Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication device, authentication system, authentication method, and storage medium

An authentication device and authentication method technology, applied in security devices, transmission systems, digital transmission systems, etc., can solve problems such as longer authentication processing time

Inactive Publication Date: 2018-01-23
KONICA MINOLTA INC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a low-performance arithmetic processing unit is installed to reduce power consumption, the time required for authentication processing becomes longer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication device, authentication system, authentication method, and storage medium
  • Authentication device, authentication system, authentication method, and storage medium
  • Authentication device, authentication system, authentication method, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0060] The outline of Embodiment 1 is as follows.

[0061] The authentication system includes a portable first device that acquires biological information of a subject, and a portable second device that communicates with the first device. The first device performs a first authentication process using the acquired biometric information, and the second device performs a second authentication process with a precision different from that of the first authentication process. The second device performs a second authentication process using the biometric information received from the first device when communication is established with the first device. During the period when the above-mentioned communication is established and the subject is authenticated through the second authentication process and the predetermined condition is satisfied after the subject is authenticated through the first authentication process, the first device sends an Information about the subject.

[0062] ...

Embodiment approach 2

[0151] The outline of Embodiment 2 is as follows.

[0152] The portable authentication device includes a biological information acquisition unit for acquiring biological information of a subject, a communication unit for wirelessly communicating with an external device including a terminal device carried by the subject, and a processor as a control unit. The processor executes authentication processing for confirming the validity of the subject based on the acquired biometric information. That is, through the authentication process, it is possible to confirm whether or not the subject is himself. The authentication device differs the accuracy of authentication processing (hereinafter referred to as authentication accuracy) depending on whether or not communication (connection) has been established with the terminal device. The authentication device judges whether or not communication has been established based on the strength (unit: dB) of a signal received from the terminal ...

Embodiment approach 3

[0233] In the third embodiment, a program for causing the mobile terminal 200 ( 200A) or the biometric authentication sensor 300 ( 300A) to execute the authentication process in each of the above-mentioned embodiments is provided. Such procedures include at least Figure 7 ~ Figure 9 , Figure 12 to Figure 14 , Figure 16 and Figure 17 The procedure shown in the flowchart. It can also be recorded in computer-readable records such as floppy disk, CD-ROM (Compact Disk-Read Only Memory), ROM, RAM, and memory card attached to the computer of the portable terminal 200 (200A) or the biometric authentication sensor 300 (300A). media and delivered as a Program Product. Alternatively, the program can be recorded on a recording medium such as a hard disk built in a computer and provided. In addition, the program can also be provided by downloading via the network. The program is executed by one or more processors such as CPU20 or CPU30, or by a combination with a processor or a c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an authentication device, an authentication system, an authentication method, and a storage medium, that are easy to use and require a short period of time for an authentication process. The authentication device includes a biometric information obtaining unit that obtains biometric information of a subject, a communication unit that communicates with another authentication device, an authentication unit that performs a first authentication process with the biometric information, and a control unit. The communication unit transmits the biometric information to the other authentication device to execute a second authentication process. When the subject is authenticated by the second authentication process as being valid and while a predetermined condition is satisfied, the control unit transmits to a controlled subject apparatus an information to cause the apparatus to authenticate the subject when the subject is authenticated by the first authentication process as being valid.

Description

technical field [0001] The present invention relates to an authentication device, an authentication system, an authentication method, and a recording medium, particularly an authentication device, an authentication system, an authentication method, and a recording medium for authenticating an examinee using biological information of the examinee. Background technique [0002] Due to an increase in security awareness, authentication using biometric information or a combination of biometric information and ID or password is attracting attention instead of existing authentication using only ID (identification) and password. Authentication methods using biometric information are disclosed in WO2002 / 009034 and WO2009 / 096475. [0003] In authentication using biometric information measured by a sensor, standard biometric information is usually registered in a device (PC (Personal Computer) or server), and the device uses the acquired biometric information and standard biometric inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCH04L63/0492H04L63/0853H04L63/0861H04W12/06H04L9/3231
Inventor 森田明美上田隆司饭塚真一
Owner KONICA MINOLTA INC