WO2012102365A1 - 移動情報端末及び把持特徴学習方法 - Google Patents
移動情報端末及び把持特徴学習方法 Download PDFInfo
- Publication number
- WO2012102365A1 WO2012102365A1 PCT/JP2012/051752 JP2012051752W WO2012102365A1 WO 2012102365 A1 WO2012102365 A1 WO 2012102365A1 JP 2012051752 W JP2012051752 W JP 2012051752W WO 2012102365 A1 WO2012102365 A1 WO 2012102365A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mode
- gripping feature
- sample
- gripping
- unit
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/68—Gesture-dependent or behaviour-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to a mobile information terminal and a gripping feature learning method for acquiring a gripping feature sample when the mobile information terminal is gripped and performing identity authentication.
- Patent Document 1 is based on the premise that when a user intends to receive some service provision using a mobile information terminal, the user authentication is performed by the grip feature. It is not assumed that identity authentication by features can be performed. Therefore, the portable information terminal disclosed in Patent Document 1 cannot perform personal authentication using the gripping feature in various usage situations. Therefore, consider classifying the usage status of the portable information terminal into several modes.
- This mode is classified according to the activation status of an application built in the portable information terminal, such as a mail mode, an application mode, and a browser mode.
- the gripping features between the modes are not necessarily similar, for example, the gripping method is greatly different between the camera mode and the mail mode.
- the gripping characteristics in the same mode are similar, for example, the gripping characteristics when sending and receiving mail are similar with few differences. In this way, several modes are defined in the portable information terminal so that the gripping features are consistently matched in the mode, and a personal authentication template necessary for personal authentication is learned for each mode.
- gripping feature samples for example, a set of detection outputs from a plurality of pressure sensor elements, hereinafter referred to as gripping feature samples
- a predetermined timing for example, the moment when a designated operation key is pressed.
- the present invention provides movement information that can learn a high-precision personal authentication template for each usage situation (mode) in short-term learning even when performing personal authentication using gripping features in various usage situations (modes).
- the purpose is to provide a terminal.
- the mobile information terminal of the present invention includes a mode acquisition unit, a gripping feature sample acquisition unit, a switching unit, a sample supplementing unit, a template learning unit, a personal authentication unit, and a lock unit.
- the mode acquisition unit acquires the mode of the mobile information terminal.
- the gripping feature sample acquisition unit acquires a gripping feature sample.
- the switching unit switches the mobile information terminal to either the learning state or the authentication state.
- the sample supplementing unit acquires gripping feature samples acquired in a mode different from any mode Is used to compensate for the lack of gripping feature samples in either mode.
- the template learning unit learns the personal authentication template for each mode using the gripping feature sample when the state of the mobile information terminal is the learning state.
- the personal authentication unit performs personal authentication by comparing the learned personal authentication template and the gripping feature sample when the state of the mobile information terminal is the authentication state.
- the lock unit locks part or all of the functions of the mobile information terminal when the personal authentication fails.
- the mobile information terminal of the present invention even when performing personal authentication using gripping features in various usage situations (modes), a high-accuracy personal authentication template is learned for each usage situation (mode) by short-term learning. can do.
- FIG. 1 is a block diagram showing a configuration of a mobile terminal according to Embodiment 1.
- FIG. FIG. 6 is a block diagram illustrating a configuration of a mobile terminal according to a second embodiment.
- FIG. 9 is a block diagram illustrating a configuration of a mobile terminal according to a third embodiment.
- FIG. 9 is a block diagram illustrating a configuration of a mobile terminal according to a fourth embodiment.
- 5 is a flowchart illustrating an operation in a learning state of the mobile terminal according to the first embodiment.
- 10 is a flowchart illustrating an operation in a learning state of the mobile terminal according to the second, third, and fourth embodiments.
- 5 is a flowchart illustrating an operation in an authentication state of the mobile terminal according to the first embodiment.
- 10 is a flowchart illustrating an operation in an authentication state of the mobile terminal according to the second embodiment.
- 10 is a flowchart illustrating an operation in an authentication state of the mobile terminal according to the third embodiment.
- FIG 10 is a flowchart illustrating an operation in an authentication state of the mobile terminal according to the fourth embodiment.
- the figure explaining the complementation rate of the grasping feature sample by the similarity of the grasping feature.
- the figure explaining the complementation rate of the grasping feature sample by the similarity of the grasping feature.
- Examples of devices that embody the mobile information terminal of the present invention include a portable terminal, a PDA, a portable game machine, an electronic notebook, and an electronic book dedicated terminal. However, it is not limited to these listed devices (1) It is a device that is used while gripping and can acquire gripping characteristics during use. (2) There are several modes in use, and the gripping state is stable for each mode. (3) Any device that satisfies the above requirements (1) to (3) may be used as the mobile information terminal of the present invention if personal information or value information may be leaked due to loss or theft. it can. In the description of the embodiment, a mobile terminal will be described in detail as a specific example.
- gripping feature samples acquired by the mobile terminals 300, 300 ', 300 ", 300"' will be described.
- Humans are inherently different in (1) finger length, (2) strength of grip, etc., and (3) habit when holding a mobile terminal, etc.
- the gripping feature is very excellent as biometric information used for personal authentication.
- the gripping feature authentication has the same degree of accuracy as general face authentication in the person rejection rate and the other person acceptance rate.
- Examples of the gripping feature sample include a gripping pressure distribution, a gripping shape distribution, and a gripping heat / heat distribution.
- the pressure sensor can be distributed by arranging the pressure sensors on the surfaces of the mobile terminals 300, 300 ', 300 ", 300"' to acquire the gripping pressure distribution.
- the grip shape distribution can be acquired by the distribution arrangement of the CCD (CMOS) sensor.
- CMOS CCD
- the pressing state of the operation key (touch panel) when the terminal is gripped whether the operation key or touch panel is pressed.
- the gripping feature can also be acquired by.
- FIG. 1 is a diagram illustrating a state where mobile terminals 300, 300 ′, 300 ′′, 300 ′′ ′′ according to all embodiments are held.
- FIG. 2 is a diagram illustrating the gripping pressure distribution output by the pressure sensor array built in the mobile terminals 300, 300 ', 300 ", 300"' according to all embodiments.
- the portable terminals 300, 300 ′, 300 ′′, and 300 ′ ′′ are assumed to be general foldable portable terminals, and can be folded at one end in the short direction of two long plate-shaped bodies with a connecting shaft.
- One body is provided with operation keys.
- the surface on which the operation keys are arranged is the key arrangement surface 11, the left and right longitudinal side surfaces of the key arrangement surface 11 are the left side surface 12 and the right side surface 13, the back surface of the key arrangement surface 11 is the back surface 14, and the lower side of the key arrangement surface 11.
- the short side surface (surface opposite to the surface having the connecting shaft) is referred to as the lower surface 15.
- a liquid crystal screen 16 is arranged on a surface facing the key arrangement surface 11 when the other body is folded.
- the portable terminals 300, 300 ′, 300 ′′, and 300 ′ ′′ are configured in this way, but the above description is an example for explaining in detail the gripping pressure distribution output by the pressure sensor array described later. Only. Accordingly, the mobile terminals 300, 300 ', 300 ", 300"' do not necessarily have to be a folding type as shown in FIG. 1, and may have a straight type, a slide type, or any other shape.
- the users of the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′ are holding the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′ as shown in FIG. To do.
- a pressure sensor array 105 is arranged on the body on which the key arrangement surface 11 of the portable terminal 300, 300 ′, 300 ′′, 300 ′ ′′ is arranged so as to be able to detect an external gripping pressure (the broken line portion in FIG. 2). ).
- the pressure sensor array 105 can sense the grip pressure distribution on the left side surface 12, the right side surface 13, and the back surface 14 of the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′. If the signal from the sensor is analyzed, a gripping pressure distribution as shown in FIG. 2 can be drawn. From the grasping pressure distribution in FIG. 2, it can be seen that the features of the user's fingers and gripping force are clearly shown on the left side surface 12, the right side surface 13, the back surface 14, and the like. The gripping pressure distribution acquired in this way can be used for the gripping feature sample used in the present invention.
- the portable terminal 300, 300 ′, 300 ′′, 300 ′ ′′ obtains the gripping feature sample, and the user authentication template required for the user authentication is obtained. Announcement made to the user when learning starts and when learning ends will be described.
- 3A and 3B are diagrams exemplifying announcements made to the user when the mobile terminal 300, 300 ', 300 ", 300"' according to all embodiments starts / ends the personal authentication template learning.
- the mobile terminals 300, 300 ′, 300 ′′, 300 ′′ ′′ learn a personal authentication template described later when they are used for the first time.
- 3A is displayed on the liquid crystal screen 16.
- the following announcement 16-2 is made on the liquid crystal screen 16 in a scene setting in which the agent 16-1 residing in the portable terminal speaks to the user. “From now on, I will remember the habit of Mr. xxxx (user's name). Please be careful not to operate this terminal other than Mr. xxxx during the study period.” Therefore, the user continues to use the mobile terminals 300, 300 ′, 300 ′′, and 300 ′ ′′ as usual without being particularly conscious.
- the gripping feature sample is automatically acquired within the above learning period.
- the method for acquiring the gripping feature sample may be acquired every elapse of a certain time, or may be acquired when the user presses a specific operation key. Further, as will be described in detail in Embodiment 2 and later, a trigger (hereinafter, sampling) is performed when the user performs a certain key operation in a mode (for example, during mail operation, during a call, etc.) within the above-described learning period. As a trigger), a gripping feature sample may be acquired. It is assumed that there is no information presented to the user to acquire (do) the gripping feature sample at the moment when the gripping feature sample is acquired or before and after that.
- the gripping feature sample is automatically acquired and accumulated with the acquisition timing as an unconscious time elapses from the user's point of view, the user's own key operation performed unconsciously, and the like.
- the gripping feature sample is acquired in this way, it is possible to acquire the gripping feature sample in a state where the user is unconscious and using the terminal in a most relaxed state. Thereby, the dispersion
- the gripping feature samples are automatically accumulated during the learning period.
- an announcement 16-3 as shown in FIG. 3B is displayed, and the learning period ends.
- FIG. 14 is a diagram for explaining mode classification based on the similarity of gripping features.
- modes such as browser 1, browser 2, mail, personal information browsing, telephone call, application, and menu.
- the browser 1 mode indicates an operating state of the mobile terminal in which communication charges are generated by browsing (browsing) a web page, or communication charges may occur. Therefore, for example, the browser software installed in the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′ is started to browse the portal pages of the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′.
- the operating state is the browser 1 mode.
- the browser 2 mode refers to an operating state of the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′ in which content charging is generated by browsing (browsing) a web page or content charging may occur. Show. Accordingly, for example, the browser software installed on the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′ is started and the mobile application of the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′ is downloaded for charging. The operating state is in the browser 2 mode.
- Mail mode indicates an operational state in which browsing of personal information described in an email can occur. Therefore, for example, the mailer installed in the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′ is activated to browse the mail folders of the mobile terminals 300, 300 ′, 300 ′′, 300 ′ ′′.
- the mail mode is an operation state in which a reply mail is being created using a mailer or the other party's mail is being received.
- the personal information browsing mode indicates an operating state in which personal information such as a telephone directory is being browsed. Therefore, for example, the operating state of browsing the phone book stored in the mobile terminals 300, 300 ', 300 ", 300"' corresponds to the personal information browsing mode.
- the call mode indicates an operation state of the mobile terminals 300, 300 ', 300 ", 300"' where the call charge is generated. Therefore, for example, an operation state in which a call is performed using the mobile terminals 300, 300 ', 300 ", 300"' corresponds to the call mode.
- the application mode indicates an operation state of the mobile terminals 300, 300 ', 300 ", 300"' that may cause communication billing or personal information browsing. Therefore, for example, an operation state in which an application installed on the mobile terminal 300, 300 ', 300 ", 300”' is running corresponds to the application mode.
- the menu mode is a mobile terminal 300, 300 ′, 300 ′′, 300 in which personal information browsing can occur depending on which screen the screen of the mobile terminal 300, 300 ′, 300 ′′, 300 ′ ′′ transitions to. Indicates the operating state of '' '. Accordingly, for example, the menu mode is an operating state in which the menu screen of the mobile terminal 300, 300 ', 300 ", 300"' is browsed and any transition destination is selected.
- the mode As described above, by acquiring the gripping feature sample separately for each mode of the mobile terminal, it is possible to acquire a stable gripping feature sample with little variation. In addition, by setting the mode according to the usage status of the mobile terminal as described above, it is possible to perform personal authentication using the gripping feature in various usage situations.
- the mode an example in which the mode is divided for each function of the mobile terminal, such as a browser and e-mail, has been shown. Based on the attitude of the mobile terminal itself using sensor information such as an acceleration sensor, a gyroscope, and a camera image It is also possible to prepare modes, and there is no need to decide the mode for each function.
- the mobile terminals 300, 300 ′, 300 ′′, and 300 ′ ′′ acquired the gripping feature samples for each mode.
- a method for compensating for the insufficient gripping feature sample will be described.
- both the browser 1 and the browser 2 are common in that they are in the state of a terminal that is browsing (browsing) a web page, and since the operation state is similar, the gripping features are similar to each other. Yes.
- the browser 1 and browser 2 modes can be classified into the same mode classification A as shown in FIG.
- the mode classification based on the similarity of the gripping features between the modes in this way for example, the mail mode and the application mode belong to the same mode classification B.
- Both the personal information browsing mode and the menu mode are classified as C.
- the call mode belongs to the category D has a gripping feature that is significantly different from other modes, the mode classification (A, B, C, D,...)
- the shortage of gripping feature samples can be compensated by using the gripping feature samples acquired in a mode belonging to the same mode classification as that mode.
- the shortage can be compensated using the gripping feature samples acquired in the browser 2 mode.
- the shortage can be compensated by using the gripping feature sample acquired in the application mode.
- FIG. 14 illustrates only an example in which only a single mode gripping feature sample is used to compensate for a mode deficiency, but is not limited thereto, and two or more similarities are used to compensate for a mode deficiency.
- a gripping feature sample in this mode may be used.
- the sample filling rate can be set for each mode.
- the sample supplement rate in the other mode is set higher as the gripping feature in another mode is similar to the certain mode.
- the sum of the sample coverages for all other modes set as other modes to compensate for the shortage of a certain mode is set to 1.
- FIG. 15 and FIG. 16 are diagrams for explaining the coverage rate of the gripping feature sample based on the similarity of the gripping feature.
- FIG. 15 is an example of a supplementing method when P ⁇ g or more gripping features are obtained in all the modes used for supplementing the gripping feature sample when P gripping feature samples are insufficient.
- FIG. 16 is an illustration of a supplementing method in the case where P ⁇ g or more gripping features are not obtained in any mode used for supplementing the gripping feature sample.
- P ⁇ 0.8 or more gripping feature samples have been acquired in the browser 2 mode (mode 2).
- the mail mode it is assumed that P ⁇ 0.2 or more gripping feature samples have been acquired.
- the gripping feature sample is supplemented as shown in FIG.
- the number of gripping feature samples in the browser 1 mode is insufficient and if the number of samples in the browser 2 mode (mode 2) is Q2, Q2 ⁇ P ⁇ 0.8.
- the gripping feature sample necessary for the supplement in the browser 2 mode is insufficient.
- Q2 ⁇ 1/4 rounded up, the same applies hereinafter
- mode 3 that is, Q3 samples of gripping features acquired in the mail mode, Q3 ⁇ Q2 ⁇ 1/4.
- Q3 gripping feature samples are acquired from the mail mode, and Q2 gripping feature samples are acquired from the browser 2 mode and used for the browser 1 mode supplement.
- the grip feature sample acquisition number Q2 in the browser 2 mode (mode 2) satisfies Q2 ⁇ P ⁇ 0.8, but the grip feature sample Q3 acquired in the mail mode is Q3 ⁇ P ⁇ 0.2. Even in the case of shortage, only Q3 gripping feature samples are acquired from the mail mode, and P ⁇ 0.8 gripping feature samples are acquired from the browser 2 mode and used for supplementing the browser 1 mode.
- the number of gripping feature samples acquired from a mode with a high sample supplementation rate and the number of gripping feature sample acquisitions from a mode with a low sample supplementation rate may not be a predetermined ratio due to the above processing. If the gripping feature sample acquisition rate from the high mode is equal to or higher than the sample compensation rate, the accuracy can be maintained.
- the gripping feature sample acquisition rate from a mode with a high sample coverage is less than the sample coverage, accuracy may not be ensured, but the gripping feature samples necessary for learning will be used even if the accuracy is somewhat lower. In such a case, it is possible to operate in the case where it is desired to obtain the information.
- FIG. 17 is a diagram for explaining the transition rate between modes.
- various modes (browser, mail, call, application,...) Can be set in the mobile terminal.
- a user of a mobile terminal usually operates the mobile terminal while changing between the plurality of modes. For example, start from the standby screen mode (referred to as mode 0), transition to mail mode (mode 3), transition to the photo browsing screen (personal information browsing mode) in the middle of mail creation, and attach a photo to the mail After that, the mode is changed to the mail mode again, and the standby screen is displayed after the mail is transmitted.
- mode 0 standby screen mode
- mode 3 transition to mail mode
- the photo browsing screen personal information browsing mode
- the gripping features of the transition mode are very similar to the gripping features of the transition mode.
- Some exceptions include, for example, a call mode and a camera mode. When calling or using a camera, the user normally grips the mobile terminal again, and the mobile terminal is often gripped again in a gripping state that is significantly different from the gripping state at the transition source. For this reason, this compensation method cannot be used exceptionally for the call mode and the camera mode.
- the transition source mode includes the browser 1 mode, the mail mode, the photo browsing screen (personal information browsing mode), the call There are a history browsing screen (personal information browsing mode), a telephone directory browsing screen (personal information browsing mode), a video browsing screen (personal information browsing mode), an application mode, a menu mode, a camera mode, and the like.
- a history browsing screen personal information browsing mode
- a telephone directory browsing screen personal information browsing mode
- a video browsing screen personal information browsing mode
- an application mode a menu mode
- a camera mode and the like.
- transition source occupation ratio in the browser 1 mode is 10%
- the transition source occupation ratio in the mail mode is 25%
- the personal information browsing mode is 10%
- Transition source occupancy is 35% in total
- transition source occupancy in app mode is 5%
- transition source occupancy in menu mode is 10%
- the transition source occupancy ratio in the camera mode can be obtained as 10%.
- 10% + 25% + 35% + 5% + 10% + 10% 95%, which is not 100%, but the remaining 5% is assumed to be occupied by another transition source (not shown).
- the mail mode is the transition destination mode, as shown in FIG.
- the transition source occupancy ratio of the standby screen (mode 0) is 40%
- the transition source occupancy ratio of the personal information browsing mode is 45% in total
- the menu mode Assuming that the transition source occupancy rate is 10%, since the similarity between the modes has a correlation with the transition source occupancy rate as described above, the gripping feature sample acquired in the standby screen (mode 0) is 40. %
- the gripping feature sample acquired in the personal information browsing mode is 45%
- the gripping feature sample acquired in the menu mode is 10%
- the other gripping feature sample is 5%.
- FIG. 4 is a block diagram illustrating a configuration of the mobile terminal 300 according to the present embodiment.
- FIG. 8 is a flowchart illustrating the operation of the mobile terminal 300 according to the present embodiment in the learning state.
- the portable terminal 300 of the present embodiment includes a pressure sensor array 105, a mode acquisition unit 110, a gripping feature sample acquisition unit 120, a switching unit 125, a sample temporary storage unit 130, a sample correction unit 310, and a template learning unit 135.
- the mobile terminal 300 includes the switching unit 125, and the switching unit 125 causes the mobile terminal 300 to be in a learning state (sample temporary storage unit 130 side) and an authentication state (person authentication unit 160 side). It is possible to switch to either of the following states. Here, it is assumed that the switching unit 125 is set to the learning state.
- the pressure sensor array 105 is arranged on the surface of the portable terminal 300 as described above.
- the mode acquisition unit 110 acquires the mode of the mobile terminal 300 (S110).
- the gripping feature sample acquisition unit 120 acquires gripping feature samples from the pressure sensor array 105 (S120). It is determined whether the preset learning period has ended (S305), and if it has ended, the process proceeds to step S130a. On the other hand, if the preset learning period has not ended, the process returns to the start, and steps S110 and S120 are repeated.
- the number of acquired gripping feature samples in the i-th mode is Smi
- the learning start sample number in the i-th mode is SFmi.
- n is an integer of 1 or more).
- the template learning unit 135 learns the user authentication template for each mode using the gripping feature sample, and stores the learned user authentication template in the template storage unit 155 corresponding to each mode (S135).
- the identity authentication template is obtained from an average value of gripping feature samples (a gripping pressure distribution in the embodiment).
- step S310 If the number is insufficient (Smi ⁇ SFmi) and it is determined in step S310 that there is a mode that can compensate for this, the k-th using the grip feature sample acquired in a mode different from the k-th mode In this mode, the shortage of gripping feature samples is compensated (S315).
- the process proceeds to step S135, and the template learning unit 135 selects the supplemented gripping feature samples.
- the user authentication template is learned for each mode using the mode, and the learned user authentication template is stored in the template storage unit 155 corresponding to each mode (S135).
- the mode that can compensate for the shortage of the kth mode can be set to a mode in which the mode classifications (A, B, C, D,%) Are equal as described above.
- the above-described sample compensation rate and transition source occupation rate can be used for determining the quantity of gripping feature samples to be used for each mode of compensation.
- FIG. 10 is a flowchart illustrating the operation of the mobile terminal 300 according to the present embodiment in the authentication state.
- the switching unit 125 of the mobile terminal 300 is set to the authentication state.
- the mode acquisition unit 110 acquires the mode of the mobile terminal 300 (S110).
- the gripping feature sample acquisition unit 120 acquires gripping feature samples from the pressure sensor array 105 (S120).
- the personal authentication unit 160 compares the learned personal authentication template with the gripping feature sample to perform personal authentication (S160).
- the lock unit 180 locks some or all of the functions of the mobile terminal 300 (S180). If the personal authentication is successful, the locking operation is not performed, and the process returns to step S110 after a predetermined time has elapsed or when a mode transition occurs.
- the method for comparing the personal authentication template and the gripping feature sample can be realized as follows, for example.
- the personal authentication unit 160 obtains a distance (for example, Mahalanobis general distance) between the personal authentication template and the gripping feature sample acquired in the authentication state.
- the personal authentication unit 160 concludes that the acquired gripping feature sample is that of the user. On the other hand, if the distance between the user authentication template and the gripping feature sample is not less than a certain value, it is concluded that the acquired gripping feature sample is not the subject's own.
- the mobile terminal 300 of the present embodiment even when the user authentication is performed using the grip feature in various modes, the shortage of the grip feature sample in a certain mode is compensated by the grip feature sample in the similar mode. Therefore, it is possible to learn a highly accurate personal authentication template for each mode with short-term learning.
- x i, j be the pressure value acquired by the i-th sensor element in the j-th measurement to be used for learning.
- m is the maximum number of gripping feature measurements for use in learning.
- Each is an integer of 2 or more.
- the mean, variance, and vector of pressure values are defined as follows:
- the subscript "le” is added to the personal authentication template.
- the Mahalanobis generalized distance f 1 is expressed by the following equation.
- the Euclidean distance f 2 is defined as follows.
- the Manhattan distance f 3 is defined as follows.
- the above three distance references can be determined in common using the determination formulas shown below.
- the subscript “self” is attached to the data of the person acquired for the determination process, and the subscript “Oth” is attached to the data of the other person. If the threshold value for determining another person is defined as x thre , the expression for determining another person can be expressed as follows. x thre ⁇ Oth f
- the other person's gripping feature sample data is pre-installed in the product of the mobile terminal, is made accessible to the user on the net, or the user acquires the data by holding the mobile terminal by another person.
- the distance Oth f is calculated from the other person's data and the personal authentication template. Further, the criterion for determining x thre is determined so as to satisfy the following condition after calculating the distance self f from the gripping feature sample of the person who has not been used for template learning and the template after learning. self f ⁇ x thre ⁇ Oth f
- the identification template is obtained from the average value of the gripping feature samples.
- the pressure distribution from the n-point sensor elements is divided into appropriate areas (for example, 10 divisions, where n is 10). And create vector data with the total gripping pressure (or average) in each divided area as an element by taking the total (or average) gripping pressure for each divided area.
- a template is created by averaging average vector data for m gripping feature samples.
- the top 20 sensor positions of the pressure values from the n sensor elements are recorded, vector data is created, and a template obtained by averaging such vector data created for m gripping feature samples is used as a template. It is good.
- FIG. 5 is a block diagram illustrating a configuration of the mobile terminal 300 ′ according to the present embodiment.
- FIG. 9 is a flowchart illustrating the operation of the mobile terminal 300 ′ according to the present embodiment in the learning state.
- the mobile terminal 300 ′ according to the present embodiment has a configuration in which a trigger monitoring unit 115 is added to the configuration of FIG. 4.
- the switching unit 125 is set to the learning state.
- the mode acquisition unit 110 acquires the mode of the mobile terminal 300 '(S110).
- the trigger monitoring unit 115 outputs a gripping feature acquisition signal when a sampling trigger determined according to the mode is generated (S115Y).
- the process returns to the start, and the mode of the portable terminal 300 'is acquired again (S115N, S110).
- the gripping feature sample acquisition unit 120 acquires a gripping feature sample from the pressure sensor array 105 in response to the gripping feature acquisition signal from the trigger monitoring unit 115 (S120). It is determined whether the preset learning period has ended (S305), and if it has ended, the process proceeds to step S130a. On the other hand, if the preset learning period has not ended, the process returns to the start and steps S110 to S120 are repeated. Since the operation after the end of the learning period is exactly the same as in the first embodiment, the description thereof is omitted.
- FIG. 19 is a diagram illustrating modes, sampling triggers, and other person determination lines in each mode.
- the modes include, for example, browser 1, browser 2, mail, personal information browsing, telephone call, application, menu, and the like.
- the sampling trigger set in the browser 1 mode is “depressing the enter key during browser activation”. This means that when the browser is being activated and the user presses the determination key of the portable terminal 300 ′, a gripping feature sample is acquired using this operation as a sampling trigger.
- the sampling trigger set in the browser 2 mode is “depressing the enter key during browser activation”. This is the same as in the case of the browser 1.
- the sampling trigger set in the mail mode is “pressing the enter key during mailer activation”.
- the sampling trigger set in the personal information browsing mode is “pressing the determination key during personal information display”. This means that when personal information such as a phone book is being displayed and the user presses the determination key of the portable terminal 300 ′, the gripping feature sample is acquired using this operation as a sampling trigger.
- “Determine key press” is an example of a sampling trigger by pressing a key, and an arbitrary operation key may be designated as a sampling trigger according to the mode.
- a sampling trigger is automatically generated “once every five minutes” without acquiring the operation key, and a gripping feature sample is acquired.
- the sampling trigger is automatically generated “once every five minutes”.
- the time interval of “5 minutes” for automatically generating the sampling trigger is an example, and an appropriate time interval may be designated according to the mode and the type of the mobile terminal.
- the sampling trigger set in the menu mode is “pressing the enter key during menu screen display”.
- a stable gripping feature sample with little variation can be obtained by setting a timing at which a stable gripping state can be expected as a sampling trigger.
- the user In each mode of the mobile terminal, the user generates a sampling trigger without being particularly conscious, and the gripping feature is automatically acquired at the timing of the sampling trigger generation, so it is possible to acquire a gripping feature sample with high accuracy. .
- FIG. 11 is a flowchart showing the operation of the portable terminal 300 ′ according to the present embodiment in the authentication state. Similar to the operation in the learning state (FIG. 9) of the present embodiment, the only difference from the first embodiment is that the sampling trigger generation is determined in step S115 before step S120.
- the mode acquisition unit 110 acquires the mode of the mobile terminal 300 '(S110).
- the trigger monitoring unit 115 determines whether a sampling trigger determined according to the mode has occurred (S115), and outputs a gripping feature acquisition signal when it occurs.
- the process returns to the start, and the mode of the portable terminal 300 'is acquired again (S110).
- the gripping feature sample acquisition unit 120 acquires a gripping feature sample from the pressure sensor array 105 in response to the gripping feature acquisition signal from the trigger monitoring unit 115 (S120). Since the process after step S160 is the same as the process after step S160 in the authentication state (FIG. 10) of the portable terminal 300 according to the first embodiment, a description thereof will be omitted.
- FIG. 6 is a block diagram illustrating the configuration of the mobile terminal 300 ′′ according to the present embodiment.
- FIG. 12 is a flowchart illustrating the operation of the portable terminal 300 ′′ according to the present embodiment in the authentication state.
- the mobile terminal 300 ′′ of the present embodiment has a configuration in which an extra person point adding unit 170 and a lock determining unit 175 are added to the configuration of the mobile terminal 300 ′ of the second embodiment shown in FIG. It has become.
- the operations of the components other than the other person point addition unit 170 and the lock determination unit 175 perform the same operations as those of the components assigned the same numbers in the second embodiment, and will not be described.
- the lock unit 180 immediately locks part or all of the functions of the mobile terminal 300 ′ (S180).
- the third embodiment is different in that the mobile terminal 300 ′′ is not immediately locked if the user authentication fails only once.
- the other person point addition unit 170 adds a predetermined number of points ⁇ to the other person point Oth (the initial value of Oth is 0) when the person authentication result performed by the person authentication unit 160 is not the person ( S170).
- the number of points ⁇ to be added can be appropriately adjusted so that the authentication operation is optimized. The larger the number of points ⁇ added at one time, the shorter the time until the terminal is locked.
- Thi other person determination line
- FIG. 18 is a diagram illustrating the operations of the other person point adding unit 170 and the lock determining unit 175 according to the present embodiment.
- the graph of FIG. 18 represents the time change of the accumulated state of other person points (Oth), with the horizontal axis representing time and the vertical axis representing other person points (Oth).
- a third party who is not a user of the mobile terminal 300 ′′ operates the mobile terminal 300 ′′ to open the menu screen of the mobile terminal 300 ′′, and then browses the phone book. Suppose that a call is made.
- the threshold value Thi (other person determination line, Thi) is different for each mode i.
- the threshold value Th7 is set to 60 in the menu mode (mode 7)
- the threshold value Th4 is set to 40 in the personal information browsing mode (mode 4).
- a difference in sex can be provided.
- a third party operating the mobile terminal 300 ′′ of this embodiment unintentionally generates a sampling trigger several times on the menu screen. As described above, the sampling trigger in the menu mode is “pressing the enter key while the menu screen is displayed”.
- the person authentication is performed using the gripping feature sample acquired in this way, and the point number ⁇ is added to the other person point (Oth) every time the person authentication fails.
- the threshold value Th7 in the menu mode is 60. In the menu mode, the other person's point (Oth) does not exceed Th7, and the screen changes from the menu screen to the phone book screen. Also on this telephone directory screen, the above-mentioned third party unintentionally generates a sampling trigger several times, and each time the personal authentication fails, the point number ⁇ is added to the other person's point (Oth).
- the threshold Th4 in the personal information browsing mode (mode 4) is as low as 40, the other person's point (Oth) does not exceed Th4 in this mode, and the screen changes from the phone book screen to the busy screen.
- all of the functions of the terminal may be locked, or only the mode may be locked for the mode where the other person's point (Oth) exceeds the threshold.
- the other person point (Oth) has exceeded 50, and the other person point (Oth) has exceeded the threshold (other person determination line) for browser 1, browser 2, mail, personal information browsing, and call mode. Therefore, only the browser function, the mail function, the personal information browsing function, and the call function may be locked. In this way, since the terminal lock is generated by accumulating the other person's points, the conditions for the terminal lock can be relaxed, so that the user himself / herself operates the portable terminal 300 '' with a gripping state different from usual.
- the convenience of the user is improved because the mobile terminal 300 '' is not locked immediately.
- the threshold value other person determination line
- a plurality of modes having the same threshold may exist. Note that the operation of the mobile terminal 300 ′′ according to the present embodiment in the learning state is the same as that of the mobile terminal 300 ′ according to the second embodiment, and thus description thereof is omitted.
- FIG. 7 is a block diagram illustrating the configuration of the mobile terminal 300 ′′ ′′ according to the present embodiment.
- FIG. 13 is a flowchart showing the operation of the portable terminal 300 ′′ ′′ according to the present embodiment in the authentication state.
- the mobile terminal 300 ′′ ′′ according to the present embodiment has a configuration in which a feedback unit 185 is added to the configuration of the mobile terminal 300 ′′ in FIG. 6.
- the operations of the components other than the feedback unit 185 are the same as those of the components having the same numbers in the third embodiment, the description thereof is omitted.
- the feedback unit 185 performs the personal authentication in step S165 of FIG.
- the result of the personal authentication performed by the authentication unit 160 is the principal, feedback correction is performed on the personal authentication template using the gripping feature sample used for learning of the personal authentication template and the gripping feature sample used for personal authentication. (S185).
- the gripping feature sample used for the personal authentication is temporarily stored in the feedback unit 185.
- the feedback unit 185 acquires all the gripping feature samples used for generating the personal authentication template from the sample temporary storage unit 130.
- the feedback unit 185 newly generates a personal authentication template by using all of the gripping feature sample used for the personal authentication and the gripping feature sample used for generating the personal authentication template (feedback correction).
- the new personal authentication template generated in this way is stored in the template storage unit 155 (S185).
- the gripping feature sample used for the personal authentication is stored in the sample temporary storage unit 130 in preparation for the next feedback correction. As described above, by performing feedback correction using the gripping feature sample when the personal authentication is successful, a more accurate personal authentication template can be generated.
- the alternative gripping feature sample that compensated for the shortage may be replaced with the gripping feature sample newly acquired at the time of personal authentication.
- the gripping feature sample used for the personal authentication is temporarily stored in the feedback unit 185.
- the feedback unit 185 acquires all the gripping feature samples used for generating the personal authentication template from the sample temporary storage unit 130.
- the supplemented gripping feature sample is replaced with a newly acquired gripping feature sample to generate a new authentication template ( Feedback correction).
- the new personal authentication template generated in this way is stored in the template storage unit 155 (S185).
- the gripping feature sample used for the authentication is replaced with the supplemented gripping feature sample and stored in the sample temporary storage unit 130 in preparation for the next feedback correction.
- the accuracy of the personal authentication template can be further improved by replacing the supplemented gripping feature sample with a new gripping feature sample by feedback correction.
- learning data can be added as appropriate by such feedback correction, so the initial learning period is shortened and referred to as short-term learning mode, temporary learning mode, etc.
- the user authentication template is learned, and the obtained user authentication template is sequentially improved in accuracy by feedback correction, so that the user authentication using the gripping feature can be started at an early stage.
- the operation in the learning state of the mobile terminal 300 ′′ ′′ according to the present embodiment is exactly the same as that of the mobile terminal 300 ′ according to the second embodiment, and thus the description thereof is omitted.
- the first embodiment is used as the basic pattern, the second embodiment in which the trigger monitoring unit 115 is added thereto, the third embodiment in which the other person point addition unit 170 and the lock determination unit 175 are added to the second embodiment.
- Example 4 which added the feedback part 185 to Example 3 was disclosed, it is not restricted to said combination. Only the other person point addition unit 170 and the lock determination unit 175 may be added to the first embodiment. Only the feedback unit 185 may be added to the first embodiment. Only the other person point addition unit 170, the lock determination unit 175, and the feedback unit 185 can be added to the first embodiment. Only the feedback unit 185 may be added to the second embodiment.
- the program describing the processing contents can be recorded on a computer-readable recording medium.
- the computer-readable recording medium may be any recording medium such as a magnetic recording device, an optical disk, a magneto-optical recording medium, and a semiconductor memory.
- this program is distributed by selling, transferring, or lending a portable recording medium such as a DVD or CD-ROM in which the program is recorded. Furthermore, the program may be distributed by storing the program in a storage device of the server computer and transferring the program from the server computer to another computer via a network.
- a computer that executes such a program first stores a program recorded on a portable recording medium or a program transferred from a server computer in its own storage device.
- the computer reads the program stored in its own recording medium and executes the process according to the read program.
- the computer may directly read the program from a portable recording medium and execute processing according to the program, and the program is transferred from the server computer to the computer.
- the processing according to the received program may be executed sequentially.
- the program is not transferred from the server computer to the computer, and the above-described processing is executed by a so-called ASP (Application Service Provider) type service that realizes a processing function only by an execution instruction and result acquisition. It is good.
- the program in this embodiment includes information that is used for processing by an electronic computer and that conforms to the program (data that is not a direct command to the computer but has a property that defines the processing of the computer).
- the present apparatus is configured by executing a predetermined program on a computer.
- a predetermined program on a computer.
- at least a part of these processing contents may be realized by hardware.
Abstract
Description
xthre<Othf
selff<xthre<Othf
Claims (11)
- 自身が把持されたときの把持特徴サンプルを取得して本人認証を行う移動情報端末であって、
前記移動情報端末のモードを取得するモード取得部と、
前記把持特徴サンプルを取得する把持特徴サンプル取得部と、
前記移動情報端末を学習状態、認証状態のどちらかの状態に切替える切替え部と、
前記移動情報端末の状態が本人認証プレートの学習状態であって、何れかのモードにおいて取得された把持特徴サンプルの数が不足する場合に、前記何れかのモードと異なるモードにおいて取得された把持特徴サンプルを用いて前記何れかのモードにおける把持特徴サンプルの不足を補てんするサンプル補てん部と、
前記移動情報端末の状態が学習状態である場合に、前記把持特徴サンプルを用いて本人認証テンプレートを前記モードごとに学習するテンプレート学習部と、
前記移動情報端末の状態が認証状態である場合に取得された把持特徴サンプルを、前記学習された本人認証テンプレートと比較して前記本人認証を行う本人認証部と、
前記本人認証が失敗した場合に前記移動情報端末の機能の一部または全部をロックするロック部と、
を含む。 - 請求項1に記載の移動情報端末であって、前記サンプル補てん部は、何れかのモードにおける把持特徴サンプルの不足を補てんする場合に、前記何れかのモードと把持特徴が類似しているモードにおいて取得された把持特徴サンプルを用いるよう構成されている。
- 請求項1に記載の移動情報端末であって、前記サンプル補てん部は、何れかのモードにおける把持特徴サンプルの不足を補てんする場合に、モード間遷移履歴において、前記何れかのモードの遷移元となっているモードにおいて取得された把持特徴サンプルを用いるよう構成されている。
- 請求項1から3の何れかに記載の移動情報端末であって、前記モードに応じて定まるサンプリングトリガが発生した場合に、把持特徴取得信号を出力するトリガ監視部をさらに含み、前記把持特徴サンプル取得部は、前記把持特徴取得信号を取得して、前記把持特徴サンプルを取得するよう構成されている。
- 請求項1から4の何れかに記載の移動情報端末であって、
前記移動情報端末の状態が認証状態である場合に、前記本人認証部が行った本人認証結果が本人でない場合に、他人ポイントに所定のポイント数を加算する他人ポイント加算部と、
前記他人ポイントが予め定めた閾値を超える場合に本人認証が失敗したと判定するロック判定部と、
をさらに含む。 - 請求項1から5の何れかに記載の移動情報端末であって、前記移動情報端末の状態が認証状態である場合に、前記本人認証部が行った本人認証結果が本人である場合に、前記本人認証テンプレートの学習に用いられた把持特徴サンプルと、前記本人認証に用いた把持特徴サンプルとを用いて、前記本人認証テンプレートにフィードバック補正を施すフィードバック部をさらに含んでいる。
- 移動情報端末が把持されたときの把持特徴サンプルを取得して本人認証テンプレートの学習を行う把持特徴学習方法であって、
前記移動情報端末のモードを取得するモード取得ステップと、
前記把持特徴サンプルを取得する把持特徴サンプル取得ステップと、
何れかのモードにおいて取得された把持特徴サンプルの数が不足する場合に、前記何れかのモードと異なるモードにおいて取得された把持特徴サンプルを用いて前記何れかのモードにおける把持特徴サンプルの不足を補てんするサンプル補てんステップと、
前記把持特徴サンプルを用いて本人認証テンプレートを前記モードごとに学習するテンプレート学習ステップと、
を含む。 - 請求項7に記載の把持特徴学習方法であって、前記サンプル補てんステップは、何れかのモードにおける把持特徴サンプルの不足を補てんする場合に、前記何れかのモードと把持特徴が類似しているモードにおいて取得された把持特徴サンプルを用いる。
- 請求項7に記載の把持特徴学習方法であって、前記サンプル補てんステップは、何れかのモードにおける把持特徴サンプルの不足を補てんする場合に、モード間遷移履歴において、前記何れかのモードの遷移元となっているモードにおいて取得された把持特徴サンプルを用いる。
- 請求項7から9の何れかに記載の把持特徴学習方法であって、前記モードに応じて定まるサンプリングトリガが発生した場合に、把持特徴取得信号を出力するトリガ監視ステップをさらに含み、前記把持特徴サンプル取得ステップは、前記把持特徴取得信号を取得して、前記把持特徴サンプルを取得する。
- 請求項7から10の何れかに記載の把持特徴学習方法をコンピュータで実行するプログラムが記録されたコンピュータで読み取り可能な記録媒体。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012554857A JP5571808B2 (ja) | 2011-01-28 | 2012-01-27 | 移動情報端末、把持特徴学習方法、プログラム、記録媒体 |
EP12739959.0A EP2669835B1 (en) | 2011-01-28 | 2012-01-27 | Mobile information terminal and gripping-feature learning method |
CN201280006605.0A CN103348352B (zh) | 2011-01-28 | 2012-01-27 | 移动信息终端以及抓握特征学习方法 |
US13/976,482 US9117067B2 (en) | 2011-01-28 | 2012-01-27 | Mobile information terminal and gripping-feature learning method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011016096 | 2011-01-28 | ||
JP2011-016096 | 2011-01-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012102365A1 true WO2012102365A1 (ja) | 2012-08-02 |
Family
ID=46580928
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2012/051752 WO2012102365A1 (ja) | 2011-01-28 | 2012-01-27 | 移動情報端末及び把持特徴学習方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US9117067B2 (ja) |
EP (1) | EP2669835B1 (ja) |
JP (1) | JP5571808B2 (ja) |
CN (1) | CN103348352B (ja) |
WO (1) | WO2012102365A1 (ja) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100118A (zh) * | 2015-08-28 | 2015-11-25 | 努比亚技术有限公司 | 一种鉴权认证的装置和方法 |
TWI590100B (zh) | 2016-03-25 | 2017-07-01 | 速博思股份有限公司 | 手持裝置的操作方法 |
EP3238816B1 (de) | 2016-04-29 | 2019-10-09 | Symrise AG | Verfahren zur herstellung von mikrokapseln |
CN106909815A (zh) * | 2017-01-24 | 2017-06-30 | 宇龙计算机通信科技(深圳)有限公司 | 一种安全控制方法、装置及移动终端 |
KR102406099B1 (ko) * | 2017-07-13 | 2022-06-10 | 삼성전자주식회사 | 전자 장치 및 이의 정보 표시 |
JP7267439B2 (ja) | 2019-02-13 | 2023-05-01 | シムライズ アーゲー | マイクロカプセルの調製のためのプロセス |
AU2019457781B2 (en) * | 2019-07-23 | 2023-04-06 | Nippon Telegraph And Telephone Corporation | Abnormality detection device, abnormality detection method, and abnormality detection program |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11119906A (ja) * | 1997-10-09 | 1999-04-30 | Taisei Corp | 利用適格者認証用ポインティングデバイス及び利用適格者認証装置 |
JP2001142849A (ja) | 1999-11-16 | 2001-05-25 | Ntt Docomo Inc | 携帯情報端末及び個人認証方法 |
JP2004110196A (ja) * | 2002-09-13 | 2004-04-08 | Fuji Xerox Co Ltd | 個人識別装置 |
JP2006011591A (ja) * | 2004-06-23 | 2006-01-12 | Denso Corp | 個人認証システム |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6973336B2 (en) * | 2000-12-20 | 2005-12-06 | Nokia Corp | Method and apparatus for providing a notification of received message |
US20050273333A1 (en) * | 2004-06-02 | 2005-12-08 | Philippe Morin | Speaker verification for security systems with mixed mode machine-human authentication |
US20110056108A1 (en) * | 2007-05-31 | 2011-03-10 | Mccord Jonas | Retrofitted and new weapons with biometric sensors for multiple users using flexible semiconductors |
JP5340751B2 (ja) * | 2008-04-22 | 2013-11-13 | 株式会社エヌ・ティ・ティ・ドコモ | 文書処理装置および文書処理方法 |
-
2012
- 2012-01-27 EP EP12739959.0A patent/EP2669835B1/en not_active Not-in-force
- 2012-01-27 US US13/976,482 patent/US9117067B2/en not_active Expired - Fee Related
- 2012-01-27 CN CN201280006605.0A patent/CN103348352B/zh not_active Expired - Fee Related
- 2012-01-27 WO PCT/JP2012/051752 patent/WO2012102365A1/ja active Application Filing
- 2012-01-27 JP JP2012554857A patent/JP5571808B2/ja not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11119906A (ja) * | 1997-10-09 | 1999-04-30 | Taisei Corp | 利用適格者認証用ポインティングデバイス及び利用適格者認証装置 |
JP2001142849A (ja) | 1999-11-16 | 2001-05-25 | Ntt Docomo Inc | 携帯情報端末及び個人認証方法 |
JP2004110196A (ja) * | 2002-09-13 | 2004-04-08 | Fuji Xerox Co Ltd | 個人識別装置 |
JP2006011591A (ja) * | 2004-06-23 | 2006-01-12 | Denso Corp | 個人認証システム |
Non-Patent Citations (1)
Title |
---|
See also references of EP2669835A4 |
Also Published As
Publication number | Publication date |
---|---|
CN103348352B (zh) | 2015-11-25 |
EP2669835A1 (en) | 2013-12-04 |
EP2669835B1 (en) | 2017-12-27 |
CN103348352A (zh) | 2013-10-09 |
EP2669835A4 (en) | 2014-06-25 |
US9117067B2 (en) | 2015-08-25 |
JP5571808B2 (ja) | 2014-08-13 |
JPWO2012102365A1 (ja) | 2014-06-30 |
US20130298225A1 (en) | 2013-11-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5571808B2 (ja) | 移動情報端末、把持特徴学習方法、プログラム、記録媒体 | |
JP5567152B2 (ja) | 移動情報端末、把持特徴学習方法、把持特徴認証方法及び記録媒体 | |
JP5567151B2 (ja) | 移動情報端末、把持特徴学習方法、把持特徴認証方法及び記録媒体 | |
JP5612756B2 (ja) | 移動情報端末、把持特徴認証方法及びプログラム | |
JP5579915B2 (ja) | 把持特徴学習認証システム及び把持特徴学習認証方法 | |
CN107113611B (zh) | 基于多个设备的用户认证置信度 | |
CN104899056A (zh) | 一种锁屏状态进入限制使用应用的移动终端及方法 | |
CN103703463A (zh) | 基于图像识别搜索取回联系信息 | |
JP4977425B2 (ja) | 携帯端末装置及びプログラム | |
US8041738B2 (en) | Strongly typed tags | |
TWI474705B (zh) | 手持裝置及其解除鎖定的方法 | |
CN101471981A (zh) | 电话拨号方法 | |
CN104301385A (zh) | 数据获取方法、计算设备、移动设备及系统 | |
JP6441544B2 (ja) | 情報機器操作システム、情報機器操作方法及びプログラム | |
CN113254119A (zh) | 基于用户特性生成动态装置用户界面的系统和方法 | |
CN106778339B (zh) | 一种隐私保护方法及装置、移动终端 | |
Eremin et al. | Touch and move: Incoming call user authentication | |
KR101462227B1 (ko) | 지문을 이용한 파일 관리 방법, 장치 및 기록 매체 | |
CN111418196A (zh) | 移动通讯终端及其基于人脸识别的通讯方法 | |
Kumar et al. | Multifactor Authentication System | |
CN109032442A (zh) | 内容显示方法、装置、存储介质及电子设备 | |
CN110995935A (zh) | 移动终端的信息显示方法、移动终端及可读存储介质 | |
CN109241713A (zh) | 一种指纹解锁的方法、装置及用户终端 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12739959 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2012554857 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012739959 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13976482 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |