WO1998013791A1 - Apparatus and method for personal identification - Google Patents
Apparatus and method for personal identification Download PDFInfo
- Publication number
- WO1998013791A1 WO1998013791A1 PCT/US1996/015509 US9615509W WO9813791A1 WO 1998013791 A1 WO1998013791 A1 WO 1998013791A1 US 9615509 W US9615509 W US 9615509W WO 9813791 A1 WO9813791 A1 WO 9813791A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- personal
- microprocessor
- trait characteristics
- personal trait
- access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
Definitions
- This invention relates generally to means for gaining access to controlled areas, but more particularly, to card systems for gaining access to secured buildings and facilities or to secured computer systems .
- This invention has broad applications in systems where bank cards, credit cards, or other types of plastic cards are used to gain access to automated financial transaction systems, and also to computer controlled systems where plastic cards are used for entering and leaving controlled buildings or other types of facilities.
- This invention also relates to applications where access to the information stored on the card is restricted by a security system.
- these cards have a coded magnetic strip that allows the user to pass the strip through a reader which authorizes the user to gain access to the computer controlled system.
- Early versions of these basic systems allowed any holder of the card to gain entry to the system regardless of whether the holder was an authorized user or not.
- a portable device preferably a personal identi ication card or smart card which contains a microprocessor with means for storing personal identification traits such as fingerprints, hand geometry, voiceprints, etc., in the memory of the microcomputer; biometric detection means such as a reader comprising a means for reading digitized data of personal identification traits template received from an external scanner; and means for comparing the inputted personal identification traits from the external scanner with the personal identification traits stored in programmable memory of the microprocessor.
- biometric detection means such as a reader comprising a means for reading digitized data of personal identification traits template received from an external scanner
- means for comparing the inputted personal identification traits from the external scanner with the personal identification traits stored in programmable memory of the microprocessor Upon obtaining a match of the stored personal identification traits and the scanned identification traits, the smart card allows access to a secured facility or computer system or the smart card it- self.
- FIG. 1 is a simplified block diagram of the smart card interfacing with a computer system in accordance with the principles of this invention
- Figure 2 is a block diagram of the architecture of the microprocessor utilized on the smart card in accordance with the principles of this invention.
- Figure 3 is a flow chart illustrating the method of operation of the smart card in accordance with the princi- pies of this invention.
- FIG. 1 a personal identification system shown indicated generally at 10 that allows a user to gain access to controlled facilities or areas, or con- trolled computer system files in the smart card microprocessor.
- a person attempting to gain access to the system must have a user card 12 which may be a commonly used plastic card such as a credit card or other identification card which has contained therein a microprocessor general- ly referred to as 14.
- the user must connect the microprocessor to a computer system interface 16 by connecting serial communication, power, reset, and timing signal lines not shown but well known to those skilled in the art that allows the microprocessor and the computer system interface to communicate.
- the computer system interface is usually at a remote site so it is accessible to the user and is connected to a computer system not shown. Also at the remote site is a biometric scanner 18 that is connected to the computer system interface 16 so that the microprocessor 14 and the biometric scanner 18 can pass information.
- the biometric scanner 18 may be any number of scanners well known in the art such as fingerprint scanners, voiceprint digitizers, hand geometry scanners, etc .
- FIG. 2 there is shown a block diagram of the architecture of the microprocessor 14.
- addressing logic circuits 22 and control and test registers 24 for the erasable, pro- grammable read only memory (EPROM) or similar device 26 and the electrical erasable programmable read only memory (EEPROM) or similar device 28 which contains the templates for the biometric identification information and comparison and update codes.
- EPROM erasable, pro- grammable read only memory
- EEPROM electrical erasable programmable read only memory
- RAM data random access memory
- a CPU 34 is utilized to make the comparisons between the biometric template store and the biometric template input in a manner that will be hereinafter described.
- the microprocessor con- tains an input/output interface 36 and security logic control 38.
- hand geometry biometric information is used.
- a hand geometry template of the user is made, the information is digitized and inputted into the EEPROM 28.
- the microprocessor is programmed to make partial updates of the hand geometry template stored in the card.
- the template update accounts for subtle hand changes (e.g., fingernail growth and weight gain).
- the security logic circuits of the microprocessor protects the template and requires terminal verification before processing any Intemational Organization for Standardization format command.
- the program maintains template integrity using an error detection code and an invalid access attempt count.
- Figure 3 illustrates a flow chart that demonstrates the method of operation during identification of the user.
- the computer system interface challenges the user card to authenticate itself with a randomly generated security code. If the proper response is computed, the card is authenticated. If not, the computer system stops and the user is denied access. The system then prompts the user to place his hand in the hand scanner and a hand template is digitized by the hand scanner 18. However, before this information is processed by the user card 12, the user card authenticates the terminal by challenging the terminal with a randomly generated security code. If the terminal security code is present, the template is made available to the user card 12. If it is not available, the system stops and the user is denied access.
- the card requests that the hand template be sent to the card.
- the system denies access if the identity is unknown and the retry count is exceeded.
- the smart card then temporarily stores the hand template in the random access memory (RAM) 32 and retrieves the pre-stored hand template from the (EEPROM) 28.
- An algorithm stored for making a compar- ison is then used by the CPU 34 to compare the previously stored hand template with the hand template received from the scanner 18.
- the hand geometry comparison and update algorithm allows an update to be made to the stored template when a predetermined maximum score is made as a result of the comparison.
- the updated template then is stored and becomes the new stored template for comparisons for future entry attempts.
- a personal identification card smart card
- a template of biometric identification traits such as hand geometry, which is protected from unauthorized or unfriendly computers by a security logic system.
- the smart card prompts the computer system to request a hand geometry scan which is digitized and sent to the smart card. Hand geometry algorithms and update algorithms stored in the smart card are compared with the hand geometry scan.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Human Computer Interaction (AREA)
- Collating Specific Patterns (AREA)
Abstract
There is provided by this invention a personal identification card for gaining access to controlled areas or computer systems having a microprocessor combined therein that has stored in its memory personal trait characteristics of the individual user. The microprocessor also has stored algorithms for comparing the personal trait characteristics stored in the card with personal trait characteristics inputted from an external device. Stored algorithms are used to update the personal stored traits. The microprocessor verifies the identity of the user of the card. A security system within the microprocessor protects the stored personal trait characteristics and restricts access to the card.
Description
APPARATUS AND METHOD FOR PERSONAL IDENTIFICATION
BACKGROUND OF THE INVENTION Field of the Invention The U.S. government has a paid-up license in this invention and the right in limited circumstances to require the patent owner to license others on reasonable terms as provided for by the terms of contract No. DE-AC06-87RL10930 award by the United States Department of Energy.
This invention relates generally to means for gaining access to controlled areas, but more particularly, to card systems for gaining access to secured buildings and facilities or to secured computer systems . This invention has broad applications in systems where bank cards, credit cards, or other types of plastic cards are used to gain access to automated financial transaction systems, and also to computer controlled systems where plastic cards are used for entering and leaving controlled buildings or other types of facilities. This invention also relates to applications where access to the information stored on the
card is restricted by a security system. Traditionally, these cards have a coded magnetic strip that allows the user to pass the strip through a reader which authorizes the user to gain access to the computer controlled system. Early versions of these basic systems allowed any holder of the card to gain entry to the system regardless of whether the holder was an authorized user or not. Later, these basic systems were supplemented with an additional identification means such as a PIN number or a password that had been previously stored in the computer memory. The holder of the card had to enter the identification into the system to prove he was an authorized user. These systems proved to be ineffective because the authorized user oftentimes forgot the password or PIN number and, in some cases, the PIN number and password were obtained by duress or theft or some other unauthorized means .
Then, systems were developed where a personal physical trait was actually stored on the card. These physical traits could be handwriting samples , photographs , or fingerprints. In these type systems, the personal trait that was stored on the identification card was also stored in a computer memory bank. When the user attempted to gain access to the secured system, the user would input the card to a reader or scanner that read the digitized personal information trait from the card and inputted it into the main computer memory bank. The main computer would then retrieve the stored information from its memory
bank and make a comparison of the information inputted from the reader. If the personal physical traits read on the card matched the personal traits stored in the main computer, then the user was authorized to gain access to the system. However, if there was not a match, then the user was denied access to the system. Such systems were disclosed in U.S. patent no. 5,214,699, issued May 25, 1993, to Midora Monroe, et al . See also U.S. patent no. 4,636,622, issued to Clemet Clark, on January 13, 1987. These systems were typical of systems that used identification cards to gain access to controlled areas or computer systems .
However, even these systems had major drawbacks. When personal identification traits and identities were stored in a centralized database where there were many, many users, databases of enormous size and expense were required. Inordinate delays were usually encountered when many users tried to gain access to the system simultaneously. They also require extensive communication between the remote access points and the central database.
Accordingly, other systems have been developed which require the user to place his personal identification card in a reader and then re-enter his personal identification trait in a real time on-line scanner. For instance, when a personal identification trait is a picture, a camera, located at the remote site, re-enters the user's picture into the system for comparison. Other systems may have
fingerprint scanners to read actual fingerprints or voice scanners compare actual voices with voiceprints stored on the identification cards. In these systems, the information read from the on-line scanner is fed to a main compu- ter along with the information read from the identification card and a comparison is then made. If there is a match, then the user is allowed access to the system. These types of systems are disclosed in U.S. patent no. 4,993,068, issued to Gerald Piosenka, et al . , and U.S. patent no. 5,229,764, issued to Noel Matchett, et al. See also U.S. patent no. 5,191,608, issued March 2, 1993, to Francois Geroni i wherein a secret code is coded in the microprocessor of the identification card which must be matched before the card is operational by the user. However, these systems also have a major drawback. That is, they allow the personal trait information stored on the card to be read by an unknown or unfriendly computer. This type of technique compromises the security of the overall system. It is an object of this invention to provide an identification card or smart card for use with an identification and access system wherein the personal identification trait stored on the smart card cannot be obtained by unauthorized users. It is also an object to provide a system which may be used by numerous users without requiring a large centralized database. It is a still further object of this
invention to provide a multipurpose smart card which allows the user to gain access to a variety of different facilities or computer systems.
It is a further object of this invention to maintain secret information in the card that will not be released until the card holder proves his identity to the card. In all cases the identity verification takes place in the card.
Summary of the Invention There is provided by this invention a portable device, preferably a personal identi ication card or smart card which contains a microprocessor with means for storing personal identification traits such as fingerprints, hand geometry, voiceprints, etc., in the memory of the microcomputer; biometric detection means such as a reader comprising a means for reading digitized data of personal identification traits template received from an external scanner; and means for comparing the inputted personal identification traits from the external scanner with the personal identification traits stored in programmable memory of the microprocessor. Upon obtaining a match of the stored personal identification traits and the scanned identification traits, the smart card allows access to a secured facility or computer system or the smart card it- self. The smart card also contains security features which prevent any information from being inputted to the microprocessor from unauthorized computers.
Brief Description of the Drawings Figure 1 is a simplified block diagram of the smart card interfacing with a computer system in accordance with the principles of this invention; Figure 2 is a block diagram of the architecture of the microprocessor utilized on the smart card in accordance with the principles of this invention; and
Figure 3 is a flow chart illustrating the method of operation of the smart card in accordance with the princi- pies of this invention.
Brief Description of Preferred Embodiment There is shown in Figure 1 a personal identification system shown indicated generally at 10 that allows a user to gain access to controlled facilities or areas, or con- trolled computer system files in the smart card microprocessor. A person attempting to gain access to the system must have a user card 12 which may be a commonly used plastic card such as a credit card or other identification card which has contained therein a microprocessor general- ly referred to as 14. The user must connect the microprocessor to a computer system interface 16 by connecting serial communication, power, reset, and timing signal lines not shown but well known to those skilled in the art that allows the microprocessor and the computer system interface to communicate. The computer system interface is usually at a remote site so it is accessible to the user and is connected to a computer system not shown.
Also at the remote site is a biometric scanner 18 that is connected to the computer system interface 16 so that the microprocessor 14 and the biometric scanner 18 can pass information. The biometric scanner 18 may be any number of scanners well known in the art such as fingerprint scanners, voiceprint digitizers, hand geometry scanners, etc . Once the microprocessor 14 is connected to the computer system interface 16, the system will prompt the user to input information into the biometric scanner 18 for comparison in a manner hereinafter described.
Referring to Figure 2 , there is shown a block diagram of the architecture of the microprocessor 14. Connected to the internal bus 20 are addressing logic circuits 22 and control and test registers 24 for the erasable, pro- grammable read only memory (EPROM) or similar device 26 and the electrical erasable programmable read only memory (EEPROM) or similar device 28 which contains the templates for the biometric identification information and comparison and update codes. Also connected is an application read only memory (ROM) or similar device 30 and a data random access memory (RAM) 32. A CPU 34 is utilized to make the comparisons between the biometric template store and the biometric template input in a manner that will be hereinafter described. Finally, the microprocessor con- tains an input/output interface 36 and security logic control 38.
Although this system will work with any biometric identity verification trait, such as voiceprints or fingerprints, in the present invention hand geometry biometric information is used. When the card is issued to the user, a hand geometry template of the user is made, the information is digitized and inputted into the EEPROM 28. The microprocessor is programmed to make partial updates of the hand geometry template stored in the card. The template update accounts for subtle hand changes (e.g., fingernail growth and weight gain). The security logic circuits of the microprocessor protects the template and requires terminal verification before processing any Intemational Organization for Standardization format command. The program maintains template integrity using an error detection code and an invalid access attempt count.
Figure 3 illustrates a flow chart that demonstrates the method of operation during identification of the user. When the card user inserts the card 12 into the computer system interface 16 and the microprocessor 14 is connected within the computer interface, the computer system interface challenges the user card to authenticate itself with a randomly generated security code. If the proper response is computed, the card is authenticated. If not, the computer system stops and the user is denied access. The system then prompts the user to place his hand in the hand scanner and a hand template is digitized by the hand
scanner 18. However, before this information is processed by the user card 12, the user card authenticates the terminal by challenging the terminal with a randomly generated security code. If the terminal security code is present, the template is made available to the user card 12. If it is not available, the system stops and the user is denied access. Once the hand template is available and the retry count has not been exceeded, the card requests that the hand template be sent to the card. The system denies access if the identity is unknown and the retry count is exceeded. The smart card then temporarily stores the hand template in the random access memory (RAM) 32 and retrieves the pre-stored hand template from the (EEPROM) 28. An algorithm stored for making a compar- ison is then used by the CPU 34 to compare the previously stored hand template with the hand template received from the scanner 18. The hand geometry comparison and update algorithm allows an update to be made to the stored template when a predetermined maximum score is made as a result of the comparison. The updated template then is stored and becomes the new stored template for comparisons for future entry attempts. When the computer system interface requests the results from the card, the holder is either identified and the user is granted access by the system or to the card, or the holder is not identified and the system denies access .
It can be readily seen that there is provided by this invention a novel, personal identification system wherein a personal identification card (smart card) has stored therein on a microprocessor system a template of biometric identification traits, such as hand geometry, which is protected from unauthorized or unfriendly computers by a security logic system. Once a computer system has been authenticated, then the smart card prompts the computer system to request a hand geometry scan which is digitized and sent to the smart card. Hand geometry algorithms and update algorithms stored in the smart card are compared with the hand geometry scan. Thus, every individual user of the system who has a smart card carries his template in his own microprocessor and relieves the main computer sys- tern from requiring excessive and expensive data storage space when there may be many thousands of potential users . This invention provides a smart card where the biometric comparison occurs in the microprocessor of the smart card. Although there has been illustrated and described specific detail and structure of operation, it is clearly understood that the same were merely for purposes of illustration and that changes and modifications may be readily made therein by those skilled in the art without departing from the spirit and the scope of this invention.
Claims
1. A personal identification system for controlling access to a protected system, comprising: a) a portable device containing a microprocessor means disposed to be inputted into a computer system interface means for controlling access to the secure area or computer system; b) biometric reader means connected to the computer system interface means for detecting personal trait characteristics of an individual seeking access and producing a digitized output of the personal trait characteristics; c) programmable memory means within the microprocessor means for storing previously recorded biometric personal trait characteristics; d) comparative means within the microprocessor means for comparing the previously stored personal trait characteristics in the programmable memory means with the output of the biometric detection means for verifying the identity of the individual seeking access; e) output means within the microprocessor means for producing an output signal resulting from the comparison made in the comparative means to the computer interface means for enabling or disabling access of the individual to the secured areas or computer system; and f) security means within the microprocessor means wherein access to the personal trait characteristics is protected and restricted.
2. A personal identification system as recited in Claim 1 wherein the portable device is a card.
3. A personal identification system as recited in Claim 2 wherein the card is plastic.
4. A personal identification system as recited in Claim 3 wherein the biometric detection means is comprised of a scanner for digitizing the hand geometry of the individual seeking access.
5. A personal identification system as recited in Claim 4 wherein the biometric detection means is a receiver for digitizing voiceprints of the individual seeking access.
6. A personal identification system as recited in Claim 5 wherein the programmable memory means updates the previously recorded personal trait characteristics with the digitized output of the biometric detection means.
7. A personal identification system as recited in Claim 6 wherein the protected system is a controlled area or facility.
8. A personal identification system as recited in Claim 7 wherein the protected system is a computer system.
9. A portable device for accessing a protected system by the user, comprising a microprocessor wherein the microprocessor means is further comprised of: a) a programmable memory means for storing previously recorded personal trait characteristics; b) means for storing personal trait comparison algorithms and personal trait update algorithms; c) computing means for utilizing the personal trait comparison algorithms for comparing personal trait characteristics inputted into the microprocessor means with the previously recorded personal trait characteristics stored in the programmable memory means; d) update means for updating the personal trait characteristics previously recorded stored in the programmable memory means with the personal trait characteristics inputted into the microprocessor means; e) output means for producing an output signal based upon the comparison made in the computing means between the personal trait characteristics previously recorded and a personal trait characteristic inputted into the microprocessor means to verify the identity of the user; and f) security means within the microprocessor means wherein access to the personal trait characteristics is protected and restricted.
10. A method of controlling access to a protected system by an individual, consisting of the steps of: providing portable storage means for storing personal trait characteristics of an individual; verifying the portable device upon input to the protected system; verifying the protected system by the portable device; measuring personal trait characteristics of the individual seeking access and inputting the personal trait characteristics into the portable device; comparing the personal trait characteristics inputted into the portable device with the personal trait characteristics previously stored in the portable device for determining the identity of the user; and signaling the protected system to enable or disable access by the individual based upon the comparisons made.
11. A method for controlling access to a protected system as recited in Claim 10 further comprising a step of updating the personal trait characteristics stored in the portable device by the personal trait characteristics measured and inputted into the portable device.
12. A method for controlling access to a protected system as recited in Claim 11 wherein the portable device is comprised of a card having a microprocessor attached thereto .
13. A method for controlling access to a protected system as recited in Claim 12 wherein the card is plastic.
14. A method for controlling access to a protected system as recited in Claim 13 wherein the protected system is a secure area or facility.
15. A method for controlling access to a protected system as recited in Claim 14 wherein the protected system is a computer system.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU71695/96A AU7169596A (en) | 1996-09-27 | 1996-09-27 | Apparatus and method for personal identification |
PCT/US1996/015509 WO1998013791A1 (en) | 1996-09-27 | 1996-09-27 | Apparatus and method for personal identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US1996/015509 WO1998013791A1 (en) | 1996-09-27 | 1996-09-27 | Apparatus and method for personal identification |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998013791A1 true WO1998013791A1 (en) | 1998-04-02 |
Family
ID=22255871
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1996/015509 WO1998013791A1 (en) | 1996-09-27 | 1996-09-27 | Apparatus and method for personal identification |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU7169596A (en) |
WO (1) | WO1998013791A1 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL1017856C2 (en) * | 2001-04-17 | 2002-10-18 | Hendricus Hermanus Van Velden | S4U (Safety for you). |
WO2003003295A1 (en) * | 2001-06-28 | 2003-01-09 | Trek 2000 International Ltd. | A portable device having biometrics-based authentication capabilities |
WO2003073243A3 (en) * | 2002-02-27 | 2004-04-08 | Advanced Micro Devices Inc | Embedded processor with direct connection of security devices for enhanced security |
EP1398737A3 (en) * | 2002-09-12 | 2004-06-30 | Integrated Engineering B.V. | Identification system |
US6880054B2 (en) | 2000-02-21 | 2005-04-12 | Trek Technology (Singapore) Pte. Ltd. | Portable data storage device having a secure mode of operation |
EP1480099A3 (en) * | 1999-09-17 | 2005-07-13 | Fingloq AB | Mobile communication unit with a security arrangement |
RU2267155C2 (en) * | 1998-11-10 | 2005-12-27 | Аладдин Нолидж Системз Лтд. | Method for user-computer interaction for use by a set of flexibly connected computer systems, device, having block for connection to flexibly connected computer systems, a set of devices, having a block for connection to flexibly connected computer system, universal serial bus key, method for interaction with main computer via usb and data storage method (variants) |
EP1237091A4 (en) * | 1999-12-10 | 2006-08-23 | Fujitsu Ltd | PERSONAL AUTHENTICATION SYSTEM AND PORTABLE ELECTRONIC DEVICE HAVING PERSONAL AUTHENTICATION FUNCTION USING PHYSICAL INFORMATION |
US7171680B2 (en) | 2002-07-29 | 2007-01-30 | Idesia Ltd. | Method and apparatus for electro-biometric identity recognition |
FR2895121A1 (en) * | 2005-12-15 | 2007-06-22 | Cogelec Soc Par Actions Simpli | SYSTEM AND METHOD FOR ACCESS CONTROL, ACCESS CONTROL, KEYS AND CUSTOMIZATION METHOD OF THE SYSTEM |
US7249266B2 (en) | 1999-10-05 | 2007-07-24 | Aladdin Knowledge Systems, Ltd. | User-computer interaction method for use by a population of flexible connectable computer systems |
US7310734B2 (en) | 2001-02-01 | 2007-12-18 | 3M Innovative Properties Company | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
US7631121B2 (en) | 2002-05-13 | 2009-12-08 | Trek 2000 International Ltd. | System and apparatus for compressing and decompressing data stored to a portable data storage device |
US8212652B2 (en) | 2008-11-13 | 2012-07-03 | Hitachi, Ltd. | Biometric authentication method, biometric authentication system, IC card, and terminal |
CN109147204A (en) * | 2018-08-16 | 2019-01-04 | 青海华职康健康科技有限公司 | A kind of automatic distribution method of personal protective equipment and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1982003286A1 (en) * | 1981-03-18 | 1982-09-30 | Bo Loefberg | Data carrier |
GB2171828A (en) * | 1985-03-01 | 1986-09-03 | Mitsubishi Electric Corp | An individual recognition system |
EP0197535A2 (en) * | 1985-04-09 | 1986-10-15 | Siemens Aktiengesellschaft | Data input device |
GB2181582A (en) * | 1985-10-11 | 1987-04-23 | Victor Campbell Blackwell | Personal identification device |
EP0271835A2 (en) * | 1986-12-19 | 1988-06-22 | Hitachi, Ltd. | Personal voice pattern carrying card system |
GB2204971A (en) * | 1987-05-19 | 1988-11-23 | Gen Electric Co Plc | Transportable security system |
FR2615984A1 (en) * | 1987-05-30 | 1988-12-02 | Toshiba Kk | SMARTCARD |
EP0393784A1 (en) * | 1989-04-17 | 1990-10-24 | N.V. Nederlandsche Apparatenfabriek NEDAP | Multifunctional identification and information card |
JPH03269692A (en) * | 1990-03-19 | 1991-12-02 | Hitachi Ltd | Card position management method |
-
1996
- 1996-09-27 WO PCT/US1996/015509 patent/WO1998013791A1/en active Application Filing
- 1996-09-27 AU AU71695/96A patent/AU7169596A/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1982003286A1 (en) * | 1981-03-18 | 1982-09-30 | Bo Loefberg | Data carrier |
GB2171828A (en) * | 1985-03-01 | 1986-09-03 | Mitsubishi Electric Corp | An individual recognition system |
EP0197535A2 (en) * | 1985-04-09 | 1986-10-15 | Siemens Aktiengesellschaft | Data input device |
GB2181582A (en) * | 1985-10-11 | 1987-04-23 | Victor Campbell Blackwell | Personal identification device |
EP0271835A2 (en) * | 1986-12-19 | 1988-06-22 | Hitachi, Ltd. | Personal voice pattern carrying card system |
GB2204971A (en) * | 1987-05-19 | 1988-11-23 | Gen Electric Co Plc | Transportable security system |
FR2615984A1 (en) * | 1987-05-30 | 1988-12-02 | Toshiba Kk | SMARTCARD |
EP0393784A1 (en) * | 1989-04-17 | 1990-10-24 | N.V. Nederlandsche Apparatenfabriek NEDAP | Multifunctional identification and information card |
JPH03269692A (en) * | 1990-03-19 | 1991-12-02 | Hitachi Ltd | Card position management method |
Non-Patent Citations (1)
Title |
---|
PATENT ABSTRACTS OF JAPAN vol. 016, no. 085 (P - 1319) 28 February 1992 (1992-02-28) * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2267155C2 (en) * | 1998-11-10 | 2005-12-27 | Аладдин Нолидж Системз Лтд. | Method for user-computer interaction for use by a set of flexibly connected computer systems, device, having block for connection to flexibly connected computer systems, a set of devices, having a block for connection to flexibly connected computer system, universal serial bus key, method for interaction with main computer via usb and data storage method (variants) |
EP1480099A3 (en) * | 1999-09-17 | 2005-07-13 | Fingloq AB | Mobile communication unit with a security arrangement |
US7249266B2 (en) | 1999-10-05 | 2007-07-24 | Aladdin Knowledge Systems, Ltd. | User-computer interaction method for use by a population of flexible connectable computer systems |
EP1237091A4 (en) * | 1999-12-10 | 2006-08-23 | Fujitsu Ltd | PERSONAL AUTHENTICATION SYSTEM AND PORTABLE ELECTRONIC DEVICE HAVING PERSONAL AUTHENTICATION FUNCTION USING PHYSICAL INFORMATION |
EP1959369A1 (en) * | 1999-12-10 | 2008-08-20 | Fujitsu Limited | User verification system, and portable electronic device with user verification function utilising biometric information |
US6880054B2 (en) | 2000-02-21 | 2005-04-12 | Trek Technology (Singapore) Pte. Ltd. | Portable data storage device having a secure mode of operation |
US7310734B2 (en) | 2001-02-01 | 2007-12-18 | 3M Innovative Properties Company | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
NL1017856C2 (en) * | 2001-04-17 | 2002-10-18 | Hendricus Hermanus Van Velden | S4U (Safety for you). |
WO2003003295A1 (en) * | 2001-06-28 | 2003-01-09 | Trek 2000 International Ltd. | A portable device having biometrics-based authentication capabilities |
GB2401457A (en) * | 2002-02-27 | 2004-11-10 | Advanced Micro Devices Inc | Embedded processor with direct connection of security devices for enhanced security |
GB2401457B (en) * | 2002-02-27 | 2005-07-27 | Advanced Micro Devices Inc | Embedded processor with direct conneciton of security devices for enhanced security |
WO2003073243A3 (en) * | 2002-02-27 | 2004-04-08 | Advanced Micro Devices Inc | Embedded processor with direct connection of security devices for enhanced security |
US7631121B2 (en) | 2002-05-13 | 2009-12-08 | Trek 2000 International Ltd. | System and apparatus for compressing and decompressing data stored to a portable data storage device |
US7171680B2 (en) | 2002-07-29 | 2007-01-30 | Idesia Ltd. | Method and apparatus for electro-biometric identity recognition |
US7689833B2 (en) | 2002-07-29 | 2010-03-30 | Idesia Ltd. | Method and apparatus for electro-biometric identity recognition |
US7392943B2 (en) | 2002-09-12 | 2008-07-01 | Integrated Engineering | Identification system |
US7219837B2 (en) | 2002-09-12 | 2007-05-22 | Integrated Engineering B.V. | Identification system |
EP1398737A3 (en) * | 2002-09-12 | 2004-06-30 | Integrated Engineering B.V. | Identification system |
FR2895121A1 (en) * | 2005-12-15 | 2007-06-22 | Cogelec Soc Par Actions Simpli | SYSTEM AND METHOD FOR ACCESS CONTROL, ACCESS CONTROL, KEYS AND CUSTOMIZATION METHOD OF THE SYSTEM |
US8212652B2 (en) | 2008-11-13 | 2012-07-03 | Hitachi, Ltd. | Biometric authentication method, biometric authentication system, IC card, and terminal |
CN101739521B (en) * | 2008-11-13 | 2013-03-27 | 株式会社日立制作所 | Biometric authentication method, biometric authentication system, IC card, and terminal |
EP2189923A3 (en) * | 2008-11-13 | 2013-07-24 | Hitachi Ltd. | Biometric authentication method, biometric authentication system, IC card and terminal |
CN109147204A (en) * | 2018-08-16 | 2019-01-04 | 青海华职康健康科技有限公司 | A kind of automatic distribution method of personal protective equipment and system |
Also Published As
Publication number | Publication date |
---|---|
AU7169596A (en) | 1998-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9864992B1 (en) | System and method for enrolling in a biometric system | |
EP1313026B1 (en) | Living body authentication system | |
EP0956818B1 (en) | System and method of biometric smart card user authentication | |
US6454173B2 (en) | Smart card technology | |
US7216803B2 (en) | Biometric delegation and authentication of financial transactions | |
US20020147588A1 (en) | Method and system for interacting with a biometric verification system | |
WO1998013791A1 (en) | Apparatus and method for personal identification | |
JPH087720B2 (en) | Area access method for IC cards for multiple services | |
US8443437B2 (en) | Method and apparatus for enforcing logical access security policies using physical access control systems | |
JPH11280317A (en) | Access control system and access control method | |
JP4299894B2 (en) | Portable electronic device and personal authentication method using biometric information | |
US20050111709A1 (en) | Identification system | |
EP1610273A1 (en) | Improved security device and terminal and method for communication between them | |
US6256616B1 (en) | System for identifying the user of postal equipment | |
JPH08115422A (en) | Personal identification device | |
JPS62212781A (en) | Personal identification system | |
JP4008626B2 (en) | Integrated management system for entry / exit and equipment use | |
JPH03154137A (en) | Security system for data | |
US20020146154A1 (en) | Method and system for mitigating distortive effects in biometric samples in a biometric verification system | |
JP4623053B2 (en) | Portable electronic device and personal authentication method using biometric information | |
KR20080109118A (en) | Fingerprint information authentication method using smart card and system | |
KR20220015097A (en) | Integrated Access Management System Using Cloud Platform | |
JP2003256787A (en) | Personal authentication system | |
JP3090265B2 (en) | Authentication IC card | |
JP4623054B2 (en) | Portable electronic device and personal authentication method using biometric information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CN JP KR NO |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 1998515585 Format of ref document f/p: F |
|
122 | Ep: pct application non-entry in european phase |