JP5549518B2 - Authentication device, authentication program, and portable terminal device - Google Patents

Authentication device, authentication program, and portable terminal device Download PDF

Info

Publication number
JP5549518B2
JP5549518B2 JP2010227828A JP2010227828A JP5549518B2 JP 5549518 B2 JP5549518 B2 JP 5549518B2 JP 2010227828 A JP2010227828 A JP 2010227828A JP 2010227828 A JP2010227828 A JP 2010227828A JP 5549518 B2 JP5549518 B2 JP 5549518B2
Authority
JP
Japan
Prior art keywords
data
authentication
storage unit
unit
folder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2010227828A
Other languages
Japanese (ja)
Other versions
JP2012083857A (en
Inventor
絵里佳 大野
孝暢 服部
友宏 吉位
Original Assignee
富士通株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社 filed Critical 富士通株式会社
Priority to JP2010227828A priority Critical patent/JP5549518B2/en
Publication of JP2012083857A publication Critical patent/JP2012083857A/en
Application granted granted Critical
Publication of JP5549518B2 publication Critical patent/JP5549518B2/en
Application status is Expired - Fee Related legal-status Critical
Anticipated expiration legal-status Critical

Links

Images

Description

The present invention relates to an authentication device that uses biometric information such as a fingerprint for authentication, and relates to, for example, an authentication device, an authentication program, and a mobile terminal device that automatically update data to be authenticated.

  In authentication using biometric information such as fingerprints, authentication target data representing the person is registered, and by comparing the authentication target data with the input data, whether the input data matches the authentication target data or not. It is determined whether or not.

  Regarding such authentication, the fingerprint image input until the authentication is successful is temporarily stored, the temporary storage image is compared with the failed image, the number of matches is counted, and the number of matches is equal to or greater than a predetermined value. It is known to replace a failed image with an authentication image (Patent Document 1).

Further, it is known that a failure rate is calculated from the history information of fingerprint authentication, the reference fingerprint information is updated when the failure rate exceeds the required level, and the fingerprint authentication is stopped when the failure rate exceeds the stop level (patent) Reference 2).

JP 2008-217442 A JP 2007-141113 A

  By the way, the authentication target data is unique data for identifying the user and is not updated unless the user executes the update process. It is not known whether the authentication success rate will increase even if the authentication target data is updated for the purpose of increasing the authentication success rate.

  A difference occurs between the input data and the authentication target data at the beginning of registration depending on the frequency of authentication and the level of proficiency of the operation. If this difference is large, an authentication failure occurs.

  At the time of authentication, it is necessary to repeat the input operation until the authentication is successful. However, taking the time for the authentication operation such as the repetition of the input operation gives the user anxiety and discomfort.

Accordingly, an object of the authentication device, the authentication program, and the mobile terminal device of the present disclosure is to automatically update the authentication target data according to the performance of the authentication target data and to improve the authentication operability.

  In order to achieve the above object, the authentication device according to the present disclosure compares input data and authentication target data in a verification unit, and also verifies the reference data if there is reference data in the reference data storage unit. The storage control unit stores the input data that matches the authentication target data in the reference data storage unit, and the reference data storage unit stores the reference data in which the number of verifications exceeds the reference value and the authentication success rate exceeds the authentication target data. Replace with the authentication target data.

  In order to achieve the above object, the authentication program is executed by the computer according to the present disclosure, and the input data and the authentication target data are collated, and if there is reference data in the reference data storage unit, the reference data is also collated. Then, the input data that matches the authentication target data is stored in the reference data storage unit, and the reference data in which the number of verifications exceeds the reference value and the authentication success rate exceeds the authentication success rate of the authentication target data is authenticated in the authentication target data storage unit Replace with the target data.

In order to achieve the above object, a portable terminal device having an authentication function, the portable terminal device comprising the authentication device described above. Therefore, the collation unit collates the input data with the authentication object data, and collates the reference data if there is reference data in the reference data storage unit. Then, the control unit stores the input data that matches the authentication target data in the reference data storage unit, and the reference data whose reference count exceeds the reference value and whose authentication success rate exceeds the authentication target data is stored in the authentication target data storage unit. Replace with data to be authenticated.

  According to the authentication device, the authentication program, and the mobile terminal device of the present disclosure, any of the following effects can be obtained.

  (1) The data to be authenticated can be automatically updated to data with a high authentication success rate, and the authentication operability can be improved.

  (2) Since the authentication target data updated based on the authentication results is used, the authentication accuracy can be improved.

  (3) It is possible to reflect biometric conditions and biometric changes in the authentication target data, and improve the accuracy of biometric authentication.

Other objects, features, and advantages of the present invention will become clearer with reference to the accompanying drawings and each embodiment.

It is a figure which shows an example of the authentication apparatus which concerns on 1st Embodiment. It is a flowchart which shows operation | movement of an authentication apparatus. It is a figure which shows an example of the function part of the mobile telephone which concerns on 2nd Embodiment. It is a figure which shows an example of the hardware of a mobile telephone. It is a figure which shows an example of a memory part. It is a figure which shows an example of an authentication object data storage part, an accumulation | storage folder, and an examination folder. It is the figure which showed the cellular phone from the front side. It is the figure which showed the mobile phone from the back side. It is a figure which shows an example of the screen display at the time of fingerprint registration. It is a figure which shows an example of a fingerprint sensor part and fingerprint collection. It is a flowchart which shows an example of the process sequence of initial registration. It is a flowchart which shows the process sequence of an authentication process (1st-Xth). It is a flowchart which shows the process sequence of an authentication process [(X + 1) th-(X + Y-1) th]. It is a flowchart which shows the process sequence of an authentication process [(X + Y) time or later]. It is a figure which shows an example of an authentication process (1st time). It is a figure which shows an example of an authentication process (2nd time). It is a figure which shows an example of an authentication process (3rd time). It is a figure which shows an example of an authentication process (4th time). It is a figure which shows an example of an authentication process (5th time). It is a figure which shows an example of an authentication process (6th time). It is a figure which shows an example of an authentication process (7th time). It is a figure which shows an example of an authentication process (8th time). It is a figure which shows an example of replacement examination processing. It is a figure which shows an example of replacement examination processing. It is a figure which shows an example of an authentication process (9th time). It is a figure which shows an example of replacement examination processing. It is a figure which shows an example of replacement examination processing. It is a flowchart which shows an example of the process sequence of the authentication process which concerns on 3rd Embodiment. It is a figure which shows the personal computer which concerns on other embodiment. It is a figure which shows the personal computer which concerns on other embodiment. It is a figure which shows PDA which concerns on other embodiment. It is a figure which shows the comparative example of fingerprint authentication.

[First Embodiment]

  The first embodiment will be described with reference to FIG. FIG. 1 shows an example of an authentication apparatus.

  The authentication device 2 is an example of the authentication device and the authentication program of the present disclosure, and has a function of collating the input data 4 with registered authentication target data and a function of updating the authentication target data according to the authentication results. Contains. The input data 4 is data used for authentication, for example, image data representing a fingerprint image, and serves as authentication target data and reference data described later.

  As illustrated in FIG. 1, the authentication device 2 includes functional units such as an input unit 6. The input unit 6 is an example of a data input unit for biometric information such as a fingerprint, and is used to input data used for authentication and data to be authenticated. Data used for authentication is data representing biometric information, such as data collected from a living body, for example, data representing a fingerprint. The authentication target data is data representing the person and is registration data representing the authentication target.

  The authentication target data storage unit 8 is an example of a storage unit that stores a plurality of authentication target data, and the authentication target data is the data described above. The authentication target data stored in the authentication target data storage unit 8 may be single, but a plurality of different authentication target data is stored. This is to provide redundancy for authentication.

  The reference data storage unit 10 is an example of a storage unit that stores a plurality of reference data. Here, the reference data is input data that matches at least one of the plurality of authentication target data as a result of collation with the above-described authentication target data.

  The collation unit 12 is an example of a collation unit that collates the input data 4 with the authentication target data stored in the authentication target data storage unit 8 and collates with the reference data if the reference data storage unit 10 has reference data. In the collation unit 12, authentication is successful if the data matches (matches), and authentication fails if the data does not match. Regarding this verification, if the input data 4 does not match any of the authentication target data, the storage control unit 14 discards (that is, deletes) the input data 4 without storing it. If the input data 4 does not match any of the authentication target data, even if there is reference data in the reference data storage unit 10, the reference data is not verified. This speeds up authentication.

  The storage control unit 14 is an example of a data storage control unit, and performs data replacement between the data storage and the storage unit. Specifically, one of them stores the input data 4 matching the authentication target data in the reference data storage unit 10. The other one performs a process of replacing the reference data in which the number of verifications exceeds the reference value and the authentication success rate exceeds the authentication target data with the authentication target data in the authentication target data storage unit 8.

  The authentication operation of the authentication device 2 will be described with reference to FIG. FIG. 2 shows an example of the processing procedure of the authentication process.

  This processing procedure is an example of the authentication method or the authentication program of the present disclosure. As shown in FIG. 2, data is input to the input unit 6, and a plurality of authentication target data is set as authentication targets in the authentication target data storage unit 8. Is stored (step S11). This input data is biometric information such as a fingerprint. For example, there are three authentication target data recorded in the authentication target data storage unit 8.

  New data for authentication is input to the input unit 6 (step S12). The input data 4 and the authentication target data stored in the authentication target data storage unit 8 are collated (step S13). It is determined whether the input data 4 matches any of the authentication target data in the authentication target data storage unit 8 (step S14). If the input data 4 does not match any of the authentication target data (NO in step S14), the input data 4 is deleted and discarded (step S15).

  If the input data 4 matches any of the authentication target data (YES in step S14), it is determined whether there is reference data in the reference data storage unit 10 (step S16). If there is reference data in the reference data storage unit 10 (YES in step S16), the reference data and the input data 4 are collated (step S17), and the process proceeds to step S18. Even when there is no reference data in the reference data storage unit 10 (NO in step S16), the process proceeds to step S18.

  In step S <b> 18, the input data 4 that matches any of the authentication target data is stored in the reference data storage unit 10.

  In step S19, the reference data in which the number of collations exceeds the reference value and the authentication success rate exceeds the authentication success rate of the authentication target data is replaced with authentication target data in the authentication target data storage unit 8.

  In such a configuration, the input data 4 that matches any of the authentication target data is data that has been successfully authenticated, and thus is stored in the reference data storage unit 10. The input data 4 that matches any of the authentication target data is also verified with the reference data in the reference data storage unit 10. If the number of verifications, that is, the number of verifications is counted for each data and the success of authentication is counted, the verification frequency and the authentication success rate of the authentication target data and the reference data can be obtained. As a result, a reference value is set for the number of verifications, and the reference data in which the number of verifications exceeds the reference value and the authentication success rate exceeds the authentication target data is replaced with the authentication target data in the authentication target data storage unit 8. Therefore, the authentication target data can be automatically updated to data with a high authentication success rate, and a decrease in authentication operability can be prevented.

  If the authentication object data updated based on the authentication result as described above is used, the authentication accuracy can be improved.

  Although the living body changes depending on the living environment or the like, the automatic update of the authentication target data described above can reflect the biological state and the biological change in the authentication target data, so that the accuracy of biometric authentication can be improved.

  Since the reference data is input data that matches any of the authentication target data, the reference data storage unit stores data that has been successfully authenticated. Since the authentication failure data is not stored, the reference data storage unit is spent storing only valid data, and the data can be stored efficiently.

[Second Embodiment]

  For the second embodiment, reference is made to FIG. FIG. 3 shows an example of the authentication function unit of the mobile phone according to the second embodiment. In FIG. 3, the same parts as those in FIG.

  The mobile phone 20 is an example of the authentication device, the authentication program, or the mobile terminal device of the present disclosure, and includes an authentication function unit 22 as shown in FIG. The authentication function unit 22 is an application unit (APL) that includes the function of the above-described authentication device 2 (FIG. 1). The authentication function unit 22 is realized by a computer, collates the input data 4 applied to the input unit 6 with data including authentication target data in the memory unit 24, and outputs an authentication result.

  The input unit 6 is an example of a data input unit for biometric information such as a fingerprint, and is controlled by the input control unit 26. The input control unit 26 is an example of an input control unit, and performs control such as input from the input unit 6 and capturing and holding of input data 4 such as fingerprint collection of the fingerprint sensor unit 46 (FIG. 4).

  The memory unit 24 includes an authentication object data storage unit 28, a collection folder 30, and an examination folder 32 as data storage means. The authentication target data storage unit 28 stores authentication target data, and the integrated folder 30 stores input data 4 that matches any of the authentication target data. The examination folder 32 stores data extracted from the accumulation folder 30 with a high number of collations.

  The collation unit 12 collates the input data 4 with the authentication target data registered in the authentication target data storage unit 28, collates with the data if there is data in the accumulation folder 30, and the data if there is data in the examination folder 32. It is an example of the collation means which collates with. If the input data 4 matches any of the authentication target data in the authentication target data storage unit 28, the authentication is successful. If the input data 4 does not match, the authentication is unsuccessful. Verification is performed.

  The storage control unit 14 is an example of a data storage control unit, and stores and deletes the input data 4 in response to the authentication target data registration process and the verification result of the verification unit 12. That is, if the input data 4 matches any of the authentication object data (successful authentication), the input data 4 is stored in the integrated folder 30. In this case, if there is no space necessary for data registration in the collection folder 30, a replacement process is executed. After the data replacement process with the examination folder 32, a space is formed in the collection folder 30 and the input data 4 is stored. If the input data 4 does not match any of the authentication target data (authentication failure), the input data 4 is deleted.

  The calculation processing unit 34 is an example of a calculation unit that performs calculation processing such as verification results, and the calculation of the number of verifications, comparison of the number of verifications, calculation of the number of verification matches, comparison of the number of verification matches, authentication success rate, authentication success rate Perform operations such as comparison. The verification results represented by the number of verifications, the number of verification matches, or the authentication success rate are stored in the verification results storage units 284, 304, and 324 (FIGS. 5 and 6), and the data being saved is updated every time computation is performed. Is called. The comparison result of the number of verifications and the authentication success rate is used for data replacement processing.

  The display control unit 36 is an example of display control means of the display unit 38, and displays and controls the display screen of the display unit 38 such as fingerprint setting.

  Next, the hardware of the mobile phone 20 will be described with reference to FIGS. FIG. 4 shows an example of the hardware of the mobile phone, and FIG. 5 shows an example of the memory unit. 4 and 5, the same parts as those in FIG. 3 are denoted by the same reference numerals.

  The mobile phone 20 is an example of the authentication device or the mobile terminal device of the present disclosure, and includes the authentication device 2 described above. As shown in FIG. 4, the mobile phone 20 includes a CPU (Central Processing Unit) 42, a memory unit 24, an operation input unit 44, a fingerprint sensor unit 46, a display unit 38, a digital baseband (DBB). Part 48 is included.

  The CPU 42 executes an OS (Operating System) and an authentication program in the memory unit 24 and executes various controls. This control includes various controls such as input data capture, input data authentication processing, and display control. The authentication process includes verification of input data and authentication target data or other data, counting of the number of verifications, calculation of the authentication success rate of the authentication target data or other data, replacement processing of authentication target data, and the like.

  The memory unit 24 is a storage unit that stores the above-described OS and authentication program to be executed by the CPU 42, and includes a recording medium such as a flash memory.

  The operation input unit 44 is an example of a unit that inputs various types of information such as user data.

  The fingerprint sensor unit 46 is an example of the input unit 6 or the data input unit described above, and is an example of a unit that collects a fingerprint, which is an example of the biological information described above, from a living body. The fingerprint sensor unit 46 may be either an area type or a slide / sweep type, and other sampling methods may be adopted.

  The display unit 38 is an example of a display unit that visually displays various types of information such as user data and authentication results, and includes, for example, an LCD (Liquid Crystal Display) display.

  The DBB unit 48 is a unit that is controlled by the CPU 42 or the CPU provided in the DBB unit 48 and reproduces voice and data from the radio signal received by the radio unit 50 or sends out a radio signal modulated by the audio signal and data. In this embodiment, an activation request and a reset output are issued to the CPU 42. A real-time clock (RTC) unit 52, a power supply LSI (Large Scale Integration) 54, and a power switch 56 are connected to the DBB unit 48.

  The wireless unit 50 is a wireless communication means with the base station. The RTC unit 52 is also referred to as a calendar clock, and is an example of a time measuring unit that operates in a system different from the clock of the CPU 42.

  The power supply LSI 54 is an example of a power supply control unit of the DBB unit 48, and a reset output is issued to the DBB unit 48 by operating the power switch 56. The power supply OFF output is received from the DBB unit 48 and a reset output is issued from the power supply LSI 54 to the DBB unit 48.

  As shown in FIG. 5, the memory unit 24 includes a RAM (Random-Access Memory) 58, a program storage unit 60, and a data storage unit 62. The RAM 58 is a temporary data storage means and is used as a work area. In this embodiment, input data representing the collected fingerprint is temporarily stored.

  The program storage unit 60 stores various application programs such as the OS 64 and the authentication program 66 described above. The authentication program 66 is an example of the authentication program of the present disclosure.

  The data storage unit 62 includes storage areas for a user data setting unit 68, an authentication target data storage unit 28, a collection folder 30, and an examination folder 32. The user data setting unit 68, the authentication target data storage unit 28, the collection folder 30 and the examination folder 32 may be independent memories, or each may be a data storage area in a folder format.

  The user data setting unit 68 is an area for setting data for identifying a user. The authentication target data storage unit 28 is an example of the authentication target data storage unit 8 and the first storage unit described above, and stores the authentication target data described above. The authentication target data storage unit 28 includes a data storage unit 282 and a verification result storage unit 284 that stores a verification result of the authentication target data.

  The accumulation folder 30 is an example of the reference data storage unit 10 and the second storage unit described above, stores the reference data described above, and stores input data that matches any of the authentication target data. The accumulation folder 30 includes a data storage unit 302 and a verification result storage unit 304 that stores data verification results.

  The examination folder 32 is an example of the reference data storage unit 10 and the third storage unit described above, and stores reference data having predetermined conditions (to be described later) by examination from the accumulation folder 30. Specifically, the examination folder 32 The data replaced from 30 is stored. The examination folder 32 includes a data storage unit 322 and a verification result storage unit 324 that stores data verification results.

  Next, the authentication target data storage unit 28, the accumulation folder 30, and the examination folder 32 are referred to FIG. FIG. 6 shows an example of the data storage structure of the authentication target data storage unit, the collection folder, and the examination folder.

  As shown in FIG. 6, the data storage unit 282 of the authentication target data storage unit 28 corresponds to registration units 2821, 2822, and 2823 that register three pieces of data as a plurality of fingerprint data, and the respective registration units 2821, 2822, and 2823. Result storage units 2841, 2842, and 2843 are provided.

  In this embodiment, since the three registration units 2821, 2822, and 2823 are set, the above-mentioned specified number is 3, but may be 4 or more, or may be less than 3.

  In the data storage unit 302 of the integrated folder 30, registration units 3021, 3022, 3023, 3024, and 3025 for registering five pieces of data as a plurality of fingerprint data, and results corresponding to the registration units 3021, 3022, 3023, 3024, and 3025, are registered. Storage units 3041, 3042, 3043, 3044, and 3045 are provided.

  The data storage unit 322 of the examination folder 32 includes registration units 3221, 3222, 3223 that register three pieces of data as a plurality of fingerprint data, and record storage units 3241, 3242, 3243 corresponding to the registration units 3221, 3222, 3223. Is provided.

  Next, the cellular phone 20 will be described with reference to FIGS. 7 shows the front side of the mobile phone, and FIG. 8 shows the back side of the mobile phone.

  As shown in FIG. 7, the cellular phone 20 divides the casing into an operation-side casing unit 70 and a display-side casing unit 72, and connects the casing units 70 and 72 with a hinge unit 74. It is configured as possible. The operation-side housing unit 70 is provided with a symbol key 76 and a cursor key 78 as an example of the operation input unit 44, and a microphone 80. The display-side casing unit 72 uses an LCD display which is an example of the display unit 38 and is provided with a display screen 82. In addition, a receiver 83 is installed in the display side casing 72.

  Further, as shown in FIG. 8, the above-described fingerprint sensor unit 46, which is an example of a means for collecting a fingerprint from the user's finger, is installed on the back side of the operation-side housing unit 70.

  Next, FIG. 9 is referred to for screen display. FIG. 9 shows an example of the screen display. 9, the same parts as those in FIG. 7 are denoted by the same reference numerals.

  This screen display 84 is a setting screen display for fingerprint authentication as an example of biometric authentication. As shown in FIG. 9, the screen display 84 displays a fingerprint registration selection unit 88 together with a title display 86. By superimposing the cursor display 90 on the fingerprint registration selection unit 88 by operating the cursor key 78 (FIG. 7), guide information is displayed on the guide information display unit 92. In this display state, fingerprints can be collected by pressing a determination key at the center of the cursor key 78 or a hard key corresponding to a software key displayed on the display screen 82. That is, the fingerprint input mode is started.

  Next, the fingerprint sensor unit 46 will be described with reference to FIG. 10A shows an example of an area type fingerprint sensor, and FIG. 10B shows an example of a slide / sweep type fingerprint sensor.

  As described above, either the area type fingerprint sensor 94 (A in FIG. 10) or the slide / sweep type fingerprint sensor 96 (B in FIG. 10) may be used for the fingerprint sensor unit 46.

  As shown in FIG. 10A, the area fingerprint sensor 94 includes a detection area 100 having a wide detection area in the center of the sensor body 98. The area fingerprint sensor 94 can collect a fingerprint by placing the finger of the finger 102 on the detection area 100 and resting.

  The slide / sweep fingerprint sensor 96 includes a linear detection unit 104 in the center of the sensor main body 98 as shown in FIG. 10B. In the slide / sweep type fingerprint sensor 96, the fingerprint of the finger 102 is applied to the detection unit 104 and is slid in the direction indicated by the arrow, whereby the fingerprint can be collected.

  Next, registration processing and authentication processing will be described for the authentication operation of the mobile phone 20.

  (1) Registration process (FI)

  Refer to FIG. 11 for the registration process of the authentication target data. FIG. 11 shows an example of a processing procedure for registering authentication object data.

  This processing procedure is an example of the authentication method of the present disclosure, and is registration data registration processing. This registration processing FI is a pre-processing for starting authentication. The registration data is data that is registered in advance by the user and is the authentication target data described above. The authentication target data is registered in the authentication target data storage unit 28.

  In this processing procedure, as shown in FIG. 11, data representing the fingerprint is read by collecting the fingerprint (step S101). The reading of this data is determined, and it is determined whether or not the reading is successful (step S102). If the data reading fails (NO in step S102), the process returns to step S101 to reread the data.

  If the data reading is successful (YES in step S102), after this data reading, it is determined whether or not the reading of the specified number (reference value) is completed (step S103). If the number of data readings has not reached the specified number (NO in step S103), the process returns to step S101, and the processes in steps S101 to S103 are continued.

  If the prescribed number of data has been read (YES in step S103), the registration data, which is the data to be authenticated, is completed, and the authentication can be started (step S104). After this process, the system shifts to a standby state.

  (2) Authentication processing [1st to Xth] (FII)

  FIG. 12 is referred to for the first to X-th authentication processes. FIG. 12 shows an example of a processing procedure for registering authentication object data.

  This processing procedure is an example of the authentication method of the present disclosure, which is registration data registration processing and authentication processing. This processing procedure is a process in which the number of collations is from 1 to X times.

  The accumulation folder 30 is a folder for accumulating data to be replaced, and a threshold value X is set for the number of data that can be stored.

  The examination folder 32 is a folder for accumulating data to be actually replaced, and a threshold Y is set for the number of data that can be stored.

  This processing procedure is a process in which the number of verifications is 1 or more and the threshold value X, and as shown in FIG. 12, by reading data (starting verification) (step S201), the read data is one or more registered data. It is determined whether or not they match (step S202). If the read data does not match any registered data (NO in step S202), the read data is deleted (step S203), and the process returns to step S201 for the next verification.

  If the read data matches any registered data, that is, matches one or more of the registered data (YES in step S202), the number of matching and the number of matching matches are stored for the registered data (step S204).

  It is confirmed whether there is data in the accumulation folder 30 (step S205). If there is no data in the accumulation folder 30 (NO in step S205), the read data is stored in the accumulation folder 30 (step S206) for the next verification. Return to step S201.

  If there is data in the accumulation folder 30 (YES in step S205), the read data is collated with the data in the accumulation folder 30, and the number of collations and the number of collation matches are stored (step S207).

  It is confirmed whether (X-1) pieces of data exist in the accumulation folder 30 (step S208). If there are no (X-1) pieces of data in the accumulation folder 30 (NO in step S208), the read data is accumulated. The data is stored in the folder 30 (step S206), and the process returns to the step before step S201 for next verification.

  If there are (X-1) pieces of data in the accumulation folder 30 (YES in step S208), the read data is stored in the accumulation folder 30 (step S209), and the process proceeds to the next verification (process FIII: FIG. 13) ( Step S210).

  (3) Authentication processing [(X + 1) th to (X + Y-1) th] (FIII)

  FIG. 13 is referred to for the authentication processing of [(X + 1) th to (X + Y−1) th]. FIG. 13 shows an example of a processing procedure for registering authentication object data.

  This processing procedure is an example of the authentication method of the present disclosure, which is registration data registration processing and authentication processing. This processing procedure is processing from the number of matching times (X + 1) to (X + Y-1).

  In this processing procedure, as shown in FIG. 13, by reading data (starting collation) (step S301), it is determined whether the read data matches one or more pieces of registered data (step S302). If the read data does not match one or more of the registered data, that is, if any of the registered data does not match (NO in step S302), the read data is deleted (step S303), and for the next verification, It returns to before step S301.

  If the read data matches any registered data, that is, matches one or more registered data (YES in step S302), the number of matching and the number of matching matches are stored for the registered data (step S304).

  The read data and the data in the collection folder 30 are collated, and the number of collations and the number of collation matches are stored (step S305).

  It is confirmed whether or not there is data in the examination folder 32 (step S306). If there is no data in the examination folder 32 (NO in step S306), the data having the actual number of times representing the X collation results in the accumulation folder 30 is examined. Move to the folder 32 (step S307). The read data is stored in the accumulation folder 30 (step S308), and the process returns to step S301 for the next verification.

  If there is data in the examination folder 32 (YES in step S306), the read data and the data in the examination folder 32 are collated, and the number of collations and the number of collation matches are stored (step S309).

  It is confirmed whether there are (Y-2) pieces of data in the examination folder 32 (step S310), and if there are no (Y-2) pieces of data in the examination folder 32 (NO in step S310), steps S307 and S308 are performed. After the processing, the process returns to step S301 for the next verification.

  If there are (Y-2) pieces of data in the examination folder 32 (YES in step S310), the data having the actual number of times X in the accumulation folder 30 is moved to the examination folder 32 (step S311). The read data is stored in the accumulation folder 30 (step S312), and the process proceeds to the next verification (process FIV: FIG. 14) (step S313).

  (4) Authentication processing [when (X + Y) th is exceeded] (FIV)

  FIG. 14 is referred to for the authentication processing [when the (X + Y) th time is exceeded]. FIG. 14 shows an example of the authentication process.

  This processing procedure is an example of the authentication method of the present disclosure, which is registration data registration processing and authentication processing. This processing procedure is processing after the number of collations is (X + Y) times or later.

  In this processing procedure, as shown in FIG. 14, by reading data (starting collation) (step S401), it is determined whether or not the read data matches one or more pieces of registered data (step S402). If the read data does not match one or more of the registered data, that is, if any of the registered data does not match (NO in step S402), the read data is deleted (step S403), and for the next verification, It returns to before step S401.

If the read data matches any registered data, that is, matches one or more of the registered data (YES in step S402), the registered data and the number of matching matches are stored for the registered data, and the success rate is calculated ( Step S404). In this case, the method for calculating the registration data and the success rate of the data in the examination folder 32 is as follows:
Success rate = (number of matching matches ÷ number of matching) x 100 [%] (1)
Is required.

  The read data and the data in the collection folder 30 are collated, and the number of collations and the number of collation matches are stored (step S405).

The success rate of the data having the actual number of times in the accumulation folder 30 is calculated (step S406). In this case, the calculation method of the success rate of data having the number of times of X times in the accumulation folder 30 is
Success rate = (Number of matching matches / X) x 100 [%] (2)
Is required.

  The read data and the data in the examination folder 32 are collated, and the number of collations and the number of collation matches are stored (step S407). The success rate of the data in the examination folder 32 is calculated using equation (1) (step S408).

  The data with the lowest success rate in the registered data is compared with the data with the highest success rate in the examination folder 32 (step S409). If the success rate in the registered data is the lowest data ≦ the success rate in the examination folder 32 (YES in step S409), replacement is performed (step S410). If the success rate in the registered data is the lowest data> the success rate in the examination folder 32 is the highest data (NO in step S409), the process proceeds to step S411 without replacement.

  In step S411, the data with the lowest success rate in the examination folder 32 is compared with the data having X times of actual data in the accumulation folder 30. If the success rate in the examination folder 32 is the lowest data> data having X times of actual data in the integrated folder 30 (NO in step S411), data having the actual number of times of X in the integrated folder 30 is determined. It deletes (step S412), stores the read data in the accumulation folder 30 (step S413), and returns to the step before step S401 for the next verification.

  If the success rate in the examination folder 32 is the highest-order data ≦ data having X times of actual data in the collection folder 30 (YES in step S411), the data with the lowest success rate in the examination folder 32 is deleted. (Step S414). At this time, in the examination folder 32, the data storage position is shifted, and an empty space is generated. As a result, the read data is stored in the accumulation folder 30 (step S415), and the process returns to step S401 for the next verification.

  Next, the authentication processing will be described with reference to FIGS. 15, 16, 17, 18, 19, 20, 21, 22, 22, 23, 24, 25, 26, and 27. FIG.

  This authentication process is an example of an execution process of the authentication program of the present disclosure. This authentication process is different from the above-described processing procedure (FIG. 14) in storing read data. In the above-described authentication process, the read data is stored in the accumulation folder 30 after the data replacement process (step S410) (steps S413 and S415). In contrast, in the following authentication process, the read data is stored in the collection folder 30 prior to the data replacement process (step S410), but any process may be performed.

  (1) First certification

  As shown in FIG. 15A, in the data storage unit 282 of the authentication target data storage unit 28, as a plurality of authentication targets, for example, three data A, B, C after three fingerprints and three fingerprints are collected. Is registered.

  The user collects a new fingerprint for verification with the authentication target. As shown in FIG. 15B, the collected data D (input data 4) and data A, B, and C are individually compared. Data D does not match data B and C (disagree), but matches data A (match). In this case, since the data D matches any of the data A, B, and C, the authentication is successful. In FIG. 15B, ◯ indicates matching and × indicates mismatching.

  Further, as shown in FIG. 15C, if the data D does not match any of the data A, B, and C, authentication is performed again (authentication failure), and the collated data D is deleted.

  In this case, the data D matches the data A and has been successfully authenticated. When the authentication is successful, the verification results of the authentication target data A, B, and C are automatically grasped. The data D that has been successfully authenticated is automatically saved in the registration unit 3025 of the data storage unit 302 of the integrated folder 30 as shown in FIG. A certain amount of data can be stored in the accumulation folder 30, and the certain amount is five as described above. The verification result is a numerical value indicating the number of matches with respect to the verification number, and the verification result of the first authentication is 1/1 for data A, 0/1 for data B, and 0/1 for data C, and saves the verification results. Registered in the section 284.

  (2) Second authentication

  The user collects a new fingerprint for verification with the authentication target. As shown in FIG. 16A, newly collected data E (input data 4) is compared with data A, B, and C to be authenticated. The data E does not match the data C (disagreement), but matches the data A and B (matches). In this case, since the data E matches any of the data A, B, and C, the authentication is successful.

  Further, as shown in FIG. 16B, if the collected data E does not match any of the data A, B, and C, authentication is performed again (authentication failure), and the collated data E is deleted.

  Since the data E matches the data A and B and has been successfully authenticated, the verification results of the authentication target data A, B and C are grasped as shown in FIG. In this case, the collation results are 2/2 for data A, 1/2 for data B, and 0/2 for data C.

  Then, the data E is compared with the data D stored in the data storage unit 302 of the accumulation folder 30. In this case, it matches the data D. The collation record 1/1 of the data D is recorded in the collation record storage unit 304 of the accumulation folder 30. Further, as shown in FIG. 16D, the data E that has been successfully authenticated is registered and stored in the registration unit 3025 of the integrated folder 30, and the data D in the registration unit 3025 is shifted to the registration unit 3024. Let

  (3) Third certification

  The user collects a new fingerprint for verification with the authentication target. As shown in FIG. 17A, the collected data F (input data 4) is individually compared with the data A, B, and C to be authenticated. The data F does not match with the data B (non-match), but matches with the data A and C (match). In this case, since the data F matches any of the data A, B, and C, the authentication is successful.

  Further, as shown in FIG. 17B, if the collected data F does not match any of the data A, B, and C, authentication is performed again (authentication failure), and the collated data F is deleted.

  Since the data F matches the data A and C and has been successfully authenticated, as shown in FIG. 17C, the verification results of the authentication target data A, B and C are grasped. In this case, the verification results are 3/3 for data A, 1/3 for data B, and 1/3 for data C.

  The data F is compared with the data D and E stored in the data storage unit 302 of the accumulation folder 30, and does not match the data D and matches the data E. The verification results are 1/2 for data D and 1/1 for data E. Further, as shown in FIG. 17D, the data F that has been successfully authenticated is registered and stored in the registration unit 3025 of the accumulation folder 30, and the data D and E are registered from the registration units 3024 and 3025 to the registration unit. Shift to 3023, 3024.

  (4) 4th certification

  The user collects a new fingerprint for verification with the authentication target. As shown in FIG. 18A, the collected data G (input data 4) is individually compared with the data A, B, and C to be authenticated. The data G does not match the data A and C (mismatch), but matches the data B (match). In this case, since the data G matches any of the data A, B, and C, the authentication is successful.

  Further, as shown in FIG. 18B, if the collected data G does not match any of the data A, B, and C, authentication is performed again (authentication failure), and the collated data G is deleted.

  As shown in FIG. 18C, the data G matches the data B and has been successfully authenticated. In this case, the verification results are 3/4 for data A, 2/4 for data B, and 1/4 for data C.

  The data G is compared with the data D, E, and F stored in the accumulation folder 30, and does not match the data D and matches the data E and F. The verification results are 1/3 for data D, 2/2 for data E, and 1/1 for data F. Further, as shown in FIG. 18D, the data G that has been successfully authenticated is registered and stored in the registration unit 3025 of the accumulation folder 30, and the data D, E, and F are registered in the registration units 3023, 3024, and 3025. Shift to registration units 3022, 3023, 3024.

  (5) 5th certification

  The user collects a new fingerprint for verification with the authentication target. As shown in FIG. 19A, the collected data H (input data 4) is individually compared with the data A, B, and C to be authenticated. The data H does not match the data C (disagreement), but matches the data A and B (matches). In this case, since the data H matches any of the data A, B, and C, the authentication is successful.

  Further, as shown in FIG. 19B, if the collected data H does not match any of the data A, B, and C, authentication is performed again (authentication failure), and the collated data H is deleted.

  As shown in FIG. 19 (c), the data H matches the data A and B and has been successfully authenticated. In this case, the verification results are 4/5 for data A, 3/5 for data B, and 1/5 for data C.

  Then, the data H is compared with the data D, E, F, G stored in the accumulation folder 30, and does not match the data E, G, and matches the data D, F. The verification results are 2/4 for data D, 2/3 for data E, 2/2 for data F, and 0/1 for data G. Further, as shown in FIG. 19D, the data H that has been successfully authenticated is registered and stored in the registration unit 3025 of the accumulation folder 30, and the data D, E, F, and G are registered in the registration units 3022 and 3023. , 3024, 3025 to shift to registration units 3021, 3022, 3023, 3024. As a result, all the registration units 3021, 3022, 3023, 3024, and 3025 in the accumulation folder 30 are free.

  (6) 6th certification

  The user collects a new fingerprint for verification with the authentication target. As shown in FIG. 20A, the collected data I (input data 4) is individually compared with the data A, B, and C to be authenticated. Data I does not match data C (disagree), but matches data A and B (match). In this case, since the data I matches any of the data A, B, and C, the authentication is successful.

  Further, as shown in FIG. 20B, if the collected data I does not match any of the data A, B, and C, authentication is performed again (authentication failure), and the collated data I is deleted.

  As shown in FIG. 20 (c), the data I matches the data A and B and has been successfully authenticated. In this case, the verification results are 5/6 for data A, 4/6 for data B, and 1/6 for data C.

  The data I is compared with the data D, E, F, G, and H stored in the accumulation folder 30, and does not match the data E, F, and H, and matches the data D and G. . The verification results are 3/5 for data D, 2/4 for data E, 2/3 for data F, 1/2 for data G, and 0/1 for data H.

  In this case, the data I that has been successfully authenticated satisfies the conditions for storing the integrated folder 30, but the registration units 3021 to 3025 of the integrated folder 30 have no space and cannot be stored in this state. Therefore, the examination folder 32 is used for data storage. The examination folder 32 is a higher-order folder that stores data whose collation count exceeds the reference count with respect to the accumulation folder 30. As described above, registration sections 3221, 3222, and 3223 for registering a plurality of data are set in the examination folder 32. In the comparison of the number of collations of each data in the accumulation folder 30, since the number of collations of the data D exceeds the reference number = 5 [times], as shown in FIG. It is automatically transferred to 3223 and stored. The verification result storage unit 324 is also set in the examination folder 32, and the verification result 3/5 of the data D is recorded.

  As a result, the registration unit 3021 of the accumulation folder 30 is vacant, and the data E, F, G, and H in the registration units 3022, 3023, 3024, and 3025 are shifted to the registration units 3021, 3022, 3023, and 3024. As a result, a space is created in the registration unit 3025 of the accumulation folder 30, and the data I is stored in the registration unit 3025.

  (7) 7th certification

  The user collects a new fingerprint for verification with the authentication target. As shown in FIG. 21A, the collected data J (input data 4) is individually compared with the data A, B, and C to be authenticated. Data J does not match data C (disagree), but matches data A and B (match). In this case, since the data J matches any of the data A, B, and C, the authentication is successful.

  Further, as shown in FIG. 21B, if the collected data J does not match any of the data A, B, and C, authentication is performed again (authentication failure), and the collated data J is deleted.

  As shown in FIG. 21 (c), the data J matches the data A and B and has been successfully authenticated. In this case, the verification results are 6/7 for data A, 5/7 for data B, and 1/7 for data C.

  Further, the data J is compared with the data E, F, G, H, and I stored in the accumulation folder 30, and does not match the data E, G, and I, and matches the data F and H. . The verification results are 2/5 for data E, 3/4 for data F, 1/3 for data G, 1/2 for data H, and 0/1 for data I. In addition, the data D stored in the examination folder 32 is also compared with the data D and matches.

  In this case, the data J that has been successfully authenticated satisfies the conditions for being stored in the accumulation folder 30, but the registration units 3021 to 3025 of the accumulation folder 30 have no space. Therefore, as shown in FIG. 21D, data E exceeding the reference number (= 5 [times]) is shifted to the registration unit 3223 of the examination folder 32, and the data D is transferred from the registration unit 3223 to the registration unit 3222. Shift and save. The verification results are 4/6 for data D and 2/5 for data E.

  As a result, the registration unit 3021 of the accumulation folder 30 is vacant, and the data F, G, H, and I in the registration units 3022 to 3025 are shifted to the registration units 3021 to 3024. As a result, a space is created in the registration unit 3025 of the accumulation folder 30, and the data J is stored in the registration unit 3025.

  (8) 8th certification

  The user collects a new fingerprint for verification with the authentication target. As shown in FIG. 22A, the collected data K (input data 4) is individually compared with the data A, B, and C to be authenticated. The data K does not match the data B and C (mismatch), but matches the data A (match). In this case, authentication is successful because the data K matches any of the data A, B, and C.

  Further, as shown in FIG. 22B, if the collected data K does not match any of the data A, B, and C, authentication is performed again (authentication failure), and the collated data K is deleted.

  As shown in FIG. 22C, the data K matches the data A and has been successfully authenticated. In this case, the collation results are 7/8 for data A, 5/8 for data B, and 1/8 for data C.

  The data K is compared with the data F, G, H, I, and J stored in the accumulation folder 30, and does not match the data H and matches the data F, G, I, and J. The verification results are 4/5 for data F, 2/4 for data G, 1/3 for data H, 1/2 for data I, and 1/1 for data J. Further, the data D and E stored in the examination folder 32 are also compared with each other, and are matched with the data D and E.

  In this case, the data K that has been successfully authenticated satisfies the conditions for being stored in the accumulation folder 30, but the registration units 3021 to 3025 of the accumulation folder 30 have no space. In this case, as shown in FIG. 22D, the data F exceeding the reference number (= 5 [times]) are shifted to the registration unit 3223 of the examination folder 32, and the data D and E are registered in the registration units 3222 and 3223. Are shifted to registration units 3221 and 3222 and stored. The verification results are 5/7 for data D, 3/6 for data E, and 4/5 for data F.

  As a result, the registration unit 3021 of the accumulation folder 30 is vacant, and the data G, H, I, and J in the registration units 3022 to 3025 are shifted to the registration units 3021 to 3024. As a result, a space is created in the registration unit 3025 of the accumulation folder 30, and data K is stored in the registration unit 3025.

  As described above, when the authentication target data storage unit 28, the collection folder 30 and the examination folder 32 are not empty (full state), that is, when the data reaches the predetermined amount, the replacement examination is executed.

  First, when the success rate is calculated for the data A, B, and C in the authentication target data storage unit 28, as shown in FIG. 23A, the data A is 7/8 = 88 [%], and the data B is 5/8 = 63 [%], data C is 1/8 = 13 [%], and data C is the lowest success rate.

  Next, when the success rate is calculated for the data D, E, and F in the examination folder 32, the data D is 5/7 = 71 [%], the data E is 3/6 = 50 [%], and the data F is 4 / 5 = 80 [%], and the data F is the highest success rate.

Therefore, when the success rate of the lowest data C in the authentication object data storage unit 28 and the highest data F in the examination folder 32 are compared, and the success rate of the data F exceeds the success rate of the data C, In response to this, replacement is automatically generated. in this case,
C (1/8 = 13 [%]) <F (4/5 = 80 [%])
Therefore, a replacement process is performed. In this replacement process, as shown in FIG. 23C, the data F is registered in the registration unit 2823 of the authentication object data storage unit 28 instead of the data C, and the data F is registered in the registration unit 3223 of the examination folder 32. To register data C.

  Next, when the success rate of the data G in the accumulation folder 30 is calculated, as shown in FIG. 24 (d), the data G has four verification results, and the success rate is 2/4 = 50 [% ].

Therefore, when the success rate of the lowest data C in the examination folder 32 and the data G in the accumulation folder 30 are compared, the success rate of the data G is the success rate of the data C as shown in FIG. If it exceeds the maximum, replacement and data deletion are automatically generated. in this case,
C (1/8 = 13 [%]) ≦ G (2/4 = 50 [%])
Therefore, replacement processing and data deletion are performed. In this process, as shown in FIG. 24 (f), data G is registered in the registration unit 3223 of the examination folder 32 instead of the data C, and the data C in the registration unit 3223 of the examination folder 32 is deleted.

  As a result, the registration unit 3025 of the accumulation folder 30 is vacant, so that the data H, I, J, and K in the registration units 3022 to 3025 are shifted to the registration units 3021 to 3024. As a result, the registration unit 3025 of the accumulation folder 30 becomes empty.

  (9) 9th certification

  The user collects a new fingerprint for verification with the authentication target. As shown in FIG. 25A, the collected data L (input data 4) is individually compared with the data A, B, and F to be authenticated. In this case, all the data A, B, and F are matched and the authentication is successful.

  Further, as shown in FIG. 25B, if the collected data L does not match any of the data A, B, and F, authentication is performed again (authentication failure), and the collated data L is deleted.

  The data L is compared with the data D, E, G in the examination folder 32 and the data H, I, J, K in the collection folder 30 as shown in FIG. And the data E, I, J, and K match. In this case, collation results are 8/9 for data A, 6/9 for data B, 5/6 for data F, 5/8 for data D, 4/7 for data E, 4/6 for data G, and data H Is 1/4, data I is 2/3, data J is 2/2, and data K is 1/1.

  Further, as shown in FIG. 25D, the data L that has been successfully authenticated is registered and stored in the registration unit 3025 of the integrated folder 30, and all the registration units 3021 to 3025 of the integrated folder 30 are free. .

  As described above, when the authentication object data storage unit 28, the examination folder 32, and the collection folder 30 are not empty (full state), that is, when the data reaches the predetermined amount, the replacement examination is executed.

  First, the success rate is calculated for data A, B, and F in the authentication target data storage unit 28 and data D, E, and G in the examination folder 32. As shown in FIG. 26A, in the authentication object data storage unit 28, data A is 8/9 = 89 [%], data B is 6/9 = 67 [%], and data F is 5/6 =. 83 [%], and data B is the lowest success rate. In the examination folder 32, data D is 5/8 = 63 [%], data E is 4/7 = 57 [%], data G is 4/6 = 67 [%], and data G is the highest. Is the success rate.

Therefore, when the success rate of the lowest data B in the authentication target data storage unit 28 and the highest data G in the examination folder 32 are compared, the success rate of the data G exceeds the success rate of the data B (G Replacement is automatically generated with ≧ B). In this case, as shown in FIG. 26B, replacement occurs even at the same rate. there,
B (6/9 = 67 [%]) = G (4/6 = 67 [%])
Therefore, a replacement process is performed. In this case, since the data in the examination folder 32 has a low number of verifications and indicates a success rate with new data, if the success rate is the same rate, the data in the examination folder 32 is prioritized and shifted to the authentication target. . In this replacement process, as shown in FIG. 25C, the data G is registered in the registration unit 2822 of the authentication target data storage unit 28 instead of the data B, and the data G is replaced in the registration unit 3223 of the examination folder 32. To register data B.

  Next, when the success rate of the data H in the accumulation folder 30 is calculated, as shown in FIG. 27D, the data H has four verification results, and the success rate is 1/4 = 25 [% ].

Therefore, when the success rates of the lowest data E in the examination folder 32 and the data H in the collection folder 30 are compared, the magnitude relationships between the data H and E are shown in FIGS. 27E and 27F. Thus, replacement and data deletion occur. in this case,
E (4/7 = 57 [%])> H (1/4 = 25 [%])
Therefore, the data is deleted without performing the replacement process. In this process, the data E in the registration unit 3222 of the examination folder 32 is maintained, and the data H in the registration unit 3021 of the accumulation folder 30 is deleted.

  As a result, the registration unit 3021 of the accumulation folder 30 is vacant, and the data I, J, K, and L in the registration units 3022 to 3025 are shifted to the registration units 3021 to 3024. As a result, the registration unit 3025 of the accumulation folder 30 becomes empty.

  With respect to the authentication processing described above, modifications, features, effects, and the like are listed below.

  (a) In the authentication operation, a function for automatically calculating the authentication success rate of the authentication target data and grasping the actual number is provided. When a difference occurs between the authentication target data and the input data 4 and the frequency of authentication failure increases, the authentication target data registered first by the user is automatically replaced with data having a high success rate. Thereby, an authentication rate can be raised.

  (b) It has a function of storing a certain amount in another area as exemplified by the accumulation folder 30 and the examination folder 32 as data for replacing data that has been successfully verified in the authentication operation.

  (c) A function for automatically calculating the success rate of data stored in another area as data to be replaced and grasping the actual number is provided.

  (d) Two folders, a collection folder 30 and an examination folder 32, are provided to replace the authentication target data with data having a higher success rate. In the examination folder 32, data promoted from the accumulation folder 30 is registered.

  (e) A function of saving data that has been successfully verified in the integrated folder 30 is provided.

  (f) The accumulation folder 30 has a function of performing a certain number of times (X times) of collation.

  (g) The data that has been collated X times in the collection folder 30 has a function of being automatically moved to the examination folder 32 up to a certain amount.

  (h) When the data in the examination folder 32 exceeds a certain amount, the data with the lowest success rate in the authentication target data, the data with the highest success rate in the examination folder 32, and the data with the lowest order The function to calculate is provided. In order to create replacement data, all the fingerprint data collected and actually verified when collating is stored in the accumulation folder 30 and collated a certain number of times (X times). The data for which the X-th collation has been completed is transferred to the examination folder 32.

  (i) When the success rate of the data with the highest success rate in the examination folder 32 exceeds the success rate of the lowest data among the authentication target data, a function is provided for replacement.

  (j) A threshold may be set for the success rate of the data that has been collated X times in the accumulation folder 30, and a function may be provided for deleting if the threshold is below this threshold. With such a function, it is possible to prevent a decrease in authentication rate due to deterioration of authentication data due to data with a low success rate.

  (k) The success rate of the data that has been collated X times in the collection folder 30 is compared with the success rate of the data with the lowest success rate in the examination folder 32. Is stored in the examination folder 32.

  (l) The success rate of the data that has been collated X times in the collection folder 30 is compared with the success rate of the data with the lowest success rate in the examination folder 32. The function to delete is provided.

  (m) When the number of data in the examination folder 32 exceeds a predetermined number, data replacement work is started. Thereby, efficient data replacement can be performed. In the data replacement, the data with the lowest success rate in the authentication target data is compared with the data with the highest success rate in the examination folder 32, and then the data is replaced. The data is updated to data with a high authentication success rate, and as a result, it contributes to the improvement of the authentication success rate of the data to be authenticated, enabling highly reliable authentication.

  (n) A fixed threshold is set for data that has been collated X times in the accumulation folder 30, and if the data that has been collated X times is less than the threshold, the data may be deleted. Good. Such data deletion can improve the reliability of authentication. When the data that has been collated X times in the accumulation folder 30 exceeds the threshold value, the success rate is compared with the lowest data in the examination folder 32, and the collation is completed X times in the accumulation folder 30. If the data success rate exceeds, replace the data. At that time, data with a lower success rate is deleted. Since data with a low authentication success rate is deleted, efficient use of the storage means is achieved along with erasure of valuable data.

  (o) When the authentication success rate of fingerprint authentication decreases, the data is automatically replaced with data with a high authentication success rate, so that the authentication operability of a mobile phone having such an authentication function can be improved.

  (p) In the above embodiment, both the authentication target data and the replacement data are updated based on the calculation of the success rate. Therefore, even if the biometric information of the user, for example, the fingerprint changes, The data can be replaced according to the authentication success rate. Since data updating can be automated, authentication can be performed with the latest registered data corresponding to changes in biometric information over time, and authentication performance can be improved.

  (q) Since the data to be authenticated is automatically updated according to the authentication success rate, the user need only use the authentication function without being aware of the data update, there is no data update load on the user, A high authentication function can be realized.

[Third Embodiment]

  Next, the authentication process will be described with reference to FIG. FIG. 28 shows an example of the processing procedure of authentication processing according to the third embodiment.

  The processing procedure of this authentication processing is an example of the authentication method of the present disclosure, and as shown in FIG. 28, collation of collected data and existing data is performed (step S501). In this collation process, it is determined whether or not collation is successful (step S502). If collation is not successful (NO in step S502), the process returns to step S501 and collation is performed again.

  If the collation is successful (YES in step S502), the existing registration data and the data in the examination folder 32 are collated, the success rate is calculated, and the actual number is counted (step S503). The data is collated with the data of the accumulation folder 30, and the results are counted (step S504).

  It is determined whether or not there is data that has X verification results in the accumulation folder 30 (step S505). If there is no data that has X verification results in the accumulation folder 30 (NO in step S505), the process proceeds to the next verification. (Step S501).

  If there is data that has X verification results in the accumulation folder 30 (YES in step S505), the success rate of the Xth data is calculated (step S506), and it is determined whether there are Y data in the examination folder 32 (Step S507).

  If there are no Y pieces of data in the examination folder 32 (NO in step S507), the process proceeds to the next verification (step S501). If there are Y data in the examination folder 32 (YES in step S507), it is determined whether the lowest registered data <the highest examination folder (step S508), and the lowest registered data <the lowest examination folder. If it is higher (YES in step S508), replacement is performed (step S509).

  If the lowest order of the registered data is not <highest of the examination folder (NO in step S508), it is determined whether it is the Xth of the accumulation folder> the lowest order of the examination folder (step S510). If the Xth of the accumulation folder> the lowest position of the examination folder (YES in step S510), the replacement is performed, the lowest place of the examination folder 32 is deleted (step S511), and the next verification is performed (step S501). If the accumulation folder X is not the lowest in the examination folder (NO in step S510), the X-th accumulation folder 30 is deleted (step S512), and the next verification is performed (step S501).

  Also according to such a processing procedure, as in the second embodiment, the authentication function can be realized, and the authentication success rate can be increased.

[Other Embodiments]

  (1) In the above embodiment, the mobile phone 20 (FIG. 3 and the like) is disclosed as an example of the authentication device 2 (FIG. 1) and the mobile terminal device, but the present invention is not limited to such disclosure. The present invention may be a personal computer (PC) 400 (FIGS. 29 and 30) or a personal digital assistant (PDA) 500 (FIG. 31). Furthermore, it may be a game machine or a digital camera having a communication function.

  The PC 400 includes the above-described authentication function unit 22 (FIG. 3). As shown in FIG. 29, the operation-side housing unit 70 and the display-side housing unit 72 are connected by a hinge unit 74, and can be opened and closed. ing. The above-described fingerprint sensor unit 46 is installed in the operation-side casing unit 70. Also with such a configuration, the same function as that of the above-described embodiment is realized, and the same effect can be obtained. In FIG. 29, the same parts as those in the above embodiment are given the same reference numerals, and the description thereof is omitted.

  The fingerprint sensor unit 46 may be installed in the operation-side casing unit 70 of the PC 400, but instead of the fingerprint sensor unit 46 described above, an area fingerprint sensor 94 may be used as shown in FIG. The area fingerprint sensor 94 has a configuration in which an area fingerprint sensor 94 is connected to a PC 400 with a cable 95. Also with such a configuration, the same function as that of the above-described embodiment is realized, and the same effect can be obtained.

  The PDA 500 includes the authentication function unit 22 (FIG. 3) described above, and the slide / sweep fingerprint sensor 96 described above is installed in the housing unit 502 as shown in FIG. Also with such a configuration, the same function as that of the above-described embodiment is realized, and the same effect can be obtained. In FIG. 31, the same parts as those of the above embodiment are denoted by the same reference numerals, and the description thereof is omitted.

  (2) In the above embodiment, fingerprint authentication is exemplified as an authentication function using biometric information. However, the authentication device, the authentication program, and the mobile terminal device of the present disclosure may use biometric information such as vein authentication. It is not limited to authentication.

  (3) In the above embodiment, the fingerprint sensor unit 46 is exemplified, but an existing digital camera may be used for the fingerprint sensor unit 46.

  (4) In the flowchart (FIG. 14) showing the processing procedure of the above embodiment, the number of matching matches and the success rate are calculated based on the number of times of X times. X used for this calculation does not need to match the number of data stored in the accumulation folder 30 and may be a value smaller than the number N of data stored. The candidate data to be transferred from the accumulation folder 30 to the examination folder 32 may be the data with the maximum number of achievements.

[Comparative Example]

  (1) Conventional fingerprint authentication device

  With respect to mobile phones and other devices equipped with a fingerprint authentication function, authentication target data is not updated unless the user replaces himself / herself. Updating the authentication target data does not necessarily increase the authentication success rate. The setting for registering fingerprint authentication is performed at a stage prior to getting used to holding and operating the mobile phone. For this reason, if you get used to the operation, there will be a difference in the initial holding and fingerprint authentication operation from the initial registration, and the frequency of fingerprint authentication failure will increase, and there is a possibility that it will be mistaken for a failure. When performing fingerprint authentication, there is an inconvenience accompanied by an uncomfortable feeling in the authentication operation, for example, input must be repeated until the authentication is successful. Such inconvenience is solved by the above embodiment, authentication failure due to operation mistakes can be reduced, and the authentication success rate can be increased.

  (2) Memory of biometric information that failed authentication

  This comparative example will be described with reference to FIG. FIG. 32 shows the authentication of the comparative example. 32, (A) is authentication of the user himself, (B) is authentication of the user himself and others, (C) is authentication of others, (D) is authentication of the user himself and others, and (E) is authentication of the user himself / herself. Indicates authentication.

  This comparative example is a case where another person who is not a user simultaneously collects fingerprints while continuously collecting fingerprints from the user's own finger 102. Reference numeral 103 denotes a finger of another person who is not a user. Setting the failed image before the authentication success as the replacement target data also sets the other person's image as the target data.

  In such a process, since a failed image is registered, there is a problem of insufficient security for fingerprint authentication.

  In contrast, the authentication device, the authentication program, and the mobile terminal device of the present disclosure do not store the authentication failure image, and store only the authentication success image as the authentication target data and registration data, and store the data with a high authentication success rate. doing. For this reason, it is possible to save only the data with a high authentication success rate as well as to reduce the storage capacity, and to improve the authentication success rate.

  Next, the following additional notes will be disclosed with respect to the embodiment including the above-described examples. The present invention is not limited to the following supplementary notes.

(Appendix 1) An input unit for inputting data;
An authentication object data storage unit for storing a plurality of authentication object data to be collated with input data;
A reference data storage unit for storing a plurality of reference data to be collated with the input data;
A collation unit that collates the input data with at least the authentication target data;
The input data that matches any of the authentication target data is stored in the reference data storage unit, and the reference data whose number of verifications exceeds a reference value and whose authentication success rate exceeds the authentication success rate of the authentication target data is authenticated. A storage control unit for replacing the authentication target data in the target data storage unit;
An authentication device comprising:

(Additional remark 2) The said data is the collected fingerprint information, The authentication apparatus of Additional remark 1 characterized by the above-mentioned.

(Supplementary Note 3) The authentication apparatus according to Supplementary Note 1, wherein input data that does not match any of the authentication target data is deleted.

(Additional remark 4) The said reference data memory | storage part is an authentication apparatus of Additional remark 1 provided with the memory | storage part which memorize | stores the reference data with the said high frequency | count of collation extracted from the said reference data.

(Supplementary Note 5) An input unit for inputting data used for authentication;
A first storage unit for storing a plurality of authentication target data;
A second storage unit that stores input data that matches the authentication target data;
A collation unit that collates the input data with the authentication target data in the first storage unit, and collates with the data if there is data in the second storage unit;
If the input data matches any one of the authentication target data, the success rate of the authentication target data in the first storage unit, and if there is data in the second storage unit, the success rate of the data is also obtained. A control unit that calculates and stores the input data in the second storage unit;
An authentication device comprising:

(Additional remark 6) Furthermore, it is provided with the 3rd storage part which memorizes a plurality of data, The control part, when the number of the data in the 2nd storage part reaches the 1st standard value, 6. The authentication apparatus according to appendix 5, wherein data having the largest number of collations in the second storage unit is transferred to the third storage unit, and the data in the second storage unit is deleted.

(Additional remark 7) The said control part reaches | attains the 2nd reference value in the number of the said data in the said 3rd memory | storage part, and the success rate of the data with the highest success rate in the said 3rd memory | storage part is the said If the success rate of the authentication target data having the lowest success rate in the first storage unit is exceeded, the data having the highest success rate in the third storage unit is stored in the first storage unit as the authentication target data. 6. The authentication device according to appendix 5, wherein the authentication target data having the lowest success rate in the first storage unit is transferred to the third storage unit.

(Supplementary note 8) When the number of the data in the second storage unit reaches the first reference value, the control unit has a success rate of data having the largest number of collations in the second storage unit. If the success rate of the data with the lowest success rate in the third storage unit is equal to or higher than the success rate of the data with the highest number of matchings in the second storage unit and the lowest success rate in the third storage unit 6. The authentication apparatus according to appendix 5, wherein the authentication apparatus replaces data.

(Supplementary note 9) An authentication program executed by a computer,
The ability to enter data,
A function of storing a plurality of authentication target data in the authentication target data storage unit;
A function of storing a plurality of reference data in a reference data storage unit;
A function of collating input data with the authentication object data, and collating with reference data if there is reference data in the reference data storage unit;
The input data that matches any of the authentication target data is stored in the reference data storage unit, and the reference data whose number of verifications exceeds a reference value and whose authentication success rate exceeds the authentication success rate of the authentication target data is authenticated. A function to replace the authentication target data in the target data storage unit;
An authentication program for causing the computer to execute.

(Supplementary Note 10) An authentication program executed by a computer,
A function to input data used for authentication;
A function of storing a plurality of pieces of authentication target data in the first storage unit;
A function of storing, in a second storage unit, input data that matches the authentication target data in the first storage unit;
A function of collating the input data with the authentication target data in the first storage unit, and collating with the data if there is data in the second storage unit;
If the input data matches any one of the authentication target data, the success rate of the authentication target data in the first storage unit, and if there is data in the second storage unit, the success rate of the data is also obtained. A function to calculate,
An authentication program for causing the computer to execute.

(Appendix 11) A mobile terminal device having an authentication function,
An input section for inputting data;
An authentication object data storage unit for storing a plurality of authentication object data to be collated with input data;
A reference data storage unit for storing a plurality of reference data to be collated with the input data;
A collation unit that collates the input data with at least the authentication target data;
The input data that matches any of the authentication target data is stored in the reference data storage unit, and the reference data whose number of verifications exceeds a reference value and whose authentication success rate exceeds the authentication success rate of the authentication target data is authenticated. A storage control unit for replacing the authentication target data in the target data storage unit;
A portable terminal device comprising:

As described above, the most preferable embodiments of the authentication device, the authentication program, and the mobile terminal device have been described. However, the present invention is not limited to the above description, and is described in the claims, or It goes without saying that various modifications and changes can be made by those skilled in the art based on the gist of the invention disclosed in the embodiments for carrying out the invention, and such modifications and changes are included in the scope of the present invention. Needless to say.

DESCRIPTION OF SYMBOLS 2 Authentication apparatus 4 Input data 6 Input part 8 Authentication object data storage part 10 Reference data storage part 12 Collation part 14 Storage control part 20 Cellular phone 22 Authentication function part 28 Authentication object data storage part 30 Integrated folder 32 Examination folder

Claims (5)

  1. An input section for inputting data;
    An authentication object data storage unit for storing a plurality of authentication object data to be collated with input data;
    A reference data storage unit for storing a plurality of reference data to be collated with the input data;
    A collation unit that collates the input data with at least the authentication target data;
    The input data that matches the authentication target data is stored in the reference data storage unit, and reference data whose number of verifications exceeds a reference value and whose authentication success rate exceeds the authentication success rate of the authentication target data is stored in the authentication target data storage A storage control unit that replaces the authentication target data of a unit;
    An authentication device comprising:
  2.   The authentication apparatus according to claim 1, wherein the data is collected fingerprint information.
  3.   The authentication device according to claim 1, wherein the reference data storage unit includes a storage unit that stores reference data extracted from the reference data and having a high number of matchings.
  4. An authentication program executed by a computer,
    The ability to enter data,
    A function of storing a plurality of authentication target data in the authentication target data storage unit;
    A function of storing a plurality of reference data in a reference data storage unit;
    A function of collating input data with the authentication object data, and collating with reference data if there is reference data in the reference data storage unit;
    The input data that matches the authentication target data is stored in the reference data storage unit, and reference data whose number of verifications exceeds a reference value and whose authentication success rate exceeds the authentication success rate of the authentication target data is stored in the authentication target data storage A function of replacing the authentication target data of a part,
    An authentication program for causing the computer to execute.
  5. A mobile terminal device having an authentication function,
    An input section for inputting data;
    An authentication object data storage unit for storing a plurality of authentication object data to be collated with input data;
    A reference data storage unit for storing a plurality of reference data to be collated with the input data;
    A collation unit that collates the input data with at least the authentication target data;
    The input data that matches the authentication target data is stored in the reference data storage unit, and reference data whose number of verifications exceeds a reference value and whose authentication success rate exceeds the authentication success rate of the authentication target data is stored in the authentication target data storage A storage control unit that replaces the authentication target data of a unit;
    A portable terminal device comprising:
JP2010227828A 2010-10-07 2010-10-07 Authentication device, authentication program, and portable terminal device Expired - Fee Related JP5549518B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2010227828A JP5549518B2 (en) 2010-10-07 2010-10-07 Authentication device, authentication program, and portable terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2010227828A JP5549518B2 (en) 2010-10-07 2010-10-07 Authentication device, authentication program, and portable terminal device

Publications (2)

Publication Number Publication Date
JP2012083857A JP2012083857A (en) 2012-04-26
JP5549518B2 true JP5549518B2 (en) 2014-07-16

Family

ID=46242677

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2010227828A Expired - Fee Related JP5549518B2 (en) 2010-10-07 2010-10-07 Authentication device, authentication program, and portable terminal device

Country Status (1)

Country Link
JP (1) JP5549518B2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015121874A (en) * 2013-12-20 2015-07-02 富士通株式会社 Biometric authentication device, data verification method for collation, and data verification computer program for collation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4923910B2 (en) * 2006-09-22 2012-04-25 富士通株式会社 Biometric authentication device, control method, and control program
JP4403426B2 (en) * 2007-01-09 2010-01-27 サイレックス・テクノロジー株式会社 Biometric authentication device and biometric authentication program
JP2008242954A (en) * 2007-03-28 2008-10-09 Nec Corp Fingerprint recognition system, method and program for personal identification, biometrics authentication system for personal identification and portable telephone terminal
JP5228872B2 (en) * 2008-12-16 2013-07-03 富士通株式会社 Biometric authentication apparatus, biometric authentication method, biometric authentication computer program, and computer system

Also Published As

Publication number Publication date
JP2012083857A (en) 2012-04-26

Similar Documents

Publication Publication Date Title
US9626094B2 (en) Communication device and electronic device
EP1831772B1 (en) System and method of predicting user input to a mobile terminal
JP5372182B2 (en) Portable electronic device, control method thereof and computer program
JP4552632B2 (en) Portable device
EP2256610A1 (en) Method for unlocking screen-locked state of touch screen, electronic device and recording medium using the same
JP2006165822A (en) Electronic camera and program
US8434015B2 (en) Information processing apparatus, information processing method, and information processing program
EP2291987B1 (en) Method and device for launching an application upon speech recognition during a communication
JP3964734B2 (en) Navigation device
RU2595933C2 (en) Mobile terminal and method of controlling data output in form of list based on multi-touch therefor
US20130091468A1 (en) Individualized method for unlocking display screen on mobile computing device and system thereof
US20110063234A1 (en) System and method for the management of image browsing in an electronic device with a touch screen
WO2013185537A1 (en) Method for quickly operating file of smart phone and smart phone
EP2490112A2 (en) Variable display scale control device and variable playing speed control device
US8914010B2 (en) Method and mobile terminal for controlling application in the mobile terminal
US9058098B2 (en) Display control device
CN101572750A (en) Mobile terminal and call content management method thereof
WO2012022070A1 (en) Method and mobile terminal for initiating application program
US8842888B2 (en) User interface for combined biometric mobile device
KR20160059454A (en) Method and apparatus for processing terminal anomaly and electronic device
JPWO2008105231A1 (en) Information processing apparatus having lock function, information processing apparatus locking (unlocking) method, and program thereof
KR20140027578A (en) Method for controlling lock function and an electronic device thereof
KR20140120712A (en) Apparatus and method for providing additional information using caller identification
US20130318625A1 (en) Method for protecting data stored in device and device thereof
US20140013336A1 (en) Method for prompting recently used application programs in wireless communication device

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20130805

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20140328

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20140422

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20140505

R150 Certificate of patent or registration of utility model

Ref document number: 5549518

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

LAPS Cancellation because of no payment of annual fees