[go: up one dir, main page]

GB2204971A - Transportable security system - Google Patents

Transportable security system Download PDF

Info

Publication number
GB2204971A
GB2204971A GB08711741A GB8711741A GB2204971A GB 2204971 A GB2204971 A GB 2204971A GB 08711741 A GB08711741 A GB 08711741A GB 8711741 A GB8711741 A GB 8711741A GB 2204971 A GB2204971 A GB 2204971A
Authority
GB
United Kingdom
Prior art keywords
computer
token
card
program
security system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB08711741A
Other versions
GB8711741D0 (en
Inventor
Christopher John Stanford
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
General Electric Company PLC
Original Assignee
General Electric Company PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by General Electric Company PLC filed Critical General Electric Company PLC
Priority to GB08711741A priority Critical patent/GB2204971A/en
Publication of GB8711741D0 publication Critical patent/GB8711741D0/en
Publication of GB2204971A publication Critical patent/GB2204971A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Human Computer Interaction (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

In order to overcome the problem of security of data held within a program, an electronic token (3) of the type including on-board processing and memory is provided with either authentication and password software or a partially complete program, and arranged for interaction with a host computer (1) via a read/write unit (2) so that the computer will not function in a chosen manner without the presence of the token. When the token contains a partially complete program the remainder of the program is held within the computer so that both elements must be present before the program will run. <IMAGE>

Description

Transportable Security System This invention relates to a transportable security system, particularly to a transportable system for the security of computer programs or for restricting access to a computer.
It should be noted that by the term 'computer in the following specification is meant any system which includes a degree of processing or intelligence within it.
Current methods to improve the security of data or programs contained within a computer system often involve the provision of passwords or codes which must be typed in by a user before he is allowed to view or use the data.
Such systems are however suspect since a person with sufficient knowledge and determination can generally 'break in' to the program within the computer to ascertain the codes or passwords required.
According to the present invention in a first aspect there is provided a security system comprising a computer; an electronic token comprising processing means, memory means and input/ output means; and means for inductively coupling the token with the computer, wherein the token and computer are each provided with a partial program which cooperate in use to provide a unitary program essential to the operation of the computer.
A plurality of tokens may be provided, each token being assigned to a particular user or class of users and including a partial program allowing its user access only to information he is authorised to access.
In use, the system may be arranged such that a computer will not function in a particular way unless one unique token is placed within operative coupling range of the computer. The token may then identify itself to the computer and a program will be allowed to run. The token could be provided with authentification and/or verification programs such that when a user enters his unique passwords or code numbers these will only be verified if the token is operatively present. The invention thus provides a far more secure system than was previously available.
Advantageously, the electronic token and its associated inductively coupled read/write unit will be of a type disclosed in the applicants published United Kingdom patent application no. GB2173623A, which is incorporated herein by reference.
Embodiments of the invention will now be described by way of example only with reference to the accompanying drawing, which shows in block form elements of the electronic token and coupler which may be used in embodiments of the present invention.
Referring to the Figure' 1 a host computer 1 is inductively coupled by means of coupler 2 to an electronic token, shown here as Card 3. Coupling between the card and coupler is achieved inductively by means of modulated fields, as is described in the aforementioned British patent application no. GB2173623A. The Card 3 comprises a micro-processor 4 of any convenient type, a Receive/ Transmit circuit 5 and power supply means 6 which may either be an onboard battery or, more preferably, means for tapping off power which is inductively coupled from the coupler 2. The card also includes a memory region which is divided into three areas; an operating system area 7, applications program area 8 and data storage area 9.
The coupler 2 comprises a demodulator 10 and modulator 11 for processing modulated signals received or transmitted after amplification by an amplifier 12.
Unmodulated signals, either after demodulation or before modulation are fed by a suitable connection to chosen address lines of the host computer 1.
In use, the card is placed with its inductive coupling coils in contact with or in a position where it will operatively couple with the coils of the coupler 2 so that, in effect, the card forms part of the computer system and signals may be transferred at will between the card and computer. By providing suitable programs in the application program area 8 of the card, by well known programming methods, the card may be used as a security measure in any of the following ways, which are merely shown as non-limiting examples.
Firstly the card will identify itself uniquely to the system and any card not bearing the correct code within it will not be accepted and will not allow a program to run on the computer. The card can then be used to verify the identity of the user of the computer by comparing an entered PIN (Personal Identification Number) or password with a value stored in the card. Alternatively or additionally, characteristics unique to the user can be compared by means of the characteristics of a digitised signature in the card, characteristics of a voice in the card, or any other biometric characteristics such as finger prints, retina patterns, hand geometry, vein patterns etc. The card holder may be allowed to change PIN or passwords to a new value once his identity has been verified.
Apparatus of the present invention may be used to authenticate, validate, encrypt or decrypt any messages or files recieved, sent from or stored within the associated computer.
Secret keys or lists of keys to be used in authentication, encryption and decryption algorithms may be held within the token or card, and software may be included such that if one key is felt compromised then a new key can be called into play from the cards internal memory, i.e. the processing capability of the token can be used to look for a key search which may be going on when a non-authorised person is trying to use the computer, having obtained the card. Since the card itself can hold any number of keys, within its memory capacity, then a new key does not have to be transmited to the card and new keys could be brought into play automatically dependent upon factors such as date, site of computer, time and history of use, etc.Additionally if the card detects that a person is attempting to break or illegally access the verification codes the card may be programed to erase the data or programs stored within it. This 'self destruct' feature may be initiated as a result of a number of successive threats, or perhaps be dependent upon the frequency of threats.
A multi-tier system of authorisation can be embedded within the card such that the user has to go through a number of procedures before he is allowed full access.
These may be in a prescribed series or perhaps a few of them may be randomly selected by the card.
Programs may be incuded such that the card can cumulatively store details of its use, each time it has been used.
One particularly advantageous use of the card is for the card to have stored within it a portion of a program, the remaining portion of which is stored within the computers memory. A user will then not be able to use the full program unless the card is present and operating.
Furthermore, if the structure of the program is organised such that those parts carried on the card are executed entirely within the card then there is no need for the computer ever to have the complete program loaded into it and the security is greatly increased. Alternatively however that partial program could be down loaded into the computer upon start up.
It is seen that if the card or token is provided in a conventional portable form, perhaps as a credit card size token made generally from plastics material, then each user of a computer system can be provided with his own unique card which allows him to view or use only those parts of the data or program code within the computer for which he is authorised. It is also a convenient way to store and transport data for use at different terminals or different computers in different environments.
Tokens and couplers of the type described in patent application no. 2173623 may be implemented in association with small personal computers to provide a convenient security procedure and system.

Claims (3)

1. A security system comprising a computer; an electronic token comprising processing means, memory means and input/output means; and means for inductively coupling the token with the computer, wherein the token and computer are each provided with a partial program which cooperate in use to provide a unitary program essential to the operation of the computer.
2. A security system as claimed in claim 1 and including a plurality of tokens, each token being assigned to a particular user or class of users and including a partial program allowing its user access only to information he is authorised to access.
3. A security system substantially as hereinbefore described with reference to, and as illustrated by, the accompanying drawings.
GB08711741A 1987-05-19 1987-05-19 Transportable security system Withdrawn GB2204971A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB08711741A GB2204971A (en) 1987-05-19 1987-05-19 Transportable security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB08711741A GB2204971A (en) 1987-05-19 1987-05-19 Transportable security system

Publications (2)

Publication Number Publication Date
GB8711741D0 GB8711741D0 (en) 1987-06-24
GB2204971A true GB2204971A (en) 1988-11-23

Family

ID=10617546

Family Applications (1)

Application Number Title Priority Date Filing Date
GB08711741A Withdrawn GB2204971A (en) 1987-05-19 1987-05-19 Transportable security system

Country Status (1)

Country Link
GB (1) GB2204971A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0421409A3 (en) * 1989-10-06 1991-05-29 International Business Machines Corporation Transaction system security method and apparatus
FR2663442A1 (en) * 1990-05-29 1991-12-20 Toshiba Kk Electronic apparatus including separate units
EP0416482A3 (en) * 1989-09-04 1993-03-24 Hitachi, Ltd. Automatic trading method and apparatus
WO1998013791A1 (en) * 1996-09-27 1998-04-02 Westinghouse Electric Corporation Apparatus and method for personal identification
WO1999027500A1 (en) * 1997-11-19 1999-06-03 Orga Consult Gmbh Method and device for processing biometric data
WO1999035553A1 (en) * 1998-01-10 1999-07-15 Ncipher Corporation Limited Cryptographic token
EP0935221A3 (en) * 1998-02-05 2000-02-02 Mitsubishi Denki Kabushiki Kaisha Remote authentication system
RU2146834C1 (en) * 1998-06-15 2000-03-20 Бардаев Эдуард Аркадьевич Device for authentication of software units
WO2001061640A1 (en) * 2000-02-16 2001-08-23 Ong Yong Kin Michael Electronic credit card - ecc
GB2377525A (en) * 2002-03-22 2003-01-15 Trek 2000 Int Ltd A portable device having biometrics based authentication capabilities
US6880054B2 (en) 2000-02-21 2005-04-12 Trek Technology (Singapore) Pte. Ltd. Portable data storage device having a secure mode of operation
GB2395323B (en) * 2001-08-02 2006-01-11 Sandisk Corp Removable computer with mass storage
US7082483B2 (en) 2002-05-13 2006-07-25 Trek Technology (Singapore) Pte. Ltd. System and apparatus for compressing and decompressing data stored to a portable data storage device
US7353399B2 (en) 2002-07-31 2008-04-01 Trek 2000 International Ltd. Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks
US20090150671A1 (en) * 2007-12-06 2009-06-11 Hiroshi Abe Communication system and communication terminal device
US7549161B2 (en) 2001-06-28 2009-06-16 Trek 2000 International Ltd. Portable device having biometrics-based authentication capabilities
US7650470B2 (en) 2001-06-28 2010-01-19 Trek 2000 International, Ltd. Method and devices for data transfer
WO2010120205A1 (en) * 2009-04-16 2010-10-21 Palchenko Nikolay Ivanovich Computer architecture with self-contained modules
EP2296103A1 (en) * 2000-09-06 2011-03-16 Hitachi, Ltd. Personal identification device and method
GB2478702A (en) * 2010-03-15 2011-09-21 Mohammed Ayub Ullah Secure biometric card device
US8322606B2 (en) 2000-02-16 2012-12-04 Ong Yong Kin Michael Electronic credit card—ECC

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2148075A (en) * 1983-10-08 1985-05-22 Dainippon Printing Co Ltd Transmitter-transponder systems
GB2154344A (en) * 1984-02-13 1985-09-04 Nat Res Dev Apparatus and methods for granting access to computers
GB2167586A (en) * 1984-11-12 1986-05-29 Halpern John Wolfgang Card reader
EP0191162A2 (en) * 1984-12-18 1986-08-20 International Business Machines Corporation Method of software protection
GB2173623A (en) * 1985-04-10 1986-10-15 The General Electric Co Plc Transaction system
GB2177528A (en) * 1985-07-03 1987-01-21 Nippon Lsi Card Kk Data read/write method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2148075A (en) * 1983-10-08 1985-05-22 Dainippon Printing Co Ltd Transmitter-transponder systems
GB2154344A (en) * 1984-02-13 1985-09-04 Nat Res Dev Apparatus and methods for granting access to computers
GB2167586A (en) * 1984-11-12 1986-05-29 Halpern John Wolfgang Card reader
EP0191162A2 (en) * 1984-12-18 1986-08-20 International Business Machines Corporation Method of software protection
GB2173623A (en) * 1985-04-10 1986-10-15 The General Electric Co Plc Transaction system
GB2177528A (en) * 1985-07-03 1987-01-21 Nippon Lsi Card Kk Data read/write method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WO A 85/02696 *
WO A 85/03785 *

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0416482A3 (en) * 1989-09-04 1993-03-24 Hitachi, Ltd. Automatic trading method and apparatus
US5315634A (en) * 1989-09-04 1994-05-24 Hitachi, Ltd. Automatic trading method and apparatus
EP0421409A3 (en) * 1989-10-06 1991-05-29 International Business Machines Corporation Transaction system security method and apparatus
FR2663442A1 (en) * 1990-05-29 1991-12-20 Toshiba Kk Electronic apparatus including separate units
WO1998013791A1 (en) * 1996-09-27 1998-04-02 Westinghouse Electric Corporation Apparatus and method for personal identification
US6345761B1 (en) 1997-11-19 2002-02-12 Orga Kartensysteme Gmbh Method and device for processing biometric data
WO1999027500A1 (en) * 1997-11-19 1999-06-03 Orga Consult Gmbh Method and device for processing biometric data
WO1999035553A1 (en) * 1998-01-10 1999-07-15 Ncipher Corporation Limited Cryptographic token
EP0935221A3 (en) * 1998-02-05 2000-02-02 Mitsubishi Denki Kabushiki Kaisha Remote authentication system
RU2146834C1 (en) * 1998-06-15 2000-03-20 Бардаев Эдуард Аркадьевич Device for authentication of software units
US7533828B2 (en) 2000-02-16 2009-05-19 Ong Yong Kin Michael Electronic credit card—ECC
US7278581B2 (en) 2000-02-16 2007-10-09 Yong Kin Ong Electronic credit card-ecc
US8322606B2 (en) 2000-02-16 2012-12-04 Ong Yong Kin Michael Electronic credit card—ECC
WO2001061640A1 (en) * 2000-02-16 2001-08-23 Ong Yong Kin Michael Electronic credit card - ecc
US6880054B2 (en) 2000-02-21 2005-04-12 Trek Technology (Singapore) Pte. Ltd. Portable data storage device having a secure mode of operation
US8209462B2 (en) 2000-02-21 2012-06-26 Trek 2000 International Ltd. Portable data storage device
EP2296103A1 (en) * 2000-09-06 2011-03-16 Hitachi, Ltd. Personal identification device and method
US7549161B2 (en) 2001-06-28 2009-06-16 Trek 2000 International Ltd. Portable device having biometrics-based authentication capabilities
US7650470B2 (en) 2001-06-28 2010-01-19 Trek 2000 International, Ltd. Method and devices for data transfer
GB2395323B (en) * 2001-08-02 2006-01-11 Sandisk Corp Removable computer with mass storage
US7418344B2 (en) 2001-08-02 2008-08-26 Sandisk Corporation Removable computer with mass storage
US8176335B2 (en) 2001-08-02 2012-05-08 Sandisk Technologies Inc. Removable computer with mass storage
GB2377525A (en) * 2002-03-22 2003-01-15 Trek 2000 Int Ltd A portable device having biometrics based authentication capabilities
US7082483B2 (en) 2002-05-13 2006-07-25 Trek Technology (Singapore) Pte. Ltd. System and apparatus for compressing and decompressing data stored to a portable data storage device
US7631121B2 (en) 2002-05-13 2009-12-08 Trek 2000 International Ltd. System and apparatus for compressing and decompressing data stored to a portable data storage device
US7353399B2 (en) 2002-07-31 2008-04-01 Trek 2000 International Ltd. Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks
US8429416B2 (en) 2002-07-31 2013-04-23 Trek 2000 International Ltd. Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks
US20090150671A1 (en) * 2007-12-06 2009-06-11 Hiroshi Abe Communication system and communication terminal device
RU2413290C2 (en) * 2009-04-16 2011-02-27 Николай Иванович Пальченко Computer architecture with self-contained modules
WO2010120205A1 (en) * 2009-04-16 2010-10-21 Palchenko Nikolay Ivanovich Computer architecture with self-contained modules
GB2478702A (en) * 2010-03-15 2011-09-21 Mohammed Ayub Ullah Secure biometric card device

Also Published As

Publication number Publication date
GB8711741D0 (en) 1987-06-24

Similar Documents

Publication Publication Date Title
GB2204971A (en) Transportable security system
US12050674B2 (en) Biometric identification device and methods of use
US6957338B1 (en) Individual authentication system performing authentication in multiple steps
US6367017B1 (en) Apparatus and method for providing and authentication system
KR100768754B1 (en) Portable Electronic Billing and Authentication Device and Method Therefor
CA2417901C (en) Entity authentication in electronic communications by providing verification status of device
EP0379333B1 (en) Secure data interchange system
US5267315A (en) Secret identification number checking system
US20050055557A1 (en) Personal authentication system and portable unit and storage medium used therefor
US20080005566A1 (en) Portable terminal, settlement method, and program
WO2009095263A1 (en) Method of secure pin entry and operation mode setting in a personal portable device
JPH11306088A (en) IC card and IC card system
US20030228886A1 (en) Electronic value data communication method, communication system, IC card, portable terminal, and communication
JPH11143833A (en) User confirmation system using biometric data, IC card, and recording medium
JP2009151528A (en) IC card storing biometric information and access control method thereof
US7461252B2 (en) Authentication method, program for implementing the method, and storage medium storing the program
US7287272B1 (en) Method, data carrier and system for authentication of a user and a terminal
EP0624267B1 (en) Method and device for preventing unauthorised access to a computer system
JPH11282983A (en) Individual identification method by fingerprint data
JP2001195551A (en) IC card reader and IC card system
JP4113112B2 (en) User confirmation system using biometric data and IC card
JP4760124B2 (en) Authentication device, registration device, registration method, and authentication method
JP2004185255A (en) Floppy (registered trademark) disk type biometric information authentication device that has both personal information management and biometric authentication
JP2001331375A (en) Program startup method, method and device for preventing unauthorized access, encoding/decoding system and card
JP4729187B2 (en) How to use card management system, card holder, card, card management system

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)