WO2004111806A1 - Methode, agencement, terminal, dispositif de traitement de donnees et programme informatique pour une identification d'utilisateur - Google Patents

Methode, agencement, terminal, dispositif de traitement de donnees et programme informatique pour une identification d'utilisateur Download PDF

Info

Publication number
WO2004111806A1
WO2004111806A1 PCT/FI2004/000358 FI2004000358W WO2004111806A1 WO 2004111806 A1 WO2004111806 A1 WO 2004111806A1 FI 2004000358 W FI2004000358 W FI 2004000358W WO 2004111806 A1 WO2004111806 A1 WO 2004111806A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
identification
input
media file
terminal
Prior art date
Application number
PCT/FI2004/000358
Other languages
English (en)
Inventor
Pauli Kuosmanen
Vesa Huotari
Alpi Santakallio
Original Assignee
Elisa Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Elisa Oyj filed Critical Elisa Oyj
Publication of WO2004111806A1 publication Critical patent/WO2004111806A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Definitions

  • the invention relates to user identification in data processing systems and/or devices, such as user-specific terminals, network servers or services, or passage control devices.
  • a password may, for example, be a PIN (Personal Identification Number) code known from mobile stations or some longer character string defined by the user or system administrator, or a one-time password generated with a time-synchronous device.
  • biometric methods such as fingerprint identification, speech identification or eye retina identification may be utilised in user identification.
  • User identification may be implemented locally in one device, or it may be implemented via a suitable data transmission connection so that user identification is not performed in the user's own terminal (for example, user connecting into a data transmission network or an Internet service with a suitable terminal).
  • An objective of the present invention is to create a new manner of identifying a user.
  • a basic idea of the invention is to present the user with some media file, such as a music or video file, as a response to which the user gives an identification input, and the user is identified on the basis of said media file and identification input given by the user.
  • the user may, for example, rhythmise his/her input based on the heard music or place his/her input on a touch screen wherever he/she wants in relation to the animation or video clip presented on said touch screen.
  • the utilised media file may be whichever applicable file, which advantageously consists of material observable by hearing, sight and/or sense of touch.
  • whichever applicable file which advantageously consists of material observable by hearing, sight and/or sense of touch.
  • different people react differently to such observations, and thus different people are likely to give different inputs based on the media file. It is, however, straightforward for a single person to repeat his/her input based on personal observations and feelings.
  • the media file on which the input is based may be different for different users.
  • the user may utilise on different identification occasions different, randomly created media files. Then, the user is identified based on the logical connection with the contents of media file in question and the response given by the user to be identified. The user may, for example, react in a predetermined way to a certain sound, colour, shape, or event in the media file, the relative position of which vary between identification occasions.
  • a method for identifying a user, the method comprising presenting a user with a media file, receiving an identification input comprising at least one input element, which identification input a user gives as a response to the contents of said media file, receiving said identification input substantially simultaneously with presenting said media file, and identifying a user on the basis of the combination of said identification input and said media file by examining temporal and/or spatial location of the input elements of said identification input in relation to the content of said media file.
  • an arrangement which arrangement comprises presentation equipment for presenting a media file, reception equipment for receiving user input, and identification equipment for identifying the user of said arrangement, and in which arrangement said presentation equipment is arranged to present the media file in connection with the user identification of said arrangement, said reception equipment is arranged to receive the identification input given by the user to be identified, which input comprises at least one input element, substantially simultaneously with the presentation of the media file, and said identification equipment is arranged to identify the user on the basis of the combination of said identification input and media file by examining temporal and/or spatial location of the input elements of said identification input in relation to the content of said media file.
  • a terminal comprises presentation equipment for presenting a media file, and reception equipment for receiving a user input, and in which terminal said presentation equipment is arranged for presenting a media file in the connec- tion with identifying the user of said terminal, and said reception equipment is arranged for receiving an identification input given by the user to be identified, which input comprises at least one input element, substantially simultaneously with the presentation of the media file to be utilised in the identification of the user of the terminal, wherein said terminal further comprises identification equipment for identifying a user of the terminal on the basis of the combination of said identification input and said media file by examining temporal and/or spatial location of the input elements of said identification input in relation to the content of said media file.
  • a terminal according to the invention may, for example, be a computer, a portable computer, a mobile station, a smart phone, a personal digital assistant (PDA) or other electronic device.
  • PDA personal digital assistant
  • a data processing device comprises identification equipment for identifying users of said data processing device, said identification equipment being arranged for identifying a user on the basis of a combination of a media file presented to said user and an identification input given by said user, the identification input comprising at least one input element, by examining temporal and/or spatial location of the input elements of said identification input in relation to the content of said media file.
  • a data processing device may, for example, be any general-purpose computer or server, a gateway to a data network, a passage control device or a pay terminal.
  • a computer program is implemented to be run in the terminal, said computer program producing a routine for user identification and comprising a program code for presenting a media file, a program code for receiving an identification input given by the user to be identified, which identification input comprises at least one input element, substantially simultaneously with the presentation of the media file to be utilised in identifying the user of the terminal, and a program code for identifying the user of the terminal on the basis of the combination of said identification input and said media file by examining temporal and/or spatial location of the input elements of said identification input in relation to the content of said media file.
  • a computer program is implemented to be run in a data processing device, said computer program producing a routine for user identification, said computer program comprising a program code which is arranged to identify a user based on a combination of a media file presented to said user and an identification input given by said user, the identification input comprising at least one input element, by examining temporal and/or spatial location of the input elements of said identification input in relation to the content of said media file.
  • Fig.1 illustrates visually a basic idea of the invention
  • Fig.2A describes an arrangement according to an embodiment of the invention
  • Fig.2B is a flow chart, which shows a method applicable for, for example, an arrangement according to Figure 2A;
  • Fig.3A illustrates a media file according to an embodiment of the invention which media file comprises random material
  • Fig.3B is a flow chart, which shows a method applicable for, for example, a media file according to Figure 3A;
  • Fig.4 is a signalling diagram describing a method according to an embodiment of the invention.
  • Fig.5 is a simplified block diagram of a terminal according to an embodiment of the invention.
  • Fig.6 is a simplified block diagram of a data processing device according to an embodiment of the invention.
  • Fig.7A is a simplified block diagram of an arrangement according to an embodiment of the invention.
  • Fig.7B is a simplified block diagram of an arrangement according to another embodiment of the invention.
  • Figure 1 illustrates visually a basic idea of the invention, according to which the user to be identified is presented with a media file 100, and the user gives as a response to the media file an identification input 101 which comprises at least one input element. Then, user identification 103 is performed on the basis of said media file and identification input linked to it.
  • An applicable media file may, for example, be a music file 104 or a video file 105 or some other file, which includes material observable by hearing, sight and/or sense of touch.
  • An identification input may, for example, be given via the keypad of a mobile station 106 or a computer 107 or via the touch screen of a personal digital assistant 108.
  • the identification input may also be a sound created by the user, such as a whistle or phonemes, which is received with microphone 109.
  • the input element of the identification input may thus be, for example, a push of a button or touch screen or a phoneme.
  • the identification input may also be given via an EMFi (Electromechanical Film).
  • EMFi Electromechanical Film
  • the identification input can be given as unnoticeably as possible, because no such sound as, for example, in using micro switches is produced of using the film.
  • the EMFi may be utilised in presenting a music or other sound file, that is, both presenting the media file and receiving the identification input may be performed via the same film.
  • the presentation of a media file may comprise, for example, the "impulses" of Force Feedback mouse when the user would react to these impulses by, for example, pushing a button or moving the mouse into some direction when giving the identification input.
  • user identification input may also be 3D response instead of mere pushes.
  • a media file may be utilised in user identification either explicitly or implicitly.
  • a media file When utilising a media file explicitly, one checks that the user actually chose the correct media file in addition to checking the actual identification input.
  • the implicit utilisation of a media file means that the media file is presented to the user, and the identification input is received substantially simultaneously with presenting the media file, and one does not separately check which media file was used for giving the identification input but assumes that the user cannot give the correct identification input if the utilised media file was not the correct one.
  • this is a weaker identification than the identification which includes checking the correctness of the media file, but this weaker identification may be, depending on the area of application, adequate.
  • the invention may be applied in user identification locally in one device or in a distributed manner when the user is connected or is connecting in some data network, network server or network service, when the actual identification may be performed centralised in a suitable network element.
  • the terminal in which the invention can be applied may be any data processing device the use of which requires that a user identifies himself/herself or which may be utilised in identifying a user in a device with which the terminal is in data transmission connection.
  • a terminal may, for example, be a computer, a portable computer, a mobile station, a smart phone, a personal digital assistant (PDA) or other electronic device.
  • PDA personal digital assistant
  • This terminal may communicate with a data transmission network and, thus, with a network server via a fixed or wireless connection.
  • the data transmission network may, for example, be an Internet or other IP (Internet Protocol) based network, a GSM (Global System for Mobile Communications) network, a third generation mobile communications network, such as UMTS (Universal Mobile Telecommunications System) network, a WLAN (Wireless Local Area Network) network, a WiFi (Wireless Fidelity) network, a broadcasting service network or a cable television network.
  • IP Internet Protocol
  • GSM Global System for Mobile Communications
  • UMTS Universal Mobile Telecommunications System
  • WLAN Wireless Local Area Network
  • WiFi Wireless Fidelity
  • broadcasting service network or a cable television network.
  • An applicable data transmission network may be in general or closed operation.
  • the terminal may also communicate with an external device via a local short-range link, such as a Bluetooth or infrared link.
  • Such an external device may, for example, be a gateway to a data transmission network, a passage control device or a pay terminal.
  • Figure 2A describes an arrangement according to an embodiment of the invention, which comprises a terminal 200 (for instance, a mobile station) and a server 201 between which there is a wireless data transmission connection, such as a Bluetooth connection.
  • Terminal 200 utilises an operating system into which programs created by a third party can be downloaded.
  • programs created by a third party are, inter alia, Symbian and Series 60 developed by Nokia.
  • the user identification is performed in the terminal 200, and the user may download the computer program executing the identification to his/her terminal from, for example, the Internet.
  • User identification is performed when a user attempts to connect into a service in server 201. If the user identification in terminal 200 is passed successfully, the user is allowed to connect to the service.
  • Figure 2B is a flow diagram which shows a method applicable for, for example, an arrangement according to Figure 2A.
  • an applicable terminal is advantageously such one as is only in the personal use of one person.
  • the user information linked to the service in server 201 of Figure 2A is initialised into the terminal.
  • the same information may, if necessary, be applied in substantially more than one service.
  • the user is requested a user ID and a password, which are so-called ordinary user identifications which are generally utilised in user identification in different data systems and services.
  • the user is requested to choose one of available media files to be utilised in identification.
  • the available media files may, for example, be ringing tones downloaded into the terminal. Also animations or video clips downloaded in advance to the terminal may be offered to be utilised as a media file.
  • this media file is presented to the user, and the user is required to give a personal input as a response to the contents of the media file.
  • This personal input is recorded as a reference input and is saved with the user information.
  • this phase may include a checking phase in which one checks if the input given by the user fulfils certain criteria defined in advance in relation to, for example, its length.
  • phase 203 the user of terminal 200 opens a connection from the terminal to the server 201.
  • the server sends the terminal an authentication request in phase 204.
  • the terminal starts a user identification process for receiving identification input in phase 205.
  • the user is required to choose a media file to be utilised in identification. In other words, the user must know which media file should be utilised in identification. Optionally, one may check in this phase that the user chose the correct media file.
  • the media file chosen by the user is presented, and the identification input, which was given by the user as a response to the contents of the media file, is received.
  • phase 206 the identification input given by the user and the reference input recorded in the initialising phase are compared.
  • the comparison of the identification input and the reference input is described in more detail below. If the identification input and the reference input do not substantially correspond each other, the user identification was unsuccessful, in which case the connection between the terminal and the server is terminated in phase 207. If the identification input and the reference input substantially correspond to each other, the user is successfully identified. Then the user ID and password saved in the initialising phase are sent to the server in phase 208. After this, the user is identified on the server on the basis of the sent user ID and password, and the data transmission between the terminal and the server is continued in a manner already known.
  • the implementation of the embodiment in question does not require special changes to the server, because the identification based on the media file is performed totally in the terminal. Together with the user ID and password, one may also send a piece of information on the successful media file identification, when the server must be able to process such information. If wanted, the used password may be a PIN code of a PKI (Public Key Infrastructure) card. Naturally, the connection between the terminal and the server may include encryption of the connection for information security.
  • PKI Public Key Infrastructure
  • the user may be required, for example, a user ID with which he/she wishes to identify before choosing and presentation of the media file.
  • the reference input used in identification will then be acquired from the user record corresponding to the user ID given by the user.
  • the same user may need many different user ID-password pairs for different services, when each user ID-password pair may be given its own record.
  • the media file and the reference input in different records may be identical.
  • Figure 3A illustrates a media file according to an embodiment of the invention, which comprises random material.
  • the media file is an animation in which balls of different colours move inside a box: black, white and striped. The paths of the balls are random. Three instances 300-302 are presented of the state of the animation in different points of time.
  • this kind of file is utilised in user identification, the user, for example, pushes some button in his/her mobile station when a predetermined sequence occurs in the animation.
  • Such an event could be, for example, that the black ball hits the wall of the box in instance 300, that the white ball hits the bottom of the box in instance 301, that the white ball hits the side wall of the box in instance 302, that the striped ball hits the bottom of the box in instance 302, or that the black balls hit each other in instance 302. Since the events of the animation are generated randomly, different events occur in different points of time, and the user input is substantially different in different identification occasions.
  • Figure 3B is a flow diagram which shows a method applicable with, for example, the media file according to Figure 3A. Also any other media file, which includes random material, may be utilised in this context.
  • user identification information is initialised to the terminal (or other suitable device in which the user is wished to be identified).
  • the user is requested a user ID and the type of media file to be used in identification.
  • the type may, for example, be animation or music.
  • the type of the media file to be used may be predetermined.
  • the user is requested a piece of logic information which identifies the logical relation between the random material of the media file and user identification input. This logic information is recorded with the user information.
  • the user may be requested to define this piece of logic information freely or the user may be offered some fixedly determined alternatives from which the user may choose which one he/she wants. In any case, the user may alternatively be presented with an example of a media file.
  • phase 304 the user identification given by the user is requested and received in phase 304, for example, as a response to an external authentication request or some user action.
  • phase 305 a random media file being the type defined for the user identification is formed. If the method is applied in a device, which is substantially in the personal use of one person, no user identification is necessarily required. Then user identification may be started directly from phase 305, that is, phase 305 may directly be a response, for example, for external authentication request or some user action. Then also saving user identification in phase 303 is unnecessary. For example, when utilising the current identification method, the user identification equivalent to the PIN code of mobile station is not required, but anyone who is able to give a correct kind of input as a response to the presented media file may use the mobile station.
  • phase 306 said random media file is presented to the user, and substantially simultaneously an identification input, which the user gives as a response to the contents of said media file, is received.
  • a reference input is formed on the basis of the logic information corresponding to the user ID and the random media file formed in phase 305. In other words, in phase 307 an input, which the "right" user should give in relation to the media file formed this time, is defined.
  • Phases 306 and 307 may naturally be performed simultaneously or in reverse order.
  • phase 308 the identification input given by the user and the reference input formed in phase 307 are compared.
  • the comparison of the identification input and the reference input is described in more detail below. If the identification input and reference input do not substantially correspond to each other, it is established that user identification was unsuccessful in phase 309. If the identification input and reference input substantially correspond to each other, the user is established to be successfully identified in phase 310. As the result of unsuccessful or successful identification, one may perform, depending in the context, required measures, such as switching off/on connections or allowing/refusing access to information or system (not shown in the figure).
  • the media file utilised in identification may be a file separately created by the user for each identification occasion.
  • the media file may, for example, be a picture from the environment of the user in the moment of identification, whereby the media file is substantially related to the location of the user and only a user located in an allowed location passes the identification successfully, or the media file may be a picture of a person or an object on him/her at the moment of identification.
  • the identification input in such a case is some kind of response to this file created by the user.
  • the picture presented is actually taken at the moment of identification, and that the pictures taken from the environment, person or object at different points of time correspond to each other with adequate precision.
  • the comparison of the identification input and reference input is performed according to an embodiment of the invention by means of rank correlation.
  • the identification input and reference input are sampled by saving a time stamp for each input element in relation to the contents of the media file.
  • the start of the media file is advantageously set as zero moment, that is, the timer on the basis of which the time stamps are defined is started at the start of the media file.
  • For each input element one may save either a time stamp denoting the starting moment of the input element, or time stamps denoting both starting and ending moment. If the input may be given with many different buttons, also the used button is saved for each input element. Depending on the practical implementation method, it might be necessary to save also the relational location of input element on the touch screen or some other information on the given input element. At its simplest, however, a time stamp denoting the start moment of the input element is adequate. In any case, the sampling of the identification input and reference input is performed in the same manner.
  • the actual comparison of the identification input and reference input is performed by calculating rank correlation between sampled inputs.
  • the calculation of rank correlation is started at the first input element of the identification input, and calculation is continued till the last input element. If desired and if the practical implementation method so allows, the calculation of rank correlation may be started simultaneously with the presentation of the media file and the reception of the user input. If the result of rank correlation equals 1 (one), the inputs are totally identical. Then user identification is established passed. On the other hand, if the result of rank correlation equals 0 (zero), the inputs are totally different and user identification is failed.
  • the rank correlation usually equals something between zero and one, as slight variation might occur in the identification input given by the user because of human factors.
  • a suitable thrshold value may be defined for the rank correlation, the values exceeding which are interpreted as a passed identification result, when an identification input almost equivalent to the reference input leads to a positive identification result.
  • FIG. 4 is a signalling diagram describing a method according to an embodiment of the invention in which terminal 400 communicates with server 402 via gateway (GW) 401.
  • the terminal and gateway communicate with each other via a short- range radio link, such as a Bluetooth connection.
  • the gateway and server in their part, are connected to the Internet, and the traffic between them travels in the Internet as IP traffic.
  • Terminal 400 forms a connection with gateway 401 and sends a connection request 4-1 for opening the connection to server 402.
  • the gateway responds to the terminal with an authentication request 4-2.
  • a media file is presented to the user of the terminal and an identification input is received which identification input the user of the terminal gives as a response to the contents of the media file in phase 4-3.
  • the terminal sends the identification input 4-4 further to the gateway, which validates the identification input 4-5, that is, it checks if the identification input is correct.
  • the gateway checks if the given identification input authorises the connection to the server with which the terminal tries to communicate. If the identification input is not established valid, the gateway terminates the connection to the terminal 4-7 (shown with dashed line in the figure). If the identification input is valid, the gateway opens a connection 4-6 to the server.
  • the communication between the terminal and server continues in a manner already known, so it is not discussed here in more detail.
  • passage control People allowed in a controlled area may be identified with an application installed to, for example, a mobile station.
  • the passage control equipment is advantageously arranged to actively seek and observe mobile stations brought near it and to form a Bluetooth connection to the observed mobile station. Via the Bluetooth connection, the passage control equipment requests the user of the mobile station to authenticate himself/herself by means of an identification input given as a response to the contents of a media file.
  • the media file is presented to the user of the mobile station and the identification input of the user is communicated to the passage control equipment via the mobile station.
  • the received identification input is validated in the passage control equipment by comparing it to the pre- saved valid reference inputs. If the identification input proves to be valid, passage to controlled area is allowed.
  • Other parts of the passage control may be performed in a manner already known, so passage control is not discussed here in more detail.
  • the invention is advantageously implemented as a suitable combination of soft- ware components and physical hardware.
  • FIG. 5 is a simplified block diagram of a terminal 50 according to an embodiment of the invention, which terminal may be any device in which access control is required or which may be utilised in user identification.
  • a device may, for example, be a mobile station, a smart phone, a computer, a personal digital assistant, a mobile computer or an electronic device especially designed for user identification.
  • Terminal 50 comprises a processing unit 51, which, for its part, comprises a memory 53.
  • the processing unit communicates with a radio part (RF) 52 via which the terminal 50 receives and sends information over a wireless data transmission connection.
  • RF radio part
  • the processing unit also communicates with a user interface (UI) 55 via which, inter alia, commands of the user of the terminal are received, a media file utilised for user identification is presented, and the identification input given by the user is received.
  • UI user interface
  • the user interface may be arranged to give information, for example, in visual format on a screen, sound over a loudspeaker or in a format sensed with touch, and to receive information, for example, via a keyboard, a touch screen, a mouse or a microphone.
  • a computer program 54 to be run in the processing unit is saved in memory 53.
  • the computer program 54 comprises a program code for presenting a media file for the user of the terminal via user interface 55 and for receiving an identification input given by the user of the terminal, comprising at least one input element, substantially simultaneously with the presentation of the media file to be utilised in identifying the user of the terminal.
  • the computer program 54 also comprises a program code for identifying the user of the terminal on the basis of the combination of said identification input and said media file.
  • the computer program 54 may be arranged to receive an authentication request from an external data processing device and to send said identification input to said external data processing device as a response to said authentication request via radio part 52.
  • the invention is applicable to be utilised in a terminal which functions as an independent unit and does not communicate with external devices or which receives and sends data via a fixed data transmission connection.
  • FIG. 6 is simplified block diagram of a data processing device 60 according to an embodiment of the invention, which data processing device may, for example, be any general-purpose computer or server.
  • the data processing device comprises a processing unit 61, which, for its part, comprises a memory 63.
  • the processing unit communicates with I/O interface 62 via which the data processing device communicates with other devices through a fixed or wireless data transmission connection.
  • a computer program 64 producing a user identification routine to be run in the processing unit is saved in memory 63.
  • the computer program 64 comprises a program code which is arranged to identify a user on the basis of a media file and identification input comprising at least one input element, when said identification input is an input which the user to be identified has given as a response to the contents of said media file.
  • the data processing device 60 receives an identification input via I/O interface 62 from the terminal which the user to be identified utilises.
  • the data processing device 60 may be arranged to receive from an external terminal an I/O interface connection set-up request as a response to which the data processing device sends the terminal an authentication request comprising a request to supply an identification input to the data processing device.
  • FIG. 7A is a simplified block diagram of an arrangement according to an embodiment of the invention in which user identification is performed in a distributed manner in terminal 700 and data processing device 701 which communicate with each other via suitable I/O interfaces (not shown in the figure).
  • the terminal 700 comprises presentation equipment 702 for presenting a media file to the user of the terminal and reception equipment 703 for receiving an identification input given by the user.
  • the presentation equipment and reception equipment communicate with the external world via a user interface.
  • the data processing device comprises identification equipment 704, which is arranged to establish the user identification passed or failed on the basis of the presented media file and the identification input given as a response to it.
  • the reception equipment 703 is arranged to send the identification input directly or indirectly to the identification equipment 704 of the data processing device, and the identification equipment 704 may alternatively be arranged to control the presentation of a media file with presentation equipment 702.
  • Figure 7B is a simplified block diagram of an arrangement according to another embodiment of the invention in which arrangement user identification is performed locally in terminal 705.
  • the terminal 705 comprises presentation equipment 706 for presenting a media file to the user of the terminal and reception equipment 707 for receiving an identification input given by the user, and identification equipment 708 which is arranged to establish the user identification passed or failed on the basis of the presented media file and the identification input given as a response to it.
  • the reception equipment 706 is arranged to supply the identification input directly or indirectly to the identification equipment 708, and the identification equipment 708 may alternatively be arranged to control the presentation of a media file with presentation equipment 706.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne une identification d'utilisateur. Un fichier média (100) est présenté à un utilisateur, l'utilisateur donne, en tant que réponse au fichier média, une entrée d'identification (101), comprenant au moins un élément d'entrée, et l'utilisateur est identifié en fonction de la combinaison (103) de cette entrée d'identification et du fichier média, par l'examen de l'emplacement temporel et/ou spatial des éléments d'entrée de l'entrée d'identification par rapport au contenu du fichier média.
PCT/FI2004/000358 2003-06-19 2004-06-10 Methode, agencement, terminal, dispositif de traitement de donnees et programme informatique pour une identification d'utilisateur WO2004111806A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI20030922 2003-06-19
FI20030922A FI20030922A (fi) 2003-06-19 2003-06-19 Käyttäjän tunnistus

Publications (1)

Publication Number Publication Date
WO2004111806A1 true WO2004111806A1 (fr) 2004-12-23

Family

ID=8566278

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2004/000358 WO2004111806A1 (fr) 2003-06-19 2004-06-10 Methode, agencement, terminal, dispositif de traitement de donnees et programme informatique pour une identification d'utilisateur

Country Status (2)

Country Link
FI (1) FI20030922A (fr)
WO (1) WO2004111806A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007174062A (ja) * 2005-12-20 2007-07-05 Canon Inc データ通信装置、データ通信システム、データ通信方法、及びそのプログラム
JP2009010658A (ja) * 2007-06-27 2009-01-15 Ricoh Co Ltd 情報処理装置
EP2071485A1 (fr) * 2007-12-13 2009-06-17 x-Desktop Ltd. Procédé et dispositif destinés à la protection d'un contenu stocké électroniquement contre un accès automatisé
CN102300020A (zh) * 2010-04-15 2011-12-28 佳能株式会社 图像处理装置及图像处理装置的用户认证方法

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2765979A1 (fr) * 1997-07-08 1999-01-15 Jacques Rivailler Terminal informatique individuel susceptible de communiquer avec un equipement informatique d'une facon securisee, ainsi qu'un procede d'authentification mis en oeuvre par ledit terminal
WO1999009512A1 (fr) * 1997-08-20 1999-02-25 Ogilvie John W L Identification d'utilisateurs de systemes informatiques par des caracteristiques inherentes
WO2000041103A1 (fr) * 1998-12-31 2000-07-13 Perfecto Technologies Ltd. Procede et systeme de discrimination entre une action humaine et une action informatisee
US6163616A (en) * 1995-12-29 2000-12-19 Feldman; Stephen E. System and method for verifying the identity of a person
US20010044906A1 (en) * 1998-04-21 2001-11-22 Dimitri Kanevsky Random visual patterns used to obtain secured access
US20020184538A1 (en) * 2001-05-30 2002-12-05 Fujitsu Limited Combined authentication system
US6509847B1 (en) * 1999-09-01 2003-01-21 Gateway, Inc. Pressure password input device and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6163616A (en) * 1995-12-29 2000-12-19 Feldman; Stephen E. System and method for verifying the identity of a person
FR2765979A1 (fr) * 1997-07-08 1999-01-15 Jacques Rivailler Terminal informatique individuel susceptible de communiquer avec un equipement informatique d'une facon securisee, ainsi qu'un procede d'authentification mis en oeuvre par ledit terminal
WO1999009512A1 (fr) * 1997-08-20 1999-02-25 Ogilvie John W L Identification d'utilisateurs de systemes informatiques par des caracteristiques inherentes
US20010044906A1 (en) * 1998-04-21 2001-11-22 Dimitri Kanevsky Random visual patterns used to obtain secured access
WO2000041103A1 (fr) * 1998-12-31 2000-07-13 Perfecto Technologies Ltd. Procede et systeme de discrimination entre une action humaine et une action informatisee
US6509847B1 (en) * 1999-09-01 2003-01-21 Gateway, Inc. Pressure password input device and method
US20020184538A1 (en) * 2001-05-30 2002-12-05 Fujitsu Limited Combined authentication system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007174062A (ja) * 2005-12-20 2007-07-05 Canon Inc データ通信装置、データ通信システム、データ通信方法、及びそのプログラム
EP1814053A1 (fr) * 2005-12-20 2007-08-01 Canon Kabushiki Kaisha Système, dispositif et procédé de communication de données
US8108938B2 (en) 2005-12-20 2012-01-31 Canon Kabushiki Kaisha Data communication system, device, and method
EP3462350A1 (fr) * 2005-12-20 2019-04-03 Canon Kabushiki Kaisha Système, dispositif et procédé de communication de données
US10996880B2 (en) 2005-12-20 2021-05-04 Canon Kabushiki Kaisha Data communication system device and method
JP2009010658A (ja) * 2007-06-27 2009-01-15 Ricoh Co Ltd 情報処理装置
EP2071485A1 (fr) * 2007-12-13 2009-06-17 x-Desktop Ltd. Procédé et dispositif destinés à la protection d'un contenu stocké électroniquement contre un accès automatisé
CN102300020A (zh) * 2010-04-15 2011-12-28 佳能株式会社 图像处理装置及图像处理装置的用户认证方法
CN102300020B (zh) * 2010-04-15 2014-07-16 佳能株式会社 图像处理装置及图像处理装置的用户认证方法

Also Published As

Publication number Publication date
FI20030922A (fi) 2004-12-20
FI20030922A0 (fi) 2003-06-19

Similar Documents

Publication Publication Date Title
CN103098441B (zh) 设备通信
CN1816136B (zh) 通过移动电话的用户认证
JP4301997B2 (ja) 携帯電話による情報家電向け認証方法
CN104618315B (zh) 一种验证信息推送和信息验证的方法、装置及系统
EP3179758A1 (fr) Procédé d'intercommunication de bâtiment, dispositif de déverrouillage nfc et système d'intercommunication de bâtiment
CN110235424A (zh) 用于在通信系统中提供和管理安全信息的设备和方法
CN105656948A (zh) 账号登录方法及装置
US20020007462A1 (en) User authentication system
JP3258632B2 (ja) 指紋認証装置
CN103021045A (zh) 移动终端用户验证智能门禁系统
WO2005002130A1 (fr) Authentification hybride
CN109407528A (zh) 安全访问方法、装置、服务器及存储介质
US20020081179A1 (en) Smart card of a terminal, a terminal using a smart card, and an improved method for identifying a user by means of a smart card
CN106060027B (zh) 基于验证码进行验证的方法、装置、设备及系统
CN107145771B (zh) 应用程序解锁方法、装置及终端
EP1788754A2 (fr) Terminal de communication mobile pour accéder à internet sans fil et procedé d'accès à internet sans fil
WO2004111806A1 (fr) Methode, agencement, terminal, dispositif de traitement de donnees et programme informatique pour une identification d'utilisateur
CN106211156B (zh) WiFi网络连接方法、装置、终端设备和WiFi接入点
EP2282563B1 (fr) Procédé de libération d'une carte de communication mobile pour utiliser un service de réseau de communication mobile et équipement d'utilisateur pour l'interaction avec un réseau de communication mobile
CN108391323A (zh) 设备互联方法、装置及电子设备
FR2832825A1 (fr) Procede de securisation d'un acces a une ressource numerique
KR101981992B1 (ko) 가상 키패드를 이용한 사용자 인증 방법 및 장치
KR100950662B1 (ko) 네트웍을 이용한 스마트 카드의 인증방법
JP2004070733A (ja) 認証システム、認証方法、認証プログラム、及び、コンピュータ読取可能な記録媒体
CN108924136A (zh) 授权认证方法、装置及存储介质

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DPEN Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101)
122 Ep: pct application non-entry in european phase