WO1998047110A1 - Procede de verification d'identite - Google Patents

Procede de verification d'identite Download PDF

Info

Publication number
WO1998047110A1
WO1998047110A1 PCT/EP1998/002201 EP9802201W WO9847110A1 WO 1998047110 A1 WO1998047110 A1 WO 1998047110A1 EP 9802201 W EP9802201 W EP 9802201W WO 9847110 A1 WO9847110 A1 WO 9847110A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
data record
record
characteristic
control data
Prior art date
Application number
PCT/EP1998/002201
Other languages
German (de)
English (en)
Inventor
Jens Bookhagen
Lutz Donnerhacke
Henry Steger
Klaus Weniger
Original Assignee
Iks Gmbh Information-Kommunikation-Systeme
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iks Gmbh Information-Kommunikation-Systeme filed Critical Iks Gmbh Information-Kommunikation-Systeme
Publication of WO1998047110A1 publication Critical patent/WO1998047110A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Definitions

  • the invention relates to a method for identity verification as a prerequisite for granting access and / or exercise authorization, in which at least one data record is generated on the basis of biometric features with the aid of a data acquisition and data processing system and in which the proof of identity is used of the underlying biometric features.
  • the invention also relates to arrangements for carrying out this method.
  • the patent DE 43 22 44 5 Cl describes a method for coding identification cards by means of fingerprints, in which a number of fingerprints are taken from the holder of the identification card with the aid of a sensor, and an imprint of the removed fingerprints is applied to the identification card as a key code is selected and after a processing key at least one of the other fingerprints is used as the identification code and is saved.
  • the key code fingerprint can be stored, for example, in the form of a hologram.
  • the method proposed here provides that the card holder inserts his identification card into a fingerprint comparison device and places a plurality or all of the fingers of both hands on a fingerprint sensor. There is a comparison of the fingerprint stored on the card with one of the natural fingerprints, after which, in the event of a positive comparison, an access to a memory is opened by means of an output signal which contains the fingerprint of the cardholder selected according to a scrambling system.
  • This memory can be a local terminal at the location where the card is used.
  • a central terminal is also proposed, which is connected to the fingerprint comparison device on site. With the open access to the memory, a comparison of the stored fingerprint with the transmitted fingerprints and, if the stored fingerprint matches with one of the transmitted fingerprints, the identification card is released.
  • a fingerprint scanning device is used for identity verification, in which an image input device is coupled to a storage device for the photoelectronic storage of fingerprints of registered persons.
  • a feature recognition device processes the image data and generates a spectra pattern.
  • a determination device identifies the person entering as a registered person.
  • An output signal device generates an unlocking signal and sends it to a door locking device.
  • a line thinning is provided in the feature recognition device used here, which separates the thick elements of the fingerprint lines from the two-dimensional fingerprint data that have been transmitted from a CCD camera to the feature recognition device. Furthermore, the feature recognition device a middle position recognition device which determines the middle section of the two-dimensional fingerprint data. Furthermore, a data recognition device is provided which recognizes a fingerprint section within a certain radius from the center position in order to present it as identification data. On the basis of this determination data, a two-dimensional Fourier transformation takes place, the result of which is the two-dimensional Fourier-transformed image which is recorded as a spectra pattern.
  • the invention has for its object to provide a method of the type described, in which, in contrast to the prior art, no permanent storage of data records is required, which are obtained from biometric sources and whose content is shaped by the characteristics of these biometric sources.
  • the object of the invention is achieved in that a first data set is generated from random data without reference to the characteristics of a biometric source and is stored on a data carrier as a control data set. Since this data set is based on random data, it does not allow any conclusions to be drawn about a biometric source of origin, even when evaluated by unauthorized persons.
  • This first data record is assigned as a tax data record to one of the persons belonging to the group of persons authorized to access. It will be saved permanently at least until the next access request is drawn.
  • the person authorized to access calls the first data record from the memory; in addition, the character Teristic biometric features of a biometric source to be identified of the person requesting access, for example the characteristic of a fingerprint, are recorded in the form of a feature data record, which is, however, not stored permanently, but is provided temporarily for linking to the control data record.
  • At least some of the feature data and at least some of the control data record are now transformed into a second data record by an irreversible arithmetic operation.
  • This second data record created in this way is used as a characteristic data record for granting access and / or exercise authorization and / or as a cryptographic key.
  • the data which have a reference to the characteristics of the biometric source, are not permanently stored in a memory and thus an uncontrollable access to this data is not possible.
  • the method according to the invention does not provide a YES / NO decision on the access authorization, but rather a value corresponding to the characteristic data record within a certain value range, the value range being able to be predetermined by the amount of the data to be recorded and processed.
  • This value which corresponds to the characteristic data record, is subsequently used as the basis for a YES / NO decision on access authorization. With each access request, this value or characteristic data record is regenerated from the combination of the permanently stored control data record with the currently obtained temporary biometric data. Only one value out of the total possible amount of achievable values is correct.
  • the second data set is unambiguous with regard to the combination of the tax data set with the biometric data which are recorded by the person requesting access; however, it is not unique in relation to the biometric data read in alone. A comparison of images or structures to identify the biometric source (fingers, facial features or voice) is no longer possible.
  • the second data record which is generated in the manner described and is intended to serve as an access criterion, is always related to the data read in and is generated anew and differently with every entry request, even if it is the same person. At the same time, however, this means that it is not possible to predict the content of the second data record generated during the next and the next but one access request, even if the same biometric data are used. This ensures that it is not possible for unauthorized parties to draw conclusions about the biometric data or to preview the data records that are generated as requests for access.
  • This symbolically means that as a prerequisite for access, a key for an existing lock is not necessary as was previously the case, but for each new access a new, unpredictable lock has to be overcome and an unknown key is required for this.
  • the second data record together with the name of the user, is used as a criterion or password for an examination, access and / or exercise authorization is only granted to those who meet the corresponding identity requirement.
  • a very preferred development of the invention consists in the fact that the computing operation for transforming the data takes place according to a cryptographic HASH function. This ensures that the transformation is irreversible with a high degree of certainty.
  • the HASH function converts a variable variable, for example any set of values, into a fixed string.
  • the arithmetic operation is easy to perform for any value, but is not reversible. Input sizes of any length become output sizes of fixed length, which briefly but precisely reproduces the original information.
  • the characteristic biometric features are recorded multiple times in order to achieve sufficiently reproducible feature data, and a feature extraction is carried out after each data acquisition. This has the advantage that later identification is possible with greater certainty.
  • the feature extraction can be carried out by multiple image recognition and "minutiae detection” analogous to forensic processing.
  • control data record can be stored uncoded on the data carrier without the risk of unauthorized decryption.
  • the method according to the invention can be applied very well on the basis of the biometric data of a finger, it can also be used in another way, e.g. based on the shape of the face or based on the voice.
  • the recording of the characteristic biometric data is carried out by capturing electronic image information, whereas when the voice is used as the basis, the data to be stored are generated using an electronic sound image.
  • This control data record has no relation to the characteristics of the user or to a biometric source.
  • the characteristic biometric features of a particular finger of this new user are recorded with high reproducibility using a high-resolution optical system, and a feature data record is obtained therefrom, which is not permanently stored on a data carrier, but is only used temporarily for linking to the control data record.
  • control data record and the feature data record are generated by an irreversible arithmetic operation, for example likewise by means of the arithmetic circuit according to
  • HASH function H (m) f ⁇ y ⁇ , transformed into a characteristic data record.
  • This characteristic rate corresponds to a specific numerical value that is used as the basis for a YES / NO decision on access authorization.
  • this value or the characteristic data record is regenerated from the combination of the permanently stored control data record with the currently obtained temporary biometric data.
  • this value or the characteristic data record is regenerated from the combination of the permanently stored control data record with the currently obtained temporary biometric data.
  • the user is first asked to enter his name using the keyboard, whereupon it is checked whether the user name is known; if the result is positive, the control data record is activated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Biomedical Technology (AREA)
  • Signal Processing (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Collating Specific Patterns (AREA)

Abstract

La présente invention porte sur un procédé de vérification d'identité en tant que condition préalable à l'octroi d'une autorisation d'accès et/ou d'utilisation, selon lequel on constitue, à l'aide d'un système de saisie et de traitement de données, au moins un jeu de données fondé sur des signes biométriques permettant de procéder à l'identification. L'invention a également trait à des installations pour la mise en oeuvre dudit procédé. Pour ce faire, on saisit dans un premier temps les signes caractéristiques biométriques sous forme de données caractéristiques reproductibles; puis, on génère un premier jeu de données à partir de données aléatoires, lequel est mis sur un support de données en tant que jeu de données de contrôle; au moins une partie des données caractéristiques est liée à au moins une partie du jeu de données de contrôle et transformée par une opération de calcul non-réversible en second jeu de données; et le second jeu de données est utilisé comme critère pour l'octroi d'une autorisation d'accès et/ou d'utilisation et/ou comme clé cryptographique.
PCT/EP1998/002201 1997-04-15 1998-04-15 Procede de verification d'identite WO1998047110A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19715644.4 1997-04-15
DE19715644A DE19715644A1 (de) 1997-04-15 1997-04-15 Verfahren zur Identitätsprüfung

Publications (1)

Publication Number Publication Date
WO1998047110A1 true WO1998047110A1 (fr) 1998-10-22

Family

ID=7826540

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1998/002201 WO1998047110A1 (fr) 1997-04-15 1998-04-15 Procede de verification d'identite

Country Status (2)

Country Link
DE (1) DE19715644A1 (fr)
WO (1) WO1998047110A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9094211B2 (en) 2011-08-26 2015-07-28 Life Technologies Corporation Systems and methods for identifying an individual

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19940341A1 (de) * 1999-08-25 2001-03-01 Kolja Vogel Verfahren zum Schutz von Daten
DE19944140A1 (de) * 1999-09-15 2001-03-29 Schulze Loewen Automaten Geldbetätigtes Gerät
EP1172775A1 (fr) * 2000-07-10 2002-01-16 Proton World International (Pwi) Procédé de protection d'un accès à un domaine sécurisé
GB0023904D0 (en) * 2000-09-29 2000-11-15 Rue De Int Ltd Verification system and method
GB0113255D0 (en) 2001-05-31 2001-07-25 Scient Generics Ltd Number generator
WO2002065693A2 (fr) * 2001-02-14 2002-08-22 Scientific Generics Limited Dispositif et procede de traitement de donnees
NO316489B1 (no) 2001-10-01 2004-01-26 Genkey As System, b¶rbar anordning og fremgangsmåte for digital autentisering, kryptering og signering ved generering av flyktige, men konsistente ogrepeterbare kryptonökler
EP1520369B1 (fr) 2002-05-31 2006-10-18 Scientific Generics Limited Systeme d'authentification biometrique
JP2006512864A (ja) 2002-12-31 2006-04-13 インターナショナル・ビジネス・マシーンズ・コーポレーション 許可された匿名の認証
JP2008502071A (ja) * 2004-06-09 2008-01-24 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ バイオメトリック・テンプレートの保護および特徴処理
GB0413034D0 (en) 2004-06-10 2004-07-14 Scient Generics Ltd Secure workflow engine
DE102006006489A1 (de) * 2006-02-10 2007-08-16 Bundesdruckerei Gmbh Verfahren zur Durchführung eines Schreibzugriffs, Computerprogrammprodukt, Computersystem und Chipkarte
JP4886371B2 (ja) * 2006-06-07 2012-02-29 株式会社日立情報制御ソリューションズ 生体認証方法及びシステム
WO2014015346A1 (fr) * 2012-07-20 2014-01-23 Life Technologies Corporation Systèmes et procédés permettant d'identifier un individu
DE102016107250A1 (de) 2015-04-22 2016-10-27 Deutsches Zentrum für Luft- und Raumfahrt e.V. Verfahren, Einrichtung und Computerprogramm zur Multi-Faktor-Authentifizierung und/oder -Identifizierung von Benutzern

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2132857A (en) * 1982-12-10 1984-07-11 Nec Corp Voice encryption and decryption system
DE4220971A1 (de) 1991-06-26 1993-01-07 Chuo Hatsujo Kk Fingerabdruck-abtastvorrichtung zur identitaetspruefung
US5268963A (en) * 1992-06-09 1993-12-07 Audio Digital Imaging Inc. System for encoding personalized identification for storage on memory storage devices
US5280527A (en) * 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
DE4243908A1 (de) * 1992-12-23 1994-06-30 Gao Ges Automation Org Verfahren zur Erzeugung einer digitalen Signatur mit Hilfe eines biometrischen Merkmals
DE4322445C1 (de) 1993-07-06 1995-02-09 Alfons Behnke Verfahren zum Kodieren von Identifikationskarten und zum Identifizieren derart kodierter Identifikationskarten und Mittel zur Durchführung des Verfahrens, wie Identifikationskarte, Fingerabdrucksensor, Fingerabdruck- Abnahme und Vergleichseinrichtung
WO1996005576A1 (fr) * 1994-08-10 1996-02-22 Prima Officina Carte Valori Turati Lombardi & C.S.P.A. Document de credit associe a une carte ou a un document personnalise, carte de credit independante personnalisee et equipement d'emission et de validation adapte
WO1996008093A1 (fr) * 1994-09-07 1996-03-14 Mytec Technologies Inc. Generation de cles a commande biometrique
WO1997005578A1 (fr) * 1995-07-28 1997-02-13 Mytec Technologies Inc. Procede et dispositif de manipulation sure d'un numero d'identification personnelle ou d'une cle cryptographique dans l'utilisation de techniques biometriques

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3784743A (en) * 1972-08-23 1974-01-08 Bell Telephone Labor Inc Parallel data scrambler
US5598474A (en) * 1994-03-29 1997-01-28 Neldon P Johnson Process for encrypting a fingerprint onto an I.D. card
US5615277A (en) * 1994-11-28 1997-03-25 Hoffman; Ned Tokenless security system for authorizing access to a secured computer system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2132857A (en) * 1982-12-10 1984-07-11 Nec Corp Voice encryption and decryption system
DE4220971A1 (de) 1991-06-26 1993-01-07 Chuo Hatsujo Kk Fingerabdruck-abtastvorrichtung zur identitaetspruefung
US5280527A (en) * 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
US5268963A (en) * 1992-06-09 1993-12-07 Audio Digital Imaging Inc. System for encoding personalized identification for storage on memory storage devices
DE4243908A1 (de) * 1992-12-23 1994-06-30 Gao Ges Automation Org Verfahren zur Erzeugung einer digitalen Signatur mit Hilfe eines biometrischen Merkmals
DE4322445C1 (de) 1993-07-06 1995-02-09 Alfons Behnke Verfahren zum Kodieren von Identifikationskarten und zum Identifizieren derart kodierter Identifikationskarten und Mittel zur Durchführung des Verfahrens, wie Identifikationskarte, Fingerabdrucksensor, Fingerabdruck- Abnahme und Vergleichseinrichtung
WO1996005576A1 (fr) * 1994-08-10 1996-02-22 Prima Officina Carte Valori Turati Lombardi & C.S.P.A. Document de credit associe a une carte ou a un document personnalise, carte de credit independante personnalisee et equipement d'emission et de validation adapte
WO1996008093A1 (fr) * 1994-09-07 1996-03-14 Mytec Technologies Inc. Generation de cles a commande biometrique
WO1997005578A1 (fr) * 1995-07-28 1997-02-13 Mytec Technologies Inc. Procede et dispositif de manipulation sure d'un numero d'identification personnelle ou d'une cle cryptographique dans l'utilisation de techniques biometriques

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9094211B2 (en) 2011-08-26 2015-07-28 Life Technologies Corporation Systems and methods for identifying an individual
US9520999B2 (en) 2011-08-26 2016-12-13 Life Technologies Corporation Systems and methods for identifying an individual
US10733277B2 (en) 2011-08-26 2020-08-04 Life Technologies Corporation Systems and methods for identifying an individual
US11636190B2 (en) 2011-08-26 2023-04-25 Life Technologies Corporation Systems and methods for identifying an individual

Also Published As

Publication number Publication date
DE19715644A1 (de) 1998-10-22

Similar Documents

Publication Publication Date Title
WO1998047110A1 (fr) Procede de verification d'identite
DE69228315T2 (de) Zugangskontrollsysteme
DE69835764T2 (de) Biometrisches system und darauf anwendbare technik
EP2548153A1 (fr) Système d'authentification, procédé d'authentification d'un objet, dispositif pour produire un dispositif d'identification, procédé de production d'un dispositif d'identification
WO2001086584A1 (fr) Procede et systeme de production d'un ensemble de donnees de cle
EP1188151B1 (fr) Dispositifs et procede pour l'authentification biometrique
EP1199623A2 (fr) Procédé et système pour l'identification d'un utilisateur
WO2011072717A1 (fr) Système d'autorisation, dispositif de comparaison et procédé d'autorisation d'un sujet
WO2005069534A1 (fr) Authentification biometrique
AT401205B (de) System zur identifizierung eines kartenbenutzers
DE10203926A1 (de) Datenträger mit mindestens einem Speicherelement
DE19645937A1 (de) Verfahren und System zum personenabhängigen Steuern einer Telekommunikations-Endeinrichtung
DE102006034241A1 (de) Verfahren zur Ermittlung einer Berechtigung
AT507372A1 (de) Identifikationsmerkmal
DE4439593C2 (de) Vorrichtung und Verfahren zur Zugangs- und Zugriffskontrolle
DE60130821T2 (de) Verfahren und Vorrichtung zur gesicherten Zugangsberechtigungsprüfung mittels eines erfassten biometrischen Merkmals
WO1999041708A1 (fr) Moyen d'autorisation d'acces ou d'identification et procede permettant de le realiser
DE102009014919A1 (de) Verfahren und Vorrichtung zum Authentifizieren eines Benutzers
DE102018010027A1 (de) Abwicklungssystem
DE69313777T2 (de) Verfahren und Vorrichtung zum Schreiben von einer Information auf einen Datenträger, mit Möglichkeit zur Bestätigung der Originalität dieser Information
DE102005045119A1 (de) Kodierverfahren und Kodiervorrichtung zur Erzeugung eines individuumsbezogenen Kodes
DE10206843A1 (de) Datenträger, Station und Verfahren für die biometrische Benutzer-Authentisierung
DE10317296A1 (de) Verfahren zur Verwendung von Fingerabdrücken als Kombination von Sein und Wissen zur biometrischen Benutzerauthentifizierung
DE19936094C1 (de) Verfahren und Vorrichtung zur biometrischen Authentisierung
EP3602958A1 (fr) Liaison d'objets assistée par la biométrie

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998543502

Format of ref document f/p: F