WO2011072717A1 - Système d'autorisation, dispositif de comparaison et procédé d'autorisation d'un sujet - Google Patents
Système d'autorisation, dispositif de comparaison et procédé d'autorisation d'un sujet Download PDFInfo
- Publication number
- WO2011072717A1 WO2011072717A1 PCT/EP2009/067162 EP2009067162W WO2011072717A1 WO 2011072717 A1 WO2011072717 A1 WO 2011072717A1 EP 2009067162 W EP2009067162 W EP 2009067162W WO 2011072717 A1 WO2011072717 A1 WO 2011072717A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- verification
- img2
- biofragment
- imgl
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Definitions
- the invention relates to an authorization system for authorizing a plurality of subjects, a matching device and a method for authorizing a
- Biometric recognition methods have experienced a tremendous upswing in recent years. Technological progress increasingly allows the rapid measurement of biological characteristics and their evaluation at a reasonable cost. The use of biometrics is a promising approach to solve the problem of many security concepts. This raises the question of how to associate identities and associated rights with the right physical subject (e.g., a person). In the globalized
- biometric data eg a person's fingerprint
- biometric measurements or scans can be used to detect forgeries and misappropriation of an identity card.
- Biometric characteristics are often differentiated into active / passive, behavioral, physiological-based or dynamic-static.
- Long-term stable behavior-based characteristics include the voice, hand or signature, typing behavior and gait dynamics.
- Long-term stable physiological characteristics are, for example, the fingerprint, the iris or the hand geometry.
- biometric characteristics for the authorization of a subject are used among other things: height, iris, retina, fingerprint,
- Nail bed pattern voice, signature, typing behavior, lip movement, gait style, body odor and DNA.
- a biometric recognition system for authorizing a person is known from WO 00/74001 AI. Here are biometric data on one
- Identification device such as an ID card or ID card, stored. In order to carry out the authentication of the person and thus to determine their authorization, they submit their identification device. The biometric data stored thereon is detected by a matching device and compared with the corresponding biometric characteristics of the person.
- a so-called live template with corresponding reference data can be generated on the basis of an iris scan and so-called comparison data compared with stored biometric data.
- the person is granted a certain authorization only if the geometric characteristics of the person match the stored biometric data.
- a disadvantage of the method described in WO 00/74001 AI is that the memory on the identification device is not conclusive against counterfeiting
- biometric data may not be duplicated or cached in different countries.
- biometric data can be used to derive information about individuals who are subject to their privacy (for example, illnesses). Also from a security point of view one would like to avoid the storage of complete biometric data, since this one
- Identification device in the form of a smart card to split.
- An authentication takes place at a terminal, in which the person to be authenticated his smart card inserts and captures the person's biometric comparison data. It is possible for a hijacked authentication terminal to spy on people's biometric data.
- EP 0 884 670 A1 does not deal with biometric data, it proposes to encrypt personal data and to distribute it via an information system in such a way that it is only possible to associate a person with a specific data record if appropriate
- Authorization system provide.
- an authorization system is to be provided which ensures very high data protection and enables secure authentication and authorization of a subject.
- a matching device for authorizing a subject and a corresponding method should be specified.
- the object is achieved by an authorization system according to claim 1, a method according to claim 10 and an adjustment device according to claim 13.
- an authorization system which comprises:
- At least one key database with a plurality of data records each having at least one key identification string
- the interrogation unit is for receiving at least one key identification string and readout
- Verification biofragment data is formed from the at least one key database
- a generation unit for generating a plurality of sets of
- Verification biofragment data and pseudobiofragment data with reference data compares to the pseudobiofragment data from the
- a verification unit for receiving a verification code from
- the verification unit is adapted to derive based on the verification code, if the matching device has recognized the Verificationbiofragment schemes.
- An essential point of the present invention is that the
- the reference data may be, for example, data created by digitally removing a fingerprint. This reference data can be detected by a matching device, the
- the interrogation unit receives, for example from the matching device, a request according to which a particular subject wishes to authorize himself for a specific procedure.
- the authorization system queries the key database for verification biofragment data that can be assigned to the subject based on the key identification string. For the anonymization of the verification biofragment data further pseudobiofragment data are generated.
- the transmission unit transmits sets of biofragment data comprising the sets of pseudobiofragment data and
- Verification biofragment data to the refection facility. This is reconstructed on the basis of the sets of biofragmentation data comparison templates and compares them with collected reference data.
- the balancing device may have a
- the refractive device - On the basis of the comparison, it is possible for the refractive device - if it is an authorized subject - to distinguish pseudobiofragment data from verification biofragment data. Accordingly, a response is generated for the authorization system, wherein the verification unit can determine on the basis of the answer, namely the received verification code, whether the matching device has recognized the verification biofragment data.
- the authorization system comprises a
- Allocation unit for assigning each one index value to the
- the transmission unit is adapted to transmit the plurality of pseudobiofragment data and the biofragment data with the respective associated index value, the verification code including at least one index value, and the
- Verification unit is adapted to determine based on the index value in the verification code, if the matching device has recognized the Verification Biofragment schemes.
- the index value is thus used to identify the individual biofragment data and to capture the result of the comparisons performed by the matching devices.
- the received verification code may immediately contain the index value. According to the invention it is also possible to have a
- Verification code that allows the verification unit to determine the specific index value.
- the allocation unit may include a random number generator unit for generating random index values.
- the verification unit may be designed to encrypt an encrypted by means of the index value of the verification biofragment data
- Decrypt data packet in the verification code Decrypt data packet in the verification code.
- the preferably randomly generated index value that is contained in the verification code can thus be used to encrypt data packets communicated by the matching device to the authorization system.
- the verification code it is not necessary for the verification code to explicitly include the index value. Rather, the
- the verification unit Upon decryption, the verification unit will determine if the correct index value, namely the index value associated with the set of verification biofragment data, has been used. By randomly generating the index values, the
- the authorization system may comprise a main database of user key data encrypted by a server key string, the plurality of records in the at least one key database each including at least one server key string encrypted by the user key string, or at least one
- User key string comprises encrypted server key string fragment, wherein the data packet in the verification code the
- User key string contains and the verification unit for decrypting the server key string or the at least one
- Server key string fragment is designed to decrypt the user data.
- the matching device thus transmits, in encrypted form, the user key string, which in turn can be used to decrypt server key string fragments contained in the key database (s).
- the server key string fragments then serve to decrypt the user data in the main database.
- User data can not be read out. For this purpose, it would be necessary to obtain the user key string, but preferably not in the
- the authorization system may include at least a first key database having a plurality of first records and a second key database having a plurality of second records, the records each having at least one key identification string and a set of
- Verification biofragment data wherein the interrogation unit is adapted to receive at least one key identification string with respect to the first and second key databases to associate corresponding data sets from the first and second key databases with each other.
- verification biofragment data from the first key database and from the second key database is necessary to make a successful comparison with the reference data.
- the present application suggests that these verification biofragmentation data be correlated to at least two
- the data records of the first and second key databases may each comprise at least one key string fragment, wherein the verification unit for reconstructing a server key string comprises at least one key string
- Key database is formed.
- the present application envisage encrypting the server key string or server key string fragments, but it also splits the server key string into at least two portions, so that additional information is necessary to reconstruct the server key string for the user data.
- the query unit may comprise a memory with local verification biofragment data or sets of local biofragment data and for reconstructing a comparison template from the local verification biofragment data and the
- the authorization request comprises at least one key identification string
- Verification biofragment data to a matching device; Receiving a verification code from the matching device;
- Matching means the pseudobiofragment data from the
- Matching device has recognized the Verificationbiofragmentaries or the set of Verificationbiofragment schemes.
- Matching device comprises:
- a memory for storing at least one set of local ones
- a receive interface for receiving multiple sets of
- Biofragment data comprising sets of pseudobiofragment data and further verification biofragment data
- a computation unit for reconstructing a plurality of comparison templates from the set of local verification biofragment data of the memory in association with the sets of received biofragment data and for comparing the reference data set with the plurality of
- a transmit interface for transmitting a verification code indicating which of the sets of received biofragment data is the at least one set of further verification biofragment data.
- the matching device may be any type of mobile computing unit that is capable of being transported by a subject.
- this is a mobile phone
- the matching device has a memory for
- comparison templates are compared with a reference data set, which is preferably obtained by the matching device.
- the matcher is able to distinguish pseudobiofragments from verification biofragments and provide a corresponding output for the authorization system.
- the user of the device can be sure that his full reference data does not fall into the wrong hands.
- the matching device is configured so that the reference data is destroyed immediately after an authorization attempt. The privacy of the user can thus be safeguarded.
- the matching device may include a memory for storing at least one of
- User key string can be used to decrypt relevant data related to the subject. Further advantageous embodiments of the inventive matching device, the authorization system and the method described will become apparent from the dependent claims.
- Fig. 1 is an authorization system communicating with a
- FIG. 2 shows a matching device in the form of a mobile telephone
- FIG. 3 shows a comparison template obtained from verification biofragments when compared with a live template
- Fig. 4 is a part of pseudobiofragment data
- FIG. 5 shows a data communication between the mobile telephone of FIG. 2 and the authorization system of FIG. 1.
- FIG. 1 shows the authorization system according to the invention, which has an authentication gateway 100.
- an authentication gateway 100 To this authentication gateway 100 are a total of three databases, namely a first key database 10, a second
- the individual databases 10, 20, 30 each include tables in which several
- the main database 30 contains encrypted user data Data, which can each be identified via a user identification number M.
- the authorization system serves to protect the access to this user data Data against unwanted access by third parties.
- Main database 30 so the user data Data are encrypted so that they can be de Scotlandin only using a server key KeyS.
- the present application selects the term "KeyS '(Data)" for the correspondingly encrypted user data Data.
- the server key KeyS which is necessary for decrypting the data, has been divided according to the invention into two server key fragments KeyS1 and KeyS2.
- both server key fragments are KeySl, KeyS2 necessary.
- the two server key fragments KeySl, KeyS2 for a particular record of the main database 30 are each separated without any
- Key databases 10, 20 each have a key database identification number ID1, ID2 and sets of verification biofragment data Imgl, Img2 stored.
- the first key database 10 thus contains a plurality of data records with a first key identification number ID1, first verification biofragment data Imgl and first user key fragments KeyB '(KeySl) encrypted by means of a user key KeyB.
- the second key database 20 contains a plurality of data records with second key identification numbers ID2, second
- the authentication gateway 100 may include a
- Authentication terminal 200 are communicatively connected to allow a particular person access to their user data Data.
- corresponding authorization requests may be sent directly from a mobile phone 300 in communication with the authentication gateway 100.
- Communication can be wired or wireless.
- all known communication standards can be used, since the proposed authorization method comprises an inherent protection of the communication paths used.
- the mobile telephone 300 is regarded as a matching device and, in conjunction with the authentication gateway 100, can carry out all the steps necessary to enable a person, preferably the owner of the mobile telephone 300, to access his user data Data in the main database 30 , The
- Mobile telephone 300 comprises a computing unit 303, a communication unit 304 for communicating with the authentication gateway 100 and a memory 301.
- this memory 301 for the user of the mobile telephone 300, the first key database identification number ID1, the second
- Key database identification number ID2 the user identification number M, local verification biofragment data ImgO and the user key KeyB deposited.
- the mobile 300 transmits an authorization request to the authentication gateway 100, which is the first
- Key database ID number ID2 contains.
- the authentication gateway 100 receives this authorization request by means of a query unit 101 (see Fig. 5) and reads out the associated sets of verification biofragment data Imgl, Img2 from the key database identification numbers ID1, ID2.
- a generation unit 103 in the authentication gateway 100 then generates a plurality of sets of dummy bio-fragment data Imgl, Img2.
- n-1 pairs of pseudobiofragment data are generated and each provided with an index value i to R t- i, R t + i to R n .
- Verification biofragment data Imgl, Img2 from the key databases 10, 20 is assigned the index value R t .
- a transmission unit 105 transmits the n pairs of biofragment data (pseudobiofragment data and verification biofragment data) together with the assigned index values R to R n to the mobile telephone 300.
- the assignment of the biofragment data or biofragment data sets to the index values Ri to R n occurs at random.
- the mobile telephone 300 uses the transmitted data to reconstruct a multiplicity of comparison rates, wherein each of the comparison templates can be assigned to one of the index values i to R n .
- corresponding comparison templates are exemplified.
- the comparison template having the index value Ri is set from the received sets of pseudobiofragment data Imgl ', Img2' and the local set of
- Verification biofragment data Img0 from the memory 301 together. Accordingly, the Vergfeichstemplate sets with respect to the index value R t from the transmitted verification biofragment data Imgl, Img2 and the local
- the comparison templates may be, for example, images of a fingerprint of the user of the mobile phone 300. It should be apparent to those skilled in the art that the individual biofragment data is not in the manner shown in Figs. 3 and 4, to a
- Comparison template must be merged.
- a comparison template can be obtained, for example, by XORing the local verification biofragment data ImgO with the received ones
- the mobile phone 300 After reconstructing the n comparison templates, the mobile phone 300 prompts the user to place an index finger on a reading device provided for this purpose on the mobile telephone 300.
- the mobile telephone 300 reads in the corresponding biometric data and generates a reference data record in the form of a live template Temp.
- the live template Temp is compared with each of the comparison templates.
- the mobile phone is able to distinguish between comparison templates generated from pseudobiofragment data Imgl ', Img2' and true comparison templates generated from the transmitted verification biofragmentation data Imgl, Img2.
- the mobile phone 300 thus determines that the comparison template associated with the index value R t is the "true" * comparison template.
- the mobile phone 300 uses the index value R t to encrypt the user key KeyB.
- the mobile telephone 300 transmits the encrypted user key KeyB to a verification unit 110 of the authentication gateway 100.
- the verification unit 110 has identified the index value R t as the index value containing the
- Vergrbi, Img2 has been assigned, and therefore can decrypt the user key KeyB.
- the verification unit 110 alone on the basis of the encrypted user key KeyB to determine whether the mobile phone 300 has recognized the Verification Biofragmente Imgl, Img2. Successful authorization is only possible if the user key KeyB can be decrypted correctly.
- the index value R t may be included as an acknowledgment in the verification code.
- the verification unit 110 unpacks the user key KeyB and reads out the values KeyB '(KeySl), KeyB' (KeyS2) from the key databases 20 and decrypts the server key fragments KeyS1, KeyS2 by means of the user key KeyB.
- the server key fragment KeySl, KeyS2 is used to reconstruct the KeyS server key.
- Verification unit 110 the user identification number M and can read from the main database 30, the encrypted user data KeyS '(Data) and decrypt.
- the authentication gateway 100 obtains access to the user data Data. These can now be forwarded to the mobile phone 300.
- mapping e.g., a hash function
- the mobile phone 300 communicates directly with the authentication gateway 100. However, it is also possible that the mobile phone 300 communicates with an authentication terminal 200. Furthermore, the authentication terminal 200 may have additional functions
- the authentication terminal 200 may function as a kind of matching device, with the data stored on the mobile phone 300 in the previously described embodiment being read in via a smart card.
- the authentication terminal 200 may be used as a reading device for multiple people
- Authentication terminal 200 is part of the mobile 300
- an identification device can be equipped with an integrated circuit, so that at least part of the above-mentioned steps on the
- Identification device of the user and not on the public access authentication terminal 200 are performed.
- the biofragment data Img0, Imgl, Img2 necessary for the reconstruction of a comparison template are over three Memory, namely key databases 10, 20 and the memory 301, distributed. It is conceivable to make only a division into two parts at this point.
- Server key fragment KeySl, KeyS2 is necessary to query individual user data Data from the multiple main databases 30.
- Fingerprint won It should be apparent to those skilled in the art that the said method is applicable to any type of biometric characteristics (e.g., iris, retina, facial geometry, hand vessel structure, hand geometry, hand line structure). Here it is not absolutely necessary is imaging
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Collating Specific Patterns (AREA)
Abstract
La présente demande porte sur l'autorisation d'utilisateurs. Le système d'autorisation décrit permet de sécuriser l'accès à des fichiers confidentiels au moyen d'une clé biométrique. Le système d'autorisation comprend: - au moins une banque de données de clés comprenant une pluralité de jeux de données comportant respectivement au moins une chaîne de caractères d'identification de clé et au moins un jeu de données de biofragment de vérification; - une unité d'interrogation destinée à recevoir une demande d'autorisation concernant un sujet; l'unité d'interrogation étant conçue pour recevoir au moins une chaîne de caractères d'identification de clé et pour lire au moins un jeu de données correspondant avec le jeu de données de biofragment de vérification provenant de ladite banque de données de clés; - une unité de génération destinée à générer plusieurs jeux de données de pseudo-biofragment; - une unité de transmission destinée à transmettre les jeux de données de pseudo-biofragment et les données de biofragment de vérification à un dispositif de comparaison, le dispositif de comparaison comparant les données de biofragment de vérification et les données de pseudo-biofragment à des données de référence pour distinguer les données de pseudo-biofragment des données de biofragment de vérification; - une unité de vérification destinée à recevoir un code de vérification du dispositif de comparaison, l'unité de vérification étant conçue pour déterminer sur la base du code de vérification si le dispositif de comparaison a reconnu les données de biofragment de vérification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2009/067162 WO2011072717A1 (fr) | 2009-12-15 | 2009-12-15 | Système d'autorisation, dispositif de comparaison et procédé d'autorisation d'un sujet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2009/067162 WO2011072717A1 (fr) | 2009-12-15 | 2009-12-15 | Système d'autorisation, dispositif de comparaison et procédé d'autorisation d'un sujet |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011072717A1 true WO2011072717A1 (fr) | 2011-06-23 |
Family
ID=42078921
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2009/067162 WO2011072717A1 (fr) | 2009-12-15 | 2009-12-15 | Système d'autorisation, dispositif de comparaison et procédé d'autorisation d'un sujet |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2011072717A1 (fr) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104408798A (zh) * | 2014-11-25 | 2015-03-11 | 苏州福丰科技有限公司 | 一种基于三维人脸识别的门禁身份验证系统 |
CN104599364A (zh) * | 2014-12-31 | 2015-05-06 | 苏州福丰科技有限公司 | 一种无线门禁系统 |
CN104616375A (zh) * | 2014-12-30 | 2015-05-13 | 苏州福丰科技有限公司 | 一种三维人脸识别智能锁 |
CN103873232B (zh) * | 2014-03-03 | 2017-01-11 | 杭州电子科技大学 | 一种触摸屏用户笔迹生物密钥生成方法 |
CN106981114A (zh) * | 2017-03-29 | 2017-07-25 | 安徽大鸿智能科技有限公司 | 机动车驾驶人科目一考试的门禁系统 |
CN109743320A (zh) * | 2019-01-03 | 2019-05-10 | 黄河科技学院 | 一种计算机网络信息安全系统及信息保护方法 |
CN109920111A (zh) * | 2019-03-05 | 2019-06-21 | 杭州电子科技大学 | 一种人脸识别和步态识别融合的门禁系统 |
US10544317B2 (en) | 2014-10-14 | 2020-01-28 | Sun Chemical Corporation | Thermoformable conductive inks and coatings and a process for fabrication of a thermoformed device |
CN111684459A (zh) * | 2019-07-18 | 2020-09-18 | 深圳海付移通科技有限公司 | 一种身份验证方法、终端设备、存储介质 |
WO2021128038A1 (fr) * | 2019-12-25 | 2021-07-01 | 深圳雾芯科技有限公司 | Appareil de reconnaissance d'utilisateur et système de reconnaissance d'utilisateur |
US11929620B2 (en) | 2012-01-30 | 2024-03-12 | Solaredge Technologies Ltd. | Maximizing power in a photovoltaic distributed power system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5805719A (en) * | 1994-11-28 | 1998-09-08 | Smarttouch | Tokenless identification of individuals |
US7254619B2 (en) * | 2000-10-13 | 2007-08-07 | Matsushita Electric Industrial Co., Ltd. | Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network |
US20090300737A1 (en) * | 2008-05-27 | 2009-12-03 | Crandell Jeffrey L | Split template biometric verification system |
-
2009
- 2009-12-15 WO PCT/EP2009/067162 patent/WO2011072717A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5805719A (en) * | 1994-11-28 | 1998-09-08 | Smarttouch | Tokenless identification of individuals |
US7254619B2 (en) * | 2000-10-13 | 2007-08-07 | Matsushita Electric Industrial Co., Ltd. | Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network |
US20090300737A1 (en) * | 2008-05-27 | 2009-12-03 | Crandell Jeffrey L | Split template biometric verification system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11929620B2 (en) | 2012-01-30 | 2024-03-12 | Solaredge Technologies Ltd. | Maximizing power in a photovoltaic distributed power system |
CN103873232B (zh) * | 2014-03-03 | 2017-01-11 | 杭州电子科技大学 | 一种触摸屏用户笔迹生物密钥生成方法 |
US10544317B2 (en) | 2014-10-14 | 2020-01-28 | Sun Chemical Corporation | Thermoformable conductive inks and coatings and a process for fabrication of a thermoformed device |
CN104408798A (zh) * | 2014-11-25 | 2015-03-11 | 苏州福丰科技有限公司 | 一种基于三维人脸识别的门禁身份验证系统 |
CN104616375A (zh) * | 2014-12-30 | 2015-05-13 | 苏州福丰科技有限公司 | 一种三维人脸识别智能锁 |
CN104599364A (zh) * | 2014-12-31 | 2015-05-06 | 苏州福丰科技有限公司 | 一种无线门禁系统 |
CN106981114A (zh) * | 2017-03-29 | 2017-07-25 | 安徽大鸿智能科技有限公司 | 机动车驾驶人科目一考试的门禁系统 |
CN109743320A (zh) * | 2019-01-03 | 2019-05-10 | 黄河科技学院 | 一种计算机网络信息安全系统及信息保护方法 |
CN109920111A (zh) * | 2019-03-05 | 2019-06-21 | 杭州电子科技大学 | 一种人脸识别和步态识别融合的门禁系统 |
CN111684459A (zh) * | 2019-07-18 | 2020-09-18 | 深圳海付移通科技有限公司 | 一种身份验证方法、终端设备、存储介质 |
WO2021128038A1 (fr) * | 2019-12-25 | 2021-07-01 | 深圳雾芯科技有限公司 | Appareil de reconnaissance d'utilisateur et système de reconnaissance d'utilisateur |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011072717A1 (fr) | Système d'autorisation, dispositif de comparaison et procédé d'autorisation d'un sujet | |
DE112005003281B4 (de) | Elektronisches Signatursicherheitssystem | |
DE69832145T2 (de) | Fernbeglaubigungssystem | |
EP2409452B1 (fr) | Procédé de fourniture de paires de clefs cryptographiques | |
EP1946481B1 (fr) | Dispositif de réalisation d une signature électronique améliorée d un document électronique | |
EP1358533B1 (fr) | Procede, systeme et moyen de securite pour authentifier un utilisateur | |
DE60306844T2 (de) | Methode und System zur Datenaktualisierung | |
DE60223129T2 (de) | Verfahren und system zur sicherung eines rechnernetzwerks und persönliches identifikationsgerät, das für die steuerung des netzwerkkomponentenzugangs verwendet wird | |
DE202018002074U1 (de) | System zur sicheren Speicherung von elektronischem Material | |
EP1199623A2 (fr) | Procédé et système pour l'identification d'un utilisateur | |
EP1706957B1 (fr) | Authentification biométrique | |
WO2011113478A1 (fr) | Système d'authentification, procédé d'authentification d'un objet, dispositif pour produire un dispositif d'identification, procédé de production d'un dispositif d'identification | |
DE112012000185T5 (de) | Vorrichtung und Verfahren zur Identitätsauthentifizierung | |
DE69330743T2 (de) | Verfahren zur Beurkundung einer Informationseinheit durch eine andere | |
EP1687932B1 (fr) | Autorisation d'une transaction | |
EP3182317A1 (fr) | Dispositif et procédé de fourniture personnalisée d'une clé | |
WO2015180867A1 (fr) | Génération d'une clé cryptographique | |
EP3252643B1 (fr) | Appareil de lecture pour une carte à puce et système informatique | |
DE19645937A1 (de) | Verfahren und System zum personenabhängigen Steuern einer Telekommunikations-Endeinrichtung | |
DE69937196T2 (de) | Verfahren und vorrichtung zur sicheren verteilung von authentifizierungsdaten an umherstreifende teilnehmer | |
EP1864196B1 (fr) | Appareil de lecture a unite de cryptage integree | |
DE10307996A1 (de) | Verfahren zum Ver- und Entschlüsseln von Daten durch verschiedene Nutzer | |
DE102009014919A1 (de) | Verfahren und Vorrichtung zum Authentifizieren eines Benutzers | |
DE102008000348A1 (de) | Verfahren zur Signierung eines medizinischen Datenobjekts | |
DE69332261T2 (de) | Verfahren zur Authentifizierung eines Datenverarbeitungssystems aus einer Computerdiskette |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09810774 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09810774 Country of ref document: EP Kind code of ref document: A1 |