WO2013069841A1 - 홍채이미지를 이용한 보안이 강화된 잠금장치 - Google Patents
홍채이미지를 이용한 보안이 강화된 잠금장치 Download PDFInfo
- Publication number
- WO2013069841A1 WO2013069841A1 PCT/KR2011/008754 KR2011008754W WO2013069841A1 WO 2013069841 A1 WO2013069841 A1 WO 2013069841A1 KR 2011008754 W KR2011008754 W KR 2011008754W WO 2013069841 A1 WO2013069841 A1 WO 2013069841A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- iris
- iris image
- lock
- security
- Prior art date
Links
Images
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B51/00—Operating or controlling locks or other fastening devices by other non-mechanical means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/0002—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network
- A61B5/0015—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network characterised by features of the telemetry system
- A61B5/002—Monitoring the patient using a local or closed circuit, e.g. in a room or building
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/0059—Measuring for diagnostic purposes; Identification of persons using light, e.g. diagnosis by transillumination, diascopy, fluorescence
- A61B5/0077—Devices for viewing the surface of the body, e.g. camera, magnifying lens
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/117—Identification of persons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
- G06V40/197—Matching; Classification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00388—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
Definitions
- the token generator mounted on the lock device is configured with one or more of a unique number and a random number of the lock device and transmitted to the terminal.
- Request the iris image to be taken and send it generate the iris template from the iris image acquired by the camera fixedly installed on the user terminal, encrypts the generated iris template and token and transmits it to the lock device from the terminal through short-range wireless communication, It is configured to decrypt the received encrypted iris template and token with a decryption device equipped with a lock and compare one or more of the iris templates previously stored in the database to perform one or more of the followings: access permit, access denied, re-request request and emergency alarm.
- Enhanced security using iris image It relates to a locking device.
- fingerprint recognition may be performed together with the lock, but there is a high possibility of a device error according to the environment in which the lock is exposed, and whether the fingerprint of the living person is recognized at the time of requesting the access of the person registered in the accessor list. There is a problem that the security is inferior because of uncertainty.
- the volume of the locking device is low and the installation position is low, which makes it difficult for users to take the iris, and the camera is exposed to an external environment in which the locking device is installed.
- the problem to be solved by the present invention is to create the iris template of a living person at the time to allow the access of the stored person registered in the accessor list stored in the lock database in order to enhance security in addition to the existing security method and means of the lock device.
- Information is encrypted and used for authentication to enhance the security of the lock.
- NFC chip near field communication chip
- Another problem to be solved by the present invention is to select and apply one or more of the terminal unique number (ID), the location where the shooting occurs, the time when the shooting occurs, the random number received from the lock device in order to provide the lock device with the validity information of the iris image This is to improve the security by sending the validity information to the lock.
- ID terminal unique number
- Another problem to be solved by the present invention is to lock the device configured to generate an emergency alarm by adding information to the iris template generation information when the iris is taken when the iris image is generated when the iris image is forced by another person It is to strengthen the security of the.
- the present invention includes means for registering and storing access information for authentication in a lock device in a terminal equipped with a near field communication device and a camera, and accessing the device to the lock device activates the lock device to authenticate the terminal.
- the terminal has a means for generating and transmitting the token to shoot the iris image within the set time and transmit it to the lock device, and generates an iris template from the iris image acquired by the camera fixedly installed on the terminal, Iris templates and tokens
- the terminal accesses the lock to transmit the lock to the lock by wireless communication, and compares the similarity between the iris template and the token stored in the lock based on the iris template received from the terminal and determines whether the picture was taken within the set time.
- the present invention provides a security-enhanced locking device using an iris image having a means for determining one or more of unlocking, maintaining a locked state, re-requesting an image, and emergency alarm.
- Another problem solving means of the present invention is to provide a terminal with a validity information of the iris image used to increase the security to the device, the terminal unique ID (ID), the location where the shooting, the time the shooting occurred, the lock
- ID terminal unique ID
- the present invention provides a security-enhanced locking device having a means for providing validity information to the locking device by selectively applying one or more of information such as a random number received from the device.
- Another problem solving means of the present invention is to insert a special fragile digital watermark (fragile digital watermark) in the iris image to increase the security when attempting to manipulate the iris image is configured to destroy the embedded digital watermark If the digital watermark is properly extracted from the received iris image, the locker recognizes the validity of the iris image. If the digital watermark is not extracted, the locker determines that the iris image has been tampered. It is to provide a locking device with enhanced security.
- a special fragile digital watermark fragment digital watermark
- the present invention in addition to the existing security method and means of the lock device, the information registered by the creation of the iris template of the living person at the point of time to allow the access of the person stored in the accessor list stored in the lock database to be used for authentication There is an advantageous effect that can enhance the security of the locking device.
- Another effect of the present invention is provided with a means for performing short-range communication such as a short-range wireless communication chip in order to send and receive wirelessly necessary information in both directions between the locking device and the terminal generating the iris template, and transmitted during communication All data is encrypted and decrypted using an encryptor and a decryptor to be used for authentication to enhance the security of the lock.
- a means for performing short-range communication such as a short-range wireless communication chip in order to send and receive wirelessly necessary information in both directions between the locking device and the terminal generating the iris template, and transmitted during communication All data is encrypted and decrypted using an encryptor and a decryptor to be used for authentication to enhance the security of the lock.
- Another effect of the present invention is to select and apply one or more of the terminal unique number (ID), the location where the shooting occurs, the time when the shooting occurs, the random number received from the lock device to provide the lock device with the validity information of the iris image It is to improve security by transmitting information to the lock.
- ID terminal unique number
- Another effect of the present invention is configured to generate an emergency alarm by adding information to the iris template generation information when the iris is taken when the iris image needs to be generated by the force of another person to secure the locking device. To strengthen the castle.
- FIG. 1 is a view showing the overall configuration of a security-enhanced locking device using the iris image according to the present invention.
- FIG. 2 schematically illustrates one example of a terminal configuration according to the present invention.
- Figure 3 schematically shows an example of the configuration of a locking device including a door lock according to the present invention.
- Terminal 22 Film or camera
- the present invention includes means for registering and storing access information for authentication in a lock device in a terminal equipped with a near field communication device and a camera, and accessing the device to the lock device activates the lock device to authenticate the terminal.
- the terminal has a means for generating and transmitting the token to shoot the iris image within the set time and transmit it to the lock device, and generates an iris template from the iris image acquired by the camera fixedly installed on the terminal, Iris templates and tokens
- the terminal accesses the lock to transmit the lock to the lock by wireless communication, and compares the similarity between the iris template and the token stored in the lock based on the iris template received from the terminal and determines whether the picture was taken within the set time.
- the present invention provides a security-enhanced locking device using an iris image having a means for determining one or more of unlocking, maintaining a locked state, re-requesting an image, and emergency alarm.
- FIG. 1 is a view showing the overall configuration of a security-enhanced locking device using the iris image according to the present invention.
- 2 schematically illustrates one example of a terminal configuration according to the present invention.
- Figure 3 schematically shows an example of the configuration of a locking device including a door lock according to the present invention.
- the present invention is configured to interlock with the lock device and the terminal including a door lock and the iris image designed to lock and release the lock device using the tag information and iris image associated with the terminal user and / or terminal through the terminal It is a security device with enhanced security.
- the user In order to use the iris image of the accessor to increase the security of the locking device, the user naturally installs the camera for photographing the iris directly to the locking device including the door lock (hereinafter referred to as the 'locking device'). It is difficult to photograph the iris, the camera installed in the locking device is exposed to the external environment, and it is easy to be damaged, and dust or dirt may accumulate on the lens surface, or there may be a problem in photography due to excessive light exposure. There is this.
- the present invention captures and acquires an iris image of a user through a mobile device and / or a terminal (hereinafter, referred to as a 'terminal') having various kinds of cameras attached thereto, and releases or maintains a lock using the same. It is configured to be able to achieve a high security lock.
- the user is a terminal owner who wants to access by unlocking the lock.
- the terminal photographs the iris, and any device capable of transmitting the photographed iris image through short-range wireless communication may be used as a locking device.
- the terminal may be a mobile phone or a smart phone.
- the terminal described in the present invention is a device or device that can be attached to the camera and can send and receive data that can lock or terminate the locking device by short-range wireless communication.
- the lock device transmits and receives the photographed iris image, tag information, and tokens in both directions through short-range wireless communication (27 in FIG. 2), and determines whether the user is allowed to access and store registered in the database or memory of the lock device based on this. On the basis of the determined information, it is configured to control the locking device through the locking device control unit to control access.
- the host (14 of FIG. 1) may perform access control except for short-range communication as shown in FIG. 1.
- the photographing unit (hereinafter referred to as a "camera”) has a display unit in the terminal, it is preferable to install a camera on the same side as the display unit, and more preferably, to be positioned above the display unit to facilitate shooting.
- the lens size of the camera is preferably 1 cm or less.
- the photographing unit of the present invention is sufficient if it is an image sensor capable of acquiring characteristic information of the iris image used for security.
- Short-range wireless communication (27 in Figure 2) is preferably configured to enable data transmission and reception at a very close distance (within 10cm), such as Near Field Communication (NFC).
- NFC Near Field Communication
- NFC chips for short-range wireless communication are embedded at both sides of the terminal and the locking device, and information necessary between the terminal (11 of FIG. 1) and the locking device (12 of FIG. 1) is provided. It is configured to unlock or hold the lock while exchanging each other in both directions.
- the user can visually confirm that the image is captured by the display unit, thereby helping to obtain a good quality iris image, but the photographing can be performed without the display unit.
- the sharpness of the photographed iris image may be lowered, and thus the recognition rate may be lowered. It can be fixedly installed on one side of the surface where the camera of the terminal is installed for the subsidiary shooting that can give (white light or infrared light).
- the lighting unit may include a function and a means for instructing the user about the action through a sound or an LED so as to capture the iris image more clearly.
- CMOS complementary metal-oxide-semiconductor
- the encryptor inserts a token or a key into the iris image or encrypts and signs the iris image information at the request of the locking device.
- the quality meter determines whether the photographed image satisfies a predetermined quality standard. If the predetermined quality standard is satisfied, the photographed iris image is transferred to the preprocessor.
- the locking device In order to prevent the iris image used in the previous entrance attempt or intentionally manipulated in the current entrance attempt, the locking device is effective before performing the matching operation with the iris image sent from the terminal. If it is determined that the iris image is not valid, the terminal may request a re-photographing of the iris image or deny access by the terminal to maintain the lock.
- the information verifying the validity of the iris image transmitted from the terminal in the present invention includes information on whether the iris image actually photographed the person in the session at that time and at the place designated by the camera attached to the terminal. .
- the terminal should be provided with a means for providing the locking device with information for authenticating the validity by selecting one or more of a terminal ID (ID), a location where the shooting takes place, a time when the shooting takes place, and a random number received from the locking device. .
- ID terminal ID
- the terminal should be provided with a means for providing the locking device with information for authenticating the validity by selecting one or more of a terminal ID (ID), a location where the shooting takes place, a time when the shooting takes place, and a random number received from the locking device.
- the information for authenticating the validity may be used to determine that the user has generated an iris template of a living person obtained by photographing directly with a camera at a time of selectively allowing access.
- the terminal unique number may refer to a unique number of a camera (image sensor) attached to a terminal photographing an iris image as well as a unique number of the terminal itself. From the unique number of the terminal or the unique number of the camera, the locking device determines that the iris image has been taken from the registered terminal.
- the location where the photographing has taken place means an absolute position or a relative position when the terminal photographs the iris image.
- the absolute position information is information provided by the GPS.
- the terminal is equipped with means capable of operating in conjunction with the satellite navigation system.
- An example of the relative location information is a unique number of a base station or a wireless AP to which a terminal is connected.
- the terminal is equipped with a means which can be used by connecting to a base station or a wireless AP.
- these means can be used to verify the validity judgment.
- the lock device determines whether the location where the recording received from the terminal is located within the setting and storage range in the memory. The information is judged to be invalid.
- the terminal is equipped with a timer in order to obtain information about the time at which the photographing occurred in the camera mounted on the terminal.
- the terminal may receive information about the current time from the base station, the wireless AP, or the like to which the terminal is connected, and provide the information to the locking device.
- the lock determines whether the time when the recording received from the terminal is within the set and stored range in the memory, and if it is within the set time, it determines that the shooting occurred at that time zone, otherwise it is valid to be taken in another time zone. Judging by the missing information.
- Information about the random number received from the lock device is generated in the lock device in the form of token in the process of requesting the iris image from the lock device to the terminal, and the terminal receives the received random number again with the iris image as the lock device. Configure to send.
- One or more pieces of information for verifying the validity of the iris image in the terminal may be inserted into the iris image when the iris image is photographed.
- the information for this validation is inserted into the iris image so that it can be distinguished, so that it can be easily extracted and can be configured to be inserted in the form of a digital watermark.
- the digital watermark embedded in the iris image is destroyed in software.
- the locker verifies the validity of the iris image based on the digital watermark extracted correctly from the received iris image. If the digital watermark is not extracted, the iris image is judged tampered and the locking device remains locked.
- the terminal is protected from external intrusion so that the process of inserting the digital watermark in the terminal does not leak.
- the preprocessor extracts only the iris from the photographed iris image to generate the iris template.
- the preprocessor may be omitted.
- the locking device and the terminal are provided with an encryptor and a decryptor to enhance security, and are configured to transmit data by encrypting the data in two-way communication when necessary, and to decrypt and use the side receiving the encrypted data.
- the information used in the iris image and the transmission / reception procedure should be encrypted in order to cope with the potential risk of information leakage or manipulation due to information leakage while the information is generated and transmitted in the terminal or the locking device.
- both the terminal and the lock can be authenticated to prove that they are the true target of transmission and reception.
- any method may be used as long as it is for authentication or information encryption.
- the terminal has a function of discriminating imitation eyes in order to prevent a third party who is not a user of the terminal from photographing imitation eyes using a terminal without permission and deceiving them as if they photographed an iris of a real person.
- Information about the validity of the iris image may be intentionally manipulated inside the terminal and transmitted to the locking device.
- malware If malware is installed in the terminal without the user's knowledge, somewhere in the middle of the iris image until it is captured and delivered to the lock device, the malicious code intervenes without permission to directly manipulate the iris image or manipulate the iris image validity information. Can transmit
- iris image shooting takes place and hardware or software is prevented from accessing the terminal's application program somewhere between the validity information generated and transmitted to the lock device. It is desirable to be designed.
- the terminal user and terminal-related tag information are read through the short-range wireless communication of the locking device in a database in which the information of the accessors of the locking device is stored so that the user can release or lock the lock using the terminal.
- registration can be performed by using a button for registration in a lock device, or a procedure for registering with a program installed in a terminal can be performed according to a guide.
- the terminal user and the tag information of the terminal is stored in the database or memory of the lock device, and is configured to perform the following procedure to register the iris template of the terminal user have.
- the tag information may be configured by selecting one or more of a unique number (resident number, etc.) of the terminal user, a unique number of the terminal, and one time password (OTP).
- a unique number resident number, etc.
- OTP one time password
- the locking device includes a token generator, and is configured to transmit the token generated by the token generator to the terminal through the short range wireless communication chip through the short range wireless communication chip.
- the terminal receives the token from the locking device through short-range wireless communication, and the terminal user acquires the iris image by photographing the iris using a camera installed with the user's iris attached to the terminal.
- the iris image input through the camera attached to the user terminal may go through a means of checking whether the iris image photographed by the quality measuring instrument satisfies the quality standard required for iris recognition.
- the quality standard includes means for evaluating a path to determine whether the iris image is directly transmitted from the camera or received through another path.
- This may be configured with information used when determining whether the iris image usefulness described above.
- the lock device when received through another path, inserts error information into the data to be transmitted to the terminal, and transmits the error information through short-range wireless communication, and photographs and transmits the iris image to a camera attached to the user terminal.
- the quality standard of the iris image may include self quality evaluation criteria information including clarity, occlusion, etc. of the iris image required to generate the iris template.
- the terminal sends a message to the user to retake the iris image.
- the preprocessor performs preprocessing to generate the iris template.
- the error information is transmitted to the terminal to process the error and perform the registration procedure again.
- the locking device includes pre-registered user's iris templates stored in a database, and has a matcher for determining whether to release or maintain the lock by comparing the registered iris template with the iris image input through the terminal. .
- the matcher compares the iris templates of users pre-registered and stored in the database of the locker with the iris templates transmitted from the decoder of the locker to determine whether the lock is unlocked or held. If data matching the iris template of a user who is already registered is registered and stored in the database, it is notified that the user terminal is registered with the attempted registration and does not perform a new registration.
- the terminal information and the iris template of the new user are registered and stored in the database or memory of the locking device and the new registration is terminated.
- the iris template, the terminal user information, and the terminal information used for new registration or additional registration may be registered and stored using information stored in the existing memory.
- the locking device is provided with means for deleting an unnecessary person from among those who are registered and stored in a database or memory.
- the means for deleting may be achieved by using a delete button installed in the lock body or by interlocking with a terminal or a computer.
- the following is a description of the means for releasing or maintaining the lock device through short-range wireless communication using a camera in the user terminal after completing the accessor registration procedure in the memory or database of the lock device.
- the user may selectively press the access number of the lock using a keypad, and may deny access if the input number of the keypad is different from the lock.
- the user is in close proximity to the user terminal for near field communication with the locking device.
- the terminal user and the terminal-related tag information is transmitted to the locking device through near field communication to activate the locking device and the terminal as an operation mode for unlocking or maintaining the lock.
- the token is transmitted to the terminal through short-range wireless communication of the lock device.
- the terminal receives the token through short-range wireless communication and acquires an iris image by using a camera attached to the user terminal.
- the iris image input through the camera may be provided to the quality measuring unit to check whether the quality criteria of the photographed iris image are satisfied.
- the quality measurement of the iris image measured by the camera and the determination of whether it satisfies the quality criteria are the same as the configuration described in the registration process, so the description thereof is omitted.
- the iris image acquired from the camera fixedly installed in the terminal generates an iris template for the iris image in the iris template generator mounted in the terminal.
- the iris template generator consists of software and is mounted in the terminal memory.
- the iris template will be described later in more detail.
- the locker decrypts the data transmitted by the terminal in the decryptor to extract error information, alarm information, information for determining whether the token is acquired within a predetermined time, user information and iris template.
- the error information is not acquired within the set time, the error information is exported. If there is alarm information, an alarm message is sent.
- a matcher is mounted in the memory of the locker, and the matcher of the locker compares the similarity between the user iris template previously registered in the database and the iris template decrypted by the decoder. Store similarity comparison results in a database or in memory.
- the lock controller sends a signal to unlock the lock to allow the user to enter and exit.
- the token generator, the encryptor, the decoder, the iris template matcher, and the iris template generator described above are configured to be automatically loaded into the memory when the software according to the present invention is downloaded.
- Encoders, decoders, iris template matchers, iris template generators are technical configurations for the public authority that are disclosed or widely used in the presently disclosed inventions, which have been previously filed by the applicant, and thus detailed descriptions or techniques thereof will be omitted.
- the locking device and the terminal have a memory or a universal subscriber identity module chip (USIM), which are iris templates, personal identification numbers (PINs), terminal identification numbers and other personal information for security purposes. Register one or more of them in a database or memory, and when the terminal approaches the lock, it is activated and transmits the terminal user and terminal related tag information to the lock, and registers them in the lock database or memory based on the transmitted tag information.
- the mobile device generates and transmits a token to the terminal after searching and determining that the stored legitimate user is present.
- the token is generated by the locking device and transmitted to the terminal.
- the universal subscriber identity module chip includes all information for user identification, it can be used for both the terminal and the locking device.
- the U-sim chip may store an iris template for comparing the accessor information used when the terminal user corresponds to a legitimate person and the iris template obtained from the iris image photographed by the terminal.
- the iris template is an iris image format that is stored in a memory for use when performing the similarity of iris images to determine whether the iris images are identical. It is a smaller iris image format than the original iris image measured by the camera.
- the corresponding iris template has a memory size of about 10 KByte and is about 1/10 of the original iris image data.
- iris template is significantly smaller than the original iris image data.
- the iris template contains an individual's unique biometric characteristics by processing the iris image using Fourier transform or wavelet transform in order to increase processing speed during authentication and reduce memory capacity during storage.
- the following includes means for accessing the lock to the terminal to transmit the encrypted iris template and the token generated in the terminal to near field communication.
- the locker compares the decrypted iris template and the token with the iris template registered in the database or memory of the locker in advance or through the registration procedure to determine the similarity, and releases the lock or permits access.
- the token is generated when a token is generated by the token generator of the lock device and transmitted to the terminal, and when the terminal receives the iris template and the token acquired by the camera from the terminal, the token is used to determine whether the token is photographed and transmitted within a set time.
- Means for encrypting or decrypting with the above-described encryptor and decryptor may also be omitted as necessary.
- the iris template stored in the terminal and the locking device is preferably manufactured and mounted in a technical configuration that can enhance security in hardware and / or software so that the iris template can not be read from the outside.
- An iris image obtained by using a camera attached to a terminal is encrypted with an iris template having a unique biometric characteristic and has a small memory capacity and transmitted to a locker, and the iris stored in a memory or a database is decrypted by decrypting the transmitted iris template. It is preferable to configure to measure the similarity between the templates.
- an algorithm for comparing and determining the similarity between the iris template obtained by using a camera and the iris template stored in the terminal is preferably implemented in the memory of the locking device.
- the algorithm for measuring the similarity between the iris templates may be any known widely known.
- the similarity of an iris template may be defined as a Euclidean distance between coefficient sequences obtained by performing Fourier transform or wavelet transform on all or a part of an iris image (iris texture).
- the similarity between the iris template acquired from the camera fixedly installed on the terminal and the iris template stored in the lock is greater than or equal to the stored reference value, authentication is established and the lock is released. If the similarity is less than the stored reference value, the lock is locked. Keep it.
- the encryptor and the decoder are made of software, and may be equipped with an encryption or decryption program designed and manufactured using a conventional encryption or decryption algorithm.
- the iris template When the unlocking is completed in the locking device, it is preferable to configure the iris template to be discarded so as not to be leaked by the hacker or modified to another form so that the original iris template cannot be inferred.
- the token information including the lock device unique number is transmitted from the lock to the terminal through local area communication.
- the terminal analyzes the data received through the short-range communication, confirms the lock device unique number, and displays or voices the display unit of the terminal to perform iris photography.
- the terminal equipped with the software according to the present invention for performing iris photographing performs iris photographing by pressing a hardware button installed on one side of the terminal or a software button on the terminal screen.
- the token information including the lock device unique number is transmitted from the lock to the terminal through local area communication.
- the terminal analyzes the data acquired through short-range communication, and determines whether the user is a legitimate user registered and stored in the memory.
- the terminal to perform iris photography is performed according to the set procedure, which is configured so that the user can perform iris photography according to the instruction of the terminal.
- the activation of the terminal and the locking device is configured such that the lock device recognizes when the user attempts to unlock the locking device by using a proximity sensor or an optical sensor on one side of the locking device, and the terminal can perform the unlocking procedure described above. It is enough if it is equipped.
- the technical configuration is the same as or modified with the security-enhanced locking device using the iris image. It belongs to the protection scope of.
- a terminal having a short range wireless communication means and a camera approaches a lock device
- at least one of a unique number and a random number of the lock device is configured as a token in the token generator mounted on the lock device, and the token is transmitted to the terminal.
- the iris image to be taken and send it generate the iris template from the iris image acquired by the camera fixedly installed on the user terminal, encrypts the generated iris template and token and transmits it to the lock device from the terminal through short-range wireless communication, It is configured to decrypt the received encrypted iris template and the token with a decryption device equipped with a lock and compare one or more of the iris templates previously stored in the database to perform one or more of the followings: access permission, access denied, re-request request, and emergency alarm.
- Enhanced security using iris image By providing a device because the gold greatly improve the security and reliability is very high availability of the industry.
Abstract
Description
Claims (23)
- 홍채이미지를 이용한 보안이 강화된 잠금장치에 있어서,잠금장치와 단말기에 인증을 위한 정보를 송수신하기 위한 근거리무선통신 수단;출입자를 잠금장치의 데이터베이스 또는 메모리에 등록 저장하는 수단;단말기에 고정 설치된 카메라로 취득한 홍채이미지 또는 이로부터 생성된 홍채템플릿을 근거리 무선통신으로 잠금장치로 전송하는 수단; 및단말기로부터 전송받은 홍채이미지 또는 이로부터 생성된 홍채템플릿과 잠금장치에 등록된 홍채이미지 또는 이로부터 생성된 홍채템플릿과의 유사성을 비교 판단하여 잠금해지, 잠금상태 유지, 촬영 재요청 및 비상 알람 중에서 하나 이상을 수행하는 수단을 구비한 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1에 있어서,단말기 정보가 잠금장치의 데이터베이스 또는 메모리에 출입자 정보와 함께 사전에 등록 저장하는 수단; 및단말기와의 근거리통신을 통하여 정당한 단말기인지를 판별하는 수단을 구비함을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1에 있어서,상기 근거리무선통신은 단말기와 잠금장치 내부에 근거리무선통신(NFC) 칩을 내장하고, 양방향 통신을 이룰 수 있도록 구성함을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1에 있어서,단말기가 홍채템플릿을 잠금장치로 전송하기 전에, 잠금장치에 탑재된 토큰생성기에서 잠금장치의 고유번호 및 랜덤번호 중에서 하나 이상을 선택하여 토큰으로 구성하여 단말기로 전송하는 것을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 4에 있어서,상기 단말기는 홍채템플릿을 잠금장치로 전송할 때 토큰에 포함된 잠금장치 고유번호 및 랜덤 번호 중에서 하나 이상을 잠금장치로 전송하며, 잠금장치는 상기 토큰에 포함되어 있던 잠금장치 고유번호 및 랜덤 번호와 부합되는 지를 확인하여 부합되지 않으면 오류 메시지를 내는 것을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 2에 있어서,상기 정당한 단말기인지를 확인하는 수단은 단말기의 고유번호, 개인식별번호, OTP 중 어느 하나 이상을 선택 구성하여 잠금장치로 전송하도록 하는 것을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 근거리무선통신으로 단말기와 잠금장치사이에 정보를 주고받을 때 보안성을 높이기 위하여 디지털 워터마크와 암호화 중 하나 이상을 선택 적용하여 수행함을 특징으로 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 단말기는 홍채이미지를 카메라로 촬영하여 잠금장치로 전송할 때 홍채이미지 촬영시각 정보와 촬영되는 장소에 대한 위치정보 중 하나 이상을 홍채템플릿에 포함시켜 전송함을 특징으로 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 8에 있어서,상기 홍채템플릿에 포함되는 정보는 보안성을 강화하기 위하여 깨지기 쉬운 디지털 워터마크로 삽입 포함시킴을 특징으로 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 8에 있어서,상기 잠금장치는 단말기로부터 홍채이미지 촬영시각이 전송되어올 때는 잠금장치에서 상기 토큰을 생성한 시각과 비교하여 잠금장치에 설정된 시간을 초과한 것으로 판단되면 오류 정보를 단말기로 내보내고, 단말기로부터 촬영이 일어난 장소에 대한 위치 정보가 전송되어올 때에는 잠금장치에서 설정된 위치 범위를 벗어난 것으로 판단되면 오류 정보를 내보내는 것을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 10에 있어서,상기 위치정보는 단말기에 제공되는 GPS 정보를 이용한 절대적 위치정보 또는 단말기가 연결된 기지국이나 무선 AP의 고유번호를 이용한 상대방 위치 정보를 이용한 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1에 있어서,상기 단말기는 촬영된 홍채이미지의 주위 배경을 비교하여 실제 출입자의 살아있는 홍채를 촬영하고 있는 것임을 확인하는 수단을 더 구비함을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1에 있어서,상기 잠금장치는 출입자를 추가로 등록 시에 잠금장치에 설치된 등록을 위한 버튼을 사용하여 등록을 수행하거나 단말기에 탑재된 프로그램으로 등록을 위한 절차를 수행하며,단말기에 고정 설치된 카메라를 이용하여 홍채를 촬영하여 잠금장치의 데이터베이스 또는 메모리에 출입자로 등록 저장하는 수단을 구비함을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 잠금장치는 카메라로 측정한 홍채이미지의 전체 또는 일부 영역에 대하여 푸리에 변환 또는 웨이블릿 변환 등을 수행하여 얻은 계수 열 간의 유클리드 거리를 측정하고,잠금장치에 저장된 홍채템플릿간의 유사도가 메모리에 설정 저장된 기준 값 이상이면 인증이 성립되어 잠금장치가 해지되고, 유사도가 설정 저장된 기준 값 미만이면 장치.
- 청구항 14에 있어서,상기 잠금장치는 잠금장치에 설치된 삭제 버튼을 이용하거나 단말기 또는 컴퓨터와 연동하여 잠금장치의 데이터베이스 또는 메모리에 등록 저장된 출입자 중에서 필요하지 않은 자를 삭제할 수 있는 수단을 구비함을 특징으로 하는 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 단말기에는 선명한 홍채이미지를 얻기 위하여 카메라와 인접하여 조명부가 부착 설치됨을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 단말기에 설치되는 카메라는 사용자 홍채를 확인하면서 용이하게 촬영할 수 있도록 디스플레이부가 위치한 면과 동일한 면에 설치됨을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 단말기에는 타인의 강요에 의해 홍채이미지를 생성하여야할 경우에는 강요된 상황이라는 정보를 홍채를 촬영할 때 홍채템플릿 생성 정보에 추가하여 비상 알람을 발생시킬 수 있도록 촬영전에 정보를 입력하는 버튼을 더 구비한 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 잠금장치는 단말기에서 잠금장치 해지를 위하여 홍채이미지를 촬영할 때 사용자가 단말기에 부착된 하드웨어 버튼이나 소프트웨어 버튼을 눌러서 홍채이미지를 획득함을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 단말기에서 촬영모드 활성화가 잠금장치에 의해 이루어질 때는 근거리통신으로 잠금장치에 의하여 단말기가 활성화되도록 구성됨을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1에 있어서,상기 단말기는 사용자들이 소지하고 다니는 휴대폰 또는 스마트 폰인 것을 특징으로 하는 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 단말기에는 카메라에서 촬영 획득한 홍채이미지의 선명도 및 가림정도중에서 하나 이상을 적용 판단하여 홍채이미지의 품질을 측정하는 품질측정기를 더 구비한 홍채이미지를 이용한 보안이 강화된 잠금장치.
- 청구항 1내지 청구항 6 중 어느 한 항에 있어서,상기 단말기에는 카메라에서 촬영 획득한 이미지 중에서 홍채이미지 만을 추출해내는 전처리기를 더 구비한 홍채이미지를 이용한 보안이 강화된 잠금장치.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014540926A JP5890033B2 (ja) | 2011-11-08 | 2011-11-16 | 虹彩イメージを用いたセキュリティの強化された施錠装置 |
US14/356,564 US20150040212A1 (en) | 2011-11-08 | 2011-11-16 | Locking apparatus with enhanced security using iris image |
CN201180074743.8A CN103917727B (zh) | 2011-11-08 | 2011-11-16 | 利用虹膜图像的加强安全性的上锁装置 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2011-0115856 | 2011-11-08 | ||
KR1020110115856A KR101182922B1 (ko) | 2011-11-08 | 2011-11-08 | 홍채이미지를 이용한 보안이 강화된 잠금장치 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013069841A1 true WO2013069841A1 (ko) | 2013-05-16 |
Family
ID=47113526
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2011/008754 WO2013069841A1 (ko) | 2011-11-08 | 2011-11-16 | 홍채이미지를 이용한 보안이 강화된 잠금장치 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20150040212A1 (ko) |
JP (1) | JP5890033B2 (ko) |
KR (1) | KR101182922B1 (ko) |
CN (1) | CN103917727B (ko) |
WO (1) | WO2013069841A1 (ko) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103870819A (zh) * | 2014-04-04 | 2014-06-18 | 沈洪泉 | 移动终端安全身份认证的虹膜识别光学成像模组及使用法 |
WO2015050282A1 (ko) * | 2013-10-02 | 2015-04-09 | 주식회사 아이락글로벌 | 개선된 홍채 인증 시스템 및 홍채 인증 방법 |
US20160092665A1 (en) * | 2014-09-27 | 2016-03-31 | Intel Corporation | Liveness Detection for User Authentication |
CN105678228A (zh) * | 2014-04-04 | 2016-06-15 | 沈洪泉 | 移动终端安全身份认证的虹膜识别光学成像模组及使用方法 |
JP2017531843A (ja) * | 2014-07-10 | 2017-10-26 | イリテック インコーポレイテッド | 虹彩認識用着用感知手付着型ウェアラブル装置とこれを利用した保安強化セット及びその制御方法 |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102413059B1 (ko) * | 2012-05-11 | 2022-06-23 | 가부시키가이샤 한도오따이 에네루기 켄큐쇼 | 전자 기기, 기억 매체, 프로그램, 및 표시 방법 |
US9430624B1 (en) * | 2013-04-30 | 2016-08-30 | United Services Automobile Association (Usaa) | Efficient logon |
US9509676B1 (en) * | 2013-04-30 | 2016-11-29 | United Services Automobile Association (Usaa) | Efficient startup and logon |
KR101530425B1 (ko) * | 2013-08-20 | 2015-06-22 | 주식회사 아이리시스 | 시간 정보를 이용한 홍채 인증 시스템 및 방법 |
CN104658073A (zh) * | 2013-11-20 | 2015-05-27 | 鸿富锦精密工业(武汉)有限公司 | 虹膜钥匙及利用该虹膜钥匙对电子装置解锁的方法 |
US9171181B2 (en) * | 2014-02-17 | 2015-10-27 | Sangeetha Balusu | Systems and methods for enhanced mobile photography |
KR101622154B1 (ko) | 2014-07-07 | 2016-05-19 | 최연석 | 태그 리더와 개인 인증 기능이 구비된 휴대용 인증 장치를 사용한 보안 장치 |
US9614838B1 (en) * | 2015-03-19 | 2017-04-04 | EMC IP Holding Company LLC | Taking a picture of a one-time use passcode and using the picture to authenticate |
JP6381478B2 (ja) * | 2015-04-15 | 2018-08-29 | 三菱電機ビルテクノサービス株式会社 | 生体情報認証システム |
KR101594433B1 (ko) * | 2015-04-30 | 2016-02-16 | 주식회사 아이티아이씨앤씨 | 홍체인식 휴대용 단말기를 이용한 출입통제 시스템 및 출입통제방법 |
KR102460069B1 (ko) * | 2015-09-30 | 2022-10-28 | 삼성전자주식회사 | 보안 인증 장치 및 보안 인증 방법 |
KR101642035B1 (ko) * | 2016-01-26 | 2016-07-29 | 오준봉 | 홍채 정보를 이용한 인증 정보 생성장치 및 방법, 그를 구비한 인증 시스템 |
CN105760818B (zh) * | 2016-01-28 | 2019-10-08 | 努比亚技术有限公司 | 一种眼纹加解密装置及方法 |
US9940519B2 (en) * | 2016-06-24 | 2018-04-10 | Fotonation Limited | Image processing method and system for iris recognition |
US10546145B2 (en) | 2017-02-17 | 2020-01-28 | International Business Machines Corporation | Storing data from a sensor device into a neighboring device |
JP7341447B2 (ja) * | 2017-05-19 | 2023-09-11 | 株式会社 エヌティーアイ | 実行装置、指示装置、それらで実行される方法、コンピュータプログラム |
US20180336749A1 (en) * | 2017-05-19 | 2018-11-22 | Bio-Key Hong Kong Limited | Intelligent Lock and Use Method Thereof |
CN107330395B (zh) * | 2017-06-27 | 2018-11-09 | 中国矿业大学 | 一种基于卷积神经网络的虹膜图像加密方法 |
CN107369231B (zh) * | 2017-06-29 | 2023-09-12 | 山东千沐云物联科技股份有限公司 | 一种智能锁控制方法及装置 |
EP3430973A1 (en) * | 2017-07-19 | 2019-01-23 | Sony Corporation | Mobile system and method |
US10713385B2 (en) * | 2018-07-03 | 2020-07-14 | International Business Machines Corporation | Position data pseudonymization |
KR102329280B1 (ko) * | 2018-07-04 | 2021-11-19 | 주식회사 케이티앤지 | 에어로졸 생성 장치와 데이터를 송수신하는 방법 및 장치 |
JP6909188B2 (ja) * | 2018-07-13 | 2021-07-28 | 富士通フロンテック株式会社 | 生体認証システムおよび認証サーバ |
KR20200100481A (ko) * | 2019-02-18 | 2020-08-26 | 삼성전자주식회사 | 생체 정보를 인증하기 위한 전자 장치 및 그의 동작 방법 |
WO2020185388A1 (en) | 2019-03-08 | 2020-09-17 | Master Lock Company Llc | Locking device biometric access |
US20220254192A1 (en) * | 2019-06-06 | 2022-08-11 | Nec Corporation | Processing system, processing method, and non-transitory storage medium |
CN110460580B (zh) * | 2019-07-11 | 2022-02-22 | 中国银联股份有限公司 | 图像采集装置、服务器及加、解密方法 |
CN111062727A (zh) * | 2019-12-29 | 2020-04-24 | 黄策 | 扩展型生物特征验证法 |
CN112261632B (zh) * | 2020-10-10 | 2024-03-12 | 深圳市锐尔觅移动通信有限公司 | 设备解锁方法、装置、控制系统以及计算机可读介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100649483B1 (ko) * | 2003-05-29 | 2006-11-28 | 종 해 김 | 원격 보안 수단을 내장한 도어록 시스템과 장치 |
KR20090011705A (ko) * | 2007-07-27 | 2009-02-02 | 주식회사 지팡이 | 개별적인 커뮤니케이션이 가능한 전자식 도어록 장치 및 그방법 |
KR20100039526A (ko) * | 2008-10-08 | 2010-04-16 | 아이리텍 잉크 | 아이이미지에서 관심영역정보 및 인식적 정보획득방법 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020112177A1 (en) * | 2001-02-12 | 2002-08-15 | Voltmer William H. | Anonymous biometric authentication |
US20020158750A1 (en) * | 2001-04-30 | 2002-10-31 | Almalik Mansour Saleh | System, method and portable device for biometric identification |
JP2003317100A (ja) * | 2002-02-22 | 2003-11-07 | Matsushita Electric Ind Co Ltd | 情報端末装置、認証システム、及び登録・認証方法 |
JP2003253940A (ja) * | 2002-03-01 | 2003-09-10 | Hitachi Kokusai Electric Inc | キーレスエントリシステム |
JP2004052482A (ja) * | 2002-07-24 | 2004-02-19 | Matsushita Electric Ind Co Ltd | 遠隔制御システム |
JP2005334402A (ja) * | 2004-05-28 | 2005-12-08 | Sanyo Electric Co Ltd | 認証方法および認証装置 |
US7562385B2 (en) * | 2005-04-20 | 2009-07-14 | Fuji Xerox Co., Ltd. | Systems and methods for dynamic authentication using physical keys |
US20090302995A1 (en) * | 2006-05-02 | 2009-12-10 | Jang-Ho Park | Multi digital door |
WO2010099475A1 (en) * | 2009-02-26 | 2010-09-02 | Kynen Llc | User authentication system and method |
CN101787824B (zh) * | 2010-01-28 | 2013-04-03 | 南京信息工程大学 | 智能防盗锁系统 |
US9118488B2 (en) * | 2010-06-17 | 2015-08-25 | Aliphcom | System and method for controlling access to network services using biometric authentication |
US8473748B2 (en) * | 2011-09-27 | 2013-06-25 | George P. Sampas | Mobile device-based authentication |
-
2011
- 2011-11-08 KR KR1020110115856A patent/KR101182922B1/ko not_active IP Right Cessation
- 2011-11-16 JP JP2014540926A patent/JP5890033B2/ja not_active Expired - Fee Related
- 2011-11-16 CN CN201180074743.8A patent/CN103917727B/zh not_active Expired - Fee Related
- 2011-11-16 WO PCT/KR2011/008754 patent/WO2013069841A1/ko active Application Filing
- 2011-11-16 US US14/356,564 patent/US20150040212A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100649483B1 (ko) * | 2003-05-29 | 2006-11-28 | 종 해 김 | 원격 보안 수단을 내장한 도어록 시스템과 장치 |
KR20090011705A (ko) * | 2007-07-27 | 2009-02-02 | 주식회사 지팡이 | 개별적인 커뮤니케이션이 가능한 전자식 도어록 장치 및 그방법 |
KR20100039526A (ko) * | 2008-10-08 | 2010-04-16 | 아이리텍 잉크 | 아이이미지에서 관심영역정보 및 인식적 정보획득방법 |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015050282A1 (ko) * | 2013-10-02 | 2015-04-09 | 주식회사 아이락글로벌 | 개선된 홍채 인증 시스템 및 홍채 인증 방법 |
CN103870819A (zh) * | 2014-04-04 | 2014-06-18 | 沈洪泉 | 移动终端安全身份认证的虹膜识别光学成像模组及使用法 |
CN103870819B (zh) * | 2014-04-04 | 2016-03-09 | 苏州思源科安信息技术有限公司 | 移动终端安全身份认证的虹膜识别光学成像模组及使用法 |
CN105678228A (zh) * | 2014-04-04 | 2016-06-15 | 沈洪泉 | 移动终端安全身份认证的虹膜识别光学成像模组及使用方法 |
CN105678228B (zh) * | 2014-04-04 | 2017-11-28 | 贵阳科安科技有限公司 | 用于安全身份认证的虹膜识别光学成像模组及使用方法 |
JP2017531843A (ja) * | 2014-07-10 | 2017-10-26 | イリテック インコーポレイテッド | 虹彩認識用着用感知手付着型ウェアラブル装置とこれを利用した保安強化セット及びその制御方法 |
US20160092665A1 (en) * | 2014-09-27 | 2016-03-31 | Intel Corporation | Liveness Detection for User Authentication |
Also Published As
Publication number | Publication date |
---|---|
CN103917727A (zh) | 2014-07-09 |
KR101182922B1 (ko) | 2012-09-13 |
CN103917727B (zh) | 2016-11-16 |
US20150040212A1 (en) | 2015-02-05 |
JP5890033B2 (ja) | 2016-03-22 |
JP2015504492A (ja) | 2015-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013069841A1 (ko) | 홍채이미지를 이용한 보안이 강화된 잠금장치 | |
WO2013012120A1 (ko) | 생체이미지 정보를 포함하는 일회용 비밀번호를 이용한 인증방법 및 장치 | |
WO2020218627A1 (ko) | 차량용 디지털 키 공유 서비스 방법 및 시스템 | |
WO2018101727A1 (ko) | 인증프로세스의 단계분할과 생체인증을 접목한 개인정보침해 방어 방법 및 시스템 | |
WO2018012747A1 (ko) | 앱 위변조 탐지 가능한 2채널 인증 대행 시스템 및 그 방법 | |
WO2015199501A1 (ko) | 가변 키패드와 생체 인식을 이용한 본인 인증 방법 및 시스템 | |
WO2015119417A1 (ko) | 자물쇠 시스템의 무선 제어 및 제어 권한 전송이 가능한 전자키 장치, 시스템 및 그 방법 | |
KR20040053253A (ko) | 네트워크를 거쳐 생체 인식 데이터를 안전하게 전송하고인증하는 방법 및 장치 | |
WO2015056979A1 (ko) | 지문 인증을 수행하는 보안카드와 그에 따른 보안카드 처리 시스템 및 그 처리 방법 | |
JP4837091B2 (ja) | 撮影装置、および撮影方法、ならびに撮影プログラム | |
WO2021085799A1 (ko) | 사용자 생체 정보를 이용하여 본인 인증을 수행하는 전자 장치 및 그 동작 방법 | |
WO2013035927A1 (ko) | 홍채이미지 정보를 포함하는 일회용 비밀번호가 탑재된 스마트카드 | |
WO2020206899A1 (zh) | 基于时间戳的身份验证方法、装置、设备及存储介质 | |
WO2020122368A1 (ko) | 보안단말기를 이용한 저장장치의 데이터 보안 관리 시스템 및 방법 | |
WO2017105049A1 (ko) | 디지털 포렌식 영상 검증 시스템 | |
WO2022045497A1 (ko) | 사용자 인증장치 및 그 제어방법 | |
WO2018056588A1 (ko) | 등록된 스마트폰 키를 제공하는 락킹시스템 및 그 방법 | |
US20220101651A1 (en) | System, device and method for authentication with use of information code | |
WO2019147105A1 (ko) | 전자 장치와 외부 전자 장치 및 이를 포함하는 시스템 | |
JPH09147116A (ja) | 資格検査システム | |
WO2022169082A1 (ko) | 출입문 개폐 제어 장치, 시스템 및 그 제어 방법 | |
JP2005036394A (ja) | 利用者認証システム | |
KR101927336B1 (ko) | 단말장치의 위조, 변조 및 사용자 확인 시스템 및 방법 | |
WO2016178499A1 (ko) | 홍채 인식 기반 보안 스토리지 제공 방법 및 그 시스템 | |
WO2023277210A1 (ko) | 폐기 가능 생체 인식 기술 기반의 스마트 도어락 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11875367 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2014540926 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14356564 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11875367 Country of ref document: EP Kind code of ref document: A1 |