TW200947303A - Enabling device and method by biometrics - Google Patents
Enabling device and method by biometrics Download PDFInfo
- Publication number
- TW200947303A TW200947303A TW97116677A TW97116677A TW200947303A TW 200947303 A TW200947303 A TW 200947303A TW 97116677 A TW97116677 A TW 97116677A TW 97116677 A TW97116677 A TW 97116677A TW 200947303 A TW200947303 A TW 200947303A
- Authority
- TW
- Taiwan
- Prior art keywords
- power
- biometric
- data
- state
- computer system
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000006243 chemical reaction Methods 0.000 claims abstract description 41
- 230000004913 activation Effects 0.000 claims description 28
- 210000001747 pupil Anatomy 0.000 claims description 5
- 210000001525 retina Anatomy 0.000 claims description 4
- 230000004256 retinal image Effects 0.000 claims description 3
- 210000004556 brain Anatomy 0.000 claims description 2
- 230000000977 initiatory effect Effects 0.000 claims 4
- 238000009395 breeding Methods 0.000 claims 1
- 230000001488 breeding effect Effects 0.000 claims 1
- 239000007943 implant Substances 0.000 claims 1
- 238000005516 engineering process Methods 0.000 abstract description 3
- 210000003811 finger Anatomy 0.000 description 10
- 230000009471 action Effects 0.000 description 8
- 239000000463 material Substances 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000012795 verification Methods 0.000 description 7
- 210000003813 thumb Anatomy 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 3
- 230000005611 electricity Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000010009 beating Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 239000010977 jade Substances 0.000 description 1
- 239000008267 milk Substances 0.000 description 1
- 210000004080 milk Anatomy 0.000 description 1
- 235000013336 milk Nutrition 0.000 description 1
- 230000035939 shock Effects 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
- 230000007306 turnover Effects 0.000 description 1
Landscapes
- Image Input (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
200947303 • 九、發明說明: 【發明所屬之技術領域】 本案係為一種生物辨識啟動裝置及方法,尤指應用於一 使用者與一電腦系統間之生物辨識啟動裝置及方法。 【先前技術】 e 傳統的電腦開機流程中,都是由使用者手動啟動電 源’主機開始運作後載入BI0S(Basic 1叩肚0utput System; 設定和開機程式,接著載入硬碟(HardDisk)内部資料並啟 動作業系統(operating system),再進入到登入晝面。而 在登入晝面會有最後一道驗證手續,用以保護電腦内的隱 私與機密資料。即使用者需輸入帳號及密碼來通過這道ς 證手續,才能進入作業系統的操作環境。 ® 而大部分的驗證手續所使用的為密碼驗證,即是透過 使用者輸入帳號及密碼來做為系統辨識使用者身份的依 據,也就是使用者輸入的帳號及密碼經系統比對無誤後才 得以登入作業系統。然而,以上述在作業系統載入後才使 用密碼驗證的方式以作為㈣電職私與_資料的方 法:所產生的成效卻是有限的。因為當作業系統載入時, 表示,碟内部的資料也已載人,而此時僅剩下密碼驗證來 ^ 做為最後一道關卡,若此道關卡被破解,電腦内部的隱私 5 200947303 與機密資料也將面臨被侵入或竊取的危險。加上許多使用 者所設定的密碼都過於簡單而容易被有心人破解’或是網 路骇客只要透過網路,針對欲侵入的電腦所使用的應用程 式之安全漏洞植入木馬程式,便可以輕鬆側錄到使用者所 輸入的帳號及密碼。 承上所述’僅在作業系統載入後才使用驗證手續來做 為保護電腦隱私與機密資料的最後一道關卡,若此關卡被 破解,則電腦内部的穩私與機密資料將受到威脅,因此這 道關卡可被視為電腦安全管理中的弱點。 是故’如何提出一適當之裝置與方法以解決上述之習 用問題,便為本案發展之主要目的。 【發明内容】 本發明在於提供一種生物辨識啟動裝置及方法,尤指應用 於一使用者與一電腦系統間之生物辨識啟動裝置及方法。 本發明提出一種生物辨識啟動裝置,應用於一使用者 與電腦系統之間,包含:一生物特徵轉換裝置,用以將 使用者之一生物特徵轉換成一第一資料;一儲存元件,用 以儲存一弟二資料;以及一處理器,訊號連接於生物特徵 轉換裝置與儲存元件,用以比對第一資料與第二資料,當 第資料與第一資料比對相符時,發出一電源控制訊號使 電腦系統進入電源控制訊號相對應之一電源狀態。 再者,本發明更提出一種生物辨識的啟動方法,包含 200947303 . 下列步驟:將一使用者之一生物特徵轉換成一第一資料; 以及將第一資料與一第二資料進行比對,當第一資料與第 二資料比對相符時,發出一電源控制訊號使一電腦系統進 入電源控制訊號相對應之一電源狀態。 A了使f審查委員能更進一步暸解本發明特徵及技 術内容,請參閱以下有關本發明之詳細說明與附圖,然而 所附圖式僅提供參考與綱,並非絲對本發明加以限制。 ® 【實施方式】200947303 • Nine, invention description: [Technical field of invention] This case is a biometric activation device and method, especially a biometric activation device and method applied between a user and a computer system. [Prior Art] e In the traditional computer boot process, the user manually starts the power supply. 'The host starts to operate and loads BI0S (Basic 1 0 0 utput System; setting and booting program, then loading inside the hard disk (HardDisk) Data and start the operating system, then enter the login page. After logging in, there will be a final verification procedure to protect the privacy and confidential information in the computer. That is, the user needs to enter the account number and password to pass the data. This procedure can only enter the operating environment of the operating system. ® And most of the verification procedures use password verification, that is, the user enters the account number and password as the basis for the system to identify the user, that is, The account and password entered by the user can be logged into the operating system after the system has been correctly verified. However, the above method is used after the operating system is loaded to use the password verification method as the method of (4) electricity private and _ data: The result is limited, because when the operating system is loaded, it means that the data inside the disc is also loaded, but only the secret is left at this time. Verification to ^ as the last level, if this level is cracked, the internal privacy of the computer 5 200947303 and confidential information will also be in danger of being invaded or stolen. Plus many users set the password is too simple and easy to be If you are a hacker, you can easily record the account and password entered by the user by simply inserting a Trojan horse into the security vulnerability of the application used by the computer you want to hack through the Internet. The use of verification procedures is only used as the last level to protect computer privacy and confidential information. If the level is cracked, the internal security and confidential information of the computer will be threatened, so this level It can be regarded as a weakness in the security management of computers. It is the main purpose of the development of the present invention to provide a suitable device and method to solve the above-mentioned conventional problems. SUMMARY OF THE INVENTION The present invention provides a biometric activation device. And a method, in particular, a biometric activation device and method applied between a user and a computer system. The present invention provides a biometric activation device for use between a user and a computer system, comprising: a biometric conversion device for converting a biometric feature of the user into a first data; and a storage component for storing a second data; and a processor, the signal is connected to the biometric conversion device and the storage component for comparing the first data with the second data, and when the first data matches the first data comparison, issuing a power control signal The computer system is brought into a power state corresponding to the power control signal. Further, the present invention further provides a method for starting biometric identification, including 200947303. The following steps: converting a biometric of a user into a first data; The first data is compared with a second data. When the first data and the second data match, a power control signal is issued to cause a computer system to enter a power state corresponding to the power control signal. A detailed description of the present invention and the technical contents of the present invention will be made with reference to the following detailed description of the invention and the accompanying drawings. ® [Implementation]
5月參見第一圖,其係為本案之一實施例所提出生物辨 識啟動I置應用於—電«統之功能方塊示意圖 。從第一 圖中我們可清楚的看出’―生物辨識啟動裝置1Q包含一生 物特徵轉換裝置11(例如—指崎描裝置),㈣將一使用 者之一生物特徵(例如使用者的指紋)轉換成一第一資料; 儲存元件13,用以儲存-第二資料;以及一處理器12, 訊於生物特徵轉換裝置11與儲存元件13,用以比 二第貝料與第二資料,當第-資料與第二資料比對相符 =n發出電源控制訊號來使該電腦系統進入該電源控制 訊號相對應之電源狀態。另外,—供電模組⑷可用電腦 ^機中的電源供應器或生物辨識啟動裝置1G内部之-獨 原來兀成)負責供給生物辨識啟動裝置10以及電腦系 、内之裝置所需之電力;以及一主要系統15,藉由一 電腦排線、一诵田由, 通用串列匯流排(Universal Serial Bus)介 7 200947303 面或藍芽傳輸技街(BluetGGth)信號連接於處 而所述之生物辨識啟動裝置1G主要係细處理/傲 為資料比對_心'並且完成與主要純15的溝通 另外,生物特徵轉換震置不僅可使用 完成,還可使用—掌形掃描器、—虹膜掃描器;^ 入裝置或一視網膜掃描器等裝置來完成。 曰】See the first figure in May, which is a schematic diagram of the function block of the biological identification start I set in one embodiment of this case. As can be clearly seen from the first figure, 'the biometric activation device 1Q includes a biometric conversion device 11 (for example, a pictographic device), and (4) a biological feature of a user (such as a user's fingerprint). Converting into a first data; storing component 13 for storing - second data; and a processor 12 for communicating with the biometric conversion device 11 and the storage component 13 for comparing the second material with the second material - The data is matched with the second data = n sends a power control signal to cause the computer system to enter the power state corresponding to the power control signal. In addition, the power supply module (4) can be used to supply the power required for the biometric activation device 10 and the computer system, the power supply in the computer or the biometric activation device 1G. A main system 15 for biometric identification by means of a computer cable, a 诵田由, a Universal Serial Bus 7200947303 face or a Bluetooth Transfer Technology Street (BluetGGth) signal The starting device 1G is mainly used for fine processing/proud data comparison _ heart' and complete communication with the main pure 15 In addition, the biometric conversion shock can be used not only to complete, but also to use a palm scanner, an iris scanner; ^ Complete the device or a device such as a retina scanner.曰】
當使用者欲啟動電腦系統!時,必須先讓生物特 換裝置11對使时之生物特徵做掃描_作,以進行身份 認證程序’生物特徵轉換裝置u便會將所掃描到之生物 徵轉換為第—#觀傳域㈣12。假設生物魏轉換裝 置η為-指紋掃描裝置’用以將使用者手指上的指紋進行 影像擷取並儲存為第一資料,再將此第一資料傳至處理器 處理器12再根據此第一資料而從儲存元件13中找出 相符的第L在崎的過程巾,處理器12會切割出第 -資料中指紋圖像裡紋路的特徵區域,也就是所謂的核心 點,並以此核心點作為指紋圖像辨識的依據。如此,處理 器12便可從預先存放至儲存元件ι3内部的第二資料申, 利用第-資料的核心點進行比對,#輯符合時,即可確 認使用者身份。若無_符合的第二㈣,航物特徵轉 換裝置11會藉由裝置上的燈號閃爍或發出警示音來提醒 使用者資料比對結果不符合。反之,當第一資料與第二資 料比對結果符合後,處理器12即發出一電源啟動訊號至供 電模組14 ’並將此訊號維持〇. 5秒至1秒,啟動供電模組 200947303 Η ’使主要系統15開始運作,主要系统15開始運作後内 部之娜動體程式便對主要系統15内部之硬體裝置進行 偵測及驅動,硬體裝置無誤後便载入作業系統,進而完成 開機動作,待開機完成後,處理器12還可使用經由比對符 合後所對應出來之使用者帳號及密碼自動登入作業系統, =使用者再另行輸人㈣及料來登人作㈣統之操作 環境。當然,為能做到雙重保護,也是可以取消自動登入When the user wants to start the computer system! At this time, the biometric device 11 must first be scanned for the biological characteristics of the time to perform the identity authentication process. The biometric conversion device converts the scanned biological sign into the first--the view of the domain (4) 12 . It is assumed that the bio-wei conversion device η is a fingerprint scanning device for capturing and storing the fingerprint on the finger of the user as the first data, and then transmitting the first data to the processor processor 12 according to the first The data is found from the storage element 13 to find a matching L-shaped process towel, and the processor 12 cuts out the feature area of the texture in the fingerprint image of the first data, which is a so-called core point, and the core point As the basis for fingerprint image recognition. In this way, the processor 12 can perform the comparison from the core data stored in the storage component ι3 in advance, and use the core point of the first data to confirm the identity of the user. If there is no _ compliant second (four), the aircraft feature conversion device 11 will prompt the user to match the data matching result by flashing or warning sound on the device. On the other hand, when the first data and the second data match result, the processor 12 sends a power-on signal to the power supply module 14' and maintains the signal for 5 seconds to 1 second to start the power supply module 200947303. 'The main system 15 is started to operate. After the main system 15 starts to operate, the internal system of the internal system 15 detects and drives the hardware devices inside the main system 15. After the hardware device is correct, the operating system is loaded and the system is completed. After the booting is completed, the processor 12 can also automatically log in to the operating system by using the user account and password corresponding to the matching, and the user can enter the user separately (4) and the material is used for the operation (4) surroundings. Of course, in order to achieve double protection, you can also cancel the automatic login.
作業系統的步驟,而保留讓使用者另行輪入帳號及密碼才 能登入作業系統的要求。 另外,為能方便使用者操作,電腦系統j於第一次被 使用者啟㈣’生物辨識啟練置1G的儲存元件Μ内部 並…、可供比對的弟二資料。因此,生物辨識啟動裝置切 不對使用者進行:^份認證程序,也就是處翻I〗不對使用 2生物特徵作比_動作,此時生物特徵轉換裝置U =需要對使用者所具有的生物雜做掃描的動作便能完成 身份驗證程序,並且完成開機動作,登入作業系統。而作 業系·’充會立即要求使用者設定第二資料,並將此第二資料 儲ίΓ儲存元件13中,以做為之後進行身份認證程序之比 子負料而所述之第二資料係包含使用者的帳號、密碼以 ,物特徵’並且可對應不同的使用者而建立不同的生物 文口此儲存的資料可超過一筆,以供處理器12於使 ,者登入作業系統時進行辨識使用者的身份。換句話說就 =生物特徵如第二資料的標籤—般,在處理H 12的身份驗 且程序中’會先比對第一資料是否有無符合的生物特徵相 200947303 * • 對應,若有相對應的生物特徵,便能藉由以該生物特徵為 標籤的第二資料而得知使用者的身份。而生物特徵即是使 用者所具備之獨-無二且可用來辨識的特徵,可以是使用 者之-指紋圖像、-視網膜圖像、一虹膜圖像、一手掌形 狀圖像、-掌紋圖像、一聲音特徵參數以及一瞳孔圖像中 之一個或多個之組合。 從以上敘述可知,當處理器12比對第一資料與第二資 肖符合後即可得知使用者身份並完朗機程序,在登入作 ㈣崎,纽器12可雜使用者的諸由儲存元件13 内部預先存放好的第二資料中得知使用者帳號及密碼而登 入作業系統。不同於上述綠,也可不將制者帳號及密 碼放在儲存元件13中,*是改存放包含使用者生物特徵、 使用者帳號及密碼的—份使用者資料於主要系統15中。而 ^ 在電源開啟但登入作業系統前,主要系統15便可根據第一 資料來與主要系統15内部預先存放好的使用者資料進行 ❹ β ί進而判斷使用者身份,並從相對應的使用者資料中 得知使用者帳號及密碼而登入作業系統。以下提供兩個實 &例來分卿細轉上述之生物辨識啟動方法。 月參見第一圖,其係為第一實施例之以生物辨識啟動 仃開機流程圖。假設儲存it件13内部之第二資料已 ^元畢且生物特徵為使用者之指紋圖像,當使用者欲啟 動電細系統1時’使用者便以指紋接觸指紋掃描裝置(步驟 20) ’使用者的指紋將進行雜擷取雜儲存為第一資料 (步称21) ’再將此第一資料傳至處理器12進行身份驗證 200947303The steps of the operating system, while retaining the requirement for the user to enter the account and password separately to log in to the operating system. In addition, in order to facilitate the user's operation, the computer system j is first activated by the user (4) 'Biometrics to set up 1G storage components Μ internal... and the second data available for comparison. Therefore, the biometric activation device does not perform the user authentication process, that is, the device does not use the 2 biometrics as the ratio_action, and the biometric conversion device U=needs to the user. The scan action completes the authentication process and completes the boot action and logs into the operating system. The operating system "requires the user to immediately set the second data, and stores the second data in the storage element 13 as the second data system for the subsequent identity authentication process. The user's account number, password, and feature characteristics are included, and different biometric ports can be established corresponding to different users. The stored data can be more than one for the processor 12 to use when identifying the user. The identity of the person. In other words, if the biometric feature is the label of the second data, in the process of processing the H 12 and the program will first compare the first data with or without the biometric phase 200947303 * • if there is a corresponding The biometric feature can be used to know the identity of the user by the second material tagged with the biometric. The biometrics are the unique features of the user that can be used for identification. They can be user-fingerprint images, retina images, an iris image, a palm shape image, and a palm print. A combination of one or more of an image, a sound feature parameter, and a pupil image. As can be seen from the above description, when the processor 12 matches the first data and the second capital, the user identity can be known and the computer program can be completed. In the login (4), the device 12 can be used by the user. The storage device 13 registers the user account and password in the second data stored in advance, and logs into the operating system. Different from the above green, the maker account and password may not be placed in the storage element 13, and * is to store the user data including the user biometrics, the user account and the password in the main system 15. And ^ before the power is turned on but the system is operated, the main system 15 can perform the user identification with the user data pre-stored in the main system 15 according to the first data, thereby determining the identity of the user and from the corresponding user. The data is entered into the operating system by knowing the user account and password. The following two examples are provided to subdivide the biometric activation method described above. See the first figure for the month, which is the biometric startup startup flowchart of the first embodiment. It is assumed that the second data stored in the internal component 13 has been completed and the biometric feature is the fingerprint image of the user. When the user wants to activate the electrical thin system 1, the user touches the fingerprint scanning device with the fingerprint (step 20). The fingerprint of the user will be stored as the first data (step 21). Then the first data is transmitted to the processor 12 for authentication. 200947303
程序’處理器12便依據此第-資料而從館存元件13尋找 符合的第二資科(步驟22)。若比對結果不符合,指紋掃描 裝置便藉由裝置上的燈號閃燦或發出警示音來提醒使用者 資料比對不符合(步驟25),並回到等待使用者婦描指紋的 狀態(步驟20)。反之,若第料與第二資料的比對結果 符合,處理器12便可從第二資料得知使用者之身份,完成 身份祕程序’並送出電源啟動訊號至供電模組Μ,並將 此訊號維持〇. 5秒至1秒,啟動供電模組14,使主要系統 15開始運作’主要系統15開始運作後内部之幻仍勤體程 式便對主要系統15内部之硬縣置進行_及驅動,硬體 裝置無誤後載人作業純,進而完成開機動作(步驟23)。 待開機完成後’處理器12還可使用經由比對符合後所對應 出來之使用者帳號及德碼自動登入作業系統(步驟24),進 入專屬於使用者的操作環境。 ^參見第二圖’其係為第二實施例之以生物辨識啟動 仃開機流程圖。假設儲存元件13内部之第二資料已 :疋:畢且生物特徵為使用者的指紋圖像,當使用者欲啟 ^腦系統1肖,使用者便以指紋接觸指紋掃描裝置以進 =掃描的動作(步驟3G),當使用者的指紋接觸指紋辨識裝 驟使用者的指紋將進行影像擷取而被儲存為第一資料(步 序,31) ’再將此第—資料傳至處理器12進行身份驗證程 人處理裔12便依據此第一資料而從儲存元件13尋找符 二的,—賴(倾⑻。若比對結果*符合,指紋掃描裝 便藉由裝置上的燈號閃爍或發出警示音來提醒使用者資 11 200947303 料比對不符合(步驟37) ’並_等待使財掃触紋的狀 態(步驟3G)。反之,若第-資料與第二資料的比對結果符 合,處理器12便可從第二資料得知使用者之身份,完成身 份驗證程序,並送出電源啟動訊號至供電模組14,並將此 訊號維持0· 5秒至1秒,啟動供電模組14,使主要系統15 開始運作,主要系統15開始運作後内部之氾呢韌體程式 便對主要系統15内部之硬體裝置進行偵測及驅動,硬體裝 置無誤後便載入作業糸統,進而完成開機動作(步驟33)。 待開機元成後,處理器12傳送第一資料至主要系統丨5(步 驟34),主要系統15便可根據第一資料來舆主要系統15 内部預先存放好的使用者資料(包含使用者生物特徵、使 用者帳號及密碼)進行比對(步驟35),進而判斷使用者身 份’並從相對應的使用者資料中得知使用者帳號及密碼而 登入作業系統(步驟36),進入專屬於使用者的操作環境。 由上述可知本發明之生物辨識啟動裝置1〇,可根據生 物特徵來辨識使用者並發出電源控制訊號使電腦系統1進 入該電源控制訊號相對應之電源狀態。而一般電腦系統1 之電源狀態’大致可分為四個狀態,對應至作業系統電源 管理之分類便如下述。第一狀態為關機狀態(S5, Shutdown) ’即電腦系統1未開機時之電源狀態;第二狀態 為工作狀態(SO,WorkingState),當電腦系統1完成開機 並成功登入作業系統後,即是屬於此工作狀態;第三狀態 為待機狀態(S3,Standby or Suspend to RAM),當電腦系 統1處於待機狀態時,主要系統15處於低電源供應狀態, 12 200947303 ❹The program 'processor 12 searches for the second compliant subject from the library element 13 based on the first data (step 22). If the comparison result is not met, the fingerprint scanning device flashes the warning light on the device or sounds a warning tone to remind the user that the data comparison does not match (step 25), and returns to the state of waiting for the user to fingerprint the fingerprint ( Step 20). On the other hand, if the comparison result between the first material and the second data is met, the processor 12 can know the identity of the user from the second data, complete the identity secret program' and send the power activation signal to the power supply module, and The signal is maintained for 5 seconds to 1 second, and the power supply module 14 is activated to start the operation of the main system 15. After the main system 15 starts operating, the internal magical program is used to drive the internal hard disk of the main system 15 and drive After the hardware device is correct, the manned operation is pure, and the booting operation is completed (step 23). After the booting is completed, the processor 12 can also enter the operating environment dedicated to the user by using the user account corresponding to the matching and the automatic code entry operation system (step 24). Referring to the second figure, it is a biometric startup startup flowchart of the second embodiment. It is assumed that the second data in the storage element 13 has been: 疋: the biometric feature is the fingerprint image of the user. When the user wants to start the brain system, the user touches the fingerprint scanning device with the fingerprint to scan. Action (step 3G), when the user's fingerprint touches the fingerprint identification device, the fingerprint of the user will be image captured and stored as the first data (step, 31) 'and then the first data is transmitted to the processor 12 According to the first data, the identifier 12 is searched from the storage component 13 for the second sign, and the thumb (8) is matched. If the comparison result* is met, the fingerprint scanning device flashes by the light on the device or A warning tone is issued to remind the user that the comparison is not met (step 37) 'and _ waiting for the state of the tactile squeak (step 3G). Conversely, if the comparison between the first data and the second data is consistent The processor 12 can learn the identity of the user from the second data, complete the identity verification procedure, and send the power activation signal to the power supply module 14, and maintain the signal for 0.5 seconds to 1 second to start the power supply module. 14, make the main system 15 start After the main system 15 starts to operate, the internal ubiquitous firmware program detects and drives the hardware device inside the main system 15, and the hardware device is loaded into the operating system after the hardware device is completed, thereby completing the booting operation (step 33). After the booting is completed, the processor 12 transmits the first data to the main system 丨5 (step 34), and the main system 15 can pre-store the user data stored in the main system 15 according to the first data (including use). The biometrics, user account and password are compared (step 35), and then the user identity is determined, and the user account and password are known from the corresponding user profile to log into the operating system (step 36), and enter The operation environment specific to the user. It can be seen from the above that the biometric activation device of the present invention can identify the user according to the biometric characteristics and issue a power control signal to cause the computer system 1 to enter the power state corresponding to the power control signal. The power state of the general computer system 1 can be roughly divided into four states, and the classification corresponding to the power management of the operating system is as follows. Shutdown state (S5, Shutdown) 'that is, the power state when the computer system 1 is not turned on; the second state is the working state (SO, WorkingState), when the computer system 1 is turned on and successfully logs into the operating system, it belongs to this working state. The third state is standby (S3, Standby or Suspend to RAM). When the computer system 1 is in the standby state, the main system 15 is in a low power supply state, 12 200947303 ❹
但能夠立即回復運轉。因此在待機模式中,僅耗損很少的 電力。當使用者想要再次使用電腦系統1時,電腦系統i 也能快速甦醒,並回復到上次使用者離開電腦系統1時的 工作狀態;第四狀態為休眠狀態(S4,Hibernet or Suspend to Disk) ’當電腦系統1處於休眠狀態時,電腦系統1會 將所有資料儲存到主要系統15中之一硬碟,該硬碟係為主 要系統15中基本的儲存設備,而電腦系統1將所有資料儲 存於硬碟後便關閉電源。當使用者重新啟動電腦系統^ 時,將回復到上一次啟動休眠狀態前的工作狀態。因此休 眠狀態時電腦系統1所使用的電力較待機狀態低,但電腦 系統1回復需要較長的時間。 當電腦系統1完成開機後即進人玉作狀態,在系統及 應用私式沒有需要驗證使用者之生物特徵的狀態下,假設 使用者以指紋接觸生物特徵轉換裝置丨丨進行掃描的動 作’主要純15會判斷為使甩者欲改變電腦系統i之電源 狀〜、因此,為了避免誤判的情形發生,主要系統U會 求使用者再輸人第m也就是使用— 進行控制電腦系統i之雷%壯能* 0 a此此 σ來 11會將μ生物特徵轉換裝置 一作描及第二次所掃描的指_檔轉換為 一第二資料。再加上欲使用此改變電腦牵鲚彳 、‘" 功能前& 變m統1之電源狀態 而 在工作狀態下設定好不同的指紋钽 第四資料。Μ心儲存於儲存元件13並設定為一 13 200947303 當生物特徵轉換裝置η已將使用者所輪入的二次指 紋圖檔轉換為第三請並傳至處理器12,處理器12便依 據此第三㈣峨儲存元件13中械符合的細資料,若 比對結果符合,處理n 12即錢細㈣之献組合設定 所相對應的電源狀態,而發出電源控制喊至供電模组 i4’命令供電模組14使電腦㈣1進人電源控制訊號相對 應之電源狀態。反之,若比對絲;f符合财理器12會藉But it can resume operation immediately. Therefore, in the standby mode, only a small amount of power is consumed. When the user wants to use the computer system 1 again, the computer system i can quickly wake up and return to the working state when the user left the computer system 1 last time; the fourth state is the sleep state (S4, Hibernet or Suspend to Disk) When the computer system 1 is in the sleep state, the computer system 1 stores all the data in one of the main systems 15, which is the basic storage device in the main system 15, and the computer system 1 will all the data. After storing it on the hard disk, turn off the power. When the user restarts the computer system ^, it will return to the working state before the last sleep state. Therefore, the power used by the computer system 1 is lower than the standby state during the sleep state, but the computer system 1 takes a long time to respond. When the computer system 1 is turned on, it enters the state of jade. In the state where the system and the application private do not need to verify the biometric characteristics of the user, it is assumed that the user touches the biometric conversion device with the fingerprint to perform the scanning action. Pure 15 will judge that the latter wants to change the power supply of the computer system i. Therefore, in order to avoid the occurrence of misjudgment, the main system U will ask the user to re-enter the mth, that is, to use - to control the computer system i % 增能* 0 a This σ11 will convert the μ biometric conversion device and the second scanned fingerprint into a second data. In addition, if you want to use this to change the power of the computer, ‘" function before & change the power state of the system 1 and set different fingerprints under working conditions 钽 fourth information. The heart is stored in the storage element 13 and is set to a 13 200947303. When the biometric conversion device η has converted the secondary fingerprint file that the user has entered into the third request and transmits it to the processor 12, the processor 12 accordingly The third (four) 细 storage element 13 in the mechanical conformity of the fine data, if the comparison results are met, the processing n 12 that is the money fine (four) combination of settings to set the corresponding power state, and the power control is called to the power supply module i4 'command The power supply module 14 causes the computer (4) 1 to enter the power state corresponding to the power control signal. On the contrary, if the comparison wire; f is consistent with the financial device 12 will borrow
由生物特徵轉換裝置u ±的麟_或發出警示音來提 醒使用者資料比對結果不符合。 電源三嫩烟崎釋以指紋控制 请參見第四圖,其係為以指紋控制電源狀態之第一實 法步驟流程圖。當關完成並登人作業系統(步驟 庵田系統1進人工作狀態(步驟奶),在系統及 Μ王,'又有需要驗證使用者之生物特徵的狀態下,假設 7者以指紋接觸生物特徵轉換裝置11進行掃描的動作 ’驟412)為了避免誤判的情形發生,主要系統υ會要 、一使用者再掃描第二次缺(步驟413),當使用者掃描第 —t指紋後(步驟414),生物特徵轉換裝置11便將第-次 ,掃描及第二次所掃描的缺圖檔轉換為第三資料並傳至 12 ’處理11 12便依據此第三資料並從儲存元件13 =付合的第四資料(步驟415)。若者未進行第二次 ^=_作’主要系、統15則狀使用者為誤觸生物特 徵轉換裝置而回到原本的工作狀態(步驟4ΐι),當第三資 14 200947303 Ο Ο 料與第四貪料比對結果不符合時,處理器12會藉由生物特 =轉換裝置11上的燈號㈣或發出警示音來提醒使用者 貝料比對結果不符合(步驟419)。反之,若比對結果符合, 處,器12即依照第四資料之指紋組合設定所對應的電源 狀態,而發出電源控制訊號至供電模組14,命令供電模組 14使電腦系統丨進人電源控制訊號相對應之電源狀態。範 例1 .若使用者第一次以拇指接觸生物特徵轉換裝置u, 第二次以食指接觸生物特徵轉換裝置11,處理器12則發 出< —電源待機職至供電模組14,命令供電模組14使電 ㈣統1孰電源㈣訊號相對應之—電齡統待機狀態 (步驟416)。_ 2 :若使用者第—次以拇指接觸生物特徵 轉換裝置11 ’第二次以拇指接觸生物特徵 理器心]發出-電源休祕敍供顿組14,命令4 模組14使電㈣統丨進人電源控制訊號相對應之一電腦系 統休眠狀態(步驟417)。範例3 :若使用者第一次以拇指 =生物特徵轉絲置U,第二次則、指接觸生物特徵轉換 f置11 ’處理器12則發出—電源關機訊號訊號至供電模 m’命令供電模組14使電腦系統1進人電源控制訊號 對應之一電腦系統關機狀態(步驟418)。範例4 :若電腦 =統1已處於待機祕雜H,若使用者第—:纽 =徵轉換裝置U,第二次以無名指接觸生物特徵轉 =裝置η,處理器12則發出一電源工作訊號至供電模电 ’命令供電模組14使電腦系統i進人電源控制訊號相對 愿之一電腦系統工作狀態(步驟42〇)。 15 200947303 明參見第五圖,其係為以指紋控制電源狀態之第二實 施例方法步驟流程圖。當開機完成並登入作業系統 510)後即電腦系統丨進人卫作狀態(步驟511),在系統及 應用程式沒有需要驗證使用者之生物特徵的狀態下,、假設 使用者以指紋接觸生物特徵轉換裝置η進行掃描的 (^驟512) ’為了避免誤判的情形發生,主要系、统π會要 求=者再掃描第二次指紋(步驟513),當使用者掃描第 一=私紋後(步驟514),生物特徵轉換裝置η便將第—次 所掃描及第二次所掃描的指紋圖槽轉換為第三資料並傳至 ,理,12 ’處理器12便依據此第三龍並從儲存元件μ :找符。的第四資料(步驟515)。若使用者未進行第二次 鲁 ^=_作’主要系、统15關定使用者為誤觸生物特 j轉換裝置而回到原本的工作狀態(步驟511)。當第三資 第四負料的比對結果不符合時,處理器12會藉由生物 換裝置u上的燈制爍或發出警示音來提醒使用 人,;對結果不符合(步驟519)。反之,若比對結果符 滿二理$ 12即依照第四資料之指紋組合設定所對應的電 組' ΐΛ’而^出電源控制訊號至供電模、组14,命令供電模 使用者統1進入電源控制訊號相對應之電源狀態。 (步驟用掃描相同的指紋兩次來切換電源狀態 置11,笛_ L若使用者第一次以食指接觸生物特徵轉換裝 12目,丨i第二次也以食指接觸生物特徵轉換裝置U,處理器 ^發出電源待機職至供頓組14,命令供電模组14 使電腦系絲〗、仓、心 P 7内电佚?且丄4 、、’、進入電源控制訊號相對應之電腦系統待機狀 16 200947303 S電腦系統處於待機狀態時,若使用者再次使用食指 進订兩-人掃描’處理H 12則發出電源休_號至供電模組 14命·^供電模、址14使電腦系統】進入電源控制訊號相對 應之電腦系統休眠狀態。當電腦系統處於休眠狀態時,使 用者,次使用食指進行料翻,處理器12則發出電源工 作訊號至供電模組14 ’命令供電模組14使電腦系統i進 入電源控制訊號相對應之電腦系統工作狀態。如此使用者 €需使用食指進行兩次掃描即可控制電腦系統1之電源狀 錢械環切換。反之,使用者可設定兩次掃描都使用不 同=指紋來執行關機動作。例如在電腦系統1任何的電源 狀態下,使用者第-次以食指接觸生物特徵轉換裝置u, 第二次以姆指接觸生物特徵轉換裝置11,處理器12則發 出電測機訊號至供電模組Μ,命令供電模組14使電腦 系統1進入電源控制訊號相對應之電腦系統關機狀態(步 驟 518)。 帛二個實施例’請參見第六圖,其係為以指紋控制電 源狀態之第三實施例方法步驟流程圖。當開機完成並登入 作業糸統(步驟610)後即電腦系統1進入工作狀態(步驟 611)’當主要系統15無法正常運作時或是使用者欲強岳丨 入電腦關機狀態,使用者可以指紋接觸生物特徵轉換裝置 11並且停留超過4秒鐘,而通常當使用者欲強制進入電腦 關機狀態時’可能為主要系統15無法正常運作的情況,因 此可由處理器12代替主要系統15進行判斷的動作,也就 • 是當主要系統15無法正常運作時’由處理器12偵侧到使 17 200947303 =指接觸生物特徵轉換裝置u超過4秒鐘(步驟 器12 g卩觸烟者g卩料行㈣ =:轉換裝置„,處理器12會要求進= =動作(步謂)。若使用者未進行第二 :The biometric conversion device u ± _ or a warning tone to remind the user data comparison results do not match. The power supply is controlled by fingerprint. Please refer to the fourth figure, which is the flow chart of the first practical step of controlling the power state by fingerprint. When the completion and boarding of the operating system (steps in the Putian system 1 into the working state (step milk), in the system and the king, 'there is a need to verify the user's biometrics, assume that 7 people touch the creature with fingerprints The action of the feature conversion device 11 performing scanning 'step 412 】 In order to avoid the occurrence of a misjudgment, the main system will have a user to scan for the second time (step 413), after the user scans the t-th fingerprint (step 414), the biometric conversion device 11 converts the first time, the scan and the second scanned missing image file into the third data and transmits it to the 12' processing 11 12 according to the third data and from the storage element 13 = The fourth information is matched (step 415). If the second time is not carried out, the user is returned to the original working state (step 4ΐι), and the third capital 14 200947303 Ο 与When the result of the four-way comparison is not met, the processor 12 will remind the user that the result of the beating comparison does not match by the signal (4) on the bio-conversion device 11 or by issuing a warning tone (step 419). On the other hand, if the comparison result is met, the device 12 sets the corresponding power state according to the fingerprint combination of the fourth data, and sends a power control signal to the power supply module 14, and commands the power supply module 14 to make the computer system break into the power supply. Controls the power state corresponding to the signal. Example 1. If the user touches the biometric conversion device u with the thumb for the first time, and touches the biometric conversion device 11 with the index finger for the second time, the processor 12 issues a power supply standby device to the power supply module 14 to command the power supply mode. Group 14 causes the electrical (four) system 1 power supply (four) signal to correspond to the electrical age standby state (step 416). _ 2 : If the user touches the biometric conversion device 11 with the thumb for the first time - the second time touches the biometric device with the thumb], the power supply is released, the command 14 module 14 is used to make the electricity (four) The input power control signal corresponds to one of the computer system sleep states (step 417). Example 3: If the user first uses the thumb=biometric feature to turn the U, the second time, the finger contact biometric conversion f is set to 11 'the processor 12 is issued — the power off signal signal to the power supply mode m' command power supply The module 14 causes the computer system 1 to enter a computer system shutdown state corresponding to the power control signal (step 418). Example 4: If the computer = system 1 is already in standby, H, if the user is -: New = sign conversion device U, the second time touches the biometric switch = device η with the ring finger, the processor 12 sends a power supply signal The power supply module 'command power supply module 14 causes the computer system i to enter the power control signal as one of the computer system working states (step 42). 15 200947303 Referring to the fifth figure, it is a flow chart of the second embodiment method step of controlling the power state by fingerprint. When the booting is completed and the operating system is 510), the computer system enters the human state (step 511), and the system and the application do not need to verify the biometric characteristics of the user, and the user is assumed to touch the biometric with the fingerprint. The conversion device η performs scanning (^512). 'In order to avoid the occurrence of misjudgment, the main system and the system π will require the person to scan the second fingerprint again (step 513), after the user scans the first=private pattern ( Step 514), the biometric conversion device η converts the scanned image groove scanned by the first time and the second time into a third data and transmits it to the third data processor 12 according to the third dragon and Storage element μ : Find the character. The fourth information (step 515). If the user does not perform the second time, the main system 15 determines that the user has returned to the original working state by mistakenly touching the biometric conversion device (step 511). When the comparison result of the third asset fourth material does not match, the processor 12 will alert the user by making a light or a warning tone on the bio-switching device u; the result is not met (step 519). On the other hand, if the comparison result is equal to $12, the power control signal corresponding to the fingerprint combination of the fourth data is set to the power supply mode, the group 14 is commanded, and the power supply mode user 1 is entered. The power control signal corresponds to the power state. (The step is to scan the same fingerprint twice to switch the power state to set 11, flute _ L. If the user touches the biometric conversion device 12 for the first time with the index finger, 丨i also touches the biometric conversion device U with the index finger for the second time. The processor ^ sends the power standby to the supply group 14, and commands the power supply module 14 to make the computer system wire, the warehouse, the heart P7, and the computer system standby corresponding to the power control signal. Shape 16 200947303 S When the computer system is in the standby state, if the user uses the index finger again to order the two-person scan 'processing H 12, then the power supply _ number is sent to the power supply module 14 life · ^ power supply mode, address 14 to make the computer system] Enter the sleep state of the computer system corresponding to the power control signal. When the computer system is in the sleep state, the user uses the index finger to turn over the material, and the processor 12 sends a power working signal to the power supply module 14 to command the power supply module 14 to make The computer system i enters the working state of the computer system corresponding to the power control signal. Thus, the user needs to use the index finger to perform two scans to control the switching of the power supply ring of the computer system 1. The user can set the scan to use different fingerprints to perform the shutdown action. For example, in any power state of the computer system 1, the user touches the biometric conversion device u with the index finger for the first time, and the second time is the thumb. In contact with the biometric conversion device 11, the processor 12 sends the electrical signal to the power supply module, and commands the power supply module 14 to cause the computer system 1 to enter the computer system shutdown state corresponding to the power control signal (step 518). Embodiments Please refer to the sixth figure, which is a flow chart of the method steps of the third embodiment for controlling the power state by fingerprint. When the booting is completed and the operation system is logged in (step 610), the computer system 1 enters the working state (step 611). When the main system 15 is not working properly or the user wants to enter the computer to shut down, the user can fingerprint contact with the biometric conversion device 11 and stay for more than 4 seconds, usually when the user wants to force the computer to shut down. When the state is 'may be the case where the main system 15 cannot operate normally, the processor 12 can replace the action of the main system 15 to perform the judgment. • When the main system 15 is not functioning properly, 'by the processor 12 to detect 17 200947303 = refers to contact with the biometric conversion device u for more than 4 seconds (step 12 g 卩 卩 卩 卩 ( 四 四 四 四 四 四The conversion device „, the processor 12 will require the input == action (step). If the user does not perform the second:
=:理器12則判定使用者為誤觸生物特徵轉換裝置文 Π林的功狀態(步驟⑽。反之,當使用者掃描 第二4紋後(步驟613),生物特徵轉換裝置n便將所掃 田的指紋圖雜換為第三:#料並傳至處理m處理器^ 便依據此第三轉錢儲存元件13顧符合的第四資料 V驟614) °而第二資料與第四資料的比對結果不符合 時,處理H 12會藉由生物特徵轉換裝置u上的燈號閃燦 或發出警7^音來提醒使用者資料比對結果不符合(步驟 616) °反之’若比對結果符合,處理器12即發出電源強制 關機訊號至供電模組14,命令供電模組14使電腦系統i 關閉電源(步驟615),進人電源控制訊號相對應之電腦系 統強制關機狀態。 以上所述之以生物特徵控制電源狀態的方法,需預先 設^:不同的生物特徵la合以對應不同的電源狀態,可以是 使用者之一指紋圖像、一視網膜圖像、一虹膜圖像、一手 掌形狀圖像、-掌紋圖像、—聲音特徵參數以及一瞳孔圖 像中之一個或多個之組合。 綜合上述技術之說明,本案最主要之技術特徵就是以 生物特徵轉換裝置代替習用電腦系統之電源按鍵,並且藉 由生物辨識啟動裝置的辨識功能提升電腦系統的安全穩私 18 200947303 言二使用者只需完成一次生物特徵掃描就可開啟電 仃個人專屬指令,以及進人使时的齡環境,如 此也大大提升烟上的便利性。 —雖然本翻已啸佳實施侧露如上然其並非用以 限疋本發明’任何所屬技術領域中具有通常知識者,在不 脫離本發明之精神和範圍内,當可作些許之更動與潤飾, f此本發明之保護範圍當視後附之中請專利範圍所界定者 ❹ 鱗。另外,本發明的任一實施例或申請專利範圍不須達 f本發明所揭露之全部目的或優點或特點。此外,摘要部 矛才下通僅疋用來辅助專利文件搜尋之用,並非用來限制 本發明之權利範圍。 【圖式簡單說明】 本案得藉由下列圖式及說明,俾得一更深入之了解: ^似圖為本案之一實施例所提出生物辨識啟動裝置應用於一 電腦系統之功能方塊示意圖。 =二圖為第—實施例之以生物辨識啟動裝置進行開機流程圖。 ^二圖為第二實施例之以生物辨識啟動裝置進行開機流程圖。 四圖為以指紋控制電源狀態之第一實施例方法步驟流程 圖。 第五圖為以指紋控制電源狀態之第二實施例方法步驟流程 圖。 第八圖為以指紋控制電源狀態之第三實施例方法步驟流程 圖。 19 200947303 【主要元件符號說明】 本案圖式中所包含之各元件列示如下: 電腦系統1 生物辨識啟動裝置10 生物特徵轉換裝置11 處理器12 儲存元件13 供電模組14 主要系統15=: The processor 12 determines that the user is in the wrong state of the biometric conversion device (step (10). Conversely, when the user scans the second pattern (step 613), the biometric conversion device n The fingerprint of the sweeping field is replaced by the third: #料 and passed to the processing m processor ^ according to the third transfer money storage component 13 in accordance with the fourth data V 614) ° and the second and fourth data If the comparison result is not met, the processing H 12 will notify the user that the data comparison result does not match by the flashing of the signal on the biometric conversion device u or by issuing a warning sound (step 616). When the result is met, the processor 12 sends a power forced shutdown signal to the power supply module 14, and commands the power supply module 14 to turn off the power of the computer system i (step 615), and enters a forced shutdown state of the computer system corresponding to the power control signal. The method for controlling the power state by using the biometrics mentioned above needs to be pre-set: different biometrics are combined to correspond to different power states, and may be one of the user's fingerprint images, a retinal image, and an iris image. a combination of one or more of a palm shape image, a palm print image, a sound feature parameter, and a pupil image. Based on the above description of the technology, the most important technical feature of the case is to replace the power button of the conventional computer system with the biometric conversion device, and to enhance the security and security of the computer system by the identification function of the biometric activation device 18 200947303 A biometric scan is required to turn on the eDonkey's personal instruction and the age-appropriate environment, which greatly enhances the convenience of the smoke. 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 f The scope of protection of the present invention is defined by the scope of the patent. In addition, any of the objects or advantages or features of the present invention are not to be construed as being limited by the scope of the invention. In addition, the abstract section is only used to assist in the search of patent documents and is not intended to limit the scope of the invention. [Simple description of the diagram] This case can be obtained through a more detailed understanding of the following drawings and descriptions: ^ Figure is a functional block diagram of a biometric activation device applied to a computer system according to an embodiment of the present invention. = The second figure is a flowchart of the booting of the biometric starting device in the first embodiment. The second figure is a flow chart of starting the biometric activation device in the second embodiment. The four figures are flow diagrams of the method steps of the first embodiment of controlling the power state by fingerprint. The fifth figure is a flow chart of the method steps of the second embodiment of controlling the power state by fingerprint. The eighth figure is a flow chart of the method steps of the third embodiment of controlling the power state by fingerprint. 19 200947303 [Description of main component symbols] The components included in the diagram of this case are listed as follows: Computer system 1 Biometric activation device 10 Biometric conversion device 11 Processor 12 Storage component 13 Power supply module 14 Main system 15
2020
Claims (1)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW97116677A TW200947303A (en) | 2008-05-06 | 2008-05-06 | Enabling device and method by biometrics |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW97116677A TW200947303A (en) | 2008-05-06 | 2008-05-06 | Enabling device and method by biometrics |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW200947303A true TW200947303A (en) | 2009-11-16 |
Family
ID=44870296
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW97116677A TW200947303A (en) | 2008-05-06 | 2008-05-06 | Enabling device and method by biometrics |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TW200947303A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI490725B (en) * | 2012-04-19 | 2015-07-01 | Authentec Inc | Electronic device including finger-operated input device based biometric enrollment and related methods |
-
2008
- 2008-05-06 TW TW97116677A patent/TW200947303A/en unknown
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI490725B (en) * | 2012-04-19 | 2015-07-01 | Authentec Inc | Electronic device including finger-operated input device based biometric enrollment and related methods |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101271500A (en) | Biological recognition starting device and method | |
| US8250387B2 (en) | Computers having a biometric authentication device | |
| US20140230048A1 (en) | Method and computer program product of switching locked state of electronic device | |
| JP5210966B2 (en) | Biometric authentication device and biometric authentication method | |
| CN107223254A (en) | The biological characteristic run in the background is set | |
| CN111125664B (en) | Electronic equipment and method for logging in operating system | |
| WO2018165942A1 (en) | Terminal device and fingerprint recognition method | |
| JP6561710B2 (en) | Information processing apparatus, information processing system, authentication method, and program | |
| US11216543B2 (en) | One-button power-on processing method and terminal thereof | |
| WO2018195976A1 (en) | Fingerprint identification-based boot method and apparatus | |
| WO2020133500A1 (en) | Method and device for unlocking terminal device, and storage medium | |
| EP3995976B1 (en) | Identity authentication system | |
| US20200327216A1 (en) | Portable authentication apparatus and self-enrollment method for enrolling authentication data in the apparatus | |
| CN101647701B (en) | Authentication method and apparatus | |
| CN106156590A (en) | A kind of computer startup processing method and processing system | |
| CN110309640A (en) | Electronic equipment starting-up method and electronic equipment | |
| TW200947303A (en) | Enabling device and method by biometrics | |
| CN114201739A (en) | Electronic equipment starting method and device based on fingerprint | |
| TWI430133B (en) | Biosensing activation device, biometric sensing control startup management system and method thereof | |
| CN107820598A (en) | Fingerprint event processing device and method | |
| CN102667721A (en) | Method for starting up computer by using user identification device | |
| EP2942708A1 (en) | Data input system for macro activation | |
| JP7652296B2 (en) | Authentication device, authentication system, and authentication method | |
| EP4168906B1 (en) | Power key and fingerprint reader | |
| CN112685714B (en) | Device control method and device |