Communication system

a communication system and communication system technology, applied in the field of communication systems, can solve the problems of inability to deny the possibility of leaking the password to a third party, the difficulty of determining and the difficulty of establishing whether or not a communicating party is an authentic party

Inactive Publication Date: 2002-04-25
SEMICON ENERGY LAB CO LTD
View PDF25 Cites 107 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When making a deal with a mating party by using an authentication apparatus, however, authentication as to whether or not a communicating party is an authentic party is practically difficult.
The communication system using the conventional authentication apparatus is not free from the following problems.
The possibility of the leak of the password to the third party cannot be denied.
When the password leaks to the third party, the conventional authentication operation cannot confirm whether or not the user is the authentic person.
In addition, it is afraid that the authentic person forgets the password.
Thus, it should be very troublesome.
When the number of times of data transmission / reception between the user and the mating party, the cost necessary for authentication increases.
When the line is cut off during data transmission / reception, it becomes necessary to start once again the authentication operation from the beginning and this is troublesome and complicated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication system
  • Communication system
  • Communication system

Examples

Experimental program
Comparison scheme
Effect test

embodiment 1

[0115] [Embodiment 1]

[0116] This embodiment explains in detail the re-write operation of the reference living body information stored in the authentication apparatus by using the authentication apparatus.

[0117] FIG. 6 shows a flow of the re-write operation of the reference living body information in this example. First, authentication is conducted to authenticate the user as an authentic person. Incidentally, the detailed explanation of authentication has already been given and is hereby omitted.

[0118] As authentication is completed and the user and the mating party (or the manager) start communication, the re-write operation is started. The user transmits the password necessary for re-writing the living body information as the data to the mating party.

[0119] The re-write operation of the reference living body information cannot be conducted when collation of the password does not prove coincident. In this case, the mating party (or the manager) notifies the user that the password i...

embodiment 2

[0125] [Embodiment 2]

[0126] The construction of the authentication apparatus used in the present invention and its operation will be explained next.

[0127] FIG. 7 is a block diagram of the authentication apparatus according to this embodiment. The authentication apparatus of this embodiment includes an antenna 601, a transmission / reception circuit 602, a signal processing circuit 603 for compressing / expanding signals and encoding them, a microcomputer 604 for control, a flash memory 605, operation keys 606, and so forth. The authentication apparatus further includes a sensor 611 and a collation circuit part 612.

[0128] When the operation key 606 is operated, the microcomputer 604 for control controls the sensor 611 and lets it read the living body information of the user. Incidentally, this embodiment uses palm prints or fingerprints as the living body information. The living body information of the user read by the sensor 611 is inputted to the collation circuit part 612.

[0129] An A / ...

embodiment 3

[0133] [Embodiment 3]

[0134] Differences of the construction of the authentication apparatus used in this embodiment and its operation from Embodiment 1 will be explained.

[0135] FIG. 8 is a block diagram of the authentication apparatus of this embodiment. The authentication apparatus includes an antenna 501, a transmission / reception circuit 502, a signal processing circuit 503 for compressing / expanding and encoding signals, a microcomputer 504 for control, a flash memory 505 and operation keys 506. The authentication apparatus further includes a microphone 511, an amplifier 516 and a collation circuit part 512.

[0136] When the operation key 506 is operated, the microcomputer 504 for control controls the microphone 511 and lets it read the living body information of the user. Incidentally, this embodiment uses a voiceprint as the living body information. The living body information read by the microphone 511 is amplified by the amplifier 516 and is inputted to the collation circuit par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

PropertyMeasurementUnit
transmissionaaaaaaaaaa
lengthaaaaaaaaaa
processingaaaaaaaaaa
Login to view more

Abstract

A communication system capable of easily distinguishing a user includes means for storing reference living body information, means for reading collation living body information of the user, means for collating the collation living body information with the reference living body information and means for sending a notice of coincidence as data to a mating party when the collation result proves coincident.

Description

[0001] 1. Field of the Invention[0002] This invention relates to a communication system. More particularly, this invention relates to a communication system for executing authentication (identifying) by using living body information (biological information).[0003] 2. Description of the Related Art[0004] A communication technology that connects an authentication (identification) apparatus such as a cellular telephone, a personal computer, a portable information terminal, or the like, through the Internet has made a remarkable progress in recent years. For Internet connection in business concerns and homes, it is customary to connect a fixed type personal computer to a telephone line. Particularly recently, various information exchanges have become possible as a cellular telephone system such as so-called i-mode capable of being connected easily to the Internet has become wide spread.[0005] Mail-order business and stock trade using a communication network such as the Internet has draw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G01N15/14G01N35/08G06F21/32G06K9/00G07C9/00
CPCG01N35/085G06F21/32G07C9/00158G07C9/00087G06K9/00006G07C9/37G07C9/257G06V40/12H04M1/0202
Inventor YAMAZAKI, SHUNPEIKOYAMA, JUN
Owner SEMICON ENERGY LAB CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products