Authentication card, card authentication terminal, card authentication server, and card authentication system

An authentication server and authentication system technology, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve the problems of increasing authentication burden and destroying the convenience of credit cards.

Inactive Publication Date: 2011-12-28
THE PUBLIC UNIV THE UNIV OF AIZU
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when using biometric information to determine whether the user is the owner, it is necessary to install a device for authentication based on the biometric information in a store or the like, which causes problems such as installation costs.
[0016] In addition, a method of improving the accuracy of legality judgment and ensuring security by using multiple authentication methods such as signature, password, and biometric information in the legality judgment of the holder is also considered. When using this method, it may increase the authentication burden when shopping with a credit card, thereby destroying the convenience of the credit card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication card, card authentication terminal, card authentication server, and card authentication system
  • Authentication card, card authentication terminal, card authentication server, and card authentication system
  • Authentication card, card authentication terminal, card authentication server, and card authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0113] Next, a card authentication system as an example of the technical means according to the present invention will be shown and described with reference to the drawings.

[0114] First, a method of synthesizing authentication images for judging the legitimacy of a card user in the card authentication system according to this embodiment will be described. Here, judging the legitimacy of the card user refers to judging whether the card user is registered as the legal owner (or legal user, holder) of the card. For ordinary cards, card issuing companies and the like often limit the users of the cards to the holders. However, sometimes a person other than the holder uses a legitimate card (not a forged card) pretending to be the holder, and if the card is used in this way, unpredictable losses may be brought to the holder. Therefore, it becomes very important to judge whether the user of the card is the holder.

[0115] Here, the card to be judged as legality refers to a card...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication card, a card authentication terminal, a card authentication server and a card authentication system. The operator operating the terminal can easily and accurately determine whether the user of the authentication card is the holder. The card authentication terminal (3) has: an image recording unit (12), which records a base image set composed of a plurality of base images; coefficient information acquisition units (11, 13), which record coefficient information corresponding to each base image The authentication card or the card authentication server connected on the network (5) obtains the coefficient information; and the image processing unit (14), which performs the synthesis processing of the authentication image according to the base image set and the coefficient information, and the authentication image is used for It is judged whether the user of the card is the holder.

Description

technical field [0001] The present invention relates to an authentication card, a card authentication terminal, a card authentication server, and a card authentication system. An authentication card, a card authentication terminal, a card authentication server, and a card authentication system. Background technique [0002] At present, there are many systems as follows: the service provider provides a specified card to a specific user (such as a member, etc.), and when it can be judged (identified) that the card-issuing user is a legal card owner (the real user who accepts the card) In some cases, specific services are provided to card users. As the card used in the above-mentioned services, for example, known security cards, basic resident registration cards adopted in Japan, and the like. In addition, it can also be applied to identity certificates such as driver's licenses and the like. [0003] As one of the cards provided like this, there is a well-known credit card....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06F21/32G06F21/34G06F21/44
Inventor 赵强福
Owner THE PUBLIC UNIV THE UNIV OF AIZU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products