WO1998013791A1 - Apparatus and method for personal identification - Google Patents

Apparatus and method for personal identification Download PDF

Info

Publication number
WO1998013791A1
WO1998013791A1 PCT/US1996/015509 US9615509W WO9813791A1 WO 1998013791 A1 WO1998013791 A1 WO 1998013791A1 US 9615509 W US9615509 W US 9615509W WO 9813791 A1 WO9813791 A1 WO 9813791A1
Authority
WO
WIPO (PCT)
Prior art keywords
means
personal
system
microprocessor
trait characteristics
Prior art date
Application number
PCT/US1996/015509
Other languages
French (fr)
Inventor
Robert A. Nelson
Anton J. Grambihler
Original Assignee
Westinghouse Electric Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Westinghouse Electric Corporation filed Critical Westinghouse Electric Corporation
Priority to PCT/US1996/015509 priority Critical patent/WO1998013791A1/en
Publication of WO1998013791A1 publication Critical patent/WO1998013791A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically

Abstract

There is provided by this invention a personal identification card for gaining access to controlled areas or computer systems having a microprocessor combined therein that has stored in its memory personal trait characteristics of the individual user. The microprocessor also has stored algorithms for comparing the personal trait characteristics stored in the card with personal trait characteristics inputted from an external device. Stored algorithms are used to update the personal stored traits. The microprocessor verifies the identity of the user of the card. A security system within the microprocessor protects the stored personal trait characteristics and restricts access to the card.

Description

APPARATUS AND METHOD FOR PERSONAL IDENTIFICATION

BACKGROUND OF THE INVENTION Field of the Invention The U.S. government has a paid-up license in this invention and the right in limited circumstances to require the patent owner to license others on reasonable terms as provided for by the terms of contract No. DE-AC06-87RL10930 award by the United States Department of Energy.

This invention relates generally to means for gaining access to controlled areas, but more particularly, to card systems for gaining access to secured buildings and facilities or to secured computer systems . This invention has broad applications in systems where bank cards, credit cards, or other types of plastic cards are used to gain access to automated financial transaction systems, and also to computer controlled systems where plastic cards are used for entering and leaving controlled buildings or other types of facilities. This invention also relates to applications where access to the information stored on the card is restricted by a security system. Traditionally, these cards have a coded magnetic strip that allows the user to pass the strip through a reader which authorizes the user to gain access to the computer controlled system. Early versions of these basic systems allowed any holder of the card to gain entry to the system regardless of whether the holder was an authorized user or not. Later, these basic systems were supplemented with an additional identification means such as a PIN number or a password that had been previously stored in the computer memory. The holder of the card had to enter the identification into the system to prove he was an authorized user. These systems proved to be ineffective because the authorized user oftentimes forgot the password or PIN number and, in some cases, the PIN number and password were obtained by duress or theft or some other unauthorized means .

Then, systems were developed where a personal physical trait was actually stored on the card. These physical traits could be handwriting samples , photographs , or fingerprints. In these type systems, the personal trait that was stored on the identification card was also stored in a computer memory bank. When the user attempted to gain access to the secured system, the user would input the card to a reader or scanner that read the digitized personal information trait from the card and inputted it into the main computer memory bank. The main computer would then retrieve the stored information from its memory bank and make a comparison of the information inputted from the reader. If the personal physical traits read on the card matched the personal traits stored in the main computer, then the user was authorized to gain access to the system. However, if there was not a match, then the user was denied access to the system. Such systems were disclosed in U.S. patent no. 5,214,699, issued May 25, 1993, to Midora Monroe, et al . See also U.S. patent no. 4,636,622, issued to Clemet Clark, on January 13, 1987. These systems were typical of systems that used identification cards to gain access to controlled areas or computer systems .

However, even these systems had major drawbacks. When personal identification traits and identities were stored in a centralized database where there were many, many users, databases of enormous size and expense were required. Inordinate delays were usually encountered when many users tried to gain access to the system simultaneously. They also require extensive communication between the remote access points and the central database.

Accordingly, other systems have been developed which require the user to place his personal identification card in a reader and then re-enter his personal identification trait in a real time on-line scanner. For instance, when a personal identification trait is a picture, a camera, located at the remote site, re-enters the user's picture into the system for comparison. Other systems may have fingerprint scanners to read actual fingerprints or voice scanners compare actual voices with voiceprints stored on the identification cards. In these systems, the information read from the on-line scanner is fed to a main compu- ter along with the information read from the identification card and a comparison is then made. If there is a match, then the user is allowed access to the system. These types of systems are disclosed in U.S. patent no. 4,993,068, issued to Gerald Piosenka, et al . , and U.S. patent no. 5,229,764, issued to Noel Matchett, et al. See also U.S. patent no. 5,191,608, issued March 2, 1993, to Francois Geroni i wherein a secret code is coded in the microprocessor of the identification card which must be matched before the card is operational by the user. However, these systems also have a major drawback. That is, they allow the personal trait information stored on the card to be read by an unknown or unfriendly computer. This type of technique compromises the security of the overall system. It is an object of this invention to provide an identification card or smart card for use with an identification and access system wherein the personal identification trait stored on the smart card cannot be obtained by unauthorized users. It is also an object to provide a system which may be used by numerous users without requiring a large centralized database. It is a still further object of this invention to provide a multipurpose smart card which allows the user to gain access to a variety of different facilities or computer systems.

It is a further object of this invention to maintain secret information in the card that will not be released until the card holder proves his identity to the card. In all cases the identity verification takes place in the card.

Summary of the Invention There is provided by this invention a portable device, preferably a personal identi ication card or smart card which contains a microprocessor with means for storing personal identification traits such as fingerprints, hand geometry, voiceprints, etc., in the memory of the microcomputer; biometric detection means such as a reader comprising a means for reading digitized data of personal identification traits template received from an external scanner; and means for comparing the inputted personal identification traits from the external scanner with the personal identification traits stored in programmable memory of the microprocessor. Upon obtaining a match of the stored personal identification traits and the scanned identification traits, the smart card allows access to a secured facility or computer system or the smart card it- self. The smart card also contains security features which prevent any information from being inputted to the microprocessor from unauthorized computers. Brief Description of the Drawings Figure 1 is a simplified block diagram of the smart card interfacing with a computer system in accordance with the principles of this invention; Figure 2 is a block diagram of the architecture of the microprocessor utilized on the smart card in accordance with the principles of this invention; and

Figure 3 is a flow chart illustrating the method of operation of the smart card in accordance with the princi- pies of this invention.

Brief Description of Preferred Embodiment There is shown in Figure 1 a personal identification system shown indicated generally at 10 that allows a user to gain access to controlled facilities or areas, or con- trolled computer system files in the smart card microprocessor. A person attempting to gain access to the system must have a user card 12 which may be a commonly used plastic card such as a credit card or other identification card which has contained therein a microprocessor general- ly referred to as 14. The user must connect the microprocessor to a computer system interface 16 by connecting serial communication, power, reset, and timing signal lines not shown but well known to those skilled in the art that allows the microprocessor and the computer system interface to communicate. The computer system interface is usually at a remote site so it is accessible to the user and is connected to a computer system not shown. Also at the remote site is a biometric scanner 18 that is connected to the computer system interface 16 so that the microprocessor 14 and the biometric scanner 18 can pass information. The biometric scanner 18 may be any number of scanners well known in the art such as fingerprint scanners, voiceprint digitizers, hand geometry scanners, etc . Once the microprocessor 14 is connected to the computer system interface 16, the system will prompt the user to input information into the biometric scanner 18 for comparison in a manner hereinafter described.

Referring to Figure 2 , there is shown a block diagram of the architecture of the microprocessor 14. Connected to the internal bus 20 are addressing logic circuits 22 and control and test registers 24 for the erasable, pro- grammable read only memory (EPROM) or similar device 26 and the electrical erasable programmable read only memory (EEPROM) or similar device 28 which contains the templates for the biometric identification information and comparison and update codes. Also connected is an application read only memory (ROM) or similar device 30 and a data random access memory (RAM) 32. A CPU 34 is utilized to make the comparisons between the biometric template store and the biometric template input in a manner that will be hereinafter described. Finally, the microprocessor con- tains an input/output interface 36 and security logic control 38. Although this system will work with any biometric identity verification trait, such as voiceprints or fingerprints, in the present invention hand geometry biometric information is used. When the card is issued to the user, a hand geometry template of the user is made, the information is digitized and inputted into the EEPROM 28. The microprocessor is programmed to make partial updates of the hand geometry template stored in the card. The template update accounts for subtle hand changes (e.g., fingernail growth and weight gain). The security logic circuits of the microprocessor protects the template and requires terminal verification before processing any Intemational Organization for Standardization format command. The program maintains template integrity using an error detection code and an invalid access attempt count.

Figure 3 illustrates a flow chart that demonstrates the method of operation during identification of the user. When the card user inserts the card 12 into the computer system interface 16 and the microprocessor 14 is connected within the computer interface, the computer system interface challenges the user card to authenticate itself with a randomly generated security code. If the proper response is computed, the card is authenticated. If not, the computer system stops and the user is denied access. The system then prompts the user to place his hand in the hand scanner and a hand template is digitized by the hand scanner 18. However, before this information is processed by the user card 12, the user card authenticates the terminal by challenging the terminal with a randomly generated security code. If the terminal security code is present, the template is made available to the user card 12. If it is not available, the system stops and the user is denied access. Once the hand template is available and the retry count has not been exceeded, the card requests that the hand template be sent to the card. The system denies access if the identity is unknown and the retry count is exceeded. The smart card then temporarily stores the hand template in the random access memory (RAM) 32 and retrieves the pre-stored hand template from the (EEPROM) 28. An algorithm stored for making a compar- ison is then used by the CPU 34 to compare the previously stored hand template with the hand template received from the scanner 18. The hand geometry comparison and update algorithm allows an update to be made to the stored template when a predetermined maximum score is made as a result of the comparison. The updated template then is stored and becomes the new stored template for comparisons for future entry attempts. When the computer system interface requests the results from the card, the holder is either identified and the user is granted access by the system or to the card, or the holder is not identified and the system denies access . It can be readily seen that there is provided by this invention a novel, personal identification system wherein a personal identification card (smart card) has stored therein on a microprocessor system a template of biometric identification traits, such as hand geometry, which is protected from unauthorized or unfriendly computers by a security logic system. Once a computer system has been authenticated, then the smart card prompts the computer system to request a hand geometry scan which is digitized and sent to the smart card. Hand geometry algorithms and update algorithms stored in the smart card are compared with the hand geometry scan. Thus, every individual user of the system who has a smart card carries his template in his own microprocessor and relieves the main computer sys- tern from requiring excessive and expensive data storage space when there may be many thousands of potential users . This invention provides a smart card where the biometric comparison occurs in the microprocessor of the smart card. Although there has been illustrated and described specific detail and structure of operation, it is clearly understood that the same were merely for purposes of illustration and that changes and modifications may be readily made therein by those skilled in the art without departing from the spirit and the scope of this invention.

Claims

What is claimed is:
1. A personal identification system for controlling access to a protected system, comprising: a) a portable device containing a microprocessor means disposed to be inputted into a computer system interface means for controlling access to the secure area or computer system; b) biometric reader means connected to the computer system interface means for detecting personal trait characteristics of an individual seeking access and producing a digitized output of the personal trait characteristics; c) programmable memory means within the microprocessor means for storing previously recorded biometric personal trait characteristics; d) comparative means within the microprocessor means for comparing the previously stored personal trait characteristics in the programmable memory means with the output of the biometric detection means for verifying the identity of the individual seeking access; e) output means within the microprocessor means for producing an output signal resulting from the comparison made in the comparative means to the computer interface means for enabling or disabling access of the individual to the secured areas or computer system; and f) security means within the microprocessor means wherein access to the personal trait characteristics is protected and restricted.
2. A personal identification system as recited in Claim 1 wherein the portable device is a card.
3. A personal identification system as recited in Claim 2 wherein the card is plastic.
4. A personal identification system as recited in Claim 3 wherein the biometric detection means is comprised of a scanner for digitizing the hand geometry of the individual seeking access.
5. A personal identification system as recited in Claim 4 wherein the biometric detection means is a receiver for digitizing voiceprints of the individual seeking access.
6. A personal identification system as recited in Claim 5 wherein the programmable memory means updates the previously recorded personal trait characteristics with the digitized output of the biometric detection means.
7. A personal identification system as recited in Claim 6 wherein the protected system is a controlled area or facility.
8. A personal identification system as recited in Claim 7 wherein the protected system is a computer system.
9. A portable device for accessing a protected system by the user, comprising a microprocessor wherein the microprocessor means is further comprised of: a) a programmable memory means for storing previously recorded personal trait characteristics; b) means for storing personal trait comparison algorithms and personal trait update algorithms; c) computing means for utilizing the personal trait comparison algorithms for comparing personal trait characteristics inputted into the microprocessor means with the previously recorded personal trait characteristics stored in the programmable memory means; d) update means for updating the personal trait characteristics previously recorded stored in the programmable memory means with the personal trait characteristics inputted into the microprocessor means; e) output means for producing an output signal based upon the comparison made in the computing means between the personal trait characteristics previously recorded and a personal trait characteristic inputted into the microprocessor means to verify the identity of the user; and f) security means within the microprocessor means wherein access to the personal trait characteristics is protected and restricted.
10. A method of controlling access to a protected system by an individual, consisting of the steps of: providing portable storage means for storing personal trait characteristics of an individual; verifying the portable device upon input to the protected system; verifying the protected system by the portable device; measuring personal trait characteristics of the individual seeking access and inputting the personal trait characteristics into the portable device; comparing the personal trait characteristics inputted into the portable device with the personal trait characteristics previously stored in the portable device for determining the identity of the user; and signaling the protected system to enable or disable access by the individual based upon the comparisons made.
11. A method for controlling access to a protected system as recited in Claim 10 further comprising a step of updating the personal trait characteristics stored in the portable device by the personal trait characteristics measured and inputted into the portable device.
12. A method for controlling access to a protected system as recited in Claim 11 wherein the portable device is comprised of a card having a microprocessor attached thereto .
13. A method for controlling access to a protected system as recited in Claim 12 wherein the card is plastic.
14. A method for controlling access to a protected system as recited in Claim 13 wherein the protected system is a secure area or facility.
15. A method for controlling access to a protected system as recited in Claim 14 wherein the protected system is a computer system.
PCT/US1996/015509 1996-09-27 1996-09-27 Apparatus and method for personal identification WO1998013791A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US1996/015509 WO1998013791A1 (en) 1996-09-27 1996-09-27 Apparatus and method for personal identification

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
PCT/US1996/015509 WO1998013791A1 (en) 1996-09-27 1996-09-27 Apparatus and method for personal identification
AU71695/96A AU7169596A (en) 1996-09-27 1996-09-27 Apparatus and method for personal identification

Publications (1)

Publication Number Publication Date
WO1998013791A1 true WO1998013791A1 (en) 1998-04-02

Family

ID=22255871

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1996/015509 WO1998013791A1 (en) 1996-09-27 1996-09-27 Apparatus and method for personal identification

Country Status (2)

Country Link
AU (1) AU7169596A (en)
WO (1) WO1998013791A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1237091A1 (en) * 1999-12-10 2002-09-04 Fujitsu Limited Personal authentication system and portable electronic device having personal authentication function using body information
NL1017856C2 (en) * 2001-04-17 2002-10-18 Hendricus Hermanus Van Velden S4U (Safety for you).
WO2003003295A1 (en) * 2001-06-28 2003-01-09 Trek 2000 International Ltd. A portable device having biometrics-based authentication capabilities
WO2003073243A2 (en) * 2002-02-27 2003-09-04 Advanced Micro Devices Inc. Embedded processor with direct connection of security devices for enhanced security
EP1398737A2 (en) * 2002-09-12 2004-03-17 Integrated Engineering B.V. Identification system
EP1480099A2 (en) * 1999-09-17 2004-11-24 Fingloq AB Mobile communication unit with a security arrangement
US6880054B2 (en) 2000-02-21 2005-04-12 Trek Technology (Singapore) Pte. Ltd. Portable data storage device having a secure mode of operation
US7171680B2 (en) 2002-07-29 2007-01-30 Idesia Ltd. Method and apparatus for electro-biometric identity recognition
FR2895121A1 (en) * 2005-12-15 2007-06-22 Cogelec Soc Par Actions Simpli Access control system for e.g. multi-floor building, has control unit commanding actuator to authorize user using key if measured characteristics correspond to stored characteristics and rights read by reader correspond to access conditions
US7249266B2 (en) 1999-10-05 2007-07-24 Aladdin Knowledge Systems, Ltd. User-computer interaction method for use by a population of flexible connectable computer systems
US7310734B2 (en) 2001-02-01 2007-12-18 3M Innovative Properties Company Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US8212652B2 (en) 2008-11-13 2012-07-03 Hitachi, Ltd. Biometric authentication method, biometric authentication system, IC card, and terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1982003286A1 (en) * 1981-03-18 1982-09-30 Bo Loefberg Data carrier
GB2171828A (en) * 1985-03-01 1986-09-03 Mitsubishi Electric Corp An individual recognition system
EP0197535A2 (en) * 1985-04-09 1986-10-15 Siemens Aktiengesellschaft Data input device
GB2181582A (en) * 1985-10-11 1987-04-23 Victor Campbell Blackwell Personal identification device
EP0271835A2 (en) * 1986-12-19 1988-06-22 Hitachi, Ltd. Personal voice pattern carrying card system
GB2204971A (en) * 1987-05-19 1988-11-23 Gen Electric Co Plc Transportable security system
FR2615984A1 (en) * 1987-05-30 1988-12-02 Toshiba Kk Smartcard
EP0393784A1 (en) * 1989-04-17 1990-10-24 N.V. Nederlandsche Apparatenfabriek NEDAP Multifunctional identification and information card
JPH03269692A (en) * 1990-03-19 1991-12-02 Hitachi Ltd Card position managing system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1982003286A1 (en) * 1981-03-18 1982-09-30 Bo Loefberg Data carrier
GB2171828A (en) * 1985-03-01 1986-09-03 Mitsubishi Electric Corp An individual recognition system
EP0197535A2 (en) * 1985-04-09 1986-10-15 Siemens Aktiengesellschaft Data input device
GB2181582A (en) * 1985-10-11 1987-04-23 Victor Campbell Blackwell Personal identification device
EP0271835A2 (en) * 1986-12-19 1988-06-22 Hitachi, Ltd. Personal voice pattern carrying card system
GB2204971A (en) * 1987-05-19 1988-11-23 Gen Electric Co Plc Transportable security system
FR2615984A1 (en) * 1987-05-30 1988-12-02 Toshiba Kk Smartcard
EP0393784A1 (en) * 1989-04-17 1990-10-24 N.V. Nederlandsche Apparatenfabriek NEDAP Multifunctional identification and information card
JPH03269692A (en) * 1990-03-19 1991-12-02 Hitachi Ltd Card position managing system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PATENT ABSTRACTS OF JAPAN vol. 016, no. 085 (P - 1319) 28 February 1992 (1992-02-28) *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1480099A2 (en) * 1999-09-17 2004-11-24 Fingloq AB Mobile communication unit with a security arrangement
EP1480099A3 (en) * 1999-09-17 2005-07-13 Fingloq AB Mobile communication unit with a security arrangement
US7249266B2 (en) 1999-10-05 2007-07-24 Aladdin Knowledge Systems, Ltd. User-computer interaction method for use by a population of flexible connectable computer systems
EP1959369A1 (en) * 1999-12-10 2008-08-20 Fujitsu Limited User verification system, and portable electronic device with user verification function utilising biometric information
EP1237091A4 (en) * 1999-12-10 2006-08-23 Fujitsu Ltd Personal authentication system and portable electronic device having personal authentication function using body information
EP1237091A1 (en) * 1999-12-10 2002-09-04 Fujitsu Limited Personal authentication system and portable electronic device having personal authentication function using body information
US6880054B2 (en) 2000-02-21 2005-04-12 Trek Technology (Singapore) Pte. Ltd. Portable data storage device having a secure mode of operation
US7310734B2 (en) 2001-02-01 2007-12-18 3M Innovative Properties Company Method and system for securing a computer network and personal identification device used therein for controlling access to network components
NL1017856C2 (en) * 2001-04-17 2002-10-18 Hendricus Hermanus Van Velden S4U (Safety for you).
WO2003003295A1 (en) * 2001-06-28 2003-01-09 Trek 2000 International Ltd. A portable device having biometrics-based authentication capabilities
WO2003073243A3 (en) * 2002-02-27 2004-04-08 Advanced Micro Devices Inc Embedded processor with direct connection of security devices for enhanced security
GB2401457B (en) * 2002-02-27 2005-07-27 Advanced Micro Devices Inc Embedded processor with direct conneciton of security devices for enhanced security
WO2003073243A2 (en) * 2002-02-27 2003-09-04 Advanced Micro Devices Inc. Embedded processor with direct connection of security devices for enhanced security
GB2401457A (en) * 2002-02-27 2004-11-10 Advanced Micro Devices Inc Embedded processor with direct connection of security devices for enhanced security
US7171680B2 (en) 2002-07-29 2007-01-30 Idesia Ltd. Method and apparatus for electro-biometric identity recognition
US7689833B2 (en) 2002-07-29 2010-03-30 Idesia Ltd. Method and apparatus for electro-biometric identity recognition
EP1398737A3 (en) * 2002-09-12 2004-06-30 Integrated Engineering B.V. Identification system
US7219837B2 (en) 2002-09-12 2007-05-22 Integrated Engineering B.V. Identification system
EP1398737A2 (en) * 2002-09-12 2004-03-17 Integrated Engineering B.V. Identification system
US7392943B2 (en) 2002-09-12 2008-07-01 Integrated Engineering Identification system
FR2895121A1 (en) * 2005-12-15 2007-06-22 Cogelec Soc Par Actions Simpli Access control system for e.g. multi-floor building, has control unit commanding actuator to authorize user using key if measured characteristics correspond to stored characteristics and rights read by reader correspond to access conditions
US8212652B2 (en) 2008-11-13 2012-07-03 Hitachi, Ltd. Biometric authentication method, biometric authentication system, IC card, and terminal
CN101739521B (en) 2008-11-13 2013-03-27 株式会社日立制作所 Biometric authentication method, biometric authentication system, IC card, and terminal
EP2189923A3 (en) * 2008-11-13 2013-07-24 Hitachi Ltd. Biometric authentication method, biometric authentication system, IC card and terminal

Also Published As

Publication number Publication date
AU7169596A (en) 1998-04-17

Similar Documents

Publication Publication Date Title
EP0924657B1 (en) Remote idendity verification technique using a personal identification device
US7898385B2 (en) Personnel and vehicle identification system using three factors of authentication
US7003669B2 (en) Document and bearer verification system
EP1291807B1 (en) Person recognition apparatus and method
US6095413A (en) System and method for enhanced fraud detection in automated electronic credit card processing
EP0924656B2 (en) Personal identification FOB
KR100703693B1 (en) System and method for face recognition
EP0152024B1 (en) Portable data storing/processing device
US8402040B2 (en) Method and system to authenticate an object
EP0935221B1 (en) Remote authentication system
US6719200B1 (en) Checking of right to access
CA1326299C (en) Speaker verification system using integrated circuit cards
US5337043A (en) Access control system with mechanical keys which store data
US7725732B1 (en) Object authentication system
US5144680A (en) Individual identification recognition system
US20050218215A1 (en) Biometric identification system
US4742351A (en) IC card system
CA2446295C (en) Smart card access control system
US7434063B2 (en) Authentication method, apparatus, and system
EP0973125B1 (en) Method for managing security for card-type storage medium, and a card-type storage medium and a transaction apparatus therefor
ES2230897T3 (en) Terminal with biometric identity check.
US20020169720A1 (en) Method for cardholder to place use restrictions on credit card at will
CN1322446C (en) Authentication card system
US5097115A (en) Transaction authentication system
Matyáš et al. Biometric authentication—security and usability

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU CN JP KR NO

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase in:

Ref country code: JP

Ref document number: 1998515585

Format of ref document f/p: F

122 Ep: pct application non-entry in european phase