Check patentability & draft patents in minutes with Patsnap Eureka AI!

Authentification device and authentification method

A technology of an authentication device and an authentication method, which is applied in security devices, selection devices, digital data authentication, etc., to achieve the effect of reducing the possibility of false authentication

Active Publication Date: 2009-09-09
ORMON CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in the above-mentioned conventional structure, if the photo of the person, that is, the original person to be authenticated is obtained in advance, and then the photo is taken with the camera of the mobile phone connected to the authentication system, there are people who are not the person who can also pass the authentication. step problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentification device and authentification method
  • Authentification device and authentification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] based on Figure 1 ~ Figure 2 One embodiment of the present invention is explained as follows. In addition, in the following, as an example of the authentication device of the present invention, a mobile phone 1 will be used for description. The mobile phone 1 performs user authentication, and if the authentication succeeds, causes the charging settlement section 11 to perform charging settlement processing.

[0031] In addition, the charge settlement section 11 is an example of an application program installed in the mobile phone 1, and may be another application program. For example, it can also be an application for sending and receiving emails or for room entry management.

[0032] (Structure of mobile phone 1)

[0033] figure 1 It is a schematic diagram showing the structure of the mobile phone 1. Such as figure 1 As shown, the mobile phone 1 includes a camera 2 (photographing component), an authentication part 3, a database 4, a control part 5, a sound input and out...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is an authentication device that is highly anti-counterfeit against impersonation. The mobile phone (1) includes: a camera (2), which can switch between a close-up shooting mode and a normal shooting mode, and takes pictures of the authenticated person; an inspection part (13), which detects whether the camera (2) It is a close-up mode; and a judging part (14), which judges that the authenticated person is not the person when the inspection part (13) detects that the mode of the camera (2) when taking pictures of the authenticated person is the close-up mode .

Description

Technical field [0001] The present invention relates to an authentication device and an authentication method that perform identity verification based on a photographed image of an authenticatee. Background technique [0002] With the popularization of portable terminals and the enhancement of functions, the demand for security enhancement continues to increase. Especially when it is equipped with functions such as electronic money that are directly connected to financial transactions, ensuring safety becomes an absolute condition. [0003] In response to such requests, in addition to conventional security measures such as passwords and passwords, biometric authentication that makes it easier to ensure security has also been proposed. Among them, because face authentication is a very common recognition method in ordinary life, there is no mental resistance, and due to the popularization of CCD (Charge Coupled Device) cameras, the number of devices that can be photographed increas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06K9/00H04L9/32H04Q7/32G06F21/32H04W12/06H04W88/02
CPCG06K9/00906G07C9/00087G06F21/32G06K9/00255H04L63/0861H04W12/06H04W88/02G07C9/257H04W12/65G06V40/166G06V40/45
Inventor 井上智裕千贺正敬
Owner ORMON CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More