WO2008081051A1 - Method and system of security by means of biometric identification of persons - Google Patents

Method and system of security by means of biometric identification of persons Download PDF

Info

Publication number
WO2008081051A1
WO2008081051A1 PCT/ES2006/000724 ES2006000724W WO2008081051A1 WO 2008081051 A1 WO2008081051 A1 WO 2008081051A1 ES 2006000724 W ES2006000724 W ES 2006000724W WO 2008081051 A1 WO2008081051 A1 WO 2008081051A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification
terminal
message
biometric
security
Prior art date
Application number
PCT/ES2006/000724
Other languages
Spanish (es)
French (fr)
Inventor
José María NEGRE CARRIÓ
Original Assignee
Doyen, S.L.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Doyen, S.L. filed Critical Doyen, S.L.
Priority to PCT/ES2006/000724 priority Critical patent/WO2008081051A1/en
Publication of WO2008081051A1 publication Critical patent/WO2008081051A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to a security method and system by means of biometric identification of persons, of flexible use and versatile character that is universally applicable for access, means of operation or performance of financial operations.
  • Biometric identification applications are known to increase the security of financial transactions and the use of devices due to the unauthorized attempt of unsuitable persons, discriminating against users if they are authorized.
  • the principle of identification of people is used by one or more physical and biological characteristics of the user, which are so personal that it is practically impossible for another person with such characteristics to supplant it.
  • Traditional systems using keys, encrypted cards, radio-controlled devices or remote controls and others, are likely to be violated, since they use control and authorization means that the user can lose or can steal with some ease, enabling a person Unauthorized can access with a key that is not your property.
  • the invention patent ES2200720 "Procedure for controlling access to enclosures and access support is known.” of the firm Primavera Sound, SL in which a system of access control to a concert is described, for example, by means of automated barriers or lathes.
  • an authorized personnel collects a biometric measurement of the user to be authorized and records it on a physical medium, such as a card with memory as an input.
  • the user when wanting to access the enclosure, must insert the card into an appropriate reader in the access and undergo a biometric test so that a remote processor compares both and decides if it is the original user, or another person who supplants it.
  • This system is simple, but it requires the use of a coded support or key to host the Ia identification, with which it is easy to lose it and possibly duplicate and modify it.
  • This system comprises, in a first embodiment, the fingerprint reader, the stored authorized fingerprint memory and the opening and closing mechanism of a door or the like in the same device.
  • the device must have sufficient memory to store all the data of authorized persons and it is difficult to update in a system with several of said devices operating simultaneously.
  • some of the elements are expected to be at a distance, but it does not establish security measures that prevent unwanted manipulation. In the case that several independent access systems are simply implemented, the management of them must be carried out completely separately and independently, according to their security characteristics.
  • the procedure and security system by means of biometric identification of persons of this invention is intended to establish a secure and universal platform in which it is easy to add both identification terminals and secure actuation devices, simply by updating a user database. This allows to establish a completely transparent system to the user, which is scalable and with real-time control.
  • the procedure comprises the phases of:
  • a message can be sent with an adequate notification of said comparison or check to the terminal to notify the user, or to notify an authority of the fraudulent identification attempt.
  • the database can be created, maintained and manipulated by controlling agents or delegates from remote computers for updating and to establish user privileges.
  • the database can be controlled immediately, controlling the privileges or access that a user has with a single stored biometric reading and a list of authorizations, as contracted.
  • This procedure is carried out using a system comprising in the biometric reading terminal an encryption device and a communication device with one or more server computers through a private virtual network over a global computer communication network, such as the Internet.
  • the terminal is capable of generating an encrypted message with the biometric reading, the identification of the terminal and the instruction to be performed.
  • This communication is transmitted to the corresponding server computer by means of the known communication networks that have been described.
  • the terminal may comprise an interface console, such as a keypad or another, for the introduction of instructions or commands to be performed.
  • the terminal may present an operation warning positively or negatively as a basic user interface, so that once it has been verified whether its identity is authorized or not, it is communicated if the desired instruction has been carried out or not.
  • the terminal and the security means are integrated in the same apparatus, such as the lock of a door or the access to an enclosure.
  • This allows a compact and easily installable design, which is safe against Assaults, since it does not include any information of the user that can open, does not store the information of the users who have used it.
  • the device comprises an autonomous and portable energy support that makes it easily installable anywhere, independent of the power supply. If, in addition, the terminal's communications device is of the wireless type, such as a UMTS or similar telephone device, total autonomy is achieved, ideal for charging devices by personal identification or others.
  • the security means can be of a very diverse nature, but in the case of physical means, such as opening locks and operating machines, it comprises at least one communication device connected to the global computer communication network for the reception of messages. Encrypted drive from the server computer.
  • Figure 2 shows a block diagram of the biometric reading terminal.
  • the system comprises biometric identification and reading terminals (1a, ... 1n) and security means (2a,, .. 2m) that can be operated from a computer server (3) remotely, these communications being made through encrypted messages circulating in a virtual private network over a global network (4) of computer communication, such as the Internet.
  • the terminal (1a) comprises a biometric reader (11), such as a fingerprint reader, an encryption device (12) that creates the message and a communications device (13) via UMTS, fed from an autonomous energy support ( 14) and portable.
  • a biometric reader such as a fingerprint reader
  • an encryption device (12) that creates the message
  • a communications device (13) via UMTS, fed from an autonomous energy support ( 14) and portable.
  • the terminal (1a) also comprises a console (15) of interface for the introduction of instructions, such as a payment order and an operation warning (16) carried out positively or negatively.
  • the server computer (3) comprises a database (31) of biometric readings of the authorized users together with a list of operating privileges for the different security means (2a, ... 2m) to which they are authorized, such as access doors or means of conducting bank transactions.
  • This server computer (3) is accessible from remote computers (5) by controlling agents or delegates granting privileges to users.
  • the security means (2a, ... 2m) are of different constitution and may comprise a communications device (not shown) for receiving the encrypted drive message from the server computer (3) through the existing private virtual network on the global network (4) of computer communication.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Method comprising the following steps: capture of a biometric reading; composition of a message with the identification of the terminal (1a,…1n), biometric reading and instruction; encrypting of the message; sending thereof via a virtual private network on the Internet; reception of the message by a server computer (3) and decrypting thereof; identification of the person; matching with a database (31) the identification of the terminal (1a,…1n), the identification of the person and the identification of the instruction; sending of an encrypted message to the means of security (2a,…2m) determined by the database (31), in the case of a positive match. The security system includes means of security (2a,…2m) operable from terminals (1a,…1n) with a biometric reader (11); an encryption device (12) and a device for communications (13) via Internet, with one or more server computers (3) by means of a virtual private network.

Description

DESCRIPCIÓN DESCRIPTION
PROCEDIMIENTO Y SISTEMA DE SEGURIDAD MEDIANTE IDENTIFICACIÓN BIOMÉTRICA DE PERSONAS.PROCEDURE AND SECURITY SYSTEM THROUGH BIOMETRIC IDENTIFICATION OF PEOPLE.
Objeto de Ia invenciónObject of the invention
La presente invención se refiere a un procedimiento y sistema de seguridad mediante identificación biométrica de personas, de utilización flexible y carácter polivalente que es de aplicación universal para accesos, medios de accionamiento o realización de operaciones financieras.The present invention relates to a security method and system by means of biometric identification of persons, of flexible use and versatile character that is universally applicable for access, means of operation or performance of financial operations.
Antecedentes de Ia invención.Background of the invention.
Son conocidas las aplicaciones de identificación biométrica para incrementar Ia seguridad de transacciones financieras y el uso de aparatos ante el intento no autorizado de personas no adecuadas, discriminando que usuarios si se encuentran autorizados. En esta identificación biométrica se utiliza el principio de identificación de las personas mediante una o más características físicas y biológicas del usuario, que son de carácter tan personal que es prácticamente imposible que exista otra persona con dichas características que pudiera suplantarla. Los sistemas tradicionales mediante llaves, tarjetas codificadas, aparatos radiocumunicados o mandos a distancias y otros, son susceptibles de ser violados, ya que utilizan unos medios de control y autorización que el usuario puede perder o Ie pueden robar con cierta facilidad, habilitando que una persona no autorizada pueda tener acceso con una llave que no es de su propiedad. Es conocida Ia patente de invención ES2200720 "Procedimiento para el control de acceso a recintos y soporte de acceso." de Ia firma Primavera Sound, S. L. en Ia que se describe un sistema de control de acceso a un concierto, por ejemplo, mediante barreras o tornos automatizados. Según el procedimiento, un personal autorizado recoge una medida biométrica del usuario a autorizar y Ia graba en un soporte físico, tal como una tarjeta con memoria a modo de entrada. A continuación el usuario, al querer acceder al recinto, debe introducir Ia tarjeta en un lector adecuado en el acceso y someterse a una prueba biométrica para que un procesador remoto compare ambas y decida si es el usuario original, u otra persona que Io suplanta. Este sistema es sencillo, pero obliga al uso de un soporte codificado o llave donde alojar Ia identificación, con Io cual es fácil perderla y posiblemente duplicar y modificarla. Segundo, es una aplicación restringida al acceso a un local o similar por una o varias puertas, imposibilitando que su uso sea de tipo universal para distintos tipos de accesos o acciones que requieran autentificación. También es conocida Ia patente ES2006936 por "Acceso digital electrónico" de D. Diego González Aligurangues en Ia que se describe un sistema de acceso mediante Ia huella digital como medio de control biométrico. Este sistema comprende en una primera realización el lector de huellas, Ia memoria de huellas autorizadas almacenadas y el mecanismo de apertura y cierre de una puerta o similar en un mismo aparto. Esta disposición es susceptible de ser manipulada y con su violación obtener datos biométricos de los usuarios registrados o introducir datos no autorizados para su utilización fraudulenta. Además el aparato tiene que tener memoria suficiente para almacenar todos los datos de las personas autorizadas y es difícil de actualizar en un sistema con varios de dichos aparatos funcionando simultáneamente. En una segunda realización se prevé que alguno de los elementos estén a distancia, pero no establece medidas de seguridad que eviten su manipulación indeseada. En el caso de que se ¡mplementen varios sistemas de acceso independientes, Ia gestión de ellos se debe realizar de forma totalmente separada e independiente, según sus características de seguridad.Biometric identification applications are known to increase the security of financial transactions and the use of devices due to the unauthorized attempt of unsuitable persons, discriminating against users if they are authorized. In this biometric identification, the principle of identification of people is used by one or more physical and biological characteristics of the user, which are so personal that it is practically impossible for another person with such characteristics to supplant it. Traditional systems using keys, encrypted cards, radio-controlled devices or remote controls and others, are likely to be violated, since they use control and authorization means that the user can lose or can steal with some ease, enabling a person Unauthorized can access with a key that is not your property. The invention patent ES2200720 "Procedure for controlling access to enclosures and access support is known." of the firm Primavera Sound, SL in which a system of access control to a concert is described, for example, by means of automated barriers or lathes. According to the procedure, an authorized personnel collects a biometric measurement of the user to be authorized and records it on a physical medium, such as a card with memory as an input. Next, the user, when wanting to access the enclosure, must insert the card into an appropriate reader in the access and undergo a biometric test so that a remote processor compares both and decides if it is the original user, or another person who supplants it. This system is simple, but it requires the use of a coded support or key to host the Ia identification, with which it is easy to lose it and possibly duplicate and modify it. Second, it is an application restricted to the access to a place or similar by one or several doors, making it impossible for its use to be universal for different types of access or actions that require authentication. It is also known the patent ES2006936 for "Electronic digital access" of Mr. Diego González Aligurangues in which an access system is described by means of the fingerprint as a means of biometric control. This system comprises, in a first embodiment, the fingerprint reader, the stored authorized fingerprint memory and the opening and closing mechanism of a door or the like in the same device. This provision is likely to be manipulated and with its violation obtain biometric data from registered users or enter unauthorized data for fraudulent use. In addition, the device must have sufficient memory to store all the data of authorized persons and it is difficult to update in a system with several of said devices operating simultaneously. In a second embodiment, some of the elements are expected to be at a distance, but it does not establish security measures that prevent unwanted manipulation. In the case that several independent access systems are simply implemented, the management of them must be carried out completely separately and independently, according to their security characteristics.
Descripción de Ia invenciónDescription of the invention
El procedimiento y sistema de seguridad mediante identificación biométrica de personas de esta invención está destinado a establecer una plataforma segura y universal en Ia cual es fácil agregar tanto terminales de identificación, como dispositivos de accionamiento seguro, simplemente actualizando una base de datos de usuarios. Esto permite establecer un sistema totalmente transparente al usuario, que es escalable y con control en tiempo real.The procedure and security system by means of biometric identification of persons of this invention is intended to establish a secure and universal platform in which it is easy to add both identification terminals and secure actuation devices, simply by updating a user database. This allows to establish a completely transparent system to the user, which is scalable and with real-time control.
En efecto, el procedimiento comprende las fases de:In effect, the procedure comprises the phases of:
- Captura de una lectura biométrica de una característica única de una persona para Ia realización de una instrucción o acción,- Capture of a biometric reading of a unique characteristic of a person to carry out an instruction or action,
- composición de un mensaje con Ia identificación del terminal donde se realiza Ia captura, los datos de Ia lectura y una identificación de Ia instrucción a realizar,- Composition of a message with the identification of the terminal where the capture is made, the data of the reading and an identification of the instruction to be carried out,
- encriptado del mensaje para evitar su violación,- encrypted message to prevent violation,
- envío del mensaje a través de una red virtual privada sobre una red global de comunicación, de ordenadores,- sending the message through a private virtual network over a network global communication, computers,
- recepción del mensaje por un ordenador servidor y su desencripíado,- reception of the message by a server computer and its decryption,
- identificación de Ia persona mediante los datos de Ia lectura biométrica,- identification of the person by means of biometric reading data,
- cotejado con una base de datos de Ia identificación del terminal, de Ia identificación de Ia persona y de Ia identificación de Ia instrucción a realizar,- collated with a database of the identification of the terminal, of the identification of the person and of the identification of the instruction to be carried out,
- envío de al menos un mensaje al medio o medios de seguridad determinado por Ia base de datos, en caso de cotejo positivo.- sending at least one message to the security means or means determined by the database, in case of positive comparison.
Se ha previsto que en caso de cotejo negativo en Ia base de datos se pueda enviar un mensaje con una notificación adecuada de dicha comparación o cotejo al terminal para avisar al usuario, o avisar una autoridad del intento de identificación fraudulenta.It is envisaged that in case of a negative check in the database, a message can be sent with an adequate notification of said comparison or check to the terminal to notify the user, or to notify an authority of the fraudulent identification attempt.
La base de datos se puede crear, mantener y manipular por los agentes controladores o delegados desde ordenadores remotos para su actualización y para establecer los privilegios de los usuarios. Así, Ia base de datos se puede controlar de forma inmediata, controlando los privilegios o acceso que tiene un usuario con una sola lectura biométrica almacenada y un listado de autorizaciones, según las tenga contratadas.The database can be created, maintained and manipulated by controlling agents or delegates from remote computers for updating and to establish user privileges. Thus, the database can be controlled immediately, controlling the privileges or access that a user has with a single stored biometric reading and a list of authorizations, as contracted.
Este procedimiento se lleva a cabo utilizando un sistema que comprende en el terminal de lectura biométrica un dispositivo de encriptación y un dispositivo de comunicaciones con uno o más ordenadores servidores mediante una red virtual privada sobre una red global de comunicación de ordenadores, tal como Internet. Así, el terminal es capaz de generar un mensaje encriptado con Ia lectura biométrica, Ia identificación del terminal y Ia instrucción que se desea realizar. Esta comunicación se transmite al ordenador servidor correspondiente mediante las redes de comunicación, ya conocidas que se han descrito.This procedure is carried out using a system comprising in the biometric reading terminal an encryption device and a communication device with one or more server computers through a private virtual network over a global computer communication network, such as the Internet. Thus, the terminal is capable of generating an encrypted message with the biometric reading, the identification of the terminal and the instruction to be performed. This communication is transmitted to the corresponding server computer by means of the known communication networks that have been described.
El terminal puede comprender una consola de interfaz, tal como una botonera u otro, para Ia introducción de instrucciones o comandos a realizar.The terminal may comprise an interface console, such as a keypad or another, for the introduction of instructions or commands to be performed.
El terminal puede presentar un avisador de operación realizada positiva o negativamente a modo de interfaz básico de usuario, con Io que una vez comprobada si su identidad está autorizada o no, se Ie comunica si Ia instrucción deseada ha sido llevada a cabo o no.The terminal may present an operation warning positively or negatively as a basic user interface, so that once it has been verified whether its identity is authorized or not, it is communicated if the desired instruction has been carried out or not.
En según que operaciones, el terminal y el medio de seguridad están integrados en un mismo aparato, tal como Ia cerradura de una puerta o el acceso a un recinto. Esto permite un diseño compacto y fácilmente instalable, el cual es seguro ante asaltos, ya que no comprende información alguna del usuario que puede abrir, no almacena Ia información de los usuarios que Io han utilizado.In accordance with which operations, the terminal and the security means are integrated in the same apparatus, such as the lock of a door or the access to an enclosure. This allows a compact and easily installable design, which is safe against Assaults, since it does not include any information of the user that can open, does not store the information of the users who have used it.
También se ha previsto que el dispositivo comprende un soporte energético autónomo y portátil que Io hace fácilmente instalable en cualquier lugar, independiente de Ia alimentación eléctrica. Si, además, el dispositivo de comunicaciones del terminal es del tipo inalámbrico, como por ejemplo un dispositivo de telefonía UMTS o análogo, se consigue una total autonomía, ideal para dispositivos de cobro mediante identificación personal u otros.It has also been provided that the device comprises an autonomous and portable energy support that makes it easily installable anywhere, independent of the power supply. If, in addition, the terminal's communications device is of the wireless type, such as a UMTS or similar telephone device, total autonomy is achieved, ideal for charging devices by personal identification or others.
Los medios de seguridad pueden ser de muy diversa índole, pero en el caso de medios físicos, tales como aperturas de cerraduras y accionamiento de máquinas comprende al menos un dispositivo de comunicaciones conectado con Ia red global de comunicación de ordenadores para Ia recepción de los mensajes encriptados de accionamiento desde el ordenador servidor.The security means can be of a very diverse nature, but in the case of physical means, such as opening locks and operating machines, it comprises at least one communication device connected to the global computer communication network for the reception of messages. Encrypted drive from the server computer.
Descripción de las figuras.Description of the figures.
Para complementar Ia descripción que se está realizando y con objeto de facilitar Ia comprensión de las características de Ia invención, se acompaña a Ia presente memoria descriptiva un juego de dibujos en los que, con carácter ilustrativo y no limitativo, se ha representado Io siguiente: - La figura 1 muestra un esquema de bloques del sistema.To complement the description that is being made and in order to facilitate the understanding of the characteristics of the invention, a set of drawings is attached to the present specification in which, for illustrative and non-limiting purposes, the following has been represented: - Figure 1 shows a block diagram of the system.
La figura 2 muestra un esquema de bloques del terminal de lectura biométrica.Figure 2 shows a block diagram of the biometric reading terminal.
Realización preferente de Ia invención Como se puede observar en las figuras referenciadas el sistema comprende unos terminales (1a,...1n) de lectura e identificación biométrica y unos medios de seguridad (2a, ,..2m) que pueden ser accionados desde un ordenador servidor (3) a distancia, realizándose estas comunicaciones a través de mensajes encriptados que circulan en una red privada virtual sobre una red global (4) de comunicación de ordenadores, tal como Internet.Preferred embodiment of the invention As can be seen in the referenced figures, the system comprises biometric identification and reading terminals (1a, ... 1n) and security means (2a,, .. 2m) that can be operated from a computer server (3) remotely, these communications being made through encrypted messages circulating in a virtual private network over a global network (4) of computer communication, such as the Internet.
El terminal (1a) comprende un lector biométrico (11), tal como un lector de huellas dactilares, un dispositivo de encriptación (12) que crea el mensaje y un dispositivo de comunicaciones (13) vía UMTS, alimentados desde un soporte energético autónomo (14) y portátil. Además el terminal (1a) también comprende una consola (15) de ¡nterfaz para Ia introducción de instrucciones, tal como una orden de pago y un avisador (16) de operación realizada positiva o negativamente.The terminal (1a) comprises a biometric reader (11), such as a fingerprint reader, an encryption device (12) that creates the message and a communications device (13) via UMTS, fed from an autonomous energy support ( 14) and portable. In addition the terminal (1a) also comprises a console (15) of interface for the introduction of instructions, such as a payment order and an operation warning (16) carried out positively or negatively.
El ordenador servidor (3) comprende una base de datos (31) de lecturas biométricas de los usuarios autorizados junto con un listado de privilegios de funcionamiento para los distintos medios de seguridad (2a,...2m) a los que están autorizados, tal como puertas de acceso o medios de realización de transacciones bancarias. Este ordenador servidor (3) es accesible desde ordenadores remotos (5) por agentes controladores o delegados de concesión de privilegios a los usuarios.The server computer (3) comprises a database (31) of biometric readings of the authorized users together with a list of operating privileges for the different security means (2a, ... 2m) to which they are authorized, such as access doors or means of conducting bank transactions. This server computer (3) is accessible from remote computers (5) by controlling agents or delegates granting privileges to users.
Los medios de seguridad (2a,...2m) son de diferente constitución y pueden comprender un dispositivo de comunicaciones (no representado) para Ia recepción del mensaje encriptado de accionamiento desde el ordenador servidor (3) a través de Ia red virtual privada existente sobre Ia red global (4) de comunicación de ordenadores.The security means (2a, ... 2m) are of different constitution and may comprise a communications device (not shown) for receiving the encrypted drive message from the server computer (3) through the existing private virtual network on the global network (4) of computer communication.
Una vez descrita suficientemente Ia naturaleza de Ia invención, así como un ejemplo de realización preferente, se hace constar a los efectos oportunos que los materiales, forma, tamaño y disposición de los elementos descritos podrán ser modificados, siempre y cuando ello no suponga una alteración de las características esenciales de Ia invención que se reivindican a continuación. Once the nature of the invention has been sufficiently described, as well as an example of a preferred embodiment, it is stated for the appropriate purposes that the materials, shape, size and arrangement of the described elements may be modified, provided that this does not imply an alteration of the essential characteristics of the invention that are claimed below.

Claims

REIVINDICACIONES
1.- Procedimiento de seguridad mediante identificación biométrica, caracterizado porque comprende las fases de: - Captura de una lectura biométrica de una característica única de una persona para Ia realización de una instrucción o acción,1.- Safety procedure by means of biometric identification, characterized in that it comprises the phases of: - Capturing a biometric reading of a unique characteristic of a person to carry out an instruction or action,
- composición de un mensaje con Ia identificación del terminal (1a,...1n) donde se realiza Ia captura, los datos de Ia lectura y una identificación de Ia instrucción a realizar, - encriptado del mensaje para evitar su violación,- composition of a message with the identification of the terminal (1a, ... 1n) where the capture is made, the data of the reading and an identification of the instruction to be performed, - encryption of the message to prevent its violation,
- envío del mensaje a través de una red virtual privada sobre una red global (4) de comunicación de ordenadores,- sending the message through a private virtual network over a global network (4) of computer communication,
- recepción del mensaje por un ordenador servidor (3) y su desencriptado,- reception of the message by a server computer (3) and its decryption,
- identificación de Ia persona mediante los datos de Ia lectura biométrica, - cotejado con una base de datos (31) de Ia identificación del terminal (1a,- identification of the person by means of the biometric reading data, - checked against a database (31) of the terminal identification (1a,
...1 n), de Ia identificación de Ia persona y de Ia identificación de Ia instrucción a realizar,... 1 n), of the identification of the person and of the identification of the instruction to be carried out,
- envío de al menos un mensaje al medio o medios de seguridad (2a, ...2m) determinado por Ia base de datos (31), en caso de cotejo positivo.- sending at least one message to the security medium or means (2a, ... 2m) determined by the database (31), in case of positive comparison.
2.- Procedimiento, según Ia reivindicación 2, caracterizado porque en caso de cotejo negativo en Ia base de datos (31), se envía un mensaje con una notificación adecuada al terminal (1a, ...1 n).2. Procedure according to claim 2, characterized in that in case of negative collation in the database (31), a message with an appropriate notification is sent to the terminal (1a, ... 1 n).
3.- Procedimiento, según Ia reivindicación 1 , caracterizado porque comprende Ia creación, mantenimiento y manipulación de Ia base de datos (31) alojada en el ordenador servidor (3) desde al menos un ordenador remoto (5a,...5n) para su actualización y establecimientos de privilegios de los usuarios.3. Method according to claim 1, characterized in that it comprises the creation, maintenance and manipulation of the database (31) housed in the server computer (3) from at least one remote computer (5a, ... 5n) for its update and user privilege establishments.
4.- Sistema de seguridad mediante identificación biométrica de personas, del tipo de los que comprenden un terminal (1 a, ...1n) con un lector biométrico (11), tal como un lector de huellas digitales, un lector del iris o de Ia retina del ojo, una cámara de visión térmica, reconocimiento de voz u otros, para el accionamiento de al menos un medio de seguridad (2a, ...2m), tal como una cerradura electrónica, un arranque de maquinas o un sistema electrónico de comunicación o pago, caracterizado porque el terminal (1a,..,1 n) comprende un dispositivo de encriptación (12) y un dispositivo de comunicaciones (13), estando relacionado con uno o más ordenadores servidores (3) mediante una red virtual privada instalada sobre una red global (4) de comunicación de ordenadores para Ia transmisión de un mensaje con Ia identificación propia, de Ia lectura realizada mediante el lector biométrico (11) y opcionalmente de una petición de instrucción al ordenador servidor (3) de gestión para Ia realización de una acción sobre uno o más medios de seguridad (2a, ...2m) si el contenido del mensaje cotejado con una base de datos (31) residente en dicho ordenador servidor (3) está autorizada.4.- Security system by means of biometric identification of persons, of the type that comprise a terminal (1 a, ... 1n) with a biometric reader (11), such as a fingerprint reader, an iris reader or of the retina of the eye, a thermal vision camera, voice recognition or others, for the actuation of at least one security means (2a, ... 2m), such as an electronic lock, a machine starter or a system electronic communication or payment, characterized in that the terminal (1a, .., 1 n) comprises an encryption device (12) and a communications device (13), being related to one or more server computers (3) by a private virtual network installed on a global network (4 ) of communication of computers for the transmission of a message with its own identification, of the reading made by the biometric reader (11) and optionally of an instruction request to the management server computer (3) for the realization of an action on one or more security means (2a, ... 2m) if the content of the message collated with a database (31) resident in said server computer (3) is authorized.
5.- Sistema, según Ia reivindicación 4, caracterizado porque el terminal5. System according to claim 4, characterized in that the terminal
(1a,...1 n) comprende un avisador (16) de operación realizada positiva o negativamente a modo de interfaz de usuario.(1a, ... 1 n) comprises an operation warning (16) performed positively or negatively as a user interface.
6.- Sistema, según Ia reivindicación 4, caracterizado porque el terminal (1a,...1 n) y el medio de seguridad (2a, ...2m) está integrado en un mismo aparato.6. System, according to claim 4, characterized in that the terminal (1a, ... 1 n) and the safety means (2a, ... 2m) are integrated in the same device.
7.- Sistema, según Ia reivindicación 4, caracterizado porque el terminal7. System according to claim 4, characterized in that the terminal
(1a,...1 n) comprende un soporte energético (14) autónomo y portátil.(1a, ... 1 n) comprises an autonomous and portable energy support (14).
8.- Sistema, según Ia reivindicación 4, caracterizado porque el dispositivo de comunicaciones (13) del terminal (1a,...1 n) es del tipo inalámbrico.8. System according to claim 4, characterized in that the communications device (13) of the terminal (1a, ... 1 n) is of the wireless type.
9.- ' Sistema, según Ia reivindicación 4, caracterizado porque el terminal9.- 'System, according to claim 4, characterized in that the terminal
(1a,...1n) comprende una consola (15) de interfaz para Ia introducción de instrucciones.(1a, ... 1n) comprises an interface console (15) for the introduction of instructions.
10.- Sistema, según Ia reivindicación 4, caracterizado porque los medios de seguridad (2a,...2m) comprenden al menos un dispositivo de comunicaciones con Ia red global (4) de comunicación de ordenadores para Ia recepción de mensajes encriptados de accionamiento desde el ordenador servidor (3). 10. System according to claim 4, characterized in that the security means (2a, ... 2m) comprise at least one communication device with the global communication network (4) of computers for receiving encrypted drive messages from the server computer (3).
PCT/ES2006/000724 2006-12-29 2006-12-29 Method and system of security by means of biometric identification of persons WO2008081051A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/ES2006/000724 WO2008081051A1 (en) 2006-12-29 2006-12-29 Method and system of security by means of biometric identification of persons

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/ES2006/000724 WO2008081051A1 (en) 2006-12-29 2006-12-29 Method and system of security by means of biometric identification of persons

Publications (1)

Publication Number Publication Date
WO2008081051A1 true WO2008081051A1 (en) 2008-07-10

Family

ID=39588176

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ES2006/000724 WO2008081051A1 (en) 2006-12-29 2006-12-29 Method and system of security by means of biometric identification of persons

Country Status (1)

Country Link
WO (1) WO2008081051A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104899488A (en) * 2014-12-31 2015-09-09 深圳市腾讯计算机系统有限公司 Numerical value transferring method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6300873B1 (en) * 1999-09-16 2001-10-09 Atlantes Services, Inc. Locking mechanism for use with one-time access code
WO2002032308A1 (en) * 2000-10-17 2002-04-25 Kent Ridge Digital Labs Biometrics authentication system and method
US20050154920A1 (en) * 2003-12-31 2005-07-14 Shawn Michael Tartaglia Method and apparatus for biometric template data management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6300873B1 (en) * 1999-09-16 2001-10-09 Atlantes Services, Inc. Locking mechanism for use with one-time access code
WO2002032308A1 (en) * 2000-10-17 2002-04-25 Kent Ridge Digital Labs Biometrics authentication system and method
US20050154920A1 (en) * 2003-12-31 2005-07-14 Shawn Michael Tartaglia Method and apparatus for biometric template data management

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104899488A (en) * 2014-12-31 2015-09-09 深圳市腾讯计算机系统有限公司 Numerical value transferring method and device

Similar Documents

Publication Publication Date Title
US7979716B2 (en) Method of generating access keys
ES2960397T3 (en) Procedure to verify biometric authentication
US8817981B2 (en) Generation of registration codes, keys and passcodes using non-determinism
ES2664947T3 (en) Lock lock and lock control procedure
ES2414089T3 (en) Operation of a security system using a wireless device
US20080024272A1 (en) Biometric authentication lock machine
EP2880586B1 (en) System and device for authenticating a user
CA2500039A1 (en) Electronic lock box with multiple modes and security states
WO2009009788A1 (en) Identity authentication and secured access systems, components, and methods
EP3486876B1 (en) Method, device and system for controlling opening of ab doors
JPH11265432A (en) Personal identification fob
TWI550435B (en) Control system operated by mobile devices
TWI569230B (en) Control system with mobile devices
JP2009181561A (en) Security management system using biometric authentication
JP4612482B2 (en) Usage management system
Nelligani et al. Smart atm security system using fpr, gsm, gps
JP5069501B2 (en) Security management system
JP2005139644A (en) Key information distribution system
JP2016184875A (en) Key data communication system
CN110111464A (en) A kind of individual palpation key controller entrance guard safety system
US20190028470A1 (en) Method For Verifying The Identity Of A Person
WO2008081051A1 (en) Method and system of security by means of biometric identification of persons
US20150326576A1 (en) Secure asset management system
CN100483443C (en) Biological key and biological lock
KR20190076763A (en) A remote iot locking device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06841776

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06841776

Country of ref document: EP

Kind code of ref document: A1