CN1249048A - Method, system and device for authenticating persons - Google Patents
Method, system and device for authenticating persons Download PDFInfo
- Publication number
- CN1249048A CN1249048A CN 97182085 CN97182085A CN1249048A CN 1249048 A CN1249048 A CN 1249048A CN 97182085 CN97182085 CN 97182085 CN 97182085 A CN97182085 A CN 97182085A CN 1249048 A CN1249048 A CN 1249048A
- Authority
- CN
- China
- Prior art keywords
- sim card
- biometric
- stored
- user
- video information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
Description
本发明涉及用于确定通信终端设备的一个使用者的或一个使用者组的真实性的一种方法,一种系统和一种装置。The invention relates to a method, a system and an arrangement for determining the authenticity of a user or a group of users of a communication terminal.
在用照片和个人证件鉴定人员的常规方法之外,在现有技术中公开了用生物统计学特征鉴定人员的方法。在这些方法中将可测量的和可摄取的人体特征记录为生物统计学的代码,并且在鉴定时刻与一个要鉴定人员的相应人体特征作比较。这样的特征的已知实例包括指纹、眼样、脸部轮廓或语音特征。In addition to conventional methods of identifying persons using photographs and personal documents, methods of identifying persons using biometric features are disclosed in the prior art. In these methods, measurable and ingestible body characteristics are recorded as biometric codes and compared at the moment of identification with corresponding body characteristics of a person to be identified. Known examples of such features include fingerprints, eye patterns, facial contours or voice features.
众所周知,个人计算机(PC)可以装备各种手段,此外可以装备外部的视频摄像机,这些手段允许PC在学习过程中摄取一个使用者的脸部,说得确切一点几个脸部特征,并且在以后的时刻为了鉴定目的重新使用这些脸部特征,在此当PC重新认出脸部特征时,PC则仅允许使用者访问PC。It is well known that personal computers (PCs) can be equipped with various means, in addition to external video cameras, which allow the PC to capture a user's face, to be precise several facial features, during the learning process, and later These facial features are reused for authentication purposes at times where the PC only allows the user to access the PC when the PC recognizes the facial features again.
视频传感器与通信终端设备的联合是在与可视电话的并联中是已知的,也有移动型式的可视电话,在这种型式中移动无线电电话是与视频摄像机结合的。The combination of a video sensor with a communication terminal is known in parallel with a videophone, and also a mobile version of the videophone, in which a mobile radiotelephone is combined with a video camera.
在DE 39 43 097 A1中说明了经通信网(此外用移动电话)将像眼样或指纹那样的生物统计学上可测量数据作为用于找到所存储医学数据的搜索概念来传输的一种方法。在此方法中基本上用生物统计学的特征鉴定一个个人,以致于可以存取他的医学数据。但是在此不涉及检查此个人的真实性,或不涉及保证在此方法中经通信网交换的数据来源的真实性和无可辩驳性。A method is described in DE 39 43 097 A1 for transmitting biometrically measurable data like eye samples or fingerprints as search concepts for finding stored medical data via a communication network (in addition with mobile phones) . In this method an individual is essentially identified with biometric features so that his medical data can be accessed. However, this does not involve checking the authenticity of this individual or guaranteeing the authenticity and irrefutable origin of the data exchanged via the communication network in this method.
本发明的任务在于,建议用于确定一个通信终端设备的一个使用者的或一个使用者组的真实性的一种新的和改善的方法和系统。The object of the present invention is to propose a new and improved method and system for determining the authenticity of a user or a group of users of a communication terminal.
按本发明尤其通过独立权利要求1、24和34的特征部分的要素达到此目的。此外也通过按独立权利要求48的系统达到此目标。此外其它有利的实施形式源自有关的权利要求和说明。This object is achieved according to the invention in particular by the characterizing elements of independent claims 1 , 24 and 34 . Furthermore, this object is also achieved by a system according to independent claim 48 . Furthermore, further advantageous embodiments result from the related claims and the description.
尤其通过本发明如此来达到这些目标,即将人体特征作为生物统计学的代码安全地存储在个人的SIM卡上,并且由使用者将此SIM卡输入通信设备,此通信设备从使用者那里确定现实的人体特征和从此确定现实的生物统计学的代码,并且为了鉴定使用者将这些代码与存储在SIM卡上的生物统计学代码作比较。这点的优点在于,一个个人卡可以在不同的通信终端设备中鉴定使用者,使用者可以无须使用可能常常忘记的或者甚至可能不合法地输入的进入密码,并且不致于鉴定例如通过偷盗或偶然拾取而滥用所获得SIM卡的使用者。一个附加的优点也在于,也可以对一个使用者组准备SIM卡,其办法是在此SIM卡上存储属于此组的全部使用者的生物统计学代码。These objectives are achieved in particular by the present invention in that the characteristics of the body are stored securely as biometric codes on a personal SIM card and the user enters this SIM card into a communication device which determines the reality from the user. The human body characteristics and the actual biometric codes are determined therefrom, and these codes are compared with the biometric codes stored on the SIM card for the purpose of authenticating the user. The advantage of this is that a personal card can identify the user in different communication terminals, the user does not have to use an access code that may often be forgotten or may even be entered illegally, and is unlikely to be authenticated, for example by theft or by accident. Users who pick up and misuse the obtained SIM card. An additional advantage is also that a SIM card can also be provided for a user group by storing the biometric codes of all users belonging to this group on the SIM card.
为了预防例如通过照相模拟人体特征的滥用鉴定,在生物统计学代码中也随同列入人体运动。In order to prevent misuse of identification, eg by photographic simulation of human characteristics, human movements are also included in the biometric code.
按本发明通过通信终端设备的使用者鉴定可以用于,按照鉴定的结果允许或禁止使用者使用通信终端设备。但是按本发明也可以无线地,尤其是通过移动通信终端设备将鉴定结果传送到外部的保险的装置上,使得这个外部的保险的装置从它这方面可以按照鉴定的结果允许或禁止该使用者访问它的业务或建筑物。According to the invention, the authentication of the user by means of the communication terminal can be used to enable or disable the use of the communication terminal by the user depending on the result of the authentication. According to the invention, however, the authentication result can also be transmitted wirelessly, in particular via a mobile communication terminal, to an external secure device, so that the external secure device can allow or disable the user according to the authentication result. Visit its business or building.
按本发明在与通信网络连接的一个显示点(POP)中进行生物统计学代码的首次摄取。从那里将这些代码保险地经通信网络传输到生物统计学的服务器上,在此服务器中代码存储在表格中,在此给一个相应的使用者分配表格中的至少一个生物统计学代码。在POP中同样可以进行生物统计学代码的补充和更新。此外如果在生物统计学的服务器上生物统计学代码的多数性对于有关的使用者已经是已知的话,则可以用本发明直接从通信终端设备出发更新生物统计学的代码。According to the invention, the first acquisition of the biometric code takes place in a point of presence (POP) connected to the communication network. From there, these codes are securely transmitted via the communication network to a biometric server, where the codes are stored in a table, where at least one biometric code in the table is assigned to a corresponding user. Supplementation and updating of biometric codes can also be performed in the POP. Furthermore, the invention can be used to update the biometric code directly from the communication terminal, if the majority of the biometric code is already known to the user concerned on the biometric server.
在本发明中在鉴定和传送生物统计学的代码时首先借助例如受委托第三者(TTP)业务的安全业务,以便保证来源的机密性,真实性,无可辩驳性,并且保证在此经通信网络交换的数据的完整性,以及保证这些在此所交换数据的发射机的真实性。In the present invention, security services such as trusted third party (TTP) services are first used when authenticating and transmitting biometric codes, in order to guarantee the confidentiality of the source, authenticity, irrefutable nature, and to ensure that hereby The integrity of data exchanged by communication networks, and the assurance of the authenticity of the transmitters in which these data are exchanged.
以下用一个实例说明本发明的一种实施。通过以下的附图描述实施例:A kind of implementation of the present invention is illustrated below with an example. Embodiments are described by the following figures:
图1示出了具有一个通信网络的和有SIM卡的以及视频传感器的一个与通信网络连接的移动通信终端设备的概况图,图1还展示具有连接的表格的和SIM服务器的一个生物统计学服务器,一个显示点以及一个保险的装置。Figure 1 shows an overview of a mobile communication terminal device connected to the communication network with a communication network and with a SIM card and a video sensor, Figure 1 also shows a biometric with a connected table and a SIM server server, a display point and a safety device.
参照号码9涉及例如与网络经营者的或服务性企业的零售点连接的一个显示点(POP)。显示点9拥有例如也用作为通信终端设备的至少一个计算机,尤其是拥有连接到例如固定网15的一个通信网络5的个人计算机或工作站。显示点9此外拥有未表示的,与计算机连接的用于摄取人体特征的外围设备,例如经电缆和视频接口卡与计算机连接的视频摄像机。计算机装备了一种程序,此程序可以访问、控制外围设备和尤其能读取,中间存储和处理外围设备的所摄取的数据。程序也拥有一个使用者表面,用此使用者表面例如通过是POP 9的一个职员的操作员可以操纵此程序。使用者表面帮助操作员摄取用户的人体特征,例如用户的面容7、眼样6或指纹8,其办法是程序具有对于专业人员是已知的元素,以便例如校正视频摄像机,调节反差,合适地表示图像片段,以及当制作了通过程序加工出的生物统计学的代码时,在使用者表面借助用户就地为鉴定目的已检查过程序之后,通知操作员。Reference number 9 relates to a point of presentation (POP) which is connected, for example, to a retail point of a network operator or a service company. The display point 9 has, for example, at least one computer which is also used as a communication terminal, in particular a personal computer or a workstation which is connected to a communication network 5 , for example a fixed network 15 . The display point 9 also has a peripheral device (not shown) connected to the computer for capturing human features, for example a video camera connected to the computer via a cable and a video interface card. The computer is equipped with a program which can access peripheral devices, control them and in particular read, intermediate store and process the data acquired by peripheral devices. The program also has a user interface with which the program can be operated, for example, by an operator who is an employee of POP9. The user surface helps the operator to capture the user's physical characteristics, such as the user's face 7, eye pattern 6 or fingerprints 8, by means that the program has elements known to specialists in order, for example, to calibrate the video camera, adjust the contrast, suitably The image segment is represented, and the operator is notified when the programmed biometric code is produced, after the user surface has been checked for authentication purposes by the user in situ.
尤其对于人体动作的摄取必要的是,程序经使用者表面指示用户和操作员例如完成例如像口或眼动作的某些运动。在此重要要提及的是,可以如此实施使用者表面的一种变型,使得此使用者表面对于生物统计学代码的摄取是完全自动化的和不需要操作员,而是将指示直接交给用户。在此变型中,计算机及其显示屏和摄像机是例如类似于像人们从例如证件照自动摄像机或自动取款机那儿所知道的那样布置的。Especially for the acquisition of human motions it is necessary that the program instructs the user and the operator via the user surface, for example to perform certain movements like eg mouth or eye movements. It is important to mention here that a variant of the user surface can be implemented in such a way that the uptake of the biometric code by the user surface is fully automated and does not require an operator, but the instructions are given directly to the user . In this variant, the computer with its display screen and video camera is arranged, for example, as is known from, for example, photo cameras or automatic teller machines.
除了视觉生物统计学的代码之外也可以以相应的方式和用像拾音器和音响接口卡那样的外围设备录取声音特征,并且作为生物统计学代码来存储。In addition to visual biometric codes, acoustic features can also be recorded correspondingly and with peripheral devices such as microphones and audio interface cards and stored as biometric codes.
在相应的个人使用者简要表中可以存放一个用户的所摄录和加工而得的生物统计学的代码,但是这些代码也可以分配给一个使用者组。程序和它的使用者表面拥有对于专业人员是容易可执行的相应组分,以便摄录从属于此的个人数据,并且存放在相应的使用者简要表和/或使用者组简要表中。此外在此也可采用例如像安全等级的其它的安全信息,以便例如将保险装置13划分为对不同业务访问权的不同等级,例如可以将使用者的访问权限制于经移动无线电电话1进行通话,而另外的使用者外加地也允许实施例如像经移动无线电电话1的专用业务选拨和实施那样的另外功能。可以输入和存放的其它安全信息的另外的实例是为了例如将某些权利的有效性限制在某个持续时间或某个时刻的有效期的说明,为了例如将对装置或业务的访问权限制在某些地理地区的地方说明,或者个人的进入密码。The recorded and processed biometric codes of a user can be stored in the corresponding individual user profile, but these codes can also be assigned to a user group. The program and its user interface have corresponding components that are easily executable by professionals in order to record the personal data associated therewith and store them in the corresponding user profile and/or user group profile. In addition, other security information such as security levels can also be used here, in order to divide the security device 13 into different levels of access rights for different services, for example, so that the access rights of the user can be restricted to calls via the mobile radio telephone 1, for example. , while other users are additionally allowed to implement additional functions such as the selection and execution of specific services via the mobile radiotelephone 1 . Further examples of other security information that may be entered and stored are specifications for e.g. Local descriptions for certain geographical areas, or individual access codes.
重要的是,检查生物统计学代码到使用者简要表或使用者组简要表上的分配,例如只有通过操作员和在严格的鉴定条件下,例如借助于具有照片的和也许具有由在场第三者确认的证书的多个正式证件进行这种分配,以防止滥用分配。It is important to check the assignment of the biometric code to the user profile or user group profile, for example only by the operator and under strict identification conditions, for example by means of a photo with a photo and possibly with a third party present. This allocation is made by multiple official documents of the certificate confirmed by the author to prevent abusive allocation.
在生物统计学代码摄录的末尾,通过计算机的程序保险地将具有生物统计学代码和安全信息的使用者简要表或使用者组简要表,经通信网络5传送到用于管理生物统计学代码的,以下称为生物统计学服务器10的服务器上,并且在那里为相应的使用者或相应使用者组存储到与生物统计学服务器10连接19的表11中。对于专业人员清楚的是,存在着实施具有表11的生物统计学服务器10的不同可能性,例如表11可以是在一种数据库服务器中的,此服务器与生物统计学服务器共同位于一个计算机上,或者此服务器位于经通信网络与生物统计学服务器10的计算机连接的一个另外的计算机上。对于专业人员甚至对于在表11中存储信息存在着在此不详述的不同变形。同样地在使用者的个人SIM卡3上,尤其是在GSM卡上,或者在相应表4中的使用者组的可能是多个SIM卡3上存储这些同一的信息,其办法是将这些信息从POP 9传输到SIM服务器12上,并且从那里按照在EP 0689 368 B1中说明的SICAP方法,借助于专用的短信息经移动无线电通信网,例如按GSM标准传输到SIM卡上,并且存储在那里。在一个另外的变型中将SIM卡3引入POP9中的相应计算机的相应的,未表示的接口中,并且程序将信息保险地存储在表4中。然后可将因此的个人SIM卡3转交给它的使用者或它的使用者组。At the end of the recording of the biometric code, the program of the computer securely transmits the user profile or user group profile with the biometric code and security information via the communication network 5 to the computer for managing the biometric code. , hereinafter referred to as the biometric server 10, and stored there for the corresponding user or corresponding user group in a table 11 connected 19 to the biometric server 10. It is clear to the person skilled in the art that there are different possibilities of implementing the biometric server 10 with the table 11, for example the table 11 can be in a database server which is co-located on a computer with the biometric server, Alternatively, the server is located on a separate computer connected to the computer of the biometric server 10 via a communication network. For professionals, there are even different variants for storing information in table 11 which are not described in detail here. The same information is also stored on the user's personal SIM card 3, especially on the GSM card, or possibly on several SIM cards 3 of the user group in the corresponding table 4, by combining them From the POP 9 to the SIM server 12, and from there according to the SICAP method described in EP 0689 368 B1, by means of a dedicated short message via the mobile radio communication network, for example transmitted to the SIM card according to the GSM standard, and stored in There. In a further variant, the SIM card 3 is inserted into a corresponding (not shown) interface of the corresponding computer in the POP9, and the program stores the information securely in Table 4. The individual SIM card 3 thus can then be handed over to its user or its user group.
对于生物统计学代码的保险的传送和存储首先借助安全业务,例如受委托第三者(TTP)业务,以便保证来源的机密性、真实性、无可辩驳性和传送数据的完整性以及保证这些所传输数据的发射机的真实性。也完全可以借助点到点方法进行编码。For secure transmission and storage of biometric codes, first of all by means of security services, such as trusted third party (TTP) services, in order to guarantee the confidentiality, authenticity, irrefutable and integrity of the transmitted data as well as to guarantee these The authenticity of the transmitter of the transmitted data. It is also entirely possible to encode by means of the point-to-point method.
在POP 9中此外也提供了可能的其它业务,尤其是用于例如由于年龄决定的改变而更新生物统计学代码的业务,或者用于补充其它的生物统计学代码的业务或者提供用于补充通过专业人员按照上列实施可以执行的另外的安全信息的业务。In addition, possible other services are also provided in POP 9, especially services for updating biometric codes due to age-dependent changes, or services for supplementing other biometric codes or providing services for supplementing through Professionals implement additional safety information services that may be performed as listed above.
使用者可以将他的个人SIM卡3插入通信终端设备1和接通此设备。在此实例中通信终端设备1是一个移动无线电电话1,此移动无线电电话装备了用于摄取例如像眼样6、脸部特征7或指纹8那样的人体特征的一个视频传感器2。视频传感器2可以是直接装入移动无线电电话1中的,或者借助于例如本身包括用于接纳SIM卡3的接口的适配器可将视频传感器例如插入移动无线电电话机1中SIM卡3用的接口中。在接通之后起动例如位于SIM卡3上的鉴定程序,并且例如借助移动无线电电话1的未图示的显示器请求使用者对着视频传感器2看,某个手指按到视频传感器2上和/或对着移动无线电电话1说话。由鉴定程序中间存储用视频传感器2和必要时用移动无线电电话1的未图示的拾音器摄录的数据,从其中处理出中间存储的和与存储的生物统计学代码4作比较的现实生物统计学代码。附加于此直接的比较地例如可以由生物统计学的服务器10借助于TTP业务证实所存储的生物统计学代码4的真实性和完整性。如果现实生物统计学代码与存储在SIM卡3上的生物统计学代码4的比较得出肯定的结果,并且由生物统计学服务器10肯定地鉴定所存储的生物统计学代码4的话,则允许例如继续使用移动无线电电话1。否则可以禁止由此使用者继续使用移动无线电电话1,并且例如关断移动无线电电话1。允许可以一直保持到重新关断移动无线电电话1时为止,或者允许也可以是时间限制的,其办法是在一个预先规定的周期之后必须重新鉴定使用者,例如也可以在使用移动无线电电话1期间自动地实施这一点。The user can insert his personal SIM card 3 into the communication terminal 1 and switch it on. In this example, communication terminal 1 is a mobile radiotelephone 1 which is equipped with a video sensor 2 for recording human features such as eyes 6 , facial features 7 or fingerprints 8 . The video sensor 2 can be built directly into the mobile radiotelephone 1, or the video sensor can be plugged, for example, into the interface for the SIM card 3 in the mobile radiotelephone 1 by means of an adapter, which itself includes an interface for receiving the SIM card 3, for example. . After switching on, for example, an authentication program located on the SIM card 3 is started and, for example, by means of a display (not shown) of the mobile radio telephone 1, the user is asked to look at the video sensor 2, to press a certain finger on the video sensor 2 and/or Speak into the mobile radiotelephone 1. The identification program buffers the data recorded with the video sensor 2 and optionally with the not-shown microphone of the mobile radiotelephone 1, from which the actual biometrics buffered and compared with the stored biometric code 4 are processed. Learn to code. In addition to this direct comparison, for example, the authenticity and integrity of the stored biometric code 4 can be verified by the biometric server 10 by means of a TTP transaction. If the comparison of the actual biometric code with the biometric code 4 stored on the SIM card 3 yields a positive result, and the stored biometric code 4 is positively authenticated by the biometric server 10, allowing for example Continue to use mobile radiotelephone 1. Otherwise, further use of the mobile radiotelephone 1 by this user can be prohibited and the mobile radiotelephone 1 can be switched off, for example. The permission can remain until the mobile radiotelephone 1 is switched off again, or it can also be time-limited in that the user has to be re-authenticated after a predetermined period, e.g. also during the use of the mobile radiotelephone 1 Implement this automatically.
SIM卡3首先借助于在通信网络5之内例如按GSM标准经移动无线电通信网16送到一个SIM服务器12上的专用短信息与生物统计学服务器10通信,此SIM服务器是经连接17连接到通信网络5上的和将这些专用短信息按在EP 0689 368 B1中说明的SICAP方法传送到生物统计学的服务器10上用于经连接18的处理。The SIM card 3 first communicates with the biometrics server 10 by means of a dedicated short message within the communication network 5, such as by means of the GSM standard via the mobile radio communication network 16, which is sent to a SIM server 12, which is connected to the biometric server 10 via a connection 17. And on the communication network 5, these private short messages are transmitted to the server 10 of biometrics for processing through the connection 18 according to the SICAP method explained in EP 0689 368 B1.
如果在使用者的生物统计学服务器10上生物统计学代码11的多数性是已知的话,则有可能直接从移动无线电电话1出发更新例如年龄决定地已改变的生物统计学代码11。对此的前提在于,已通过至少一个无需改变的第二生物统计学代码鉴定过使用者,并且对于更新一个第一生物统计学代码应采用的视频信息的质量满足预先规定的最低要求,这些可以例如是对最低光量情况或照片反差的要求,或是也可以是对新的生物统计学代码对旧的生物统计学代码的最大偏离的要求。If the majority of biometric codes 11 is known on the biometric server 10 of the user, it is possible to update, for example age-dependently changed biometric codes 11 directly from the mobile radio telephone 1 . The prerequisite for this is that the user has already been authenticated by at least one second biometric code which does not need to be changed, and that the quality of the video information to be used for updating a first biometric code meets predetermined minimum requirements, which can For example requirements for minimum light conditions or image contrast, or also requirements for maximum deviation of the new biometric code from the old biometric code.
在一个变型中,鉴定首先不用作为检查移动无线电电话1的使用,而是保证按上列实施的鉴定结果和无线地传送到外部的保险的装置13上,此装置然后从它方面相应地允许或禁止对装置13的访问。与鉴定的结果一起也可以将使用者的个人数据传输到保险的装置13上,使得保险的装置13基于受鉴定使用者的这些个人数据可以允许或禁止访问。在一个另外的变型中与鉴定的结果一起将例如像安全等级,地点说明和有效期的说明那样的,使用者的安全信息传送给保险的装置13,保险的装置13以此可作出允许或禁止访问的决定。在一个另外的变型中保险的装置13根据请求将用于它的鉴别的信息传送到移动无线电电话1上,移动无线电电话1以此在鉴定过程期间借助于例如像安全等级,地点说明和有效期的说明那样的,使用者的其它安全信息也可以作出关于使用者访问有关的保险的装置13的决定,并且可以传送到保险的装置13上。外部的保险的装置13例如是一个设备,例如自动取款机或信息查询用的频视终端,通向例如像保密的工业制造设施、警察营房或核电站那样的,保险的建筑的入口,或者是通向例如像军事基地,机场或厂区那样的隔离地带的入口。例如借助于SIM卡3上的电线圈不接触地经感应连接14可以实施无线的传送。移动无线电电话1也可以借助于未图示的不接触的红外接口或借助于短信息实施到保险的装置13上的传送。例如在借助于TTP业务的条件下,或者用点到点方法各自保险地实现传送。In a variant, the identification is at first not used as a check for the use of the mobile radiotelephone 1, but ensures that the results of the identification carried out by the above list are wirelessly transmitted to an external safe device 13, which then accordingly allows or Access to device 13 is prohibited. Along with the results of the authentication, personal data of the user can also be transmitted to the insured device 13 , so that the insured device 13 can grant or deny access based on these personal data of the authenticated user. In a further variant, together with the result of the authentication, the security information of the user, such as the security level, the specification of the location and the specification of the validity period, are transmitted to the safe device 13, which can make an authorization or prohibition of access. decision. In a further variant, the insured device 13 transmits upon request information for its authentication to the mobile radiotelephone 1, whereby the mobile radiotelephone 1 uses during the authentication process by means of, for example, information such as security level, location specification and expiration date. As stated, other security information about the user may also be used to make decisions regarding user access to the associated secured device 13 and may be transmitted to the secured device 13 . The external secured device 13 is, for example, a device, such as an automatic teller machine or a video terminal for information inquiry, an entrance to a secured building, such as a secure industrial manufacturing facility, a police barracks or a nuclear power plant, or a via Entrance to isolated areas such as military bases, airports or factory areas. Wireless transmission can be carried out, for example, by means of an electrical coil on the SIM card 3 without contact via an inductive connection 14 . The mobile radio telephone 1 can also carry out the transmission to the secure device 13 by means of a contactless infrared interface (not shown) or by means of a short message. For example, the transfer takes place securely by means of a TTP service or in a point-to-point manner.
在一个其它的变型中视频传感器位于无线电电话1之外,例如位于外部的保险的装置13中。在此变型中通过外部的视频摄像机摄取视频信息,并且无线地传输到移动无线电电话上用于分析处理。例如可以借助于SIM卡3上的电线圈不接触地经感应连接14实施无线的传输。保险的装置13也可以借助于未图示的不接触的红外接口或借助于短信息实施到移动无线电电话1上的传送。例如在借助于TTP业务的条件下,或者用点到点方法各自保险地实现传送。In a further variant, the video sensor is located outside the radiotelephone 1 , for example in an external safety device 13 . In this variant, the video information is captured by an external video camera and transmitted wirelessly to a mobile radio telephone for evaluation. For example, wireless transmission can be carried out via an inductive connection 14 by means of an electrical coil on the SIM card 3 without contact. The secure device 13 can also carry out the transfer to the mobile radiotelephone 1 by means of a contactless infrared interface (not shown) or by means of a short message. For example, the transfer takes place securely by means of a TTP service or in a point-to-point manner.
在这里也须提及,除了移动无线电电话1之外例如像个人计算机,膝上型计算机或掌上型计算机那样的另外的通信终端设备也可以实施此鉴定方法,如果这些通信终端设备装备有用于摄录人体特征的SIM卡3和外围设备的话。此外鉴定的应用不必局限于通信终端设备或外部的保险的装置13用的访问检查上,而且完全也可以将鉴定应用于业务的访问检查上,尤其是也可以应用于经过也可能包含互联网的通信网络5可以支配的业务上。在这些情况下将鉴定的结果传送给有关的业务提供者,例如到一个自动化的互联网现场上,这个业务提供者因此可以允许或禁止业务。也许将鉴定的结果与关于使用者对有关业务的访问权的信息一起,或者与使用者的个人数据一起传送给业务提供者,正如以上在与保险的装置13的关联中已说明过这一点那样。It should also be mentioned here that, in addition to the mobile radio telephone 1, other communication terminals such as personal computers, laptops or palmtops can also implement this authentication method, if these communication terminals are equipped with Record the words of SIM card 3 and peripheral equipment of human body characteristics. In addition, the use of authentication need not be restricted to access checks for communication terminals or external secured devices 13, but the authentication can also be used for access checks of services, especially communications via the Internet, which may also be included. Network 5 can dominate the business. In these cases the result of the authentication is transmitted to the relevant service provider, for example to an automated Internet site, which can thus allow or prohibit the service. The result of the authentication may be transmitted to the service provider together with information about the user's access rights to the relevant service, or with the user's personal data, as explained above in connection with the insurance device 13 .
完全有可能的是,可以由服务提供者按付费,作为给例如关注保护它们的装置、建筑物、地区或业务的第三者的业务,来提供此方法和系统。It is entirely possible that the method and system could be offered by service providers on a fee-for-pay basis as a service to third parties eg interested in protecting their installations, buildings, regions or businesses.
Claims (60)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNB971820856A CN1179293C (en) | 1997-11-07 | 1997-11-07 | Method, system and apparatus for determining the authenticity of a person |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNB971820856A CN1179293C (en) | 1997-11-07 | 1997-11-07 | Method, system and apparatus for determining the authenticity of a person |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1249048A true CN1249048A (en) | 2000-03-29 |
| CN1179293C CN1179293C (en) | 2004-12-08 |
Family
ID=5178285
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNB971820856A Expired - Fee Related CN1179293C (en) | 1997-11-07 | 1997-11-07 | Method, system and apparatus for determining the authenticity of a person |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN1179293C (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100380269C (en) * | 2001-02-07 | 2008-04-09 | 萨甘股份有限公司 | biometric identification or authentication system |
| CN1759585B (en) * | 2003-04-04 | 2011-08-03 | 艾利森电话股份有限公司 | Method and apparatus for providing data requesting entities with access to principal-related data |
| US8327151B2 (en) | 2005-06-30 | 2012-12-04 | Fujitsu Limited | Biometrics authentication method and biometrics authentication system |
| CN101960493B (en) * | 2008-01-25 | 2014-06-04 | 高通股份有限公司 | Biometric smart card for mobile devices |
-
1997
- 1997-11-07 CN CNB971820856A patent/CN1179293C/en not_active Expired - Fee Related
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100380269C (en) * | 2001-02-07 | 2008-04-09 | 萨甘股份有限公司 | biometric identification or authentication system |
| CN1759585B (en) * | 2003-04-04 | 2011-08-03 | 艾利森电话股份有限公司 | Method and apparatus for providing data requesting entities with access to principal-related data |
| US8327151B2 (en) | 2005-06-30 | 2012-12-04 | Fujitsu Limited | Biometrics authentication method and biometrics authentication system |
| CN101960493B (en) * | 2008-01-25 | 2014-06-04 | 高通股份有限公司 | Biometric smart card for mobile devices |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1179293C (en) | 2004-12-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6657538B1 (en) | Method, system and devices for authenticating persons | |
| US6219439B1 (en) | Biometric authentication system | |
| KR100774058B1 (en) | The authentication system and the authentication method which use a portable communication terminal | |
| EP2515500A1 (en) | Method and mobile station for sequential biometric authentication | |
| EA008983B1 (en) | A high security identification card | |
| KR102243963B1 (en) | System for managing attendance using face recognition | |
| US12212564B2 (en) | Mobile enrollment using a known biometric | |
| WO2019245383A1 (en) | Improved access control system and a method thereof controlling access of persons into restricted areas | |
| JP2009181561A (en) | Security management system using biometric authentication | |
| JP2007272320A (en) | Admission management system | |
| EP1329855A1 (en) | User authentication method and system | |
| CN1179293C (en) | Method, system and apparatus for determining the authenticity of a person | |
| US8442277B1 (en) | Identity authentication system for controlling egress of an individual visiting a facility | |
| CA2818214A1 (en) | System and method for identity verification in a detention environment | |
| HK1026047B (en) | Method, system and devices for authenticating persons | |
| RU2371763C2 (en) | Method and device for determining authenticity of system user | |
| JP2006260603A (en) | Method, system and device for authenticating person | |
| WO2025230002A1 (en) | Personal authentication system, personal authentication method, program, and system employing personal authentication system | |
| KR20080040859A (en) | User authentication system using human body communication | |
| US20210056563A1 (en) | Biometric medical proxies | |
| KR20250121760A (en) | A Method for Managing a Coming and Going in a Smart Way with a Comparison of a Real Image and an Identification Card | |
| Rejman-Greene et al. | The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers. ERNCIP Thematic Group Applied Biometrics for CIP. Deliverable: Guidance for Security Managers-Task 2 | |
| JP2016063515A (en) | Line connection device, line connection method and line connection device control program |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C53 | Correction of patent of invention or patent application | ||
| CB02 | Change of applicant information |
Address after: Bern, Switzerland Applicant after: SWISSCOM MOBILE AG Address before: Bern, Switzerland Applicant before: SWISSCOM AG |
|
| COR | Change of bibliographic data |
Free format text: CORRECT: APPLICANT; FROM: SWISSCOM AG TO: SWISSCOM MOBILE TELEPHONE CORP. |
|
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| ASS | Succession or assignment of patent right |
Owner name: SWEDEN TELECOMMUNICATION PTT Free format text: FORMER OWNER: SWISSCOM AG Effective date: 20130605 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20130605 Address after: Bern Patentee after: SWISSCOM AG Address before: Bern, Switzerland Patentee before: SWISSCOM MOBILE AG |
|
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20041208 Termination date: 20151107 |
|
| EXPY | Termination of patent right or utility model |