Hand-write input discriminator, method and medium for storing hand-wirte input discriminating program

A handwriting input and identification process technology, applied in the input/output process of data processing, input/output of user/computer interaction, memory system, etc., can solve the problem that handwritten strings will be seen or forged by others

Inactive Publication Date: 2003-10-01
FUJITSU LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So handwritten strings used to store ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hand-write input discriminator, method and medium for storing hand-wirte input discriminating program
  • Hand-write input discriminator, method and medium for storing hand-wirte input discriminating program
  • Hand-write input discriminator, method and medium for storing hand-wirte input discriminating program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Preferred embodiments of the present invention will be described below with reference to the accompanying drawings.

[0039] Fig. 2 shows the hardware structure of the handwriting input identification system in the embodiment of the present invention. The handwriting input authentication system of this embodiment includes an input device 10 , an authentication server 20 and a display 30 .

[0040] The hardware structure of the handwritten input authentication system of this embodiment is basically the same as that of a general handwritten signature authentication system. However, in the system of this embodiment, the information used for authentication is not necessarily limited to "user's name", and other character strings, a graphic or a symbol can also be used.

[0041] The input device 10 can be realized, for example, by a pen tablet system. Here, the input device 10 receives input by the user with the pen 11 . In particular, the input device 10 is provided with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a handwriting input identification device, a method and a medium storing a handwriting input identification program. When registering a user's signature, an authentication server presents a password to the user. When the user handwrites the password with the input device, the password and handwritten signature information are registered in a dictionary. During authentication, the authentication server requires the user to write the password by hand. When the user writes the password by hand in response to the request, the signature information control unit compares the signature information newly handwritten by the user with the signature information registered in the dictionary, and outputs a result of the comparison.

Description

technical field [0001] The present invention relates to systems, methods and programs for authenticating users based on handwritten input. Background technique [0002] Recently, in order to improve security in an information-based society, techniques for authenticating users are widely used. For example, authentication systems used to restrict access to computers. In this case, when a user uses the computer, the authentication system checks that the user is authorized. If the user does not have permission, the user is prohibited from using the computer. [0003] In order to realize this user authentication, the most common method is to use a password predetermined for each user. However, passwords can be compromised, or users can forget their passwords. Therefore, recently, biometric authentication has become more and more common. [0004] Since in the biometric authentication, the physical characteristics of the user are used as information for authenticating the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T7/00G06F3/041G06F21/32
CPCG06F21/32
Inventor 村濑正前田刚志
Owner FUJITSU LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products