-Packard Development Company, L.P. | Shared volatile and non-volatile memory |
US20060113381A1 (en) * | 2004-11-29 | 2006-06-01 | John Hochstein | Batteryless contact fingerprint-enabled smartcard that enables contactless capability |
DE102005028160B4 (en) * | 2005-06-17 | 2008-06-26 | Giesecke & Devrient Gmbh | Method for authenticating a user |
DE102009040142A1 (en) * | 2009-09-04 | 2011-03-10 | Krones Ag | Process and plant for filtering water, in particular ultrafiltration process |
US8830032B2 (en) * | 2010-10-25 | 2014-09-09 | International Business Machines Corporation | Biometric-based identity confirmation |
DE102014110694A1 (en) * | 2014-07-29 | 2016-02-04 | Bundesdruckerei Gmbh | Document with sensor means |
US10984304B2 (en) | 2017-02-02 | 2021-04-20 | Jonny B. Vu | Methods for placing an EMV chip onto a metal card |
CN108574760A (en) * | 2017-03-08 | 2018-09-25 | 阿里巴巴集团控股有限公司 | The display methods and device of associated person information and the display methods and device of information |
USD956760S1 (en) * | 2018-07-30 | 2022-07-05 | Lion Credit Card Inc. | Multi EMV chip card |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR900000116B1 (en) | 1985-03-01 | 1990-01-20 | 미쓰비시 뎅기 가부시끼가이샤 | Individual discernment system |
DE68905237T2 (en) * | 1988-05-24 | 1993-07-29 | Nippon Electric Co | METHOD AND DEVICE FOR COMPARING FINGERPRINTS. |
US5055658A (en) * | 1988-07-25 | 1991-10-08 | Cockburn John B | Security system employing digitized personal physical characteristics |
GB2237670B (en) * | 1989-11-03 | 1993-04-07 | De La Rue Syst | Reciprocal transfer system |
DE9209648U1 (en) | 1992-07-20 | 1993-01-14 | Hollnagel, Peter, 1000 Berlin | Device for detecting and reading a multifunctional card, in particular an ID card, check card, etc. |
US5559504A (en) * | 1993-01-08 | 1996-09-24 | Kabushiki Kaisha Toshiba | Surface shape sensor, identification device using this sensor, and protected system using this device |
DE4439593C2 (en) | 1994-11-05 | 1996-10-10 | Orga Kartensysteme Gmbh | Device and method for access and access control |
DE19515123C1 (en) * | 1995-04-25 | 1996-08-22 | Orga Kartensysteme Gmbh | Smart card access control security protection system |
US5815252A (en) * | 1995-09-05 | 1998-09-29 | Canon Kabushiki Kaisha | Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives |
AT405218B (en) | 1995-12-21 | 1999-06-25 | Siemens Ag Oesterreich | IDENTIFICATION SYSTEM WITH ELECTRONIC CHIP CARD |
DE19618144C1 (en) * | 1996-01-05 | 1997-04-10 | Ziegler Hans Berndt Dr | Smart data card with fingerprint input |
EP0791891B1 (en) * | 1996-02-22 | 2003-01-22 | STMicroelectronics S.r.l. | Method and device for identifying fingerprints |
FR2746201A1 (en) * | 1996-03-13 | 1997-09-19 | Seagate Technology | CREDIT CARD FOR USE IN A SYSTEM USING FINGERPRINTS TO PROVIDE PROTECTION AGAINST FRAUDULENT MANEUVER, AND METHOD OF USING THE CARD |
AUPO084896A0 (en) | 1996-07-05 | 1996-07-25 | Dynamic Data Systems Pty Ltd | Identification storage medium and system and method for providing access to authorised users |
US6219793B1 (en) * | 1996-09-11 | 2001-04-17 | Hush, Inc. | Method of using fingerprints to authenticate wireless communications |
EP0864996A3 (en) | 1997-03-13 | 1999-09-15 | Hitachi, Ltd. | Portable electronic device and method for personal identification |
US5959541A (en) * | 1997-09-23 | 1999-09-28 | Accu-Time Systems, Inc. | Biometric time and attendance system with epidermal topographical updating capability |
-
1998
- 1998-03-16 DE DE19811332A patent/DE19811332A1/en not_active Ceased
-
1999
- 1999-03-15 WO PCT/EP1999/001691 patent/WO1999048056A1/en not_active Application Discontinuation
- 1999-03-15 AU AU35173/99A patent/AU3517399A/en not_active Abandoned
- 1999-03-15 US US09/623,493 patent/US6798334B1/en not_active Expired - Fee Related
- 1999-03-15 EP EP99916819A patent/EP1062641A1/en not_active Ceased
Non-Patent Citations (1)
Title |
---|
See references of WO9948056A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO1999048056A1 (en) | 1999-09-23 |
AU3517399A (en) | 1999-10-11 |
US6798334B1 (en) | 2004-09-28 |
DE19811332A1 (en) | 1999-09-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1062641A1 (en) | Method and device for verifying a biometric characteristic | |
DE69607041T2 (en) | PROTECTED ELECTRONIC CURRENCY | |
DE3103514C2 (en) | Method and device for securing transactions | |
DE69204696T2 (en) | Rights exchange procedure between microprocessor cards. | |
EP1573689B1 (en) | Method for carrying out a secure electronic transaction using a portable data support | |
DE3782328T2 (en) | CHIP CARD WITH EXTERNAL PROGRAMMING POSSIBILITY AND METHOD FOR THEIR PRODUCTION. | |
DE602004003478T2 (en) | VIRTUAL KEYBOARD | |
EP1611510B1 (en) | Controlled execution of a program used for a virtual machine on a portable data carrier | |
EP1395943B1 (en) | Method for verifying a fingerprint | |
WO2000074001A1 (en) | Devices and methods for biometric authentication | |
DE69505685T2 (en) | METHOD AND ARRANGEMENT FOR ALLOWING SELECTIVE ACCESS TO A SECURITY SYSTEM | |
AT401205B (en) | SYSTEM FOR IDENTIFYING A CARD USER | |
DE19751172A1 (en) | Arrangement for processing biometric data, esp. fingerprint data | |
DE102010052985A1 (en) | Portable data carrier e.g. smart card for use with card reader, has strain gage integrated in data carrier main portion, which measures deformation of data carrier main portion to verify authentication characteristic of data carrier | |
DE60223703T2 (en) | AUTHENTICATION PROTOCOL WITH MEMORY INTEGRITY VERIFICATION | |
WO2010037525A1 (en) | Method and arrangement for configuring electronic devices | |
DE60105622T2 (en) | ACCESS SECURITY WITH A SECRET CODE FOR A DATA PROCESSOR | |
DE19921387C2 (en) | Arrangement and method for comparing biometric data | |
DE60025509T2 (en) | PROCESS, DEVICE AND TERMINAL FOR ASSESSING THE RESULTS OF A COMMUNICATION COMMAND | |
EP1780684A1 (en) | System and method for dispensing cash | |
EP1610218A2 (en) | Portable data carrier, system with said data carrier and method of operating said data carrier | |
DE60106893T2 (en) | DETECTION OF FALSE ACCEPTANCE IN BIOMETRIC TESTING | |
EP1152377B1 (en) | Method and terminal apparatus for performing transactions using a portable data carrier | |
DE602005004656T2 (en) | CHIP CARD AND METHOD AND SYSTEM FOR ITS AUTHENTICATION | |
EP2281259B1 (en) | Variable pin for hardware token |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20001016 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
17Q | First examination report despatched |
Effective date: 20021216 |
|
APBN | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2E |
|
APBR | Date of receipt of statement of grounds of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA3E |
|
APAF | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNE |
|
APBT | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9E |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20080619 |