JPH03100753A - Self-destruction method for personal identification device - Google Patents

Self-destruction method for personal identification device

Info

Publication number
JPH03100753A
JPH03100753A JP1238229A JP23822989A JPH03100753A JP H03100753 A JPH03100753 A JP H03100753A JP 1238229 A JP1238229 A JP 1238229A JP 23822989 A JP23822989 A JP 23822989A JP H03100753 A JPH03100753 A JP H03100753A
Authority
JP
Japan
Prior art keywords
circuit
personal identification
identification device
data
external force
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP1238229A
Other languages
Japanese (ja)
Other versions
JP2989200B2 (en
Inventor
Taku Niizaki
卓 新崎
Seigo Igaki
井垣 誠吾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP1238229A priority Critical patent/JP2989200B2/en
Publication of JPH03100753A publication Critical patent/JPH03100753A/en
Application granted granted Critical
Publication of JP2989200B2 publication Critical patent/JP2989200B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

PURPOSE:To keep a high security by forcibly destroying registered data, a collating circuit, a control circuit, etc., at the time of detecting that some external force acts upon a personal identification device. CONSTITUTION:When an external force is applied to the outer box of a personal identification device 10 to destroy the outer box, external light penetrates the device from the outside. When a photodetector 11 detects this light, an alarm device is operated to report the occurrence of abnormality, and a signal indicating it is given to a circuit destroying device 12. The circuit destroying device 12 resets a memory to erase registered fingerprint picture data and erases ROM data in the control circuit and the collating circuit and destroys an LSI, an IC, or the like by a high voltage. Thus, a higher security is kept.

Description

【発明の詳細な説明】 [w!i要] 指紋照合装置等の個人識別装置の自己破壊方法に関し、 個人識別装置に外力が加えられた時に、登録データ等を
確実に破壊して、より高いセキュリティを維持すること
を目的とし、 個人識別装置に外力が加えられたことを検出すると、警
報を発生し、登録データ、照合回路、制御回路等を破壊
手段を用いて破壊するように構成する。
[Detailed description of the invention] [w! i Required] Concerning self-destruction methods for personal identification devices such as fingerprint identification devices, the purpose is to securely destroy registered data and maintain higher security when external force is applied to personal identification devices. When it is detected that an external force is applied to the identification device, an alarm is generated and the registration data, verification circuit, control circuit, etc. are destroyed using a destruction means.

[産業上の利用分野] 本発明は指紋照合装置等の個人識別装置の自己破壊方法
に関する。
[Industrial Application Field] The present invention relates to a self-destruction method for a personal identification device such as a fingerprint matching device.

近年、コンピュータが広範な社会システムのなかに導入
されるに伴い、システム・セキュリティに関係者の関心
が集まっている。コンピュータルームへの入室や、端末
利用の際の本人の確認手段として、これまで用いられて
きたIDカードやパスワードには、セキュリティ確保の
面から多くの疑問が提起されている。これに対し、指紋
は万人不動、終生不変という2大特徴をもつため、本人
確認の最も有力な手段と考えられている。
In recent years, as computers have been introduced into a wide range of social systems, system security has become a focus of interest among those concerned. Many questions have been raised about the security of ID cards and passwords, which have been used up until now as a means of verifying one's identity when entering a computer room or using a terminal. Fingerprints, on the other hand, are considered the most powerful means of identity verification because they have two major characteristics: they are immovable and unchanging throughout life.

このような個人識別方法にはその本人確認の信頼性と共
に、外力が加えられたら情報の秘密性を確保するために
、個人に関する情報等は破壊することが望ましい。
In such personal identification methods, it is desirable to destroy information related to individuals in order to ensure the reliability of identity verification and to ensure the confidentiality of information if external force is applied.

[従来の技術] 前述した指紋を用いた個人識別袋装置の場合、予め登録
しておいた個人毎の指紋パターンと入力された指紋パタ
ーンとを照合し、一致した場合に本人であると判断して
いる。この種の個人識別装置は、重要施設への人出管理
等に用いられる。また、鍵のあるところならどこでも適
用されうる。
[Prior Art] In the case of the above-mentioned personal identification bag device using fingerprints, the fingerprint pattern for each individual registered in advance is compared with the input fingerprint pattern, and if they match, it is determined that the person is the person. ing. This type of personal identification device is used for managing the number of people at important facilities. It can also be applied anywhere there is a key.

第5図は個人識別装置の一種である指紋照合システムの
従来構成例を示すブロック図である。このようなシステ
ムでは、指紋を画像として扱うのが通常である。指紋人
力センサ1から読取られた指紋画像信号(アナログ信号
)は、続く入力装置2により画像データ(ディジタルデ
ータ)に変換され、照合装置3に送られる。
FIG. 5 is a block diagram showing an example of a conventional configuration of a fingerprint verification system, which is a type of personal identification device. Such systems typically treat fingerprints as images. The fingerprint image signal (analog signal) read from the fingerprint human power sensor 1 is converted into image data (digital data) by the subsequent input device 2 and sent to the verification device 3.

照合装置3には、予め個人毎の指紋の画像データ(指紋
特徴点データ)を記憶した記憶装置4が接続されている
。そして、照合装置3は入力されてきた指紋画像データ
から指紋特徴点データを抽出し、記憶装置4に格納され
ている登録された指紋特徴点データと照合する。照合の
結果、両方の特徴点が一致したら、本人であるとの確認
ができたことになる。
The verification device 3 is connected to a storage device 4 that stores fingerprint image data (fingerprint minutiae data) for each individual in advance. Then, the verification device 3 extracts fingerprint minutiae data from the input fingerprint image data, and collates it with the registered fingerprint minutiae data stored in the storage device 4. As a result of the verification, if both feature points match, it means that the identity of the person has been confirmed.

[発明が解決しようとする課題] 若し、このような指紋照合システムから指紋特徴点デー
タを記憶した記憶装置4を盗まれた場合、登録者と同じ
特徴を備えた指紋のレプリカを作られ、悪用されるおそ
れがある。その対策として画像データを暗号化する方法
もあるが、照合システムそのものが盗難にあい、制御用
回路、照合用回路が解析されてしまうと、暗号化した指
紋特徴点データでも解析されるおそれがある。また、制
御用回路を解析し、制御用回路になんらかの変更を加え
ることにより、指紋の照合をせずとも重要施設に進入す
ることが可能となる。
[Problems to be Solved by the Invention] If the storage device 4 that stores fingerprint minutiae data from such a fingerprint verification system is stolen, a replica of the fingerprint with the same characteristics as the registrant will be made. There is a risk of misuse. One way to counter this is to encrypt the image data, but if the verification system itself is stolen and the control and verification circuits are analyzed, there is a risk that the encrypted fingerprint minutiae data will also be analyzed. . Furthermore, by analyzing the control circuit and making some changes to the control circuit, it becomes possible to enter important facilities without fingerprint verification.

本発明はこのような課題に鑑みてなされたものであって
、個人識別装置に外力が加えられた時に、登録データ等
を確実に破壊して、より高いセキュリティを維持するこ
とができる個人識別装置の自己破壊方法を提供すること
を目的としている。
The present invention has been made in view of these problems, and provides a personal identification device that can reliably destroy registered data and maintain higher security when external force is applied to the personal identification device. The purpose is to provide a method of self-destruction.

[課題を解決するための手段] 第1図は本発明方法の原理を示すフローチャートである
。本発明は、 個人識別装置に外力が加えられたことを検出すると(ス
テップ1)、 警報を発生しくステップ2)、 登録データ、照合回路、制御回路等を破壊手段を用いて
破壊する(ステップ3)ようにしたことを特徴としてい
る。
[Means for Solving the Problems] FIG. 1 is a flowchart showing the principle of the method of the present invention. When the present invention detects that an external force is applied to the personal identification device (Step 1), it generates an alarm, Step 2), and destroys the registered data, verification circuit, control circuit, etc. using a destructive means (Step 3). ).

[作用] 個人識別装置に何らかの外力が作用したことを検出した
ら、登録データ、照合回路、制御回路等を強制的に破壊
するようにする。これにより、個人に関する情報を確実
に破壊して高いセキュリティを維持することができる。
[Operation] When it is detected that some kind of external force has been applied to the personal identification device, the registered data, verification circuit, control circuit, etc. are forcibly destroyed. This makes it possible to reliably destroy personal information and maintain high security.

[実施例] 以下、図面を参照して本発明の実施例を詳細に説明する
[Example] Hereinafter, an example of the present invention will be described in detail with reference to the drawings.

第2図は本発明方法を実施するシステム構成例を示す図
である。10は個人識別装置であり、その内部に光検知
器11を備えている。この光検知器11は回路破壊装置
12と接続されており、該回路破壊装置12から外部に
オン・オフ信号入カブラグ13が出ている。
FIG. 2 is a diagram showing an example of a system configuration for implementing the method of the present invention. Reference numeral 10 denotes a personal identification device, which includes a photodetector 11 therein. This photodetector 11 is connected to a circuit breaking device 12, from which an on/off signal input plug 13 comes out.

このように構成された装置において、個人識別装置10
の外箱に外力が加えられ、破壊されると、外部より装置
内部に外光が進入する。光検知器11はこの光を検出す
ると、警報器(図示せず)を作動させ、異常の発生を知
らせる。それと同時に、回路破壊装置12にその旨の信
号を与える。回路破壊装置12は、外光の進入を知ると
、メモリのリセットによる登録指紋画像データ(特徴点
データ)の消去、制御用回路、照合用回路のROMデー
タの消去、または高電圧によるLSI、IC等の破壊を
行う。なお、オン・オフ信号入カブラグ13は回路破壊
装置12の作動/非作動の切替えを行うための信号入力
部を構成しており、例えば、オン信号をオン・オフ信号
入カブラグ13より入力した場合は、回路破壊装置12
は作動待機状態となる。また、オフ信号をオン・オフ信
号入カブラグ13より入力した場合は、回路破壊装置1
2は作動停止状態となる。
In the device configured in this way, the personal identification device 10
When an external force is applied to the outer box of the device and it is destroyed, external light enters the inside of the device from the outside. When the photodetector 11 detects this light, it activates an alarm (not shown) to notify of the occurrence of an abnormality. At the same time, a signal to that effect is given to the circuit breaking device 12. When the circuit destruction device 12 detects the intrusion of external light, it erases the registered fingerprint image data (minutiae data) by resetting the memory, erases the ROM data of the control circuit and verification circuit, or destroys the LSI, IC by high voltage. etc. Destruction. The on/off signal input plug 13 constitutes a signal input section for switching between activation and deactivation of the circuit breaking device 12. For example, when an on signal is input from the on/off signal input plug 13, is the circuit breaking device 12
is in standby mode. In addition, when the off signal is input from the on/off signal input plug 13, the circuit destruction device 1
2 is in a non-operational state.

第3図は本発明方法を実施する他のシステム構成例を示
す図で、センサに磁気検知器を用いたものである。図に
おいて、20は個人識別装置で壁21に取付けられてい
る。20aは個人識別装置20内に設けられている照合
装置、記憶装置等の回路(以下内部回路という)である
FIG. 3 is a diagram showing another system configuration example for implementing the method of the present invention, in which a magnetic detector is used as a sensor. In the figure, 20 is a personal identification device attached to a wall 21. 20a is a circuit (hereinafter referred to as an internal circuit) such as a verification device and a storage device provided in the personal identification device 20.

22は個人識別装置20内に設けられた磁気検知器で回
路破壊装置23と接続されている。24はオン・オフ信
号入カブラグで、その機能は第2図のそれと同一である
。25は磁気検知器22と対応する位置に設けられた磁
石で、壁21の内部又は表面に取付けられている。26
は磁気検知器22と接続された警報器である。
Reference numeral 22 denotes a magnetic detector provided within the personal identification device 20 and connected to the circuit breaking device 23 . 24 is an on/off signal input plug, whose function is the same as that shown in FIG. A magnet 25 is provided at a position corresponding to the magnetic detector 22, and is attached to the inside or surface of the wall 21. 26
is an alarm connected to the magnetic detector 22.

このように構成されたシステムにおいて、所定の手順を
踏まずに個人識別装置20が壁21面より強制的に剥が
された場合には、磁気検知器22が磁石25より遠ざか
るため、その出力が弱くなる。これにより、磁気検知器
22は個人識別装置20が壁面から剥がされたことを検
出することができる。これにより、磁気検知器22は異
常の発生を検出し、警報器26を鳴動させて異常を報告
する。それと同時に、回路破壊装置23に異常を通知す
る。回路破壊装置23は異常通知を受けると、内部回路
20aを破壊する。これにより、個人に関する情報が盗
難されるという不測の事故の発生を予防することができ
る。
In a system configured in this way, if the personal identification device 20 is forcibly removed from the wall 21 without following the prescribed steps, the magnetic detector 22 will move away from the magnet 25, and its output will be weak. Become. Thereby, the magnetic detector 22 can detect that the personal identification device 20 has been peeled off from the wall surface. As a result, the magnetic detector 22 detects the occurrence of an abnormality, and sounds the alarm 26 to report the abnormality. At the same time, the abnormality is notified to the circuit breaking device 23. When the circuit destruction device 23 receives the abnormality notification, it destroys the internal circuit 20a. This makes it possible to prevent an unexpected accident in which personal information is stolen.

第4図は本発明方法を実施する他のシステム構成例を示
す図であり、センサとして振動検知器を用いたものであ
る。図において、30は個人識別装置で、その内部に第
3図と同様の内部回路30aが内蔵されている。31は
振動を検出してその解析も行う振動検知器、32は該振
動検知器31の出力を受けて回路破壊動作を行う回路破
壊装置である。33は振動検知器31と接続された警報
器である。34は第3図に示すそれへ同様の機能を持つ
オン・オフ信号入カブラグである。
FIG. 4 is a diagram showing another system configuration example for implementing the method of the present invention, in which a vibration detector is used as a sensor. In the figure, reference numeral 30 denotes a personal identification device, which has an internal circuit 30a similar to that shown in FIG. 3 built therein. Reference numeral 31 is a vibration detector that detects vibrations and also analyzes the vibrations, and 32 is a circuit destruction device that receives the output of the vibration detector 31 and performs a circuit destruction operation. 33 is an alarm connected to the vibration detector 31. 34 is an on/off signal input plug having a function similar to that shown in FIG.

このように構成されたシステムにおいて、振動検知器3
1が外箱の破壊や取外しの時に発生する振動を検出する
と、警報器33を鳴動させて異常の発生を報告すると共
に、回路破壊装置32にその旨を通知する。これにより
、回路破壊装置32は内部回路30aを破壊する。具体
的には、メモリのリセットによる画像データの消去、制
御用回路、照合用回路のROMデータの消去又は高電圧
によるLSI、IC等の破壊を行う。なお、この場合に
おいて、異常による振動と地震による振動とは地震によ
る振動が持つP波、S波を検出することで識別ができる
In the system configured in this way, the vibration detector 3
1 detects vibrations generated during destruction or removal of the outer box, it sounds an alarm 33 to report the occurrence of an abnormality, and also notifies the circuit destruction device 32 to that effect. Thereby, the circuit destruction device 32 destroys the internal circuit 30a. Specifically, image data is erased by resetting the memory, ROM data of the control circuit and verification circuit is erased, or LSIs, ICs, etc. are destroyed by high voltage. In this case, vibrations caused by an abnormality and vibrations caused by an earthquake can be distinguished by detecting P waves and S waves possessed by vibrations caused by an earthquake.

なお、上述した全ての実施例において、一連の動作はバ
ックアップ電源(例えば電池等)により行い、個人識別
装置の電源が切断された場合でも作動するように構成し
ておく必要がある。また、上述したシステムを工場で生
産したり、設置後のメインテナンスを行うためには、破
壊装置を自由に作動、停止させる機能が必要になる。破
壊装置の動作開始をするための方法として、破壊装置の
動作を停止させるためには、個人識別装置外箱に設けら
れた信号入カブラグから停止信号を人力する方法や、個
人識別装置外箱に設けられた穴より工具を用いて動作停
止信号を人力する方法等が用いられる。なお、オン・オ
フ信号入カブラグに許容値以上の電流又は電圧が印加さ
れた場合には、即座に破壊装置が動作を開始するように
しておく。
In all of the embodiments described above, the series of operations must be performed using a backup power source (for example, a battery), and must be configured to operate even when the power to the personal identification device is cut off. Furthermore, in order to produce the above-mentioned system in a factory or perform maintenance after installation, a function to freely operate and stop the destruction device is required. To start the operation of the destructive device, and to stop the operation of the destructive device, there are two methods: manually inputting a stop signal from a signal input plug provided on the outer box of the personal identification device, A method of manually issuing an operation stop signal using a tool through a provided hole is used. Note that if a current or voltage exceeding a permissible value is applied to the on/off signal input plug, the destructive device immediately starts operating.

[発明の効果] 以上、詳細に説明したように、本発明によれば個人識別
装置に外力(破壊1強奪、開封等)が加わった時に、そ
のことを検出して装置内の登録データ、制御用回路、照
合回路等を全て又は一部破壊することにより、登録デー
タの複製、捏造を防ぐことができ、更に制御系、照合系
の解析を不可能とすることができ、実用上の効果が大き
い。
[Effects of the Invention] As described in detail above, according to the present invention, when an external force (destruction, robbery, opening, etc.) is applied to a personal identification device, this is detected and the registered data in the device is By destroying all or part of the application circuit, verification circuit, etc., it is possible to prevent duplication and fabrication of registered data, and furthermore, it is possible to make analysis of the control system and verification system impossible, which has no practical effect. big.

【図面の簡単な説明】[Brief explanation of drawings]

第1図は本発明方法の原理を示すフローチャト、 第2図は本発明方法を実施するシステム構成例を示す図
、 第3図。 第4図は本発明方法を実施する他のシ ステム構成例を示す図、 第5図は指紋照合システムの従来構成例を示すブロック
図である。
FIG. 1 is a flowchart showing the principle of the method of the present invention, FIG. 2 is a diagram showing an example of a system configuration for implementing the method of the present invention, and FIG. FIG. 4 is a diagram showing another system configuration example for implementing the method of the present invention, and FIG. 5 is a block diagram showing a conventional configuration example of a fingerprint matching system.

Claims (1)

【特許請求の範囲】 個人識別装置に外力が加えられたことを検出すると(ス
テップ1)、 警報を発生し(ステップ2)、 登録データ、照合回路、制御回路等を破壊手段を用いて
破壊する(ステップ3)ようにしたことを特徴とする個
人識別装置の自己破壊方法。
[Claims] When it is detected that an external force is applied to the personal identification device (step 1), an alarm is generated (step 2), and the registered data, verification circuit, control circuit, etc. are destroyed using destructive means. (Step 3) A method for self-destruction of a personal identification device, characterized in that:
JP1238229A 1989-09-13 1989-09-13 Personal identification device Expired - Fee Related JP2989200B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP1238229A JP2989200B2 (en) 1989-09-13 1989-09-13 Personal identification device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP1238229A JP2989200B2 (en) 1989-09-13 1989-09-13 Personal identification device

Publications (2)

Publication Number Publication Date
JPH03100753A true JPH03100753A (en) 1991-04-25
JP2989200B2 JP2989200B2 (en) 1999-12-13

Family

ID=17027068

Family Applications (1)

Application Number Title Priority Date Filing Date
JP1238229A Expired - Fee Related JP2989200B2 (en) 1989-09-13 1989-09-13 Personal identification device

Country Status (1)

Country Link
JP (1) JP2989200B2 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08115267A (en) * 1994-10-19 1996-05-07 Tech Res & Dev Inst Of Japan Def Agency Information secrecy mechanism
US5987134A (en) * 1996-02-23 1999-11-16 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources
US6161183A (en) * 1996-10-21 2000-12-12 Fuji Xerox Co., Ltd. Data verifying method apparatus for creating data to be verified and data verifying apparatus
JP2006301879A (en) * 2005-04-19 2006-11-02 Glory Ltd Recording medium value-adding device
US7155745B1 (en) 1999-10-15 2006-12-26 Fuji Xerox Co., Ltd. Data storage device provided with function for user's access right
JP2007066008A (en) * 2005-08-31 2007-03-15 Seiko Instruments Inc Electronic device
JP2007193807A (en) * 2006-01-18 2007-08-02 Internatl Business Mach Corp <Ibm> Detecting system of rfid disk purge concerning computing device, method, and computer program
JP2007293876A (en) * 1997-03-13 2007-11-08 Hitachi Ltd Portable electronic device and personal identification method in which biological information is used
USRE42762E1 (en) 1996-02-23 2011-09-27 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources
WO2016141618A1 (en) * 2015-03-10 2016-09-15 深圳市贝沃德克生物技术研究院有限公司 Complete machine product anti-disassembling device and method
US9553056B1 (en) 2015-10-27 2017-01-24 International Business Machines Corporation Semiconductor chip having tampering feature

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08115267A (en) * 1994-10-19 1996-05-07 Tech Res & Dev Inst Of Japan Def Agency Information secrecy mechanism
US5987134A (en) * 1996-02-23 1999-11-16 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources
USRE42762E1 (en) 1996-02-23 2011-09-27 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources
US6161183A (en) * 1996-10-21 2000-12-12 Fuji Xerox Co., Ltd. Data verifying method apparatus for creating data to be verified and data verifying apparatus
JP2007293876A (en) * 1997-03-13 2007-11-08 Hitachi Ltd Portable electronic device and personal identification method in which biological information is used
JP4623054B2 (en) * 1997-03-13 2011-02-02 株式会社日立製作所 Portable electronic device and personal authentication method using biometric information
US7155745B1 (en) 1999-10-15 2006-12-26 Fuji Xerox Co., Ltd. Data storage device provided with function for user's access right
JP4695434B2 (en) * 2005-04-19 2011-06-08 グローリー株式会社 Recording medium pricing device
JP2006301879A (en) * 2005-04-19 2006-11-02 Glory Ltd Recording medium value-adding device
JP2007066008A (en) * 2005-08-31 2007-03-15 Seiko Instruments Inc Electronic device
JP2007193807A (en) * 2006-01-18 2007-08-02 Internatl Business Mach Corp <Ibm> Detecting system of rfid disk purge concerning computing device, method, and computer program
WO2016141618A1 (en) * 2015-03-10 2016-09-15 深圳市贝沃德克生物技术研究院有限公司 Complete machine product anti-disassembling device and method
US9553056B1 (en) 2015-10-27 2017-01-24 International Business Machines Corporation Semiconductor chip having tampering feature
US10032730B2 (en) 2015-10-27 2018-07-24 International Business Machines Corporation Semiconductor chip having tampering feature
US10096737B2 (en) 2015-10-27 2018-10-09 International Business Machines Corporation Semiconductor chip having tampering feature
US10103111B2 (en) 2015-10-27 2018-10-16 International Business Machines Corporation Semiconductor chip having tampering feature
US10692821B2 (en) 2015-10-27 2020-06-23 International Business Machines Corporation Semiconductor chip having tampering feature

Also Published As

Publication number Publication date
JP2989200B2 (en) 1999-12-13

Similar Documents

Publication Publication Date Title
US6512454B2 (en) Tamper resistant enclosure for an electronic device and electrical assembly utilizing same
US5351303A (en) Infra-red imaging and pattern recognition system
JP4278176B2 (en) Active security device with electronic memory
US6570610B1 (en) Security system with proximity sensing for an electronic device
JPH03100753A (en) Self-destruction method for personal identification device
JP2013513151A (en) System for distributed secure storage of personal data, especially biometric features, and systems, local devices and methods for monitoring identity
US20060101047A1 (en) Method and system for fortifying software
EP3486876B1 (en) Method, device and system for controlling opening of ab doors
CN112788269A (en) Video processing method, device, server and storage medium
CN112671700B (en) Enterprise economic management information security system
Rhunn et al. Internet of things (iot) based door lock security system
Al Hattali et al. Design and development for detection and prevention of ATM skimming frauds
Rosenzweig et al. Biometric Technologies: Security, legal, and policy implications
KR101625786B1 (en) Anti-theft system using a mobile smart terminal and fingerprint recognition
JP2001357371A (en) Hardware token with fingerprint collating function
US5826009A (en) Protection of software from physical and electronic interrogation by sealing and checking password
EP0973118A2 (en) Fingerprint checking system, fingerprint checking method and memory card used for the same
Siswanto et al. Fingerprint Authentication In Smart Home Environment Based On Embedded System
CN1392475A (en) Multiple cipher privacy warning system
Mainguet et al. Fingerprint recognition based on silicon chips
JP2010073112A (en) Face collating system
JP2001040924A (en) Integrated control system for entry/exit and apparatus usage
JP2004310405A (en) Information device and entrance/exit management device
JP2001118045A (en) Ic module
RU71179U1 (en) UNIVERSAL BIOMETRIC DEVICE FOR PERSONAL IDENTIFICATION FOR ACCESS CONTROL AND MANAGEMENT SYSTEMS, REMOVAL AND PROTECTION OF FIRE ALARM SYSTEMS, SATELLITE MONITORING SYSTEMS OF AUTOMATIC SYSTEMS

Legal Events

Date Code Title Description
LAPS Cancellation because of no payment of annual fees