User authentication device, user authentication method

A user authentication and user technology, applied in digital data authentication, computer security devices, image data processing, etc., can solve problems such as inability to deal with individual behavior patterns, and achieve the effects of shortening calculation time, efficient authentication, and high-speed verification processing

Active Publication Date: 2012-07-18
FUJITSU LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] However, since the above-mentioned technique of sequentially checking biometric information with higher priority focuses on only one behavior pattern and attaches priority, there is a problem that efficient authentication cannot always be realized.
[0014] That is, the behavior pattern of each individual is not limited by only one element, but changes according to multiple elements such as time zone, day of the week, and change of working hours. The problem that it is not necessarily possible to achieve efficient authentication
[0015] In addition, the technique using a cache memory caches biometric information based on predetermined information, so it cannot cope with individual behavior patterns that vary according to multiple factors, and there is a problem that efficient authentication cannot always be realized.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication device, user authentication method
  • User authentication device, user authentication method
  • User authentication device, user authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] [Summary and Features of User Authentication Device in Embodiment 1]

[0060] First, use Picture 1-1 , Figure 1-2 as well as Figure 1-3 , to specifically describe the main features of the user authentication device in Embodiment 1. Picture 1-1 , Figure 1-2 as well as Figure 1-3 It is a diagram for explaining the outline and features of the user authentication device in the first embodiment.

[0061] In summary, the user authentication device in Embodiment 1 performs user authentication using biometric information.

[0062] That is, if Picture 1-1 As shown, for example, a user (user ID: 00001) who wishes to enter the "First Facility" which is one of a plurality of facilities installed on the company site makes the biometric information reading device read his own fingerprint, and when When the biometric information reading device sends the "fingerprint image" as the user's biometric information to the user authentication device, the user authentication device ...

Embodiment 2

[0139] In the first embodiment described above, the case where the biometric information is stored in the predetermined storage unit in advance is described, and in the second embodiment, the case where the biometric information stored in the predetermined storage unit is cleared according to the situation is described.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user authentication device and a user authentication program. The user authentication device holds biological information registered for each user and holds user information that is a plurality of kinds of attribute information made correspond to each user. Using the plurality of kinds of attribute information included in the held user information, the user authentication device predicts, on a per-user basis, the possibility that the user requests authentication, and calculates its prediction value. When receiving biological information for an authentication request, the user authentication device compares the received biological information with the biological information of a plurality of users determined by the calculated prediction values and determines, based on the comparison result, whether to authenticate a person who has input the received biological information as a user.

Description

technical field [0001] The invention relates to a user authentication device and a user authentication method. Background technique [0002] Conventionally, biometric authentication for authenticating individuals by using biometric information (for example, fingerprints, vein patterns of palms, irises of eyes, etc.) that is difficult to forge and unique to individuals has been popularized. [0003] For example, in the entry management in a facility using biometric authentication, only when the biometric information received from the person wishing to enter the facility matches the biometric information registered in advance as a user, the person wishing to enter the facility is authenticated as a user. Users who are allowed to enter the facility are allowed to enter the facility. [0004] Here, the biometric authentication method is roughly classified into two types of "1:1 authentication" and "1:N authentication". "1:1 authentication" refers to receiving identification in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/20G06T7/00G06F21/32G06K9/00
CPCG06F21/32G07C9/00158G07C9/37
Inventor 林田尚子
Owner FUJITSU LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products