Terminal device, information processing method, and program
A terminal device and program technology, applied in the input/output process of data processing, electrical digital data processing, instruments, etc., can solve the problems of wrong identification of biological information, failure to authenticate legal users, etc., and achieve the effect of reducing the operation burden
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Deformed example 1
[0094] In the above-described embodiments, as the authentication using the user's biological information, authentication using the user's face image and fingerprint authentication are used. Not limited thereto, authentication using the user's biological information may be any method such as voiceprint authentication, iris authentication, or the like. In addition, in the above-mentioned embodiment, only the authentication using the user's face image is used as the determination condition for using auxiliary authentication, but a plurality of biometric information may also be used for determination.
Deformed example 2
[0096] In the above embodiment, by executing figure 2 The authentication processing program 170 is shown to implement user authentication processing. All or part of the steps executed by the authentication processing program 170 may be implemented by semiconductor chips such as ASIC (Application Specific Integrated Circuit) and system LSI (Large-Scale Integration), and circuits composed of various circuit elements.
Deformed example 3
[0098] In the above-described embodiments, connection with a trusted connection destination, trusted event execution, and the face distance between the user's face and the terminal device 1 are used as determination conditions for auxiliary authentication. Without being limited thereto, other methods may also be used or included. For example, it is determined whether or not a device owned by the user is connected to the terminal device 1 via Bluetooth (registered trademark), and if connected, the user is authenticated. In order to use devices connected by Bluetooth (registered trademark), it is necessary to "pair" the devices with each other. Therefore, connecting a device via Bluetooth (registered trademark) has strong individual specificity, and by using it as auxiliary authentication, it is possible to authenticate the user himself. In addition, further, it is also possible to use the figure 2 The shown position detection unit 36 determines whether the user's movement ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


