TW200820218A - Portable personal authentication method and electronic business transaction method - Google Patents

Portable personal authentication method and electronic business transaction method Download PDF

Info

Publication number
TW200820218A
TW200820218A TW096125582A TW96125582A TW200820218A TW 200820218 A TW200820218 A TW 200820218A TW 096125582 A TW096125582 A TW 096125582A TW 96125582 A TW96125582 A TW 96125582A TW 200820218 A TW200820218 A TW 200820218A
Authority
TW
Taiwan
Prior art keywords
sound
external auditory
auditory canal
data
customer
Prior art date
Application number
TW096125582A
Other languages
Chinese (zh)
Inventor
Shinji Seto
Original Assignee
Nap Entpr Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nap Entpr Co Ltd filed Critical Nap Entpr Co Ltd
Publication of TW200820218A publication Critical patent/TW200820218A/en

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R2410/00Microphones

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computer Hardware Design (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Details Of Audible-Bandwidth Transducers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Reliable biometric personal authentication is realized by using the sound spectrogram, especially the external auditory canal sound produced in the closed external auditory canal. The external auditory canal sound confirmed by acoustical analysis of the phonetic quality of the external auditory canal produced in the closed external auditory canal and the phonetic quality of the oral sound produced from the mouth is used as a sound spectrogram for biometric authentication. Sound spectrogram confirmation for checking the similarity between the electronic data collected from the external auditory canal confirmed by the acoustic analysis and the electronic data stored in storage means of a computer system is conducted. If the similarity agrees or the difference is small, the person to be authenticated is authenticated.

Description

200820218 九、發明說明: 【發明所屬之技術領域】 、/發明係有關於攜帶型個人認證方法,特別是有_ 以·!:之外耳運内產生的外耳道内聲音執行生物測定學 的認證方法,係、關於可以應用於手機或電腦的個人…: 汽車的個人認證、獨戶住宅或公寓的個人認證、金二槿 的ATM、⑶的個人認證等的攜帶型個人認證方法及 業=易方法。在此,生物測定學認證係為以電子方式執ς 遂證個人、確認本人的認證方式。 【先前技術】 近年來,料料機等的所有f訊終端機巾的資料的 :生大增,❼防止因其遺失或被竊等的被害之對策為, 谋求保全功能的擴充。目前最普及的保全方式為密碼,直 次為1c卡的方式。但是,密碼雖具有運用成本低的優勢, 但是,卻可能被盜用。200820218 IX. Description of the invention: [Technical field to which the invention pertains] / The invention relates to a portable personal authentication method, in particular, an authentication method for performing biometrics in the external auditory canal generated in the external ear transport, Department, personal information that can be applied to mobile phones or computers...: Personal authentication of a car, personal certification of a single-family house or apartment, ATM of Kim Jong-soo, personal authentication of (3), etc. Here, biometrics certification is an electronic method of certifying individuals and confirming their own certification methods. [Prior Art] In recent years, the information on all the equipments of the material feeders, such as the material feeders, has been greatly increased, and the countermeasures against the damage caused by the loss or theft have been prevented, and the maintenance function has been expanded. At present, the most popular security method is password, which is directly 1c card. However, although passwords have the advantage of low cost of operation, they may be stolen.

Ic卡方式在認證時藉由將其 機的方法而可以方便地使用,但是,其具有遺 失、被竊、損壞、傷造的風險,且具有IC卡或讀卡機、 周邊系統的構建等的成本。 ―、相車乂於傳統的密碼等的藉由記憶的方式,能夠減低忘 :己、A漏、偽造等的風險的生物敎學認證,係為利用人 類亡士理特徵、特性而執行之本人認證方式而受到矚目, 為商女全度的保全而展開其研究、開發、商品化,至目前 為止’已提出大量的生物敎學認證技術。例&gt;,以聲紋 2026-9004-pf 5 200820218 執行生物測定學認證的認證方法即為立. , 、1〈一,不過在此 傳統的聲紋認證中,具有如下問題:(1)外部_音所造 成的認證錯誤;(2)以發聲音之錄音進行偽造;j3)因 為感冒等身體狀況的影響而造成音調變化;因為年 齡增加而造成聲音的經年變化之對靡· T應,(5 )接受他人的 比率高等。 而且,生物測定學認證具有如下之妓 、 另 卜之共通的問題點:(a) 因為是唯一的本人認證,所以一曰資 ^ 一貝抖洩漏給第三人,則 其不可能變更,而使本人終其一生都盔 …、生郡無法使用認證(可變 更ID的極端狀況中);(b)廍舻十 1 D)硬體或糸統的導入成本高; (c ) 5忍證錯誤時的對策。 再者,就保全整體而言,具有下列問題,本人認證的 特徵資料或參照資料本身細微普通的電子㈣,為確保包 含周邊機器或網路的系統整體的安全,而要求完全的密碼 化0 目前的專利公開技術’提出至少讀取人類的生物學的 特徵中-者,以該讀取的資料作為認證資料,依據該認證 貧料執打個人認證(例如,日本專利公開2〇〇1—92786號 公報)。 但疋,在該日本專利公開2〇〇1 —92786號公報中揭露 的攜帶型個人認證的情況下,為利用人類的指紋、聲紋、 、、’罔膜紋、虹杉紋、臉部、簽名中至少一者的生物測定學認 證,以此種認證要解決上述問題還有一大段距離,而現狀 為幾乎不可能實現確實的個人認證。 2026-9004-PF 6 200820218 因此’本發明的目的在於, 及電子商孝 、“、w型個人認證方法 蓉 易方法,其解決上述的傳統之問題點,藉由 聲、,文,特別是利用密閉之外耳 寸I円屋生的外耳道内聲音爽 執行生物測定學認證,以 处垂 、月b夠μ現確實的個人認證。 【發明内容】 為達成上述目的,本發明之攜帶型個人認證方法,係 為以聲紋執行生物測定學的切说 ^ 予的°心5且方法,其特徵在於將由密 閉之外耳道内產生的外耳道 #曰的音質和從口產生的 曰的&quot;進行音響分析而確認的外耳道内聲音作為生 物測定學認證的聲紋。 王 :且,本發明之電子商業交易方法,其係為使用上述 ^ 嵩可型個人認證方法,顧客和金融機構之間的電子商業 又易方法’其利用具有輸人㈣之外耳道内產生的外耳道 内聲音的耳機麥克風的顧客用手機等的資料通訊終端,及 ^無線或有線的通訊線路和該資料通訊終端連接的金融 *構用電腦系統’當執行從顧客的資料通訊終端對金融機 構的電腦系統的認證要求時’將從金融機構的電腦系統傳 來的接收確認訊息傳送到顧客的資料通訊終端,再和上述 相同執行從顧客的資料通訊終端對金融機構的電腦系統 的認證要求並承認之,則認證完成,使顧客和金融機構之 間的電子商業交易開始。 如上述,在攜帶型個人認證方法中,因為將由密閉之 外耳運内產生的外耳道内聲音的音質和從口產生的口音The Ic card method can be conveniently used by the method of the machine at the time of authentication, but it has the risk of being lost, stolen, damaged, wounded, and has an IC card or a card reader, a peripheral system, and the like. cost. ―, 相 乂 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统 传统The certification method has attracted attention, and its research, development, and commercialization have been carried out for the full preservation of business women. So far, a large number of biometric authentication technologies have been proposed. Example> The authentication method for performing biometrics certification with voiceprint 2026-9004-pf 5 200820218 is Li, . , 1 <1, but in this traditional voiceprint authentication, the following problems are solved: (1) External Authentic error caused by _ tone; (2) forgery by sound recording; j3) Tonal change due to physical condition such as cold; due to age increase, the change of sound over the years 靡·T should, (5) The rate of accepting others is high. Moreover, the biometrics certification has the following common problems: (a) Because it is the only one, it is impossible to change if it is leaked to a third person. Let me be helmeted for the rest of my life..., the county can not use the certification (in the extreme situation of the ID can be changed); (b) 廍舻 10 1 D) the introduction cost of hardware or sputum is high; (c) 5 tortuous error The countermeasures at the time. In addition, as far as the whole is concerned, the following problems are solved: the characteristic data of the certification or the reference data itself is fine and ordinary electronic (4), in order to ensure the security of the system including the peripheral machine or the network as a whole, the complete encryption is required. The patent disclosure technique 'proposes at least reading the characteristics of human biology, using the read data as authentication material, and performing personal authentication according to the certified poor material (for example, Japanese Patent Publication No. 2-92786) Bulletin). However, in the case of the portable personal authentication disclosed in Japanese Patent Laid-Open Publication No. Hei. No. Hei. No. Hei. No. 92-92786, in order to utilize human fingerprints, voiceprints, and, 罔 film lines, rainbow patterns, faces, There is still a long way to go to the biometrics certification of at least one of the signatures, and the current situation is that it is almost impossible to achieve a definitive personal certification. 2026-9004-PF 6 200820218 Therefore, the object of the present invention is to provide an electronic authentication method, and a w-type personal authentication method, which solves the above-mentioned conventional problems, by sound, text, and especially In the outer ear canal of the sputum, the sputum is performed in the external auditory canal, and the biometrics certification is performed, and the personal authentication of the present invention is carried out in order to achieve the above object. It is a method for performing biometrics on a voiceprint, and is characterized by a sound analysis of the sound quality of the external auditory canal produced in the closed ear canal and the sputum generated from the mouth. The confirmed sound in the external auditory canal is used as the voiceprint for biometrics certification. Wang: Moreover, the electronic business transaction method of the present invention is to use the above-mentioned personal identification method, and the electronic business between the customer and the financial institution is easy. a method of using a data communication terminal such as a mobile phone for a customer who has a headphone microphone having an external ear canal sound generated in an ear canal other than the ear (4), and The communication line and the financial communication system of the data communication terminal 'when performing the authentication request from the customer's data communication terminal to the financial institution's computer system', the reception confirmation message transmitted from the financial institution's computer system is transmitted. The data communication terminal to the customer performs the authentication request from the customer's data communication terminal to the computer system of the financial institution in the same manner as above, and the certification is completed, so that the electronic commercial transaction between the customer and the financial institution starts. In the portable personal authentication method, the sound quality of the sound in the external auditory canal and the accent generated from the mouth will be generated by the closed external ear transport.

2026-9004-PF 7 200820218 的θ貝進行音響分析而確認的外耳道内聲音作為生物測 定學認證的聲紋,所以可以隔絕外界噪音而僅輸入外耳道 内聲音。因此能夠防止過去成為問題的錄音或認證錯誤, 而:夠κ現確貫的個人認證。而且,若資料通訊終端具有 耳機麥克風,彳以透過無、線或有線的通訊線路和電腦系統 連接’因此’之後僅要將軟體導入資料通訊終端或電腦系 、、充任者,電腦系統等的導入成本也是低價即可完成。而 二=管理電子資料的管理者端的惡意或侵入電腦系 解析密碼之惡意第三者,翻管理者端無法得知且 不、止:=得知的ID(語言),而且依重要性採取 土 方以上的認證方式,不但可以防止吳音其 理者或第三者的不正當行為 —吕 的高額結算系統,防止不正行二=為電子商業交易 而曰杜 為而可旎有劃時代的應用。 使用目前普遍的手機作為 … 全度的2人(5方)以上的=4通訊終端的話,高安 隔地也可以順利處理。 個人遇證者即使在遠 而且’在電子商業交易方法的 止電子商業交易中高額結算對應之;為能夠確實地防 額結算系統的劃時代#用,正仃為,可以作為高 丁代應用其實用性高。 【實施方式】 用以實施發明之最佳實施例 參照附圖說明本發明之實施例。 在弟】圖中’1為耳機麥克 為和耳機麥克風i 2 02 6-9004 ~ρρ 200820218 連接的增幅器,例凡 主機,以無線或古 機3。4為作為電腦系統的 結,收接聲立二;線的通訊線路和手機3的增幅器2連 置6。 …儿。主機4設有音響分析裝置5及比對裝 在音響分析梦 之耳機夫 &quot; 中,從波形分析透過增幅器2輸入 的:二: = Γ::音(非藉由骨傳導之聲音) 、日的曰貝並僅取得外耳道内聲音。不 而彳Γ績進行音響分析亦可,但是,波形的識別 注孕乂 π,因此較佳。 ::對裝置6中’比對由音響分析裝置5取出的外耳 二Γ電子資料之特徵資料’以及事先儲存於主機4 版;=:儲存袭置中的電子f料之⑽ ^機4 ’ 一般稱之為伺服器,除了上述之音響分析裝 置5或比對裝置6之外 褰右枝左 之夕卜通有儲存裝置或中央處理裝置, 广衣置並未圖示。而且’在此增幅器2係設置於 ’但設於行動電腦等之同效果的資料通訊終端亦可。 更詳細說明音響分析裝置5及比對裝置6的功能。 在音響分析裝置5中,從本人的生物測定資料中抽出 二寺徵資料,連同本人的屬性儲存於主機4的儲存裝置中, ,儲存資料稱之為樣版,儲存作為認證時參照用資料。亦 即,參照用資料的登錄作業為下列流程,(a )資料輪入、 將取得的本人提示的生物測定資料輸入系統, 杳柯; 、』特徵 、’斗抽出’處理取得的生物測定資料,並從其中抽出特徵 2〇26-9〇〇4~pF 9 200820218 作為認證 資料,(c )將抽出的特徵資料儲存於系統中, 時的參照用資料。 再者,在比對裝置6中,於切说护AA、六&lt; r 於¥的流程為(a)資 料輸入’將取得的本人與;A 、 #行幻桊人袄不的生物測定資料輸入系统 特徵資料抽出,處理取得的4必 次 %侍的生物測疋資料,並從i中抽出 特徵資料,(c)比較比對 日刀 ^ 丁 比孕乂 &gt; Ί用負料及特徵資料 的相似度,(d )資料一钤气%呈f # ' 貝卄致或誤差小時,則判斷為認證為 本人。 生物測定學認證時要求的資料,並非聲音訊號的聲紋 之整體像’而僅限於稱之為特徵f料的某—部份。特徵資 料的抽出方法為認證技術的核心之―,能夠在短時間正確 抽出及比對的方法可說是優良的認證方式。但是,生物測 =資料’隨著資料收集時的環境條件而變〖,因此,並非 ::例*⑤目日寸音質變化,噪音和本人的聲音混雜。 像這樣各式各㈣原因料生㈣定詞,而難以總是提 不同樣的生物測定資料。 二為了對應像這樣變化的生物測定資料,認證系統被設 、、' u疋的誤差。在此重要的是,究竟到怎樣的誤差 ::就算是本人也會產生的誤差,或者,誤差要超過怎樣 、、準才視為疋他人。此問題之對應,係使用統計學的手 之有忍)·生檢定法。本人和他的判斷之分野,稱之為臨界 此臨界值的設定水準具有非常重要的意義。認證時收 -的生物測定資料,例如即使是本人,幾乎所有的情況 下,都會因為外部條件等的影響,而產生和參照用資料的 2〇26-9〇〇4~pf 10 200820218 誤差。當臨界值的設定水準嚴,則本人被視為是他人的可 能性高,另一方面,當臨界值的設定水準低,則也有將他 人視為本人的危險性。 因此,臨界值的設定在生物測定學認證的應用上具有 極大的意義。| 了實現適當的臨界值的設^,必須要瞭解 影響知識的累積或認證精度的環境條件。 相對蒼…、用資料,魂證時的特徵資料相似的程度即為 相^度。相似度為’比對參照用資料和認證時的特徵資料 而算出,兩者越是相似則其值越高。 耳桟夕克風1,如第2、3圖所示具有中空狀的本體 _ ”有適σ耳穴大小並附帶開口 1 3的插入部14。本 體15為合成樹脂所製成,為從侧面觀之呈現圓形之略成 :筒狀,除在插入部14有開口 13之外,並無其他開口, 咖 0中工#。插入部14設置為從本體15側 、中央大出’其先端由橡膠等彈性材料構成,並嵌設有可 和任何大小的 斗八(外耳道)密合的耳墊16。本體15 车泣耳塾1 6側的半部1 5a和相反侧的半部1 5b嵌合,且 番 b之外。卩I有環元件1 7,並嵌設有用以收納後述之 電氣:線的管體18的—端擴開部,且為一體成形。 珂述之耳機麥克風i,可藉由將插入部14插入耳穴中 ::可裝卸的方式裝,卸於耳上。當裝上 墊 的设數個遮音壁1Rq — &amp; Π 緣 叫在插入側和相反側彎曲倒入’其外周 ^壁接觸’並使外耳道密閉。 在本體15中設有,用以接收藉由空氣震動經過插入 2026-9004-pp 11 200820218 部14的開口 13傳遞的聲音信號之丨個麥克風2〇,以及除 了-個放音孔之外均為密閉狀’並將從主機4或圖未顯矛 的外部收發訊機透過手機3接收的聲音訊號擴音的擴音哭 21。 °。 擴音器21,圖未顯示之上述放音孔,係向著插入部 1 4的開口 13設置,而且,执古· Q加 叹有· 2個從擴音器21向著開 :13且同樣長度及内徑的放音道22,其從放音孔分歧為 —。該放音道2 2和與本體一辦士、芯/ 不餵體成形的合成樹脂23形成复 周圍。合成樹脂23設置為從本體15的插人部14向著開 口 1 3之相反端外周呈現圓形延伸的形狀。 麥克風20,設置於對於插入 的開口 13較擴音器2026-9004-PF 7 200820218 The sound in the external auditory canal confirmed by acoustic analysis is used as a biometric calibration voiceprint, so it is possible to isolate external sound and input only the sound in the external auditory canal. Therefore, it is possible to prevent recording or authentication errors that have become problems in the past, and to ensure that the personal authentication is sufficient. Moreover, if the data communication terminal has a headphone microphone, it is connected to the computer system through a no-wire, wired or wired communication line. Therefore, it is only necessary to import the software into the data communication terminal or the computer system, the incumbent, the computer system, etc. The cost is also low. And the second is the malicious third party who manages the electronic data, or the malicious third party who resolves the password. The administrator can't know and does not stop: = the ID (language) that is learned, and the earthwork is taken according to the importance. The above authentication method can not only prevent Wu Yin's or third party's improper behavior - Lv's high-settlement system, preventing the wrong business two = for the electronic business transaction and for the epoch-making application. If you use the current popular mobile phone as the =4 communication terminal with 2 or more people (5 parties) or more, you can handle it smoothly. Personal witnesses, even if they are far away and 'highly settled in the electronic business transaction of the electronic business transaction method; for the epoch-making era that can reliably prevent the settlement system, it can be used as a high-generation application. High sex. [Embodiment] BEST MODE FOR CARRYING OUT THE INVENTION Embodiments of the present invention will be described with reference to the drawings. In the figure, '1 is the amplifier that connects the earphone microphone to the earphone microphone i 2 02 6-9004 ~ρρ 200820218. For example, the host, wireless or ancient machine 3.4 is used as the knot of the computer system. Li 2; the line communication line and the amplifier 2 of the mobile phone 3 are connected 6 . …child. The main unit 4 is provided with an acoustic analysis device 5 and a pair of headphones mounted in the audio analysis dream, and is input from the waveform analysis through the amplitude amplifier 2: two: = Γ:: sound (not by bone conduction sound), The mussels of the day only get the sound inside the external auditory canal. It is also possible to perform acoustic analysis without any performance, but it is better to recognize the waveform as π. :: For the device 6 'Comparative to the characteristic data of the external data of the external ear taken by the acoustic analysis device 5' and stored in the host 4 version in advance; =: (10) ^ machine 4 ' in the electronic f material stored in the attack Referring to the server, in addition to the acoustic analysis device 5 or the comparison device 6 described above, there is a storage device or a central processing device, and the clothing is not shown. Further, the amplifier 2 is provided in the data communication terminal of the same effect as that of the mobile computer. The functions of the acoustic analysis device 5 and the comparison device 6 will be described in more detail. In the acoustic analysis device 5, the information of the two temples is extracted from the biometric data of the person, and stored in the storage device of the host computer 4 together with the attributes of the person, and the stored data is referred to as a pattern and stored as a reference material for authentication. In other words, the registration operation of the reference data is the following flow, (a) the data is entered, the biometric data that is obtained by the person is input into the system, and the biometric data obtained by the process of "drawing out" is selected. And extract the feature 2〇26-9〇〇4~pF 9 200820218 as the authentication data, and (c) store the extracted feature data in the system, and the reference data. Furthermore, in the comparison device 6, the process of cutting the AA, the sixth &lt; r to ¥ is (a) data input 'the biometric data to be obtained by the person and the A; Input the system characteristic data to extract, process the obtained biometric data of 4 must-have, and extract the characteristic data from i, (c) compare the comparison with the Japanese knife ^ Dingbi pregnant 乂 > use negative materials and characteristic data Similarity, (d) If the data is in the form of f # 'Bei's or the error is small, it is judged as the authentication. The information required for biometric authentication is not the overall image of the voiceprint of the sound signal, but is limited to what is called a feature. The method of extracting characteristic data is the core of the authentication technology, and the method of correctly extracting and comparing in a short time can be said to be an excellent authentication method. However, the biometric = data 'has changed with the environmental conditions at the time of data collection. Therefore, it is not a sound change of the sound of the sound of the sound of the sound. In this way, each of the four (four) reasons is expected to produce (four) words, and it is difficult to always mention the same biometric data. 2. In order to correspond to biometric data that changes like this, the authentication system is set to the error of 'u疋'. What is important here is what kind of error is :: even if it is the error that I will produce, or if the error is more than what is, the standard is considered to be others. Correspondence to this problem is the use of statistical hand-forbearing). The distinction between myself and his judgment is called critical. The setting level of this threshold is very important. Biometric data collected at the time of certification, for example, even in my own case, the error of 2〇26-9〇〇4~pf 10 200820218 of the reference data is generated due to external conditions. When the threshold is set to a strict level, I am considered to be a high possibility of others. On the other hand, when the threshold is set at a low level, there is also a danger of treating others as others. Therefore, the setting of the critical value is of great significance in the application of biometrics certification. | To achieve the appropriate threshold value, it is necessary to understand the environmental conditions that affect the accumulation of knowledge or the accuracy of the certification. Relative to Cang..., using the data, the degree of similarity of the characteristic data at the time of the soul is the degree. The similarity is calculated by comparing the reference data with the characteristic data at the time of authentication, and the more similar the two are, the higher the value is. The ear scorpion wind 1, as shown in Figs. 2 and 3, has a hollow body _ ” an insertion portion 14 having a sigma ear size and an opening 13 3. The body 15 is made of synthetic resin and is viewed from the side. The circular shape is slightly cylindrical: except for the opening 13 in the insertion portion 14, there is no other opening, and the insertion portion 14 is disposed to be larger from the side of the body 15 and at the center. It is composed of an elastic material such as rubber, and is embedded with an ear pad 16 which can be tightly fitted to the bucket 8 (outer ear canal) of any size. The body 15 is a half portion 15 5a of the side of the weeping ear, and a half 1 5b of the opposite side is embedded. In addition to the other, the 卩I has a ring element 17 and is provided with an end-opening portion for accommodating the electrical body 18 of the electric wire to be described later, and is integrally formed. The insertion portion 14 can be inserted into the ear cavity: it can be detachably mounted and unloaded on the ear. When the pad is mounted, a plurality of sound-absorbing walls 1Rq - & Π 叫 叫 在 在 在 在 其 其 其 其The peripheral wall contacts 'and closes the external auditory canal. It is provided in the body 15 for receiving the shock through the air through the insertion 2026-9004 -pp 11 200820218 The sound signal transmitted by the opening 13 of the part 14 is a microphone 2〇, and is sealed except for a sound hole, and will pass through the external transceiver of the host 4 or the unexposed spear. The sound amplification of the sound signal received by the mobile phone 3 is crying 21. The loudspeaker 21, which is not shown in the figure, is disposed toward the opening 13 of the insertion portion 14 and is also provided by the singer. · 2 from the loudspeaker 21 to the opening: 13 and the same length and inner diameter of the soundtrack 22, which is divided from the sound hole into -. The soundtrack 2 2 and the body with a franchise, core / not feeding The body-formed synthetic resin 23 forms a complex periphery. The synthetic resin 23 is provided to have a circularly extending shape from the insertion portion 14 of the body 15 toward the outer periphery of the opposite end of the opening 13. The microphone 20 is disposed to be enlarged for the insertion opening 13. Sounder

21之上述放曰孔還遠的位置,而且,彳# n q A 立、蓄於 且攸開口 13集音的集 曰逼25係以不能從擴音器21 所彳丨 八σ 、曰道22直接集音的材 貝’例如由橡膠等彈性, τ 中★隊.! 成於其周圍。彈性體26為 Γ 其中心孔形成於集音道25,並且,外周面為 和合成樹脂23相接的贴能山此 外乃面為 22及火古n 前述,擴音器21的放音道 22及麥克風20的集音道25 曰、 性體26形成,所以姐i ”、、疋由曰成樹脂23及彈 而不會直接V 二的機械震動藉此受到抑制, 放音道二:麥克風2°’而使得-定是只有收集由從 為2個分離的防立铋乂 、25的晨動音。27a、27b 擴音器21的#立 狀心填充於本體15 t。 別設置位於插人邱u 克風2〇的集音道25,分 领入口IM4的開口 13的內 從擴音器21及夹士 内k中,且為直線狀。 叹參克風20延伸牿它P由 、疋長度的電氣配線2 8、 202 6-9004 ~pp 200820218 29 ’如前述收那於管體18内。 在上述十,生物測定學認證係如後述進行。 、、在第4圖中,如此一流程(1方方式)所丁示’在外耳 ^内產生的外耳道内聲音從耳機3的增幅器2以有線或無 '‘达到主機4。此時’如第5圖所示’因為耳墊16的遮音 壁1 6 a在插入侧和相反侧彎曲倒入,其外周緣和外耳道内 壁接:,並使外耳道密閉,所以外部噪音不會混人外耳道 内聲音’而在無雜音的狀態下被取得。 '亦即’藉由裝設了耳墊16的耳機麥克風卜進入外耳 道的周㈣音約為難以下,因此,可以僅輸入外耳道 内聲音,而防止認證錯誤。外耳道内聲音為口音的 以下’很難竊聽或將其錄音’而為充分的抑制力。外耳、首 内聲音,因為本來是壓縮過的音調,所以沒有像口音那: 大的變化’由感胃造成的音調變化小,對認證的影響小。 因年齡增加而造成的聲音的經年變化,因為並非突^的變 化’所以,例如使手機3具有音響分析功能,使其 風 習通常的外耳道内聲音的會話,將監測器自動更新即可: 此為認證精度的問題,藉由結合阻擋外部噪音+外耳、首 聲音+ ID (語言),即可以使接受他人的比率降到極=内 另一方面,也可能增加了本人拒絕率。 _ 傳送到主機4的外耳道内聲音,首先以音響分 5執行音響分析以確認該聲音為外耳道内聲音或口音 耳道内聲音與口音’如第6圖所示,於其音質的波:有:卜 顯的差異。第6圖為其-例之「“、的外耳道内 2026-9004-PF 13 200820218 耳曰為上奴,口 S為下段,並描繪其波形,其橫軸為時間, 縱軸為音壓程度(dB)。音響分析裝置5從該波形的差確認 外耳道内聲音或口音,並僅擷取外耳道内聲音。因此,在 此階段若不外耳道内聲音,就無法執行個人認證(第&quot;章 礙)。 朴以音響分析裝置5僅取出外耳道内聲音,則進行到繼 之藉由比對哀置6的聲紋確認。在比對裝置6中,比對該 外耳道内聲音的特徼眘啦L ^ ^ . 枓’及事先儲存於主機4的儲存裝 置中的本人的用餐昭咨^ α &gt; 〜、、、、枓的相似度。然後當兩資料的相似 度一致或誤差小時,則剌磨 則判斷為本人。因此,在此階段相似 致或誤差大的話,則無法個人認證(第2障礙)。 以比對裝置6判定為太 &gt; 為本人守’則進行到繼之的ID (語 吕)確涊。在此藉由褚ψ丄 心μ 兄出㈠司的内容,亦即密碼等來進行 確涊,當確認時則判定為本 丁 ^ §1, ^ . 口此’在此階段若不被確 則無法個人認證(第3障礙)。 若在之3個障礙時’完全地完成了個人認證。 證,而使對V端:不法/除障礙,則在該階段無法個人認 Jβ豕%的不正行為犋 的冒用身份等的不正行為: i而確貫防止對象端 上述之外耳道内聲音等的特徵 資料,伤彳法左认立 貝枓之本人端的電子 、;手機3的資料庫中,而且和特 儲存裝置中的資料庫館存於設於主機4的 端的電子資料的儲存管理的二端的電子資料和對象The position of the above-mentioned boring hole of 21 is far away, and the set of n# nq A stands and is stored in the opening 13 is forced to be 25 lines so as not to be directly smashed from the loudspeaker 21 by the sigma and the shovel 22 The sound of the material is 'elastic, for example, rubber, τ 中★队.! Become around it. The elastic body 26 is Γ, the center hole is formed in the sound collecting path 25, and the outer peripheral surface is the affixed mountain which is in contact with the synthetic resin 23, and the surface is 22 and the fire is the aforementioned. The sounding path 22 of the loudspeaker 21 is as described above. And the sound channel 25 曰 and the body 26 of the microphone 20 are formed, so that the sister i ′, 疋 is made of the resin 23 and the spring is not directly vibrated by the mechanical vibration of the V 2 , and the sound channel 2: the microphone 2 °', so that only the collection is separated from the body by 15 from the two separate anti-station, 25 morning motion sounds. 27a, 27b loudspeakers 21. The sound channel 25 of Qiu Yuke 2〇 divides the inside of the opening 13 of the entrance IM4 from the loudspeaker 21 and the inside of the clamper k, and is linear. The sacred wind 20 extends 牿 it P, 疋The length of the electrical wiring 2 8, 202 6-9004 ~ pp 200820218 29 'received in the tube body 18 as described above. In the above ten, the biometrics certification system is described later. In Fig. 4, such a flow (1 way) It is indicated that the sound in the external auditory canal generated in the external ear ^ is reached from the amplifier 2 of the earphone 3 by wire or without '' to reach the host 4. As shown in Fig. 5, because the sound insulating wall 16a of the ear pad 16 is bent and poured on the insertion side and the opposite side, the outer peripheral edge and the inner wall of the external auditory canal are connected: and the external auditory canal is sealed, so that external noise does not mix the sound in the external auditory canal. 'And it is obtained in a state without noise. 'That is, 'the sound of the earphone microphone that has the ear pad 16 installed into the external auditory canal is hard to go down. Therefore, it is possible to input only the sound in the external auditory canal, and prevent the authentication error. The sound in the external auditory canal is accented by the following 'hard to eavesdrop or record it' for full restraint. The outer ear, the inner voice, because it is a compressed tone, so there is no accent like that: big change' sense The tone change caused by the stomach is small, and the influence on the authentication is small. The change of the sound due to the increase in age is not a sudden change. Therefore, for example, the mobile phone 3 has an acoustic analysis function, so that it is used in the external auditory canal. The voice session will automatically update the monitor: This is a question of authentication accuracy, by combining blocking external noise + outer ear, first voice + ID (language), ie In order to reduce the rate of accepting others to the extreme = inside, on the other hand, it may increase the rejection rate. _ The sound transmitted to the external auditory canal of the host 4, first perform an acoustic analysis with the sound 5 to confirm that the sound is the sound in the external auditory canal or The sound and accent in the accent ear canal 'As shown in Fig. 6, the wave in its sound quality: There is a difference in the difference between the two. The sixth picture is the "", in the external auditory canal 2026-9004-PF 13 200820218 For the slave, the mouth S is the lower section and the waveform is depicted. The horizontal axis is time and the vertical axis is the sound pressure level (dB). The acoustic analysis device 5 confirms the sound or accent in the external auditory canal from the difference in the waveform, and only extracts the sound in the external auditory canal. Therefore, at this stage, if you do not hear the sound in the ear canal, you will not be able to perform personal authentication ("Chapter"). When the sound analysis device 5 only takes out the sound in the external auditory canal, it proceeds to confirm the voiceprint by the comparison of the sorrow. In the comparison device 6, it is more prudent than the sound in the external auditory canal L ^ ^ . 枓 ' and the storage plan previously stored in the storage device of the host 4 ^ α &gt; ~,,,, 枓Similarity. Then when the similarity of the two data is consistent or the error is small, then the judgment is judged as the person. Therefore, if the similarity or error is large at this stage, personal authentication (second obstacle) cannot be performed. If the comparison device 6 determines that it is too &gt; is the person's keeper, then the ID (language) that follows is confirmed. Here, by the heart of the brother, the content of the division, that is, the password, etc., is confirmed. When it is confirmed, it is judged as §1, ^. The mouth is not confirmed at this stage. Unable to personally authenticate (3rd obstacle). If you are in 3 obstacles, you have completely completed your personal certification. In the case of the V-end: the illegal/except the obstacle, the wrong behavior such as the fraudulent use of the wrong behavior of the Jβ豕% cannot be recognized at this stage: i, and the sound of the ear canal in the above-mentioned ear canal is prevented. Characteristic data, the scars of the left side of the self-identified electronic, the database of the mobile phone 3, and the database in the special storage device are stored in the second end of the storage management of the electronic data provided at the end of the host 4. Electronic materials and objects

2026-9004-PF 200820218 藉由此種生物測定學認證,相 為是利用本人的聲紋特徵之外耳 ^去的密碼等,因 險為〇,被竊的風險也比密碼小尸夕。耳曰’所以遺忘的風 造等的風險也小之特點’其安全性:密、偽 優良的保全方式。 錄的抗拒感’可稱之為 個人認證完成之後,傳送訊息時, f 鼓膜方向的外耳道内空氣震動而傳遞的外耳:二以從 開口 13如第2圖的箭頭β所 耳曰’從 的麥克風2。擷取,從手機…:遞,並由耳機麥克風^ 攸于械d稭由無線或 機4。第2圖的箭頭A,係顯示接收訊、、、 込1主 的擴音器21擴音,傳達到外:::耳機麥克風1 的方向。此接收訊息之時,幾 日汛唬 象。 成手不產生回音現象或震動現 圖顯示用以說明在顧客“銀行之 父易中,銀行員端的不正防止對策的3 汚業 圖。在此舉出顧客A使用手機等式概要的流程 提款時的認證例。 以錢仃的主機⑽) A的::要t據苐4圖所示之1方方式的程序執行從顧客 广,要未(㈣n ’則以銀行的AH受理。受理之 《再以语音指示對顧客A的手機等發 ::=續:認」的要求作為銀行發出二= 功執―顧―A k之和上逃的1方方式—樣’再次,成 執订顧各A提出的認證要求(步驟3),則第—次認證2026-9004-PF 200820218 With this biometrics certification, it is the password that uses the voiceprint characteristics of the person to go outside, and the risk is stolen, and the risk of being stolen is also smaller than that of the password. Deafness' so the risk of forgotten wind and so on is also small. 'Safety: dense, false, excellent preservation. The recorded resistance can be called the outer ear transmitted by the air in the outer ear canal in the direction of the tympanic membrane after the personal authentication is completed: the microphone that is deaf from the opening 13 as indicated by the arrow β in Fig. 2 2. Draw, from the phone...: hand, and by the headset microphone ^ 攸 械 d d d by the wireless or the machine 4. The arrow A in Fig. 2 shows that the loudspeaker 21 of the reception signal, the 込1 main unit is amplified, and is transmitted to the outside::: the direction of the earphone microphone 1. This is a few days when I receive the message. The hand-painted phenomenon does not produce an echo phenomenon or a vibration. The current picture shows the 3 pollution maps for the customer's "family of the bank, the banker's failure prevention measures. Here, the customer A uses the mobile phone equation summary process to withdraw funds. In the case of the certificate of the company (10), the host of the bank (10)): The program to be executed from the customer according to the one-way method shown in Figure 4 is not required ((4)n' is accepted by the bank's AH. Then, by voice indicating to the customer A's mobile phone, etc.::=Continue: Recognition" as the bank issued two = 执 ― 顾 顾 顾 A A A A A A 顾 顾 顾 顾 顾 顾 顾 顾 顾 顾 顾 顾 A A A A A A A A A certification request (step 3), then the first certification

2026-9004-PF 15 200820218 ::以::開始顧客銀行之間的電子商業交易,顧客 A 了〜自己在銀行的帳戶提款 確認顧客A釦郝广4 ^方方式彼此 不正行為。之間的相互認證,而能夠防止對象端的 第8圖顯示用以說乂 、结算對應之不正防止業交易中’高額 此對朿之5方· 7方方式之概要的、、六γ 圖。例如,在同公司 ' 額結算t,通常#以 可以結算的1G萬元小 的相互認證的3方方式來確認和銀行之間 的要求時,則移到負責貝、^出面過結算限額10萬元 仕营、/ 負貝邛長β可以結算之100萬元的中額 二要1責課長Α和負責部長β兩方的認證。亦即, 1 ΓΓ於3方方式上,而成為5方方式。::, 到代表人C可社瞀“二Γ 的要求時,則移 1具…、’ 萬元的高額結算,而必須負- 二V “及代表者C全員的認證。亦即,將貝 2 方方”方方式附加於3方方式上,而成為7方方Γ 如此,即使有管理電子資料的管理 。 入祠服器或主機,並破解密碼的惡意第三者,^^侵 性:不為1方方式,而為3方以上的認證方式,=要 ❼額結异系統之劃時代的運用。另外因為不進行二執 理、重事等的結算就不能繼續進行,所以安全性提古 r簡易的保全到高度重要性的保全之實施例,=如 5而具有大範圍的實用性。而且,在此的 心組2026-9004-PF 15 200820218 ::I::Starting an electronic business transaction between customer banks, customer A~~ withdrawing money from the bank account. Confirm that customer A deducts Haoguang 4^ party way of misconduct. In the case of mutual authentication, it is possible to prevent the sixth gamma diagram of the summary of the five-party and seven-party methods of the high-order pairing in the transaction prevention. For example, when the same company's settlement, t, usually #3,000 yuan, which is a small mutual authentication method that can be settled, can be used to confirm the demand with the bank, then move to the responsible account, and the settlement limit is 100,000. Yuan Shiying, / negative shell 邛 long β can be settled by the amount of 1 million yuan in the middle of the second to be responsible for the class leader and responsible for the two sides of the certification. That is, 1 is in the 3 way and becomes the 5 way. ::, when the representative C can share the requirements of the second party, it will transfer 1 (...) a high settlement of 10,000 yuan, and must be negative - 2V "and the certification of the representative C. That is, the method of attaching the square 2 square to the three-way method becomes the 7-party method, even if there is management of the management electronic data. The malicious third party who enters the server or the host and cracks the password, ^^Invasiveness: It is not a one-way method, but an authentication method of three or more parties. It is an epoch-making application of a sizable balance system. In addition, it cannot be continued because the settlement of two procedural and serious events is not carried out. Therefore, the safety of the ancients r simple preservation to the high importance of the preservation of the example, = such as 5 has a wide range of practicality. Moreover, the heart group here

說明係以銀行為例,但只要是金融機構,其他二: 2026-9004-PF 16 200820218 會也可適用。 ?、#述的女全性更詳細說明時,該實施例中如第4圖 梦7Γ ,第一者不正行為防止ID (語言)之外,亦具有手機 等的資訊通訊終端中的 鳊中的對象☆而不正仃為防止丨D (語言)。 亦即,第二者不正行為防止ID (語言)係為,對參 銀行和個人認證者顧客雔 ....... …有顧客又方遇知的Π)(語言),亦即,例 f ^子等構成者,既然於對象端儲存為資料庫,所 :被:惡意的對象端及第三者惡意使用的可能性夂 :二Γ象端不正行為防止1D(語幻為只有認證者: ,=(#言),亦即,本人的聲紋之外耳道内聲音 1 疋我」的語言聲音),所以不被第三者知Λ, 不於對象端儲存為電子杳粗 ^ 心 ,, 科,所以不會被解析。因此,葬 由使對象端不正行為防止丨 士 曰 止叫語言)的電子資料庫為及弟二者不正行為防 提言。 、庫為一 70化,而使安全性更向上 弟9圖顯示有別於μ h 面。在此實施例中,音施例,對應於第1圖之圖 ”曰響刀析褒置5連同增幅器2設置於 、、 〜方面’僅將比對裝置6設於主機4,。在 '月況下’客戶端保管參照用資料,以主機‘,的 置6執行對於由客戶端的音鲤 、、 鈑 9析装置5擷取的外耳道内 =,的比對。因為音響分析裝置5設於手機3,,= 和主機4可以不採用聲音訊號,而採用封包訊 因此,可以快速傳送訊號。 匕^號 再者’上述實施例僅為舉出較佳之一例,並不排除其The description is based on the bank, but as long as it is a financial institution, the other two: 2026-9004-PF 16 200820218 will also apply. When the description of the female fullness is described in more detail, in the embodiment, as shown in the fourth figure, the first one is not in the prevention of the ID (language), but also in the information communication terminal of the mobile phone or the like. Object ☆ is not correct to prevent 丨D (language). That is, the second party's misbehavior prevents the ID (language) system from being used by the participating bank and the individual certifier customer ............. ...the customer is acquainted with) (language), that is, The composition of the f ^ sub-component, since it is stored as a database on the object side, is: the possibility of malicious use of the malicious object side and the third party: Γ 端 端 不 防止 防止 防止 防止 防止 防止 防止 防止 防止 防止 防止: , = (#言), that is, my voice sounds outside the ear canal 1 疋 me" language sound, so I am not known by the third party, not stored on the object side as an electronic ^ ^ ^, Branch, so it won't be parsed. Therefore, the electronic database that prevents the wrong end of the object from being used to prevent the swearing of the singer from speaking to the singer does not prevent the wrong behavior. The library is a 70-degree, and the security is more upward. The figure 9 shows that it is different from the μh surface. In this embodiment, the sound embodiment corresponds to the figure of FIG. 1 "the squeaking knife splicing device 5 together with the horn 2 is disposed on the side, and the aligning device 6 is only disposed on the host 4, in the ' In the case of the month, the client stores the reference data, and performs the comparison of the external ear canal that is captured by the client and the device 5 by the user's device 6. The acoustic analysis device 5 is provided at The mobile phone 3,,= and the host 4 can use the voice signal instead of the voice signal, so that the signal can be transmitted quickly. The above embodiment is only a preferred example, and does not exclude it.

2026-9004-PF 17 200820218 他的實施例。而且,耳機麥 兄風1的構忐 各具一個擴音器21、麥克風2〇,僅有一成,不限於圖示之 或者有兩個擴音器21及一徊决士 個耳機麥克風1, 1U麥克風亦可。 【圖式簡單說明】 第1圖顯示依據本發明一 認證方法的技術適用於的震動 體概要圖。 貫施例的關於本 •消除回音系統 攜帶型個人 之一例的整 第2圖顯示使用於同上之附有耳墊 大斷面圖。 的耳機麥克風的擴 3圖顯示從第2圖左側觀之耳機麥克風的圖面 4圖顯示用以說明—般認證流程的i方方式的概 第5圖顯示耳機麥克風裝設於耳的狀態圖。 f 6圖顯示外耳道内聲音及口音的波形的示意圖。 第7圖顯示用以說明銀行員端的不正防止對策的3方 方式概要的流程圖。 第8圖顯示用以說明高額結算對應之不正防止對策之 5方.7方方式之概要的流程圖。 第9圖顯示另一實施例,對應於第1圖之圖面。 【主要元件符號說明】 1〜耳機麥克風; 2〜增幅器; 2026-9004-pf 18 200820218 3〜手機; 4〜主機; 5〜音響分析裝置; 6〜比對裝置; 1 6〜耳塾。2026-9004-PF 17 200820218 His embodiment. Moreover, the configuration of the earphones Mai Xiafeng 1 has one loudspeaker 21 and two microphones, only one percent, not limited to the figure or two loudspeakers 21 and a pair of earphone microphones 1 , 1U The microphone is also available. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a view showing a schematic diagram of a vibrating body to which the technique of an authentication method according to the present invention is applied. According to the example of the present invention, the elimination of the echo system is as follows. Figure 2 shows a large cross-sectional view of the ear pad attached to the same. The expansion of the earphone microphone shows the picture of the earphone microphone viewed from the left side of Fig. 2. The figure 4 shows the i-way mode for explaining the general authentication process. Figure 5 shows the state diagram of the earphone microphone installed in the ear. Figure f 6 shows a schematic diagram of the waveforms of sounds and accents in the external auditory canal. Fig. 7 is a flow chart showing an outline of a three-way method for explaining the countermeasure against the banker's side. Fig. 8 is a flow chart showing an outline of the five-party seven-party method for explaining the countermeasure against the high-resolution settlement. Fig. 9 shows another embodiment, corresponding to the drawing of Fig. 1. [Main component symbol description] 1~Headphone microphone; 2~amplifier; 2026-9004-pf 18 200820218 3~Mobile phone; 4~host; 5~audio analysis device; 6~ comparison device; 1 6~ deafness.

2026-9004-PF 192026-9004-PF 19

Claims (1)

200820218 十、申請專利範圍: 以聲紋執行生物測定 1 · 一種攜帶型個人認證方法 學認證, 具特徵在於: 將由密閉之外耳道内產生的外 ★ +道内聲音的音質和 攸口產生的口音的音質進行音變 嚷立从达丄 曰刀析而確認的外耳道内 聲曰作為生物測定學認證的聲紋。 法1·中二Γ利範圍第1項所述之攜帶型個人認證方 二由曰響分析的確認係藉由外耳道内聲音的波形執 【如申請專利範圍第&quot;員所述之攜帶型個人認證方 二:::對由音響分析確認的外耳道内聲音所得到的電 子貝枓和事先館存於電腦系統的儲存裝置中的電子資料 的相似度而執行聲紋確認,若兩資料的相似度—致或誤差 小,則判定為本人。 4·如申請專利範圍第3項所述之攜帶型個人認證方 法其中更執行ID (語言)確認,若確認該丨D (語言) 的内容’則判定為本人。 5·如申請專利範圍第1項所述之攜帶型個人認證方 /、中透過手機專的資料通訊終端具有的耳機麥克風取 侍外耳道内聲音,並且,將該外耳道内聲音使用作為ίΙ} (扣口)’以確認是否為可以啟動資料通訊終端的本人, 若確w 4 ID (語言)的内容,則判定為本人。 6· 一種電子商業交易方法,使用如申請專利範圍第 2026-9004-PF 20 200820218 1項所述之攜帶型個人認證方法,顧客和金融機構之間的 電子商業交易方法, 其特徵在於: 其利用具有輪入密閉之外耳道内產生的外耳道内聲 音的耳機麥克風的顧客用手機等的資料通訊終端,及以無 線或有線的通訊線路和該資料通訊終端連接的金融機構 用電腦系統,當執行從顧客的資料通訊終端對金融機構的 電腦系統的認證要求時,將從金融機構的電腦系統傳來的 接收確認訊息傳送到顧客的資料通訊終端,再和上述相同 執订從顧客的f料通訊終端對金融機構的電腦系、統的認 要求並承^之,則認證完成,使顧客和金融機構之間的 黾子商業交易開始。 、 、,·如月專利範圍第6項所述之電子商業交易方 法’其中對應、於屬於同一組織的複數顧纟的種類,設定小 額、中額、大額等複數的結算方法,當僅能小額結=顧 各U額度超過限度額的交易要求時,請求可以進 結异的顧客的認證,當僅能中額結算 限度額的交易要求時’請求可以進行大額結 證,當有此種超過結算額度的交易要求時,依序要 1 6心 以結算該額度的顧客的認證。 、彳可 、8.&quot;請專利範圍第6項所述之電 法,其中將本人端的電子資料儲存於資料又方 庫中,對象端的電子資料儲存於設於電:、、端的資料 的庫中’本人端的電子資料和對 ::置 兔卞貝枓的儲 202β-9004-PF 21 200820218 存管理為分別進行。 2026-9004-PF 22200820218 X. Patent application scope: Performing biometrics with voiceprints 1 · A portable personal authentication methodological certification, featuring: the sound quality of the accent produced by the external sounds and the sounds produced by the closed outer ear canal The vocal folds in the external auditory canal confirmed by the analysis of the sputum are performed as the voiceprint for biometrics certification. The portable personal authentication method described in item 1 of the second paragraph of the first two patents is confirmed by the waveform analysis of the sound in the external auditory canal [such as the portable individual described in the patent application scope] Authenticator 2::: Perform voiceprint confirmation on the similarity of the electronic data obtained from the sound in the external auditory canal confirmed by the acoustic analysis and the electronic data stored in the storage device of the computer system, if the similarity between the two data If the error or the error is small, it is judged as the person. 4. If the portable personal authentication method described in item 3 of the patent application is executed, the ID (language) confirmation is further performed, and if the content of the 丨D (language) is confirmed, it is determined as the person. 5. If the portable personal authentication party mentioned in item 1 of the patent application scope/, the earphone microphone provided by the data communication terminal dedicated to the mobile phone is used to take the sound in the external auditory canal, and the sound in the external auditory canal is used as ίΙ} ()) to confirm whether it is the person who can start the data communication terminal, if it is the content of w 4 ID (language), it is judged as the person. 6. An electronic business transaction method using a portable personal authentication method as described in claim 2026-9004-PF 20 200820218, an electronic business transaction method between a customer and a financial institution, characterized in that: A data communication terminal such as a mobile phone with a headphone microphone that is inserted into a closed ear canal in the external auditory canal, and a computer system for a financial institution connected by a wireless or wired communication line and the data communication terminal, when executed from a customer When the data communication terminal requests the certification of the computer system of the financial institution, the reception confirmation message transmitted from the financial institution's computer system is transmitted to the customer's data communication terminal, and then the same as the above-mentioned customer's f-communication terminal pair The certification of the computer system and the system of the financial institution is completed, and the certification is completed, so that the business transaction between the customer and the financial institution begins. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, If there is a transaction request that exceeds the limit amount, the request can be authenticated by the customer who has entered the difference. When the transaction request is only possible for the amount of the settlement limit, the request can be carried out in a large amount. When the transaction amount of the settlement amount is required, the customer's certification of the credit amount shall be settled in order. , 彳可, 8.&quot; Please refer to the electric law described in item 6 of the patent scope, in which the electronic data of the person's end is stored in the data and the square library, and the electronic data of the object end is stored in the library of the data set at the electric:, and end. The electronic data of the 'home' and the pair:: the storage of the rabbit oysters, 202β-9004-PF 21 200820218 storage management is carried out separately. 2026-9004-PF 22
TW096125582A 2006-07-31 2007-07-13 Portable personal authentication method and electronic business transaction method TW200820218A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2006208547A JP4937661B2 (en) 2006-07-31 2006-07-31 Mobile personal authentication method and electronic commerce method

Publications (1)

Publication Number Publication Date
TW200820218A true TW200820218A (en) 2008-05-01

Family

ID=38997135

Family Applications (1)

Application Number Title Priority Date Filing Date
TW096125582A TW200820218A (en) 2006-07-31 2007-07-13 Portable personal authentication method and electronic business transaction method

Country Status (3)

Country Link
JP (1) JP4937661B2 (en)
TW (1) TW200820218A (en)
WO (1) WO2008015956A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110832483A (en) * 2017-07-07 2020-02-21 思睿逻辑国际半导体有限公司 Method, apparatus and system for biometric processing
CN112585676A (en) * 2018-08-31 2021-03-30 思睿逻辑国际半导体有限公司 Biometric authentication
CN113643707A (en) * 2020-04-23 2021-11-12 华为技术有限公司 Identity verification method and device and electronic equipment
US11694695B2 (en) 2018-01-23 2023-07-04 Cirrus Logic, Inc. Speaker identification
US11704397B2 (en) 2017-06-28 2023-07-18 Cirrus Logic, Inc. Detection of replay attack
US11755701B2 (en) 2017-07-07 2023-09-12 Cirrus Logic Inc. Methods, apparatus and systems for authentication
US11829461B2 (en) 2017-07-07 2023-11-28 Cirrus Logic Inc. Methods, apparatus and systems for audio playback
US12026241B2 (en) 2017-06-27 2024-07-02 Cirrus Logic Inc. Detection of replay attack

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019006587A1 (en) * 2017-07-03 2019-01-10 深圳市汇顶科技股份有限公司 Speaker recognition system, speaker recognition method, and in-ear device
KR102488001B1 (en) * 2018-01-22 2023-01-13 삼성전자주식회사 An electronic device and method for authenricating a user by using an audio signal
EP3846052A4 (en) * 2018-08-31 2021-09-29 NEC Corporation Biometric authentication device, biometric authentication method, and recording medium
JP7131636B2 (en) * 2019-01-15 2022-09-06 日本電気株式会社 Information processing device, wearable device, information processing method, and storage medium

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6397198B1 (en) * 1994-11-28 2002-05-28 Indivos Corporation Tokenless biometric electronic transactions using an audio signature to identify the transaction processor
JPH10105368A (en) * 1996-07-12 1998-04-24 Senshu Ginkou:Kk Device and method for vocal process request acceptance
JPH10228367A (en) * 1997-02-14 1998-08-25 Omron Corp Data transmission terminal
JPH11308680A (en) * 1998-04-21 1999-11-05 Hiromasa Kobayashi Ear-adaptor type handset
JP2001006028A (en) * 1999-06-21 2001-01-12 Hitachi Ltd Instantaneous settlement system by automatic voice response system
JP2002041788A (en) * 2000-07-24 2002-02-08 Tetsuya Otsuji Method for structuring system and device disclosing no personal information on internet
JP2002109439A (en) * 2000-09-29 2002-04-12 Ricoh Co Ltd Electronic account settlement system, ic card, electronic settlement equipment and recording medium in which the program is recorded
JP2002304522A (en) * 2001-04-05 2002-10-18 Ufj Bank Ltd Authentication method, transaction-side system, computer program and recording medium recorded with the program
JP2005267618A (en) * 2004-02-18 2005-09-29 Bank Of Tokyo-Mitsubishi Ltd Electronic commerce support device and program
JP4359887B2 (en) * 2004-06-23 2009-11-11 株式会社デンソー Personal authentication system
JP2006025079A (en) * 2004-07-07 2006-01-26 Nec Tokin Corp Head set and wireless communication system
JP2006126558A (en) * 2004-10-29 2006-05-18 Asahi Kasei Corp Voice speaker authentication system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12026241B2 (en) 2017-06-27 2024-07-02 Cirrus Logic Inc. Detection of replay attack
US11704397B2 (en) 2017-06-28 2023-07-18 Cirrus Logic, Inc. Detection of replay attack
CN110832483A (en) * 2017-07-07 2020-02-21 思睿逻辑国际半导体有限公司 Method, apparatus and system for biometric processing
US11714888B2 (en) 2017-07-07 2023-08-01 Cirrus Logic Inc. Methods, apparatus and systems for biometric processes
US11755701B2 (en) 2017-07-07 2023-09-12 Cirrus Logic Inc. Methods, apparatus and systems for authentication
US11829461B2 (en) 2017-07-07 2023-11-28 Cirrus Logic Inc. Methods, apparatus and systems for audio playback
CN110832483B (en) * 2017-07-07 2024-01-30 思睿逻辑国际半导体有限公司 Method, apparatus and system for biometric processing
US11694695B2 (en) 2018-01-23 2023-07-04 Cirrus Logic, Inc. Speaker identification
CN112585676A (en) * 2018-08-31 2021-03-30 思睿逻辑国际半导体有限公司 Biometric authentication
US11748462B2 (en) 2018-08-31 2023-09-05 Cirrus Logic Inc. Biometric authentication
CN113643707A (en) * 2020-04-23 2021-11-12 华为技术有限公司 Identity verification method and device and electronic equipment

Also Published As

Publication number Publication date
WO2008015956A1 (en) 2008-02-07
JP4937661B2 (en) 2012-05-23
JP2008033144A (en) 2008-02-14

Similar Documents

Publication Publication Date Title
TW200820218A (en) Portable personal authentication method and electronic business transaction method
EP3272101B1 (en) Audiovisual associative authentication method, related system and device
US7861092B2 (en) Personal communication apparatus capable of recording transactions secured with biometric data
ES2812881T3 (en) Live signal determination based on sensor signals
JP5015939B2 (en) Method and apparatus for acoustic outer ear characterization
CN112585676A (en) Biometric authentication
CN110832484A (en) Method, device and system for audio playback
JP7120313B2 (en) Biometric authentication device, biometric authentication method and program
Shi et al. Wearid: Low-effort wearable-assisted authentication of voice commands via cross-domain comparison without training
WO2022199405A1 (en) Voice control method and apparatus
US11069363B2 (en) Methods, systems and apparatus for managing voice-based commands
US20240012893A1 (en) Headphone biometric authentication
US11721346B2 (en) Authentication device
WO2023124248A1 (en) Voiceprint recognition method and apparatus
Duan et al. F2Key: Dynamically Converting Your Face into a Private Key Based on COTS Headphones for Reliable Voice Interaction
Derawi et al. Biometric acoustic ear recognition
US20220272131A1 (en) Method, electronic device and system for generating record of telemedicine service
WO2019006587A1 (en) Speaker recognition system, speaker recognition method, and in-ear device
EP3575994B1 (en) Method and system for real-time-proofing of a recording
WO2023119629A1 (en) Information processing system, information processing method, recording medium, and data structure
Zhang Towards Enhanced Mobile Voice Authentication
FI127920B (en) Online multimodal information transfer method, related system and device
Talukder et al. Exploiting Playback Device's Effect on Multi-channel Audio to Secure Voice Assistants
JP2006215651A (en) Speaker identification apparatus
Shi et al. Authentication of Voice Commands on Voice Assistance Systems Leveraging Vibrations on Wearables