KR20160101248A - Portable secure authentication apparatus using fingerprint - Google Patents
Portable secure authentication apparatus using fingerprint Download PDFInfo
- Publication number
- KR20160101248A KR20160101248A KR1020150022976A KR20150022976A KR20160101248A KR 20160101248 A KR20160101248 A KR 20160101248A KR 1020150022976 A KR1020150022976 A KR 1020150022976A KR 20150022976 A KR20150022976 A KR 20150022976A KR 20160101248 A KR20160101248 A KR 20160101248A
- Authority
- KR
- South Korea
- Prior art keywords
- fingerprint
- information
- moc
- smart card
- applet
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- G06K9/00013—
-
- G06K9/00067—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
Description
The present invention relates to a portable security authenticator employing a fingerprint recognition method, and more particularly, to a portable security authenticator that incorporates a fingerprint recognition unit and an on-card match (MOC) smart card, receives a fingerprint image through a fingerprint sensor, The MOC smart card performs user authentication in comparison with the previously stored user information, and when the user authentication is successful, access to the data stored in the memory is permitted and predetermined data is transmitted to the mobile terminal through the wired / wireless communication interface The present invention relates to a portable security authenticator employing a fingerprint recognition method for authenticating a user and performing a necessary operation with a mobile terminal.
In the market where existing biometrics technology is applied, physical proximity control such as access and time attendance management is the most important part, and it is mainly used in public parts such as logical access control and identification for access control of devices and systems. However, recently, bio-recognition technology has been applied to mobile devices and its application area is expanding.
Fingerprint biometrics has been widely adopted for access control in places requiring high security level such as laboratory. By attaching a fingerprint scanner to mobile devices, it can be used for security related to mobile phones. In case of mobile phone, it is not possible to acquire accurate fingerprint image with the basic input device, so a separate fingerprint image scanner is needed.
In recent years, the rapid development of information communication infrastructures such as computers, the Internet and mobile phones has urgently necessitated the security of personal information and corporate information, and the demand for Internet banking, credit card payment, mobile payment As a result, there is a need for a unique authentication means for individuals.
Accordingly, there is a demand for a fingerprint authentication-based security authentication device that can be conveniently used by an individual, and in particular, a biometric authentication using an on-card match (MOC) Based portable security authentication device is desired.
Generally, a biometric system is basically divided into a registration / enrollment process, a verification process (1: 1), and an identification process (1: N) . Authentication and recognition are selectively used depending on the application area, and the configuration of the system is also different from each other. The five components of registration, authentication, and biometric identification systems are Capture, Storage, Processing, Matching, and Decision.
The portable security authenticator employing the fingerprint recognition method of the present invention is a system utilizing fingerprint recognition, smart card, and MoC based technology.
As a conventional method of embedding encryption technology in a USB storage device and encrypting data to thereby prevent leakage of information stored when a storage device is lost, a method of inputting a logon password when using a secure USB is applied. There is a possibility that information stored in the USB storage device may be leaked when a password leakage due to leakage or hacking occurs. Accordingly, there is a need for a biometric authentication method capable of uniquely recognizing a user who is not a password system Do.
In general, Bio security tokens and secure USB memory require encryption / decryption technology, user authentication and identification, random copy protection of stored data, and deletion function to protect data in the event of lost or stolen.
It is a technology that encrypts data when transferring data to USB memory and decrypts it automatically when verifying data of USB memory. It is divided into hardware type and software type and it is provided with dedicated security chip type .
In the user authentication and identification function, it is used as a security function that incorporates a password setting function or a fingerprint recognition function in a memory area of a user and is interlocked with other functions.
In the random copy protection function of stored data, access to data in the storage memory is disabled without user authentication, thereby making data replication impossible to the outside.
In case of lost smartphone or security authentication device, it deletes memory data so that other users can not access data in personal information area. And deletion of data.
In relation to the technology of biometric authentication USB memory that uses fingerprint authentication, the existing method is mainly extracting / matching on the PC S / W due to the large amount of computation in minutiae extraction / matching operation of the data read from the fingerprint sensor I need skills to work on. The personal fingerprint information captured by the fingerprint sensor must be transmitted to the PC through the USB. At this time, privacy problems such as exposure of the living body and the security information of the individual may occur, so that extraction / matching of the fingerprint is performed in the USB memory device Structure.
Recent authentication processing methods include a form (SOC, System On Card) that performs the entire process of fingerprint capture / feature point extraction / matching in the smart card and a form (MOC, Matching On Card) Respectively.
The SOC smart card has a drawback in that a high performance CPU and a large capacity memory must be used because the fingerprint sensor and the fingerprint processing algorithm must be processed in the smart card. On the other hand, since the MOC smart card processes only the matching algorithm, it can be processed by a commercial smart card. The code used for card matching is less than 10 kbytes. RAM memory size is less than 5 kbytes, and processing speed is less than 5 seconds.
Recently, the market for mobile financial services using smart phones is increasing. Space and time constraints can be greatly reduced. In addition, financial information such as credit cards, account information, and related service information such as coupons and points can be managed through a single smartphone. However, with the concentration of personal information in mobile devices and the use of open wireless networks, the risk of information leakage, forgery and tampering by loss, theft, eavesdropping and eavesdropping also increased. Accordingly, there is a demand for a new authentication technique that has higher stability than existing authentication means and can satisfy the convenience of use.
Although biometrics can satisfy high security and ease of use due to the fact that the nature of the information can not be separated from individuals, there is no universal mobile terminal that can support sensor and hardware performance yet, It does not meet the exact recognition rate that can be used for authentication.
As a prior art, there are a portable security authentication device and system of Korean Patent Laid-Open Publication No. 2001-0095788 and an operation method thereof.
Korean Patent Laid-Open Publication No. 2001-0095788 discloses a method and apparatus for recognizing a pattern of a biometric feature (fingerprint and voice) possessed by a user and determining whether or not the user is an authorized user. In accordance with the determination result, And allows the system to be used and accessed to be opened and the system to be opened remotely.
However, in the case of the present invention, it is not compact, requires too much time for operation processing, is exposed to information, is hacked from a malicious user, is recognized by using a user information DB and a user fingerprint DB. There is a possibility that the security is not easy.
The present invention has been made to solve the above-mentioned problems, and an object of the present invention is to provide an image processing apparatus and a method for processing a fingerprint image by incorporating a fingerprint recognition unit and an on-card match (MOC) smart card, receiving a fingerprint image through a fingerprint sensor, Authenticates the user by comparing the user information stored in the card with the password stored in the card through the biometric matching program installed in the card, permits access to the data stored in the memory when the user authentication is successful, And a portable security authenticator employing a fingerprint recognition method, which is transmitted to a mobile terminal through a communication interface and authenticated to perform a necessary operation with the mobile terminal.
Another problem to be solved by the present invention is to extract the feature information of the fingerprint image and to provide various services installed in the MOC smart card such as OTP One-time password, one-time password, PKCS (Public-Key Cryptography System), eID, payment, and the like.
Another problem to be solved by the present invention is to store and manage the fingerprint information of the user in the security memory area of the smart card through the bio registration / authentication manager program and to provide the smart card on-card match fingerprint recognition algorithm And a portable security authentication system employing a fingerprint recognition method that grants an access right to use personal information and stored data through a wired / wireless interface connected to a smartphone / tablet for an authenticated user Lt; / RTI >
Another object of the present invention is to provide a biometric authentication method in which authentication is performed by comparing biometric information stored in a smart card with externally inputted biometric information and then an authenticated user uses a mobile phone or various services, And a portable security authenticator employing a fingerprint recognition method which is configured to store biometrics information in a smart card by using a biosafety authentication platform and a biometrics authentication solution, and to process user authentication in a smart card.
According to an aspect of the present invention, there is provided a fingerprint authentication system comprising: a fingerprint sensor unit having a fingerprint sensor, the fingerprint sensor being mounted to be exposed to a housing portion of a security authentication device; The MOC smart (smart) smart card, which stores the encrypted user fingerprint information and compares the feature information of the fingerprint received from the operation processing unit with the user fingerprint information using a bio matching algorithm, Card; Extracting feature points from the fingerprint image received from the fingerprint sensor, transmitting the extracted feature points to the MOC smart card, receiving the user authentication result from the MOC smart card, allowing access to the data stored in the memory unit if the user authentication is successful, And an arithmetic processing unit.
MOC smart cards include OTP applets, PKCS applets, eID applets, HPTP applets, Payment applets and E-Cash applets.
The fingerprint sensor is a swipe sensor.
A blue pitcher communication unit, a WiFi communication unit, an NFC communication unit, and a USB connector unit.
The memory unit may store the password of any one of an external mobile terminal, a POS terminal, and a computer terminal.
The operation processing unit receives the user authentication result from the MOC smart card and, if the user authentication is successful, transmits the OTP applet, the PKCS applet, the eID applet, the HPTP applet, the payment applet, the E-cash applet .
The MOC smart card determines the degree of similarity between two fingerprint images using extracted minutia information and pre-stored user fingerprint information.
The arithmetic processing section thinning the fingerprint image, extracting a disadvantage point and a branch point information in which a change occurs in the ridge flow from the thinning image, extracting candidate feature points, removing pseudo feature points from the extracted candidate feature points, .
The MOC smart card calculates an amount of rotation and transition in which the feature information of the fingerprint received from the operation processing unit and the feature points of the two fingerprint images of the stored user fingerprint information are overlapped to the greatest extent to select the alignment reference point of the image, And then calculates the similarity (Measure Vector) using the coordinates, type, and angle information of the determined pair of corresponding feature points, and calculates the similarity (Measure Vector) from the similarity of the corresponding pair of feature points, Is output to the arithmetic processing unit as a score in accordance with predetermined rule data.
According to the portable security authenticator employing the fingerprint authentication method of the present invention, a fingerprint image recognition unit and an on-card match (MOC) smart card are built in. A fingerprint image is received through a fingerprint sensor, Information is transmitted to the MOC smart card, the user authentication is performed by comparing the user information stored in the card with the password information stored in the card through the biometric matching program installed in the card, and if the user authentication is successful, access to the data stored in the memory is permitted , Transmits predetermined data to the mobile terminal through the wired / wireless communication interface, and authenticates the mobile terminal so that the mobile terminal can perform necessary operations.
In addition, the present invention extracts feature information of a fingerprint image, and provides various services installed in the MOC smart card, such as OTP (One Time Password, One-time password), PKCS (Public Key Cryptography System), eID, payment, and so on.
In addition, the present invention stores and manages the fingerprint information of the user in the secure memory area of the smart card through the bio-registration / authentication manager program, and performs an on-card match fingerprint recognition algorithm of the smart card on the input fingerprint information, And authorizes the authenticated user to use personal information and stored data via the wired / wireless interface with the smartphone / tablet.
In addition, the present invention compares the biometric information stored in the smart card with the biometric information input from the outside, performs authentication, and allows the authenticated user to use a mobile phone or various services. On-card match technology and biometric security authentication The biometric information is stored in the smart card using the platform and the biometric authentication solution, and the user authentication is processed in the smart card.
Therefore, the present invention is compact, fast, and more stable in information security.
INDUSTRIAL APPLICABILITY The present invention can be applied to various application systems such as an automobile, a POS, an ATM, a mobile phone, a personal computer, a card reader, and the like.
1 is an example of the appearance of a portable security authenticator employing the fingerprint recognition method of the present invention.
2 is a schematic diagram for explaining the use of a portable security authenticator employing the fingerprint recognition method of the present invention.
3 is a block diagram schematically illustrating the configuration of the portable security authenticator of FIG.
4 is a schematic diagram schematically illustrating the configuration of the MOC smart card.
5 is a schematic diagram for explaining the concept of signal detection in the fingerprint sensor of FIG.
6 is a flowchart schematically illustrating a fingerprint recognition process in the portable security authenticator of the present invention.
7 is a flowchart illustrating the feature extraction step of FIG.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, a portable security authenticator employing a fingerprint recognition method according to the present invention will be described in detail with reference to the accompanying drawings.
FIG. 1 is an example of the appearance of a portable security authenticator employing the fingerprint authentication method of the present invention, FIG. 2 is a schematic diagram for explaining use of a portable security authenticator employing the fingerprint authentication method of the present invention, and FIG. 3 FIG. 4 is a schematic diagram for explaining the configuration of the MOC smart card. As shown in FIG.
1, the
As shown in FIG. 2, the fingerprint image is received through the fingerprint sensor, the feature information is extracted, and the user authentication is performed by comparing the stored user information with the MOC
3, the
The
The
The
The fingerprint sensor is means for acquiring image information of a fingerprint, and detects the fingerprint image and transmits the fingerprint image to the
Generally, a fingerprint sensor is divided into a plane sensor that recognizes the entire fingerprint at one time and a swipe sensor that recognizes the fingerprint by moving a finger to the sensor in the form of a line sensor. In the sweep sensor, the price is low and the area is small do.
The fingerprint sensor driving unit drives the fingerprint sensor according to the fingerprint sensing request signal of the
The MOC
As shown in FIG. 4, the MOC
The
The
The blue
The
The
The
5 is a schematic diagram for explaining the concept of signal detection in the fingerprint sensor of FIG.
5 (a) illustrates a method of using a sweep sensor as a fingerprint sensor. The finger moves from the top to the bottom of the fingerprint sensor, and the fingerprint sensor acquires the fingerprint image at this time.
FIG. 5B illustrates a process of acquiring a fingerprint image when a finger is moved as shown in FIG. 5A. As shown in FIG. 5B, .
Since the present invention needs to process authentication in the MOC
FIG. 6 is a flowchart schematically illustrating a process of fingerprint recognition in the portable security authenticator of the present invention, and FIG. 7 is a flowchart illustrating the feature extraction process of FIG.
In the data capturing step S110, the user's fingerprint information is stored in the MOC
The subsequent steps of the data capture step S110 are processed in the MOC
A minutiae data file to be used in the fingerprint matching step is formed by the fingerprint detection and feature extraction step (S150). The
The feature extraction step proceeds to three steps: a pre-processing step S160, a feature point extraction step S170, and a post-processing step S180.
The preprocessing step S160 is a step of thinning the fingerprint image. The preprocessing step S160 performs image enhancement, binarization of the image-improved fingerprint image, and thinning.
That is, the preprocessing step (S160) is a process of converting into a block directional image, a binarized image, and a thinned image. The fingerprint image is divided into blocks of a predetermined size, and a direction indicating the flow of ridges is determined for each block, and the image is converted into a direction image per block. The obtained ridge direction information is used for the binarization and smoothing process. In the process of binarization, the fingerprint image is transformed into a binary image, which is expressed only in black and white, and the binary image is smoothed by eliminating noise and emphasizing the fusion, thereby improving the connectivity of the image. The image is converted into a thinning image,
The feature point extracting step S170 is a step of extracting candidate feature points from the thinned fingerprint image in the preprocessing step S160.
Here, a minutiae refers to a point where a ridge called a ridge called a branch point (a point where a ridge flows off) and a branch point (a ridge splits into two ridge) are changed. The feature quantities (T = {m1, m2, ..., mm}) consist of the information of the minutiae (mi) existing in the fingerprint image. In most cases, The type of the feature point, the position in the fingerprint image, and the direction of the ridge where the feature point is located.
That is, the feature point extracting step S170 is a candidate feature point extracting step, and stores a disadvantage point and a bifurcation point in which a change occurs in the ridge flow from the thinned image. Extract candidate feature points including pseudo minutiae from the rinse information of the thinned image. At this time, pseudo minutia points may be generated due to erroneous ridge portions of the thinned image. Pseudo minutia refers to the fake minutiae that occur during the thinning process due to the noise during fingerprint acquisition. The pseudo minutiae point increases the amount of meaningless computation and increases the error, which degrades the performance of the system.
The post-processing step S180 is a step of removing fake feature points from the feature points extracted in the feature point extracting step S170. That is, in the post-processing step (S180), the ridge portion causing the pseudo minutiae is corrected to remove the pseudo minutiae points, and the missing minutiae are added to extract the final minutiae.
In the
The
In the aligning step (S210), rotation and transition amounts at which the feature points of the two fingerprint images overlap the most are calculated to select an alignment reference point of the image. Then, the coordinates of the minutiae points are converted so as to be aligned with the alignment reference point, and then the corresponding pair of minutiae are determined. At this time, it is necessary to perform as many candidate alignments as possible in order to find an ideal rotation shift amount.
In the matching step (S230), the similarity (Measure Vector) is calculated using the coordinate, type, and angle information of the corresponding pair of feature points determined in the aligning step (S210). In order to reflect the similarity of pairs of corresponding feature points in real terms, various statistical techniques can be considered at various angles in the similarity determination method.
In the scoring step S250, the degrees of coincidence of the two fingerprint images from the similarity pair (Measure Vector) of the corresponding pair of feature points are indicated by points according to predetermined rule data.
The rule data is data set in advance by using statistical basis and mathematical modeling in decision making of the score calculation rule in order to accurately reflect the degree of matching of images as in the matching step.
As described above, the present invention relates to a portable security authentication technology and a security authentication device based on bio-authentication using On-Card Match (MOC) for biometric identification using fingerprint information and safe personal information security management.
The
In the present invention, a new user fingerprint is encrypted and stored in the MOC
In addition, the present invention provides a function to prepare for theft or loss of a storage device by activating an encryption / decryption algorithm for the stored security data, and the user authentication / authentication using the portable security authenticator program, applet management, memory management Function.
In the foregoing, the present invention has been shown and described with reference to certain preferred embodiments. It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit and scope of the invention as defined in the appended claims. .
10: Portable security authenticator 20: Security authenticator housing
100: operation processing unit 110: USB connector unit
120: Blue pitcher communication unit 130: WiFi communication unit
140: NFC communication unit 150: fingerprint sensor unit
170: memory unit 190: battery unit
200: MOC smart card
Claims (9)
The MOC smart (smart) smart card, which stores the encrypted user fingerprint information and compares the feature information of the fingerprint received from the operation processing unit with the user fingerprint information using a bio matching algorithm, Card;
Extracting feature points from the fingerprint image received from the fingerprint sensor, transmitting the extracted feature points to the MOC smart card, receiving the user authentication result from the MOC smart card, allowing access to the data stored in the memory unit if the user authentication is successful, An operation processing unit;
Wherein the portable security authenticator comprises:
The MOC smart card includes an OTP applet, a PKCS applet, an eID applet, an HPTP applet, a payment applet, and an e-cash applet.
Wherein the fingerprint sensor is a swipe sensor.
A blue pitcher communication unit, a WiFi communication unit, an NFC communication unit, and a USB connector unit.
Wherein a password of any one of an external mobile terminal, a POS terminal, and a computer terminal is stored in the memory unit.
The operation processing unit receives the user authentication result from the MOC smart card and, if the user authentication is successful, transmits the OTP applet, the PKCS applet, the eID applet, the HPTP applet, the payment applet, the E-cash applet To the one or more of the plurality of portable security authenticators.
Wherein the MOC smart card determines similarities between the two fingerprint images using extracted minutia information and pre-stored user fingerprint information.
The arithmetic processing section thinning the fingerprint image, extracting a disadvantage point and a branch point information in which a change occurs in the ridge flow from the thinning image, extracting candidate feature points, removing pseudo feature points from the extracted candidate feature points, The authentication server comprising:
The MOC smart card calculates an amount of rotation and transition in which the feature information of the fingerprint received from the operation processing unit and the feature points of the two fingerprint images of the stored user fingerprint information are overlapped to the greatest extent to select the alignment reference point of the image, And then calculates the similarity (Measure Vector) using the coordinates, type, and angle information of the determined pair of corresponding feature points, and calculates the similarity (Measure Vector) from the similarity of the corresponding pair of feature points, To the calculation processing unit as a score according to predetermined rule data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150022976A KR101853266B1 (en) | 2015-02-15 | 2015-02-15 | Portable secure authentication apparatus using fingerprint |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150022976A KR101853266B1 (en) | 2015-02-15 | 2015-02-15 | Portable secure authentication apparatus using fingerprint |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20160101248A true KR20160101248A (en) | 2016-08-25 |
KR101853266B1 KR101853266B1 (en) | 2018-05-02 |
Family
ID=56884461
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150022976A KR101853266B1 (en) | 2015-02-15 | 2015-02-15 | Portable secure authentication apparatus using fingerprint |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101853266B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190028970A (en) | 2017-09-11 | 2019-03-20 | 한주찬 | A security system using hand gesture recognition |
US10621321B2 (en) | 2017-02-14 | 2020-04-14 | Samsung Electronics Co., Ltd. | Storage device having fingerprint recognition sensor and operating method thereof |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI246028B (en) * | 2001-06-28 | 2005-12-21 | Trek 2000 Int Ltd | A portable device having biometrics-based authentication capabilities |
-
2015
- 2015-02-15 KR KR1020150022976A patent/KR101853266B1/en active IP Right Grant
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10621321B2 (en) | 2017-02-14 | 2020-04-14 | Samsung Electronics Co., Ltd. | Storage device having fingerprint recognition sensor and operating method thereof |
US11227039B2 (en) | 2017-02-14 | 2022-01-18 | Samsung Electronics Co., Ltd. | Storage device having fingerprint recognition sensor and operating method thereof |
KR20190028970A (en) | 2017-09-11 | 2019-03-20 | 한주찬 | A security system using hand gesture recognition |
Also Published As
Publication number | Publication date |
---|---|
KR101853266B1 (en) | 2018-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6444500B2 (en) | User authentication method and system using variable keypad and biometric authentication | |
US11824642B2 (en) | Systems and methods for provisioning biometric image templates to devices for use in user authentication | |
KR101667388B1 (en) | System for relaying financial transaction with multiple safety function using finger vein and fingerprint to authenticate at the same time and method for processing thereof | |
KR102070635B1 (en) | Apparatus and method for recognizing biological features and for registering biological feature templates | |
US20150100485A1 (en) | Biometric confirmation for bank card transaction | |
US20050188213A1 (en) | System for personal identity verification | |
KR101853270B1 (en) | Authentication method for portable secure authentication apparatus using fingerprint | |
US10963552B2 (en) | Method and electronic device for authenticating a user | |
US9940503B2 (en) | Authentication device including template validation and related methods | |
CN109426963B (en) | Biometric system for authenticating biometric requests | |
KR20190017975A (en) | Biological Feature Recognition Device and Method and Biological Feature Template Registration Method | |
US11288349B2 (en) | System and method for authentication using biometric hash strings | |
KR20170016779A (en) | System for relaying financial transaction with multiple safety function using finger vein authentication | |
US20150120543A1 (en) | EyeWatch ATM and Wire Transfer Fraud Prevention System | |
KR20190040865A (en) | Server, method for controlling the server and terminal apparatus | |
KR101853266B1 (en) | Portable secure authentication apparatus using fingerprint | |
US20150100493A1 (en) | EyeWatch credit card fraud prevention system | |
KR102014394B1 (en) | Authentication method for portable secure authentication apparatus with improved security for fake fingerprints | |
US20220027866A1 (en) | Digital virtual currency issued by being matched with biometric authentication signal, and transaction method therefor | |
KR20040028210A (en) | Apparatus for Identifying a Person through Recognizing a Face and Method thereof | |
JP2010079633A (en) | Biological information authentication system and method | |
KR102138659B1 (en) | Smart credit card and settlement system to recognize fingerprints | |
Ibrahima et al. | FINGERPRINTS TO AUTHENTICATE TRANSACTIONS IN CONTACTLESS CARDS. | |
Al-Khalil | FINGERPRINTS TO AUTHENTICATE TRANSACTIONS IN CONTACTLESS CARDS | |
Kil et al. | A study on the portable secure authenticator using fingerprint |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E601 | Decision to refuse application | ||
AMND | Amendment | ||
X701 | Decision to grant (after re-examination) | ||
GRNT | Written decision to grant |