[go: up one dir, main page]

GB2411979A - Method for automatically filling in user data using fingerprint identification - Google Patents

Method for automatically filling in user data using fingerprint identification Download PDF

Info

Publication number
GB2411979A
GB2411979A GB0405408A GB0405408A GB2411979A GB 2411979 A GB2411979 A GB 2411979A GB 0405408 A GB0405408 A GB 0405408A GB 0405408 A GB0405408 A GB 0405408A GB 2411979 A GB2411979 A GB 2411979A
Authority
GB
United Kingdom
Prior art keywords
user
fingerprint
code
password
saved
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0405408A
Other versions
GB0405408D0 (en
Inventor
Yen Sheng Chang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giga Byte Technology Co Ltd
Original Assignee
Giga Byte Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giga Byte Technology Co Ltd filed Critical Giga Byte Technology Co Ltd
Priority to GB0405408A priority Critical patent/GB2411979A/en
Publication of GB0405408D0 publication Critical patent/GB0405408D0/en
Publication of GB2411979A publication Critical patent/GB2411979A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention describes a method for automatically filling in user data using fingerprint identification employed in recognizing user's identification. Thus, it creates a web page in first step and then uses the previously saved user's ID, account and password for a database of a specific software application, which is applied to user's ID and password required web page. Meanwhile, user is required to enter the image of user's fingerprint and generate an ID code, and these are checked against the previously saved user's identification information. The user's ID and password according to the corresponding information in the database is retrieved and filled in automatically in that for in the web page if the result of is consistent. The invention can provide a method of identification with security, and also manages user information.

Description

2411 979 1 1
ACCESS TO SOFTWARE OR WEBSITE USING BIOMETRIC
IDENTIFICATION
The present invention relates to a method for automatically filling in user data using biometric, particularly fingerprint identification.
On account of the uniqueness of each person's fingerprint, and because fingers are conveniently inherent to a person's body, personal identification by way of one's own fingerprint is employed in many systems and on many occasions requiring high-security verification. With advancements of technology, hardware devices for fingerprint input have become modularized and lo implemented in a single chip used in numerous IT products and some products for financial transactions such as credit cards or ATM machines.
At present, the authentication of a user's ID and pass word is required during sign in for many software applications or web pages. Since the user's ID and password data is easily forgotten or stolen by hackers, most people are reticent about exchanging personal secret information or conducting other business overthe Internet.
With the progression of software technology, currently, an authentication software has been developed to allow multiple users with multiple IDs and passwords to access a software application or web pages. This is achieved by SO combining the user's accounts information and address software application location or correlating a user's accounts and web page addresses. When a user executes software or signs in on a web page, the user's ID and password are automatically filled in according to the correlation mentioned above.
Even though the prior technology provides a solution to manage easily a ?.S user's account, other persons still can obtain information regarding ID and password through specific software and web pages, and an invasion of privacy and secret information is always possible. Consequently, there are issues still outstanding concerning how to manage multiple accounts and maintain secrecy or privacy at the same time.
so An object of the present invention is to overcome or alleviate at least some
of the problems in the prior art. 2
An object of the present invention is to overcome or alleviate at least some
of the problems in the prior art.
Broadly speaking, the invention relates to a method for automatically filling in user data using fingerprint identification and applies to a process of account management, which is used to verify the user's identity by inputting a fingerprint.
The invention enables the corresponding ID and password to be entered automatically, thus providing both security and a more powerful method of managing a user's ID and password.
In one embodiment a method is provided for automatically filling in user lo data using fingerprint identification and comprises the step of creating at least one URL address and a corresponding at least one user's account, ID and password saved in a database. When the user opens an ID and password required URL address, the user is required to input fingerprint image data, and then that image is transferred to a fingerprint ID code. After that, the current ID code is checked against the previously saved user's identification information; if they are consistent, the corresponding ID and password are retrieved and filled in automatically in that position on that web page.
In another embodiment a method is provided for automatically filling in user data using fingerprint identification and comprises steps of creating at least so one user's account, ID and password corresponding to an address of a software application. When a user executes that user's ID and password as required by the software application, the user is required to input image data of his own fingerprint, and generate an ID code. After that, this current ID code is checked against the previously saved user's identification information; if they are as consistent, the corresponding ID and password are retrieved and filled in automatically.
In another embodiment there is provided a method for automatically filling in user data using fingerprint identification which is used to create a database of a user's ID code for a URL address and a software application and comprises the so steps of opening the web page or the software application which requires a user's account, ID and password, and filling in that user's ID and password at) 3 corresponding to an address of the web page or the software application.
Furthermore, entering an image of the user's fingerprint is required, and a saved ID code is generated from the image. Database establishment is subsequently finished by retrieving the user's ID and password and saving the corresponding URL address or filename of the software application, the web address and the saved ID code, account and password.
Preferred embodiments of the present invention are described below by way of example only in conjunction with the accompanying drawings, in which: Fig. 1 is a block diagram of a system in accordance with the present nil invention; Fig. 2 is a schematic drawing of a web page utilised in the above embodiment; Fig. 3 is a screenshot generated by software utilised in a further embodiment; Fig. 4 is a flow chart of a method for creating a fingerprint ID code in accordance with the present invention; and Fig. 5 is a flow chart of a method for automatically signing in accordance with the present invention.
The present invention is not limited to the features of the embodiments in the accompanying drawings and following description.
Reference is made to Fig. 1, which is a schematic drawing.
A fingerprint identification module 20 is installed in a computer 10, and electrically connected with a fingerprint input module 30. The computer 10 is connected to the Internet 40 for browsing a plurality of web pages 11 with URL as addresses, and a plurality of software 12 can be executed in the computer 10.
When a user is signing in on web pages 11 or some other software 12, he will see a window 13 requiring that he enter his account and password, either as show in Fig. 2, which is a schematic drawing showing an embodiment of the present invention relating to a web page or as shown in Fig. 3 which is a so schematic drawing of an embodiment applying to software. In either case, a method for automatically filling in a user's account and password using fingerprint (a 4 input is provided, which involves managing multiple user accounts and passwords at the same time. Furthermore, since fingerprint identification is used, the method ensures high security.
As shown in Fig. 1 a fingerprint input module 30 is used for inputting at least one user's fingerprint to produce fingerprint image data, and the fingerprint identification module 20 is used for identifying the characteristics of the fingerprint image data and generating a fingerprint ID code. A database 50 is created to save at least one URL address or the filename and/or locating address of the software and at least one user's previously saved ID code, account and i; password. The database 50 can be a non-volatile memory device, such as a flash memory or a hard disk, and the database 50 is electrically connected with the fingerprint identification module 20 and optionally used to store temporarily the fingerprint image data input by the fingerprint input module 30.
Reference is made to Fig. 4, which is a flow chart of the method for is creating a fingerprint ID code utilised in this embodiment. This embodiment relates to a management process of fingerprint passwords, by which the database 50 is controlled and managed, and also the configuration of the automatic sign-in process using a fingerprint password. For the management of the fingerprint database 50, in the first step, the database 50 is created, in which JO is stored at least one URL address, at least one filename and address of the application software, and at least one user's previously saved ID, account and password corresponding with each URL address and software program (step S100).
Associated with the creating process of database 50, in the next step (step S102), a web page requiring the user's account and password is opened, or the software to be executed requires the user's account and password. Next, the user's account and password are filled into a corresponding data entry field (step S104). When the user chooses and clicks on the function of saving the user's account and password (step S106), a pop-up window appears, showing the so information and requiring the user to enter a fingerprint, as shown in Fig. 2 and \ ) s Fig. 3 (step S108). After the user inputs his fingerprint into the fingerprint input module 30, fingerprint image data is produced (S110).
Meanwhile, the fingerprint image data will generate a saved ID code using the fingerprint identification module 20 (step S112), and then the user's account and password are retrieved, the corresponding URL address or the filename and address of the software executed are filled in and stored in the database (step S114).
The management process will detect the URL address and software in which everybody needs to input their own account and password, and further lo create a user's fingerprint automatically and then produce the saved ID code corresponding with a user's account and password as described above. The management process can create multiple users and identify a plurality of users who use or sign in on the same web page or software using fingerprint identification and a corresponding account and password.
Reference is made to Fig. 5, which is a flow chart of a method for automatically signing in according to the present invention. After the user has already created the URL address, the software and the user's saved ID code, account and password in the database 50 (step S200), when opening the same web page, or executing the same software (step S202), there is no need to input JO the user's account and password again. A window requiring the user to input his own fingerprint pops up automatically in that process (step S204). The user inputs the fingerprint using the fingerprint input module 30 and fingerprint image data is generated (step S206). The fingerprint identification module 20 will retrieve the characteristic value of the fingerprint image data, which is encoded as as a fingerprint ID code (step S208).
The ID code saved previously is then retrieved (step S210), and the consistency between the fingerprint ID code and the saved ID code is checked (step S212). If the result is consistent, the user's account is retrieved and the password filled into the position corresponding with a URL address or the software (step S214). An error message window is displayed or pops up if it is not consistent (step S216) and the user is required to input his fingerprint again or informing the user is informed that the fingerprint is not created yet.
If there are many users in the checking process, then consistency is searched and checked one by one between the fingerprint ID code and the s saved ID code. If there is consistency between the fingerprint ID code and any saved ID code, the saved ID code corresponding with the user's account and password are retrieved from the URL address or the application software, but if there is no such consistency, an error message is displayed.
Another embodiment of the present invention concerns choosing a web page to be opened or software to be executed from the database with a created URL address or software application. The user's account and password are automatically signed in without any need to remember many accounts and complicated passwords after the fingerprint identification.
Furthermore, a management interface is provided to display the created Is user's account information in the database which is editable and erasable. The management interface can also be configured to switch the function of auto-gig in, the history of stored information display and the function of one time fingerprint identification.
In a variant, the function of one-time fingerprint identification mentioned above can be used to verify the user only once and fingerprint verification is not necessary for subsequent use. But if there are many users, this function should be switched off to prevent illegal access.
The many features and advantages of the present invention are apparent from the above description. Further, since numerous modifications and changes As will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation as illustrated and described. Hence, all suitable modifications and equivalents within the scope of the claims may be resorted to.

Claims (17)

  1. CLAIMS: 1. A method for automatically filling in user data using
    fingerprint identification, said method comprising: creating at least one URL address and at least one user's saved ID code, and an account and password corresponding to the URL address; opening a web page designed by said URL address and requiring the user account and password; inputting fingerprint image data, and generating a fingerprint ID code from entry of said fingerprint image data; checking for consistency between the fingerprint ID code and the saved ID code; and retrieving said user's account and password corresponding to said URL address if consistency is established, and filling in the user's account and
    password in a data entry field of said web page.
  2. 2. The method for automatically filling in user data using fingerprint identification as claimed in claim 1, wherein said step of creating said URL address and said user's saved ID code, account and password further includes 2) the steps of: opening at least one web page having said URL address and requiring the user's account and password; filling in said user's account and password in a corresponding position of said web page; ?5 inputting said user's fingerprint image data; generating a saved fingerprint ID code from said fingerprint image data; retrieving said user's account and password; and saving said URL address and said user's saved ID code, account and password. (I 8
  3. 3. A method for automatically filling in user data using fingerprint identification as claimed in claim 1 or claim 2, wherein said step of creating said URL address involves creation of a database with at least one URL address and at least one said user's saved ID code, account and password saved therein.
  4. 4. A method for automatically filling in user data using fingerprint identification as claimed in any preceding claim, wherein said step of inputting said fingerprint image data is performed by a computer system connected with a fingerprint input module for inputting said user's fingerprint and producing said fingerprint image data.
  5. 5. A method for automatically filling in user data using fingerprint identification as claimed in any preceding claim, wherein said step of generating said ID code comprises encoding by retrieving a characteristic value of a user's fingerprint from said fingerprint image data generated by a fingerprint identification module.
  6. 6. A method for automatically filling in user data using fingerprint identification as claimed in any preceding claim, wherein said saved ID code But corresponding with said URL address is retrieved before said step of checking for consistency between the fingerprint ID code and the saved ID code.
  7. 7. A method for automatically filling in user data using fingerprint identification as claimed in any preceding claim, wherein said step of checking for us consistency between the fingerprint ID code and the saved ID code further includes: searching and checking for consistency between the fingerprint ID code and the saved ID code, one by one; retrieving said saved ID code corresponding with said user's account and lo password if there is consistency; and displaying a error message if there is not consistency. (I 9
  8. 8. A method for automatically filling in user data using fingerprint identification, said method comprising: creating at least one address for a software application and at least one > user's saved ID code, account and password; requiring said user's account and password to execute said software application; inputting fingerprint image data, and generating a fingerprint ID code; checking for consistency between the fingerprint ID code and the saved ID code; u and retrieving said user's account and password corresponding with said software application if consistency is established, and filling in said user's account and password in a data entry field of said software application.
    ns
  9. 9. A method for automatically filling in user data using fingerprint identification as recited in claim 8, wherein said step of creating said address of said software application and said user's saved ID code, account and password correspondingly further includes steps of: requiring said user's account and password to execute said software go application; filling in said user's account and password in a data entry field of said software application; inputting said user's fingerprint image data; generating a saved ID code from said fingerprint image data in a saved ?S fingerprint I D code; retrieving said user's account and password; and saving a filename, address of said software application and said user's saved ID code, account and password.
    so
  10. 10. A method for automatically filling in user data using fingerprint identification as claimed in claim 8 or claim 9, wherein said step of creating said ) lo address of said software application involves creation of a database with at least one filename and address and at least one said user's saved ID code, account and password saved therein.
  11. 11. A method for automatically filling in user data using fingerprint identification as claimed in any of claims 8 to 10, wherein said step of inputting said fingerprint image data uses a computer system connected with a fingerprint input module for inputting said user's fingerprint and producing said fingerprint image data. Eli
  12. 12. A method for automatically filling in user data using fingerprint identification as claimed in any of claims 8 to 11, wherein said step of generating said ID code comprises encoding by retrieving a characteristic value of a user's fingerprint from said fingerprint image data generated by a fingerprint s identification module.
  13. 13. A method for automatically filling in user data using fingerprint identification as claimed in any of claims 8 to 12, wherein said saved ID code corresponding to said software application is retrieved before said step of checking for consistency between the fingerprint ID code and the saved ID code.
  14. 14. A method for automatically filling in user data using fingerprint identification as claimed in any of claims 8 to 13, wherein said step of checking the consistency between the fingerprint ID code and the saved ID code further > includes: searching and checking for consistency between the fingerprint ID code and the saved ID code, one by one; retrieving said saved ID code corresponding with said user's account and password if consistency is established; and ' displaying a error message if there is not consistency.
  15. 15. A method of accessing software or a website wherein biometric data of a purported authorised user newly acquired by an input device is compared with stored, previously acquired biometric data of an authorised user and, in the event of a match, is used to retrieve an ID and password of the authorised user from memory and enter said ID and password in data entry fields of said software or website which control access thereto.
  16. 16. A method according to claim 15 wherein said biometric data is fingerprint data.
  17. 17. A method of accessing software or a website substantially as described hereinabove with reference to Figs. 1, 2 and 5 or Figs. 1, 3 and 5 of the accompanying drawings, optionally in conjunction with Fig. 4 of the accompanying drawings.
GB0405408A 2004-03-10 2004-03-10 Method for automatically filling in user data using fingerprint identification Withdrawn GB2411979A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0405408A GB2411979A (en) 2004-03-10 2004-03-10 Method for automatically filling in user data using fingerprint identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0405408A GB2411979A (en) 2004-03-10 2004-03-10 Method for automatically filling in user data using fingerprint identification

Publications (2)

Publication Number Publication Date
GB0405408D0 GB0405408D0 (en) 2004-04-21
GB2411979A true GB2411979A (en) 2005-09-14

Family

ID=32117418

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0405408A Withdrawn GB2411979A (en) 2004-03-10 2004-03-10 Method for automatically filling in user data using fingerprint identification

Country Status (1)

Country Link
GB (1) GB2411979A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105808132A (en) * 2015-09-24 2016-07-27 维沃移动通信有限公司 Information filling method and electronic equipment
CN108628527A (en) * 2017-03-15 2018-10-09 奥克斯空调股份有限公司 A kind of household electric appliance control method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059521A1 (en) * 2000-10-17 2002-05-16 Siemens Aktiengesellschaft Method and system for identifying a user
US20020191816A1 (en) * 2001-06-14 2002-12-19 Michael Maritzen System and method of selecting consumer profile and account information via biometric identifiers
US6618806B1 (en) * 1998-04-01 2003-09-09 Saflink Corporation System and method for authenticating users in a computer network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6618806B1 (en) * 1998-04-01 2003-09-09 Saflink Corporation System and method for authenticating users in a computer network
US20020059521A1 (en) * 2000-10-17 2002-05-16 Siemens Aktiengesellschaft Method and system for identifying a user
US20020191816A1 (en) * 2001-06-14 2002-12-19 Michael Maritzen System and method of selecting consumer profile and account information via biometric identifiers

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105808132A (en) * 2015-09-24 2016-07-27 维沃移动通信有限公司 Information filling method and electronic equipment
CN105808132B (en) * 2015-09-24 2019-02-15 维沃移动通信(杭州)有限公司 A kind of information fill method and electronic equipment
CN108628527A (en) * 2017-03-15 2018-10-09 奥克斯空调股份有限公司 A kind of household electric appliance control method

Also Published As

Publication number Publication date
GB0405408D0 (en) 2004-04-21

Similar Documents

Publication Publication Date Title
US20050204173A1 (en) Method for automatically filling in user data using fingerprint identification
US7992005B2 (en) Providing pattern based user password access
JP5028194B2 (en) Authentication server, client terminal, biometric authentication system, method and program
US7506171B2 (en) Method and systems for securely supporting password change
US7527192B1 (en) Network based method of providing access to information
US11128613B2 (en) Authentication based on visual memory
US20070169174A1 (en) User authentication for computer systems
CN111625809B (en) Data authorization method and device, electronic equipment and storage medium
EP2009568A2 (en) Biometric authentication
Khan et al. A graphical password based system for small mobile devices
JP2014502398A (en) Method for integrating account management functions in input software
WO2020181809A1 (en) Data processing method and system based on interface checking, and computer device
US20060213970A1 (en) Smart authenticating card
Ray Ray’s scheme: graphical password based hybrid authentication system for smart hand held devices
Kumar et al. A graphical password based authentication based system for mobile devices
GB2411979A (en) Method for automatically filling in user data using fingerprint identification
KR20080017911A (en) Context-aware integrated security system for user authentication and access control suitable for ubiquitous computing environment
WO2018226500A1 (en) Biometric identification system and associated methods
CN114969698A (en) Password input method and device, electronic equipment and storage medium
JP6371938B2 (en) Personal authentication system using fingerprint verification
FR2867577A1 (en) User data filling method for web page, involves verifying concordance between identification code of finger print and saved code, and filling user`s account and password relative to address if concordance is established
JP4894309B2 (en) Authentication code setting program and authentication code setting device
CN113922967B (en) Blockchain key management method, device and computer equipment
KR101613664B1 (en) Security system reinforcing identification function on the electronic business using certificate
US11470080B2 (en) Method for performing a biometric function between a client and a server

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)