Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal device, information processing method, and program

A terminal device and program technology, applied in the input/output process of data processing, electrical digital data processing, instruments, etc., can solve the problems of wrong identification of biological information, failure to authenticate legal users, etc., and achieve the effect of reducing the operation burden

Active Publication Date: 2022-03-18
德山真旭
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, biometric information is often misidentified and sometimes fails to authenticate legitimate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal device, information processing method, and program
  • Terminal device, information processing method, and program
  • Terminal device, information processing method, and program

Examples

Experimental program
Comparison scheme
Effect test

Deformed example 1

[0094] In the above-described embodiments, as the authentication using the user's biological information, authentication using the user's face image and fingerprint authentication are used. Not limited thereto, authentication using the user's biological information may be any method such as voiceprint authentication, iris authentication, or the like. In addition, in the above-mentioned embodiment, only the authentication using the user's face image is used as the determination condition for using auxiliary authentication, but a plurality of biometric information may also be used for determination.

Deformed example 2

[0096] In the above embodiment, by executing figure 2 The authentication processing program 170 is shown to implement user authentication processing. All or part of the steps executed by the authentication processing program 170 may be implemented by semiconductor chips such as ASIC (Application Specific Integrated Circuit) and system LSI (Large-Scale Integration), and circuits composed of various circuit elements.

Deformed example 3

[0098] In the above-described embodiments, connection with a trusted connection destination, trusted event execution, and the face distance between the user's face and the terminal device 1 are used as determination conditions for auxiliary authentication. Without being limited thereto, other methods may also be used or included. For example, it is determined whether or not a device owned by the user is connected to the terminal device 1 via Bluetooth (registered trademark), and if connected, the user is authenticated. In order to use devices connected by Bluetooth (registered trademark), it is necessary to "pair" the devices with each other. Therefore, connecting a device via Bluetooth (registered trademark) has strong individual specificity, and by using it as auxiliary authentication, it is possible to authenticate the user himself. In addition, further, it is also possible to use the figure 2 The shown position detection unit 36 ​​determines whether the user's movement ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A terminal device (1) is provided with: an authentication information acquisition unit that acquires a plurality of pieces of authentication information; an authentication determination unit that determines whether or not the authentication succeeds on the basis of at least one or a plurality of pieces of authentication information among the plurality of pieces of authentication information acquired by the authentication information acquisition unit; and an authentication information updating unit that updates the stored plurality of pieces of authentication information by using the plurality of pieces of authentication information acquired by the authentication information acquisition unit when the authentication determination unit determines that the authentication is successful. In the background, an authentication determination unit determines that authentication succeeds when the first authentication information acquired by the authentication information acquisition unit is lower than a predetermined authentication threshold value, and determines that the authentication succeeds when the first authentication information is greater than or equal to the authentication threshold value and less than or equal to a predetermined authentication allowable value. And a determination unit that determines whether or not the authentication succeeds on the basis of the second authentication information acquired by the authentication information acquisition unit.

Description

technical field [0001] The present invention relates to a terminal device, an information processing method, and a program. Background technique [0002] Generally, a terminal device has an authentication function for preventing unauthorized use, and can use each function when authentication succeeds. In the authentication process, various biometric information and the like are utilized in addition to general passwords. However, biometric information is often misidentified and sometimes fails to authenticate legitimate users. Then, for example, Patent Document 1 discloses a technique of combining multiple pieces of biological information for authentication when authentication cannot be performed with one piece of biological information, or combining biological information with non-biological information such as an IC card for registration and a personal identification number. Authenticate. [0003] prior art literature [0004] patent documents [0005] Patent Document ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F3/0346G06F21/32G06F21/31G06F21/86
Inventor 德山真旭
Owner 德山真旭