Check patentability & draft patents in minutes with Patsnap Eureka AI!

Authentification device, authentification method, authentification program and computer readable recording medium

An authentication device and authentication method technology, applied in computer parts, computer security devices, computing, etc., to achieve the effect of reducing the possibility of false authentication

Active Publication Date: 2007-09-19
ORMON CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in the above-mentioned conventional structure, if the photo of the person, that is, the original person to be authenticated is obtained in advance, and then the photo is taken with the camera of the mobile phone connected to the authentication system, there are people who are not the person who can also pass the authentication. step problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentification device, authentification method, authentification program and computer readable recording medium
  • Authentification device, authentification method, authentification program and computer readable recording medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] One embodiment of the present invention will be described below based on FIGS. 1 to 2 . In the following, the mobile phone 1 will be described as an example of the authentication device of the present invention. The mobile phone 1 performs user authentication, and when the authentication is successful, causes the charge settlement unit 11 to perform charge settlement processing.

[0032] In addition, the charge settlement unit 11 is an example of an application program installed in the mobile phone 1, and may be another application program. For example, it may be an application for sending and receiving e-mails or for house entry management.

[0033] (Structure of mobile phone 1)

[0034] FIG. 1 is a schematic diagram showing the configuration of a mobile phone 1 . As shown in FIG. 1, a mobile phone 1 includes a camera 2 (photographing part), an authentication part 3, a database 4, a control part 5, a sound input and output part 7 including a microphone / speaker, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication device having high resistance to spoofing is provided. A portable telephone(1) includes a camera(2), which is switched between a close up mode enabling photographing at close up and a normal photography mode, for imaging the person to be authenticated; an examining section(13) for detecting whether or not the camera(2) is in the close up mode, and a determining section(14) for determining that the person to be authenticated is not the person in question if the examining section(13) detects that the mode of the imaging unit of when imaging the person to be authenticated is not the close up mode.

Description

technical field [0001] The present invention relates to an authentication device and an authentication method that perform identity verification based on a captured image of an authenticated person. Background technique [0002] With the popularization and enhancement of functions of portable terminals, the demand for security enhancement continues to increase. Especially in the case of carrying a function directly related to financial transactions such as electronic money, ensuring security becomes an absolute requirement. [0003] In order to respond to such demands, in addition to conventional security measures such as passwords and passphrases, biometric authentication, which is easier to ensure security, has been proposed. Among them, since face authentication is a very common identification method in ordinary life, there is no mental resistance, and due to the popularization of CCD (Charge Coupled Device, Charge Coupled Device) cameras, the number of devices that can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06K9/00H04L9/32H04Q7/32G06F21/32H04W12/06H04W88/02
CPCG06K9/00906G07C9/00087G06F21/32G06K9/00255H04L63/0861H04W12/06H04W88/02G07C9/257H04W12/65G06V40/166G06V40/45
Inventor 井上智裕千贺正敬
Owner ORMON CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More