WO1998047110A1 - Procede de verification d'identite - Google Patents
Procede de verification d'identite Download PDFInfo
- Publication number
- WO1998047110A1 WO1998047110A1 PCT/EP1998/002201 EP9802201W WO9847110A1 WO 1998047110 A1 WO1998047110 A1 WO 1998047110A1 EP 9802201 W EP9802201 W EP 9802201W WO 9847110 A1 WO9847110 A1 WO 9847110A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- data record
- record
- characteristic
- control data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Definitions
- the invention relates to a method for identity verification as a prerequisite for granting access and / or exercise authorization, in which at least one data record is generated on the basis of biometric features with the aid of a data acquisition and data processing system and in which the proof of identity is used of the underlying biometric features.
- the invention also relates to arrangements for carrying out this method.
- the patent DE 43 22 44 5 Cl describes a method for coding identification cards by means of fingerprints, in which a number of fingerprints are taken from the holder of the identification card with the aid of a sensor, and an imprint of the removed fingerprints is applied to the identification card as a key code is selected and after a processing key at least one of the other fingerprints is used as the identification code and is saved.
- the key code fingerprint can be stored, for example, in the form of a hologram.
- the method proposed here provides that the card holder inserts his identification card into a fingerprint comparison device and places a plurality or all of the fingers of both hands on a fingerprint sensor. There is a comparison of the fingerprint stored on the card with one of the natural fingerprints, after which, in the event of a positive comparison, an access to a memory is opened by means of an output signal which contains the fingerprint of the cardholder selected according to a scrambling system.
- This memory can be a local terminal at the location where the card is used.
- a central terminal is also proposed, which is connected to the fingerprint comparison device on site. With the open access to the memory, a comparison of the stored fingerprint with the transmitted fingerprints and, if the stored fingerprint matches with one of the transmitted fingerprints, the identification card is released.
- a fingerprint scanning device is used for identity verification, in which an image input device is coupled to a storage device for the photoelectronic storage of fingerprints of registered persons.
- a feature recognition device processes the image data and generates a spectra pattern.
- a determination device identifies the person entering as a registered person.
- An output signal device generates an unlocking signal and sends it to a door locking device.
- a line thinning is provided in the feature recognition device used here, which separates the thick elements of the fingerprint lines from the two-dimensional fingerprint data that have been transmitted from a CCD camera to the feature recognition device. Furthermore, the feature recognition device a middle position recognition device which determines the middle section of the two-dimensional fingerprint data. Furthermore, a data recognition device is provided which recognizes a fingerprint section within a certain radius from the center position in order to present it as identification data. On the basis of this determination data, a two-dimensional Fourier transformation takes place, the result of which is the two-dimensional Fourier-transformed image which is recorded as a spectra pattern.
- the invention has for its object to provide a method of the type described, in which, in contrast to the prior art, no permanent storage of data records is required, which are obtained from biometric sources and whose content is shaped by the characteristics of these biometric sources.
- the object of the invention is achieved in that a first data set is generated from random data without reference to the characteristics of a biometric source and is stored on a data carrier as a control data set. Since this data set is based on random data, it does not allow any conclusions to be drawn about a biometric source of origin, even when evaluated by unauthorized persons.
- This first data record is assigned as a tax data record to one of the persons belonging to the group of persons authorized to access. It will be saved permanently at least until the next access request is drawn.
- the person authorized to access calls the first data record from the memory; in addition, the character Teristic biometric features of a biometric source to be identified of the person requesting access, for example the characteristic of a fingerprint, are recorded in the form of a feature data record, which is, however, not stored permanently, but is provided temporarily for linking to the control data record.
- At least some of the feature data and at least some of the control data record are now transformed into a second data record by an irreversible arithmetic operation.
- This second data record created in this way is used as a characteristic data record for granting access and / or exercise authorization and / or as a cryptographic key.
- the data which have a reference to the characteristics of the biometric source, are not permanently stored in a memory and thus an uncontrollable access to this data is not possible.
- the method according to the invention does not provide a YES / NO decision on the access authorization, but rather a value corresponding to the characteristic data record within a certain value range, the value range being able to be predetermined by the amount of the data to be recorded and processed.
- This value which corresponds to the characteristic data record, is subsequently used as the basis for a YES / NO decision on access authorization. With each access request, this value or characteristic data record is regenerated from the combination of the permanently stored control data record with the currently obtained temporary biometric data. Only one value out of the total possible amount of achievable values is correct.
- the second data set is unambiguous with regard to the combination of the tax data set with the biometric data which are recorded by the person requesting access; however, it is not unique in relation to the biometric data read in alone. A comparison of images or structures to identify the biometric source (fingers, facial features or voice) is no longer possible.
- the second data record which is generated in the manner described and is intended to serve as an access criterion, is always related to the data read in and is generated anew and differently with every entry request, even if it is the same person. At the same time, however, this means that it is not possible to predict the content of the second data record generated during the next and the next but one access request, even if the same biometric data are used. This ensures that it is not possible for unauthorized parties to draw conclusions about the biometric data or to preview the data records that are generated as requests for access.
- This symbolically means that as a prerequisite for access, a key for an existing lock is not necessary as was previously the case, but for each new access a new, unpredictable lock has to be overcome and an unknown key is required for this.
- the second data record together with the name of the user, is used as a criterion or password for an examination, access and / or exercise authorization is only granted to those who meet the corresponding identity requirement.
- a very preferred development of the invention consists in the fact that the computing operation for transforming the data takes place according to a cryptographic HASH function. This ensures that the transformation is irreversible with a high degree of certainty.
- the HASH function converts a variable variable, for example any set of values, into a fixed string.
- the arithmetic operation is easy to perform for any value, but is not reversible. Input sizes of any length become output sizes of fixed length, which briefly but precisely reproduces the original information.
- the characteristic biometric features are recorded multiple times in order to achieve sufficiently reproducible feature data, and a feature extraction is carried out after each data acquisition. This has the advantage that later identification is possible with greater certainty.
- the feature extraction can be carried out by multiple image recognition and "minutiae detection” analogous to forensic processing.
- control data record can be stored uncoded on the data carrier without the risk of unauthorized decryption.
- the method according to the invention can be applied very well on the basis of the biometric data of a finger, it can also be used in another way, e.g. based on the shape of the face or based on the voice.
- the recording of the characteristic biometric data is carried out by capturing electronic image information, whereas when the voice is used as the basis, the data to be stored are generated using an electronic sound image.
- This control data record has no relation to the characteristics of the user or to a biometric source.
- the characteristic biometric features of a particular finger of this new user are recorded with high reproducibility using a high-resolution optical system, and a feature data record is obtained therefrom, which is not permanently stored on a data carrier, but is only used temporarily for linking to the control data record.
- control data record and the feature data record are generated by an irreversible arithmetic operation, for example likewise by means of the arithmetic circuit according to
- HASH function H (m) f ⁇ y ⁇ , transformed into a characteristic data record.
- This characteristic rate corresponds to a specific numerical value that is used as the basis for a YES / NO decision on access authorization.
- this value or the characteristic data record is regenerated from the combination of the permanently stored control data record with the currently obtained temporary biometric data.
- this value or the characteristic data record is regenerated from the combination of the permanently stored control data record with the currently obtained temporary biometric data.
- the user is first asked to enter his name using the keyboard, whereupon it is checked whether the user name is known; if the result is positive, the control data record is activated.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Biomedical Technology (AREA)
- Signal Processing (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Finance (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Collating Specific Patterns (AREA)
Abstract
La présente invention porte sur un procédé de vérification d'identité en tant que condition préalable à l'octroi d'une autorisation d'accès et/ou d'utilisation, selon lequel on constitue, à l'aide d'un système de saisie et de traitement de données, au moins un jeu de données fondé sur des signes biométriques permettant de procéder à l'identification. L'invention a également trait à des installations pour la mise en oeuvre dudit procédé. Pour ce faire, on saisit dans un premier temps les signes caractéristiques biométriques sous forme de données caractéristiques reproductibles; puis, on génère un premier jeu de données à partir de données aléatoires, lequel est mis sur un support de données en tant que jeu de données de contrôle; au moins une partie des données caractéristiques est liée à au moins une partie du jeu de données de contrôle et transformée par une opération de calcul non-réversible en second jeu de données; et le second jeu de données est utilisé comme critère pour l'octroi d'une autorisation d'accès et/ou d'utilisation et/ou comme clé cryptographique.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19715644.4 | 1997-04-15 | ||
DE19715644A DE19715644A1 (de) | 1997-04-15 | 1997-04-15 | Verfahren zur Identitätsprüfung |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998047110A1 true WO1998047110A1 (fr) | 1998-10-22 |
Family
ID=7826540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP1998/002201 WO1998047110A1 (fr) | 1997-04-15 | 1998-04-15 | Procede de verification d'identite |
Country Status (2)
Country | Link |
---|---|
DE (1) | DE19715644A1 (fr) |
WO (1) | WO1998047110A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9094211B2 (en) | 2011-08-26 | 2015-07-28 | Life Technologies Corporation | Systems and methods for identifying an individual |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19940341A1 (de) * | 1999-08-25 | 2001-03-01 | Kolja Vogel | Verfahren zum Schutz von Daten |
DE19944140A1 (de) * | 1999-09-15 | 2001-03-29 | Schulze Loewen Automaten | Geldbetätigtes Gerät |
EP1172775A1 (fr) * | 2000-07-10 | 2002-01-16 | Proton World International (Pwi) | Procédé de protection d'un accès à un domaine sécurisé |
GB0023904D0 (en) * | 2000-09-29 | 2000-11-15 | Rue De Int Ltd | Verification system and method |
GB0113255D0 (en) | 2001-05-31 | 2001-07-25 | Scient Generics Ltd | Number generator |
WO2002065693A2 (fr) * | 2001-02-14 | 2002-08-22 | Scientific Generics Limited | Dispositif et procede de traitement de donnees |
NO316489B1 (no) | 2001-10-01 | 2004-01-26 | Genkey As | System, b¶rbar anordning og fremgangsmåte for digital autentisering, kryptering og signering ved generering av flyktige, men konsistente ogrepeterbare kryptonökler |
EP1520369B1 (fr) | 2002-05-31 | 2006-10-18 | Scientific Generics Limited | Systeme d'authentification biometrique |
JP2006512864A (ja) | 2002-12-31 | 2006-04-13 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 許可された匿名の認証 |
JP2008502071A (ja) * | 2004-06-09 | 2008-01-24 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | バイオメトリック・テンプレートの保護および特徴処理 |
GB0413034D0 (en) | 2004-06-10 | 2004-07-14 | Scient Generics Ltd | Secure workflow engine |
DE102006006489A1 (de) * | 2006-02-10 | 2007-08-16 | Bundesdruckerei Gmbh | Verfahren zur Durchführung eines Schreibzugriffs, Computerprogrammprodukt, Computersystem und Chipkarte |
JP4886371B2 (ja) * | 2006-06-07 | 2012-02-29 | 株式会社日立情報制御ソリューションズ | 生体認証方法及びシステム |
WO2014015346A1 (fr) * | 2012-07-20 | 2014-01-23 | Life Technologies Corporation | Systèmes et procédés permettant d'identifier un individu |
DE102016107250A1 (de) | 2015-04-22 | 2016-10-27 | Deutsches Zentrum für Luft- und Raumfahrt e.V. | Verfahren, Einrichtung und Computerprogramm zur Multi-Faktor-Authentifizierung und/oder -Identifizierung von Benutzern |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2132857A (en) * | 1982-12-10 | 1984-07-11 | Nec Corp | Voice encryption and decryption system |
DE4220971A1 (de) | 1991-06-26 | 1993-01-07 | Chuo Hatsujo Kk | Fingerabdruck-abtastvorrichtung zur identitaetspruefung |
US5268963A (en) * | 1992-06-09 | 1993-12-07 | Audio Digital Imaging Inc. | System for encoding personalized identification for storage on memory storage devices |
US5280527A (en) * | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
DE4243908A1 (de) * | 1992-12-23 | 1994-06-30 | Gao Ges Automation Org | Verfahren zur Erzeugung einer digitalen Signatur mit Hilfe eines biometrischen Merkmals |
DE4322445C1 (de) | 1993-07-06 | 1995-02-09 | Alfons Behnke | Verfahren zum Kodieren von Identifikationskarten und zum Identifizieren derart kodierter Identifikationskarten und Mittel zur Durchführung des Verfahrens, wie Identifikationskarte, Fingerabdrucksensor, Fingerabdruck- Abnahme und Vergleichseinrichtung |
WO1996005576A1 (fr) * | 1994-08-10 | 1996-02-22 | Prima Officina Carte Valori Turati Lombardi & C.S.P.A. | Document de credit associe a une carte ou a un document personnalise, carte de credit independante personnalisee et equipement d'emission et de validation adapte |
WO1996008093A1 (fr) * | 1994-09-07 | 1996-03-14 | Mytec Technologies Inc. | Generation de cles a commande biometrique |
WO1997005578A1 (fr) * | 1995-07-28 | 1997-02-13 | Mytec Technologies Inc. | Procede et dispositif de manipulation sure d'un numero d'identification personnelle ou d'une cle cryptographique dans l'utilisation de techniques biometriques |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3784743A (en) * | 1972-08-23 | 1974-01-08 | Bell Telephone Labor Inc | Parallel data scrambler |
US5598474A (en) * | 1994-03-29 | 1997-01-28 | Neldon P Johnson | Process for encrypting a fingerprint onto an I.D. card |
US5615277A (en) * | 1994-11-28 | 1997-03-25 | Hoffman; Ned | Tokenless security system for authorizing access to a secured computer system |
-
1997
- 1997-04-15 DE DE19715644A patent/DE19715644A1/de not_active Ceased
-
1998
- 1998-04-15 WO PCT/EP1998/002201 patent/WO1998047110A1/fr active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2132857A (en) * | 1982-12-10 | 1984-07-11 | Nec Corp | Voice encryption and decryption system |
DE4220971A1 (de) | 1991-06-26 | 1993-01-07 | Chuo Hatsujo Kk | Fingerabdruck-abtastvorrichtung zur identitaetspruefung |
US5280527A (en) * | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
US5268963A (en) * | 1992-06-09 | 1993-12-07 | Audio Digital Imaging Inc. | System for encoding personalized identification for storage on memory storage devices |
DE4243908A1 (de) * | 1992-12-23 | 1994-06-30 | Gao Ges Automation Org | Verfahren zur Erzeugung einer digitalen Signatur mit Hilfe eines biometrischen Merkmals |
DE4322445C1 (de) | 1993-07-06 | 1995-02-09 | Alfons Behnke | Verfahren zum Kodieren von Identifikationskarten und zum Identifizieren derart kodierter Identifikationskarten und Mittel zur Durchführung des Verfahrens, wie Identifikationskarte, Fingerabdrucksensor, Fingerabdruck- Abnahme und Vergleichseinrichtung |
WO1996005576A1 (fr) * | 1994-08-10 | 1996-02-22 | Prima Officina Carte Valori Turati Lombardi & C.S.P.A. | Document de credit associe a une carte ou a un document personnalise, carte de credit independante personnalisee et equipement d'emission et de validation adapte |
WO1996008093A1 (fr) * | 1994-09-07 | 1996-03-14 | Mytec Technologies Inc. | Generation de cles a commande biometrique |
WO1997005578A1 (fr) * | 1995-07-28 | 1997-02-13 | Mytec Technologies Inc. | Procede et dispositif de manipulation sure d'un numero d'identification personnelle ou d'une cle cryptographique dans l'utilisation de techniques biometriques |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9094211B2 (en) | 2011-08-26 | 2015-07-28 | Life Technologies Corporation | Systems and methods for identifying an individual |
US9520999B2 (en) | 2011-08-26 | 2016-12-13 | Life Technologies Corporation | Systems and methods for identifying an individual |
US10733277B2 (en) | 2011-08-26 | 2020-08-04 | Life Technologies Corporation | Systems and methods for identifying an individual |
US11636190B2 (en) | 2011-08-26 | 2023-04-25 | Life Technologies Corporation | Systems and methods for identifying an individual |
Also Published As
Publication number | Publication date |
---|---|
DE19715644A1 (de) | 1998-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1998047110A1 (fr) | Procede de verification d'identite | |
DE69228315T2 (de) | Zugangskontrollsysteme | |
DE69835764T2 (de) | Biometrisches system und darauf anwendbare technik | |
EP2548153A1 (fr) | Système d'authentification, procédé d'authentification d'un objet, dispositif pour produire un dispositif d'identification, procédé de production d'un dispositif d'identification | |
WO2001086584A1 (fr) | Procede et systeme de production d'un ensemble de donnees de cle | |
EP1188151B1 (fr) | Dispositifs et procede pour l'authentification biometrique | |
EP1199623A2 (fr) | Procédé et système pour l'identification d'un utilisateur | |
WO2011072717A1 (fr) | Système d'autorisation, dispositif de comparaison et procédé d'autorisation d'un sujet | |
WO2005069534A1 (fr) | Authentification biometrique | |
AT401205B (de) | System zur identifizierung eines kartenbenutzers | |
DE10203926A1 (de) | Datenträger mit mindestens einem Speicherelement | |
DE19645937A1 (de) | Verfahren und System zum personenabhängigen Steuern einer Telekommunikations-Endeinrichtung | |
DE102006034241A1 (de) | Verfahren zur Ermittlung einer Berechtigung | |
AT507372A1 (de) | Identifikationsmerkmal | |
DE4439593C2 (de) | Vorrichtung und Verfahren zur Zugangs- und Zugriffskontrolle | |
DE60130821T2 (de) | Verfahren und Vorrichtung zur gesicherten Zugangsberechtigungsprüfung mittels eines erfassten biometrischen Merkmals | |
WO1999041708A1 (fr) | Moyen d'autorisation d'acces ou d'identification et procede permettant de le realiser | |
DE102009014919A1 (de) | Verfahren und Vorrichtung zum Authentifizieren eines Benutzers | |
DE102018010027A1 (de) | Abwicklungssystem | |
DE69313777T2 (de) | Verfahren und Vorrichtung zum Schreiben von einer Information auf einen Datenträger, mit Möglichkeit zur Bestätigung der Originalität dieser Information | |
DE102005045119A1 (de) | Kodierverfahren und Kodiervorrichtung zur Erzeugung eines individuumsbezogenen Kodes | |
DE10206843A1 (de) | Datenträger, Station und Verfahren für die biometrische Benutzer-Authentisierung | |
DE10317296A1 (de) | Verfahren zur Verwendung von Fingerabdrücken als Kombination von Sein und Wissen zur biometrischen Benutzerauthentifizierung | |
DE19936094C1 (de) | Verfahren und Vorrichtung zur biometrischen Authentisierung | |
EP3602958A1 (fr) | Liaison d'objets assistée par la biométrie |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 1998543502 Format of ref document f/p: F |