Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication system, authentication device, and recording medium

A technology of authentication equipment and authentication system, applied in the field of the identity of the owner, which can solve the problem of difficulty in accurately identifying the visitor, etc.

Inactive Publication Date: 2007-02-14
PANASONIC CORP
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, it is difficult to accurately identify a visitor who masks (his / her) appearance or voice using the above methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system, authentication device, and recording medium
  • Authentication system, authentication device, and recording medium
  • Authentication system, authentication device, and recording medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0165] The identity authentication system 1 in Embodiment 1 of the present invention is described below.

[0166] 1.1 Summary of Identity Authentication System 1

[0167] As shown in FIG. 1 , the identity authentication system 1 is composed of an authentication card 10 , a user terminal 20 , and a card reader 30 .

[0168] The authentication card 10 belongs to a home visiting company (for example, a delivery agency) that sends people to visit the user's house. The authentication card 10 stores in advance an identity certification key that is uniquely owned by the home visit company and certifies the authenticity of the authentication card 10 itself. The identification key is securely managed by the home access company. The identification key stored in the authentication card is different for each home access company. That is, a home visit company different from the home visit company that owns the authentication card 10 owns the authentication card 11 (not shown) in which a...

Embodiment 2

[0243] The following describes the identity authentication system 1A in Embodiment 2 of the present invention.

[0244] In the identity authentication system 1 , the identity authentication key is stored in the authentication key storage unit 201 of the user terminal 20 in advance. In the identity authentication system 1A, after the user terminal is distributed to the user, the identity authentication key is distributed from the home visit company.

[0245] 2.1 Summary of Identity Authentication System 1A

[0246] As shown in FIG. 7, the identity authentication system 1A is composed of an authentication card 10A, a user terminal 20A, a card reader 30A, and a distribution device 50A. The user terminal 20A and the card reader 30A are connected to each other by a cable 40A.

[0247] The user terminal 20A is provided in the residence of the user. In particular, the user terminal 20A is the basic unit of the intercom system. An attachable and detachable card reader 30A for the ...

Embodiment 3

[0332] The identity authentication system 1B in Embodiment 3 of the present invention is described below.

[0333] In the identity authentication system 1B, when a visitor visits a user's house, biometric information showing the visitor's biometric features is used as an identity authentication key to determine whether the authentication card is authentic.

[0334] 3.1 Summary of Identity Authentication System 1B

[0335] As shown in FIG. 15 , the identity authentication system 1B is composed of an authentication card 10B, a user terminal 20B, and a card reader 30B. The user terminal 20B and the card reader 30B are connected to each other by a cable 40B.

[0336] The user terminal 20B is provided in the residence of the user. In particular, the user terminal 20B is the basic unit of the intercom system. An attachable and detachable card reader 30B for the authentication card 10B is provided outside the user's house (for example, at the entrance of the house). In particular...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication system that verifies various types of authenticity in regards with a visit by a forwarding agent. An identity authentication system is composed of an authentication card, a user terminal, and a card reader. Upon insertion of the authentication card into the card reader, the user terminal generates a random number, stores therein the generated random number, and outputs the random number to the authentication card. The authentication card generates encrypted information by encrypting the received random number using an identity certification key having been stored therein, and outputs the generated encrypted information to the user terminal. The user terminal decrypts the received encrypted information using an identity authentication key having been stored therein, and performs an authentication by judging whether or not the decrypting result matches the stored random number.

Description

technical field [0001] The present invention relates to a technique for authenticating the identity of the owner of a recording medium. Background technique [0002] Conventionally, as a method of verifying a visitor from inside a house, an intercommunication system or a TV door-phone is used. [0003] However, it is difficult to accurately identify a visitor whose (his / her) appearance or voice is masked by the above method. [0004] As techniques for overcoming the above-mentioned problems, the following personal information display systems have been disclosed. The personal information display system includes a server for pre-storing personal information and personal identification information, an input device for receiving input personal identification information, and a user terminal for transmitting the received personal identification information to the server through a communication line . [0005] The input device has a fingerprint input device. The fingerprint in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07F7/10E05B49/00G06F21/34G06K7/00G06K17/00G06K19/00G06K19/10G06Q10/00G06Q50/00G06Q50/28G07C9/00H04L9/32
CPCG07C9/00087G06Q20/40975G07C9/00904G07C9/00309G07F7/1008G06Q20/341G07C9/257
Inventor 野仲真佐男馆林诚大森基司
Owner PANASONIC CORP