Authentication method and apparatus

An authentication method and user authentication technology, applied in the field of authentication technology, can solve problems such as failure to notify servers or administrators

Inactive Publication Date: 2010-02-17
FUJITSU LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for authentication in a program that cannot be connected to the network, such as authentication in a BIOS environment, the result cannot be notified to the server or the administrator

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and apparatus
  • Authentication method and apparatus
  • Authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Hereinafter, embodiments according to the present invention will be described in detail with reference to the accompanying drawings.

[0029] System configuration common to each embodiment

[0030] figure 1 is a system configuration common to the first to sixth embodiments.

[0031] The client 101 is, for example, a personal computer system used by a user.

[0032] The biometric information input unit 102 inputs fingerprint information by causing the user to place his or her finger for fingerprint authentication.

[0033] The output unit 103 displays an authentication screen to the user, and displays various types of applications after startup.

[0034] The control unit 104 controls authentication processing of biometric information, and calls the first program 105 and the second program 106 as necessary. The first program 105 is, for example, BIOS (Basic Input Output System), and the second program 106 is, for example, an operating system.

[0035] The server 108 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication method and an apparatus. An authentication method for use in an apparatus having a function, a function to execute a first program that executes a predetermined process after first user authentication with biometrics authentication is performed and does not have a network connection function, and a function to execute a second program that is invoked after the first program is executed, executed after second user authentication and has a network connection function comprises executing the first program in forgery detection mode regardless of a resultof a user determination if biometrics authentication with forgery is detected at the time of the first user authentication, invoking the second program in the forgery detection mode after the first program is executed in the forgery detection mode, and notifying a device connected to an external network of forgery detection information by using the network connection function after the second program is invoked in the forgery detection mode.

Description

technical field [0001] The present invention relates to authentication technology. Background technique [0002] Since conventional password authentication and ID card authentication widely used have a high risk of being stolen as personal authentication, biometrics authentication such as fingerprint authentication has drawn attention as personal authentication with higher reliability, and has become popular in recent years. Used in various scenarios. [0003] Authentication using forgery is pointed out as a problem of biometric authentication, and many techniques have been proposed. For example, Patent Document 1 below discloses a technology as a technology for eliminating illegal use by forging fingerprints. [0004] If authentication using a forged fingerprint is detected in biometric authentication, it means that a user with clear malicious intentions attempted authentication, unlike a case where the user is determined to be a different individual. This requires immed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): A61B5/117G06K9/00G06F21/32G06F21/34
CPCH04L63/0861G06F21/32
Inventor 新沼厚一郎
Owner FUJITSU LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products