TWI383324B - Identification method - Google Patents
Identification method Download PDFInfo
- Publication number
- TWI383324B TWI383324B TW96101828A TW96101828A TWI383324B TW I383324 B TWI383324 B TW I383324B TW 96101828 A TW96101828 A TW 96101828A TW 96101828 A TW96101828 A TW 96101828A TW I383324 B TWI383324 B TW I383324B
- Authority
- TW
- Taiwan
- Prior art keywords
- biometric
- electronic device
- portable electronic
- authentication method
- identity authentication
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 36
- 210000003462 vein Anatomy 0.000 claims description 7
- 230000008878 coupling Effects 0.000 claims description 2
- 238000010168 coupling process Methods 0.000 claims description 2
- 238000005859 coupling reaction Methods 0.000 claims description 2
- 208000016339 iris pattern Diseases 0.000 claims description 2
- 230000008569 process Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Description
本發明係有關於一種認證方法,更特別是有關於一種使用生物特徵進行認證之方法。The present invention relates to an authentication method, and more particularly to a method of authenticating using biometrics.
隨著IT產業的快速發展,資訊交流的熱絡,資訊的保密就變的相當重要,尤其是個人資料保密益發顯得重要。其中依生物特徵開發出的保密產品,像指紋辨識器、掌紋辨識器、靜脈辨識器、虹膜辨識器...等,由於係使用獨一無二的身分辨識密碼,不會有密碼被盜用的疑慮。因此可提供更安全、方便且迅速的檢驗作業。With the rapid development of the IT industry, the warmth of information exchange, the confidentiality of information has become very important, especially the confidentiality of personal data is important. Among them, secret products developed according to biometric features, such as fingerprint recognizer, palmprint recognizer, vein recognizer, iris recognizer, etc., because of the unique identity recognition password, there is no doubt that the password is stolen. This provides a safer, more convenient and faster inspection.
當藉由生物資料進行人別辨識時,必需於機台上加裝一生物特徵辨識器,然後在機台內部之記憶裝置中安裝所需的驅動程式、應用軟體以及比對資料庫。於辨識時,藉由掃描使用者生物特徵並與資料庫比對,當確認為用戶專屬生物特徵後,整個身份認證程序即告完成。When the biometric data is used for personal identification, it is necessary to install a biometric identifier on the machine, and then install the required driver, application software and comparison database in the memory device inside the machine. At the time of identification, by scanning the user's biometrics and comparing with the database, when the user-specific biometrics are confirmed, the entire identity authentication process is completed.
然而,上述之認證方式必須於每一機台上安裝生物特徵辨識器,如此將造成產品成本上升,且對於一些低價確有保密需求之產品而言,礙於成本之考量,勢必無法使用如此之生物特徵認證。因此,如何降低生物特徵認證成本及成為主要之追求目標。However, the above-mentioned authentication method must install a biometric identifier on each machine, which will result in an increase in product cost, and for some products with low security requirements at a low price, it is inevitable that the cost considerations will not be used. Biometric certification. Therefore, how to reduce the cost of biometric authentication and become the main goal.
因此,本發明之主要目的就是在提供一種可降低生物特徵認證成本之方法。Accordingly, it is a primary object of the present invention to provide a method for reducing the cost of biometric authentication.
根據上述目的,本發明之身份認證方法,係用以判定一機台之使用者是否為合法使用者,該方法至少包含將一可攜式電子裝置耦接於此機台,其中可攜式電子裝置至少具有一生物特徵辨識器;接著模擬此可攜式電子裝置為該機台之生物特徵辨識器;當模擬完成後,可由此可攜式電子裝置掃描使用者之生物特徵,藉以獲得一生物特徵圖形;最後比對生物特徵圖形,並根據比對結果判定該使用者是否為合法使用者。According to the above object, the identity authentication method of the present invention is used to determine whether a user of a machine is a legitimate user, and the method includes coupling at least a portable electronic device to the machine, wherein the portable electronic device The device has at least one biometric identifier; then the portable electronic device is simulated as a biometric identifier of the machine; when the simulation is completed, the portable electronic device can scan the biometric characteristics of the user to obtain a living creature Feature graphics; finally comparing the biometric graphics and determining whether the user is a legitimate user based on the comparison results.
根據本發明之另一較佳實施例,此生物特徵辨識器為一指紋辨識器、一掌紋辨識器、一靜脈辨識器或一虹膜辨識器。而用以進行辨識之生物特徵圖形可為一指紋圖形、一掌紋圖形、一靜脈分布圖或一虹膜圖形。According to another preferred embodiment of the present invention, the biometric identifier is a fingerprint recognizer, a palmprint recognizer, a vein recognizer or an iris recognizer. The biometric graphic used for identification may be a fingerprint graphic, a palm print pattern, a vein distribution map or an iris pattern.
根據本發明之另一較佳實施例,其中係使用無線或有線連接之方式將該可攜式電子裝置耦接該機台。According to another preferred embodiment of the present invention, the portable electronic device is coupled to the machine using a wireless or wired connection.
根據本發明之另一較佳實施例,比對生物特徵圖形更包括:將該生物特徵圖形與一記憶體中所儲存之至少一生物特徵圖形進行比對,而此至少一生物特徵圖形為一合法使用者之一生物特徵圖形。其中記憶體可位於可攜式電子裝置或機台中,而比對生物特徵圖形可由可攜式電子裝置或機台執行。According to another preferred embodiment of the present invention, comparing the biometric graphics further comprises: comparing the biometric graphic with at least one biometric graphic stored in a memory, wherein the at least one biometric graphic is One of the legal users' biometric graphics. The memory can be located in the portable electronic device or the machine, and the comparison biometric graphic can be performed by the portable electronic device or the machine.
根據本發明之另一較佳實施例,更包括將對應於至少一合法使用者生物特徵圖形之密碼儲存於記憶體中,且當判定使用者為合法使用者時,將密碼填入一密碼登錄區中。According to another preferred embodiment of the present invention, the password further corresponding to the at least one legal user biometric graphic is stored in the memory, and when the user is determined to be a legitimate user, the password is entered into a password login. In the district.
綜合上述所言,由於本發明之方法將生物特徵辨識器均建置於可攜式電子裝置上,各機台上可不需建構額外生物特徵辨識器,因此可降低機台生產成本。且只要機台有保密之需求,均可透過本發明之方法,進行生物特徵辨識保密,而不需考慮機台上是否有安裝生物特徵辨識器。In summary, since the method of the present invention integrates the biometric identifiers on the portable electronic device, the additional biometric identifiers need not be constructed on each machine, thereby reducing the production cost of the machine. Moreover, as long as the machine has a need for confidentiality, the biometric identification can be kept secret by the method of the present invention, without considering whether a biometric identifier is installed on the machine.
以下將以一實施例來說明,其中所使用之生物特徵辨識器為一指紋辨識器,但其他種類之生物特徵辨識器,例如掌紋辨識器、靜脈辨識器和虹膜辨識器等,亦可應用於本發明中。此外,下述之實施例中,均僅以登錄一密碼作為解說,然,本實施例,亦可用於登錄使用者代號、密碼或其他身份證明,或上述之組合。Hereinafter, an embodiment will be described, wherein the biometric identifier used is a fingerprint identifier, but other kinds of biometric identifiers, such as a palmprint recognizer, a vein recognizer, and an iris recognizer, may also be applied. In the present invention. In addition, in the following embodiments, only the login password is used as the explanation. However, the embodiment can also be used to log in the user code, password or other identity certificate, or a combination thereof.
參照第1圖所示為根據本發明一較佳具體實施例之可攜式電子裝置概略圖示。根據本實施例,此可攜式電子裝置100除了包括一顯示螢幕101以及一鍵盤區102外,此可攜式電子裝置100更設置有一指紋辨識器(圖中未展示出),而此指紋辨識器對應之指紋掃描區域103則外露於此可攜式電子裝置100。值得注意的是,掃描區域103之位置並不以第1圖中所示者為限,可依設計變動其位置。在一實施例中,可攜式電子裝置100之記憶體(圖中未展示出),則至少儲存有合法授權使用者之資料資料庫,藉以於進行指紋辨識時比對之用,於此實施例中,指紋之比對係由可攜式電子裝置100執行。此外,可攜式電子裝置100之記憶體中亦可儲存有各種經常登錄之網站位址以及對應之密碼資料。另一方面,在其他之實施例中,合法授權使用者之指紋資料庫、經常登錄之網站位址以及對應之密碼資料亦可儲存於對應之連接機台中,而於此實施例中,指紋之比對係由與可攜式電子裝置100連接之機台執行。其中可攜式電子裝置100,例如可為一行動電話或一個人數位助理(personal digital assistants,PDA)。1 is a schematic illustration of a portable electronic device in accordance with a preferred embodiment of the present invention. According to the embodiment, the portable electronic device 100 includes a display screen 101 and a keyboard area 102. The portable electronic device 100 further includes a fingerprint identifier (not shown), and the fingerprint identification is performed. The fingerprint scanning area 103 corresponding to the device is exposed to the portable electronic device 100. It should be noted that the position of the scanning area 103 is not limited to that shown in FIG. 1 and its position can be changed according to design. In an embodiment, the memory of the portable electronic device 100 (not shown) stores at least a database of legally authorized users for use in fingerprint identification. In the example, the fingerprint comparison is performed by the portable electronic device 100. In addition, the memory of the portable electronic device 100 can also store various frequently-registered website addresses and corresponding password data. On the other hand, in other embodiments, the fingerprint database of the legally authorized user, the frequently-registered website address, and the corresponding password data may also be stored in the corresponding connection machine. In this embodiment, the fingerprint is The comparison is performed by a machine connected to the portable electronic device 100. The portable electronic device 100 can be, for example, a mobile phone or a personal digital assistant (PDA).
參照第2圖與第3圖,當需要輸入密碼時,例如一使用者透過網路裝置300連線進入一網站之登錄密碼區302用以確認身份時。此時,使用者可如第2圖所示,透過有線傳輸之方式,或是如第3圖所示,若網路裝置300具無線連接功能,則可透過無線傳輸之方式,將建置有指紋辨識器之可攜式電子裝置100和網路裝置300進行連接,其中網路裝置300,例如為一電腦。值得注意的是,本發明亦可應用於在其他需要密碼之情形下。Referring to Figures 2 and 3, when a password is required, for example, a user connects to the login password area 302 of a website through the network device 300 to confirm the identity. At this time, the user can transmit by wire as shown in FIG. 2, or as shown in FIG. 3, if the network device 300 has a wireless connection function, it can be built by wireless transmission. The portable electronic device 100 of the fingerprint identifier is connected to the network device 300, and the network device 300 is, for example, a computer. It should be noted that the present invention can also be applied to other situations where a password is required.
參閱第4圖所示,為本發明可攜式電子裝置100和網路裝置300之連接流程。於步驟401,首先開啟可攜式電子裝置100,接著會執行判斷步驟403和405,藉以判定可攜式電子裝置100是否和網路裝置300連接。根據本實施例,於步驟403中,先判定可攜式電子裝置100是否以有線連接之方式連接網路裝置300,若是則接著執行步驟407,否則執行步驟405。於步驟405中,會判定可攜式電子裝置100是否以無線連接之方式連接網路裝置300,若是則接著執行步驟407,否則會判定可攜式電子裝置100和網路裝置300兩者間之連接未完成,因此步驟403和405會再次被執行。當可攜式電子裝置100和網路裝置300兩者間,不論以有線連接或無線連接之方式完成連接後,於步驟407中,可攜式電子裝置100會執行一模擬程序以模擬成為一指紋辨識器。而網路裝置300則會於步驟409中執行一驅動程式以驅動此模擬之指紋辨識器。當完成上述程序後,可攜式電子裝置100上之指紋辨識器則處於執行指紋辨識之待機狀態下。Referring to FIG. 4, the connection process of the portable electronic device 100 and the network device 300 of the present invention is shown. In step 401, the portable electronic device 100 is first turned on, and then the determining steps 403 and 405 are performed to determine whether the portable electronic device 100 is connected to the network device 300. According to the embodiment, in step 403, it is first determined whether the portable electronic device 100 is connected to the network device 300 by means of a wired connection. If yes, step 407 is performed; otherwise, step 405 is performed. In step 405, it is determined whether the portable electronic device 100 is connected to the network device 300 by way of wireless connection. If yes, step 407 is performed; otherwise, the portable electronic device 100 and the network device 300 are determined. The connection is not completed, so steps 403 and 405 will be executed again. After the connection between the portable electronic device 100 and the network device 300, whether the connection is completed by wired connection or wireless connection, in step 407, the portable electronic device 100 executes a simulation program to simulate becoming a fingerprint. Recognizer. The network device 300, in step 409, executes a driver to drive the simulated fingerprint reader. After the above procedure is completed, the fingerprint identifier on the portable electronic device 100 is in a standby state for performing fingerprint recognition.
當可攜式電子裝置100和網路裝置300完成連接後,即可進行指紋辨識比對,藉以輸入對應之密碼。參閱第5圖所示為根據本發明一實施例進行指紋比對之流程。請同時參閱第1圖與第5圖。首先,於步驟501,在可攜式電子裝置100和網路裝置300完成連接後,可攜式電子裝置100上之指紋辨識器會被啟動並處於待機狀態。接著,於步驟503,會執行一判斷步驟,藉以判定是否已進入連線網站要求輸入密碼之網頁,若非進入需要輸入密碼之網頁,則步驟503會被再次執行,亦即此判斷步驟會被重複執行,直至進入要求輸入密碼之網頁。另一方面,若已進入連線網站要求輸入密碼之網頁,且指紋之比對係由網路裝置300執行,則執行步驟505至509以進行指紋辨識。另一方面,若指紋之比對係由可攜式電子裝置100執行,則執行步驟605至609以進行指紋辨識。After the portable electronic device 100 and the network device 300 are connected, the fingerprint identification comparison can be performed, thereby inputting the corresponding password. Referring to Figure 5, there is shown a flow of fingerprint comparison in accordance with an embodiment of the present invention. Please also refer to Figures 1 and 5. First, in step 501, after the portable electronic device 100 and the network device 300 are connected, the fingerprint identifier on the portable electronic device 100 is activated and in a standby state. Next, in step 503, a determining step is performed to determine whether the webpage requesting to enter the password has been entered. If the webpage that requires the password is not entered, step 503 is performed again, that is, the judging step is repeated. Execute until you go to the web page where you want to enter your password. On the other hand, if the webpage that has entered the connection website to input the password has been entered, and the fingerprint comparison is performed by the network device 300, steps 505 to 509 are performed to perform fingerprint identification. On the other hand, if the fingerprint comparison is performed by the portable electronic device 100, steps 605 to 609 are performed to perform fingerprint recognition.
於網路裝置300執行指紋比對之實施例中,首先於步驟505中,在進行指紋辨識時,使用者先將手指放在掃描區域103中,此時指紋辨識器中之辨識器會採集指尖的指紋圖形。於步驟507,將採集的指紋圖形以無線或有線傳輸之方式傳送至網路裝置300,此時網路裝置300會利用軟體分析指紋特徵點,例如每根手指特有的脊紋與溝紋。然後於步驟509,與儲存於網路裝置300記憶體中之的指紋資料庫進行比對。In the embodiment in which the network device 300 performs the fingerprint comparison, first in step 505, when fingerprinting is performed, the user first places the finger in the scanning area 103, and the identifier in the fingerprint identifier collects the finger. Sharp fingerprint pattern. In step 507, the collected fingerprint image is transmitted to the network device 300 by wireless or wired transmission. At this time, the network device 300 uses the software to analyze fingerprint feature points, such as ridges and grooves unique to each finger. Then, in step 509, the fingerprint database stored in the memory of the network device 300 is compared.
另一方面,於可攜式電子裝置100執行指紋比對之實施例中,其執行步驟如第6圖所示。首先於步驟605中,在進行指紋辨識時,使用者先將手指放在掃描區域103中,此時指紋辨識器中之辨識器會採集指尖的指紋圖形。接著於步驟607,可攜式電子裝置100會利用軟體分析指紋特徵點的幾何圖案,例如每根手指特有的脊紋與溝紋。然後於步驟609,與儲存於可攜式電子裝置100記憶體中之的指紋資料庫進行比對。On the other hand, in the embodiment in which the portable electronic device 100 performs fingerprint comparison, the execution steps are as shown in FIG. 6. First, in step 605, when fingerprinting is performed, the user first places a finger in the scanning area 103, and the identifier in the fingerprint reader collects the fingerprint image of the fingertip. Next, in step 607, the portable electronic device 100 uses the software to analyze the geometric pattern of the fingerprint feature points, such as the ridges and grooves unique to each finger. Then, in step 609, the fingerprint database stored in the memory of the portable electronic device 100 is compared.
接著,於步驟511會判定比對結果,若所採集的指紋圖形符合網路裝置300或可攜式電子裝置100記憶體中所儲存之指紋資料,則執行步驟513,將對應此指紋資料之密碼自動帶入密碼網頁中。在一實施例中,此網站網址、各合法使用者之指紋資料以及對應密碼,可對應儲存於記憶體中,當使用者輸入之指紋圖形符合所儲存之指紋資料後,即可根據登錄之網站網址將對應密碼自動填入密碼網頁中。接著於步驟515,當網站收到此密碼後,即會進行網站本身之後續驗證流程。最後於步驟517,完成登錄程序。另一方面,若於步驟511中判定所採集的指紋圖形不符合網路裝置300或可攜式電子裝置100記憶體中所儲存之指紋資料時,則此流程拒絕使用者登錄,並回到步驟505,等待掃描下一使用者之指紋。Then, in step 511, the comparison result is determined. If the collected fingerprint pattern conforms to the fingerprint data stored in the memory of the network device 300 or the portable electronic device 100, step 513 is executed, and the password corresponding to the fingerprint data is used. Automatically brought into the password page. In an embodiment, the website URL, the fingerprint data of each legal user, and the corresponding password may be stored in the memory. When the fingerprint pattern input by the user conforms to the stored fingerprint data, the website may be logged in according to the website. The URL will automatically fill in the password on the password page. Then in step 515, when the website receives the password, the subsequent verification process of the website itself is performed. Finally at step 517, the login process is completed. On the other hand, if it is determined in step 511 that the collected fingerprint pattern does not meet the fingerprint data stored in the memory of the network device 300 or the portable electronic device 100, the process rejects the user login and returns to the step. 505, waiting to scan the fingerprint of the next user.
綜合上述所言,本發明係於傳統之可攜式電子裝置上另行建置一生物特徵辨識器,來取代分別設置於個別機台上之生物特徵辨識器。當需進行生物特徵辨識時,先將可攜式電子裝置模擬成一生物特徵辨識器,並特過可攜式電子裝置進行生物特徵辨識,並將辯識結果利用有線或無線傳輸之方式上傳至機台上,藉以進行後續之對應處理。由於本發明之方法將生物特徵辨識器均建置於可攜式電子裝置上,各機台上可不需建構額外生物特徵辨識器,因此可降低機台生產成本。且藉由本發明,只要機台有保密之需求,均可透過本發明之方法,進行生物特徵辨識保密,而不需考慮機台上是否有安裝生物特徵辨識器。In summary, the present invention is to add a biometric identifier to the conventional portable electronic device instead of the biometric identifiers respectively disposed on the individual machines. When biometric identification is required, the portable electronic device is first simulated as a biometric identifier, and the portable electronic device is used for biometric identification, and the identification result is uploaded to the machine by wired or wireless transmission. On the stage, for subsequent processing. Since the method of the present invention integrates the biometric identifiers on the portable electronic device, the additional biometric identifiers need not be constructed on each machine, thereby reducing the production cost of the machine. Moreover, according to the present invention, as long as the machine has the requirement of confidentiality, the biometric identification can be kept confidential by the method of the present invention, regardless of whether or not the biometric identifier is installed on the machine.
雖然本發明已以一較佳實施例揭露如上,然其並非用以限定本發明,任何熟習此技藝者,在不脫離本發明之精神和範圍內,當可作各種之更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。Although the present invention has been described above in terms of a preferred embodiment, it is not intended to limit the invention, and it is obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit and scope of the invention. The scope of the invention is defined by the scope of the appended claims.
100...可攜式電子裝置100. . . Portable electronic device
101...顯示螢幕101. . . Display screen
102...鍵盤區102. . . Keyboard area
103...指紋掃描區域103. . . Fingerprint scanning area
300...網路裝置300. . . Network device
302...登錄密碼區302. . . Login password area
401~411、501~517以及605~609...步驟401~411, 501~517 and 605~609. . . step
為讓本發明之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附圖式之詳細說明如下:第1圖繪示一加裝有生物特徵辨識器之可攜式電子裝置概略圖示。The above and other objects, features, advantages and embodiments of the present invention will become more apparent and understood. A schematic illustration.
第2圖所示為本發明可攜式電子裝置和對應裝置間有線連接概略圖示。FIG. 2 is a schematic diagram showing the wired connection between the portable electronic device and the corresponding device of the present invention.
第3圖所示為本發明可攜式電子裝置和對應裝置間無線連接概略圖示。FIG. 3 is a schematic diagram showing the wireless connection between the portable electronic device and the corresponding device of the present invention.
第4圖所示為本發明可攜式電子裝置和對應裝置之連接流程圖。FIG. 4 is a flow chart showing the connection between the portable electronic device and the corresponding device of the present invention.
第5圖所示為根據本發明一實施例進行指紋比對之流程。Figure 5 is a flow chart showing the fingerprint comparison according to an embodiment of the present invention.
第6圖所示為根據本發明另一實施例進行指紋比對之流程圖。Figure 6 is a flow chart showing the fingerprint comparison according to another embodiment of the present invention.
501~517...步驟501~517. . . step
Claims (18)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW96101828A TWI383324B (en) | 2007-01-17 | 2007-01-17 | Identification method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW96101828A TWI383324B (en) | 2007-01-17 | 2007-01-17 | Identification method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW200832236A TW200832236A (en) | 2008-08-01 |
| TWI383324B true TWI383324B (en) | 2013-01-21 |
Family
ID=44818838
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW96101828A TWI383324B (en) | 2007-01-17 | 2007-01-17 | Identification method |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI383324B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI682298B (en) * | 2016-04-21 | 2020-01-11 | 神盾股份有限公司 | Method and device for entering one-time password automatically |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7047419B2 (en) * | 1999-09-17 | 2006-05-16 | Pen-One Inc. | Data security system |
| US20060285663A1 (en) * | 2005-05-24 | 2006-12-21 | Rathus Spencer A | Remote Subscriber Identification (RSID) system and method |
-
2007
- 2007-01-17 TW TW96101828A patent/TWI383324B/en active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7047419B2 (en) * | 1999-09-17 | 2006-05-16 | Pen-One Inc. | Data security system |
| US20060285663A1 (en) * | 2005-05-24 | 2006-12-21 | Rathus Spencer A | Remote Subscriber Identification (RSID) system and method |
Also Published As
| Publication number | Publication date |
|---|---|
| TW200832236A (en) | 2008-08-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20220318355A1 (en) | Remote usage of locally stored biometric authentication data | |
| CN106549920B (en) | Login information input method, login information storage method and related device | |
| EP1461673B1 (en) | Validating the identity of a user using a pointing device | |
| CN101542497B (en) | Extensible bios interface to a preboot authentication module | |
| Blanco‐Gonzalo et al. | Performance evaluation of handwritten signature recognition in mobile environments | |
| TW200306499A (en) | Fingerprint authenticating system for carrying out a fingerprint authentication by using a small fingerprint sensor | |
| US20080049986A1 (en) | Image processing apparatus, image processing method, signature registration program, and storage medium | |
| WO2023036143A1 (en) | Decentralized zero-trust identity verification and authentication system and method | |
| JP2016062457A (en) | Authentication method and authentication apparatus | |
| CN101647701B (en) | Authentication method and apparatus | |
| CN101099173B (en) | Collation method and collation system | |
| JP2003162511A (en) | Authentication system, pen-type input device, and authentication processing program | |
| TWI383324B (en) | Identification method | |
| KR20100005977A (en) | System and method for providing ordered advertisement based on location with real wireless termianl user and recording medium | |
| JP5439306B2 (en) | Authentication system, authentication method, authentication server, authentication program | |
| KR101459283B1 (en) | 2 Channel authentication device and method | |
| CN114281197B (en) | Information filling method and device, electronic equipment and storage medium | |
| CN119478994A (en) | Method, device, equipment and storage medium for reviewing images of automobile insurance certificates | |
| JP7178681B1 (en) | Login management system and program | |
| JP4977830B2 (en) | Fingerprint authentication device | |
| CN110706221A (en) | Verification method, verification device, storage medium and device for customizing pictures | |
| CN110111196A (en) | Information Authentication method and Related product | |
| JP2007052489A (en) | User authentication method and user authentication program | |
| JP2008146551A (en) | Password information management system, terminal, program | |
| CN112948791A (en) | User identity authentication method and device |