Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information terminal appts. and identification system

An information terminal and authentication system technology, applied in the field of information terminal devices and authentication systems, can solve the problems of increased chances of being rejected, difficulty in obtaining identification results, etc., and achieve the effect of ensuring security

Inactive Publication Date: 2002-09-18
PANASONIC CORP
View PDF1 Cites 117 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] For example, when using a camera installed on a mobile terminal to extract human body information such as a face, it is difficult to obtain the same recognition result as the registered image due to changes in lighting conditions, background changes, or changes in the direction and distance of the camera that captures your own face.
In other words, compared with the conventional access feature type and stored data type, the chances of personal authentication being rejected are increased.
[0010] (2) Security issues in the identification of human body information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information terminal appts. and identification system
  • Information terminal appts. and identification system
  • Information terminal appts. and identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] The first embodiment is as followsfigure 1 shown.

[0055] figure 1 It shows the functional structure diagram of the information terminal device 6 with an authentication function of this invention. figure 1 The information terminal device 6 with the authentication function is equipped with an input means for inputting human body information, a display means 2 for displaying the inputted human body information, an authentication means 4 for authenticating pre-registered users according to the inputted human body information, and has the ability to perform personal identification based on the human body information. The information terminal device 6 with the function of authentication, the display means 2 is equipped with the range index display means 3 for displaying the size and position of the human body information to be input, the rectangular range or the index of two points, etc. The human body information confirming means 5 constitutes.

[0056] The information t...

Embodiment 2

[0095] The configuration of Embodiment 2 of the present invention will be described.

[0096] The difference from the structure of the first embodiment is that the structure of the mobile phone 1002 is the same as that of the server 301 for registration, and the other structures are the same. Therefore, in Example 2 with reference to Figure 11 , FIG. 12 only explains the structure different from that of the first embodiment.

[0097] The difference in the configuration of the mobile phone 1002 is that a speaker authentication section 23 for authentication using the speaker's voice is added. The speaker authentication part 23 uses the registered voice read out from the IC card 50 through the IC card reading interface 51 and the research result read out from the research completed function storage part 25 by the research completion function storage part 25 storing the result of the research registration voice. An authenticating section 24 for authenticating a speaker's voice ...

Embodiment 3

[0118] refer to Figure 17 The configuration of Embodiment 3 of the present invention will be described.

[0119] The difference from the configuration of Embodiment 1 is that an authentication function exists in the login / authentication server 401 .

[0120] exist Figure 17 In the structure, the mobile phone 1003 and the login / authentication server 401 are connected through the network. The login and authentication server 401 is composed of a system management section 402 that manages the entire login and authentication server 401, a login and authentication section 403 that conducts login research and authentication of facial images, and a facial image database 404 that stores facial images of users. The management part 402 is composed of a personal authentication support part 405 that implements facial image authentication manually, a personal information storage part 406 that includes the address, name, phone number, and login date of the logged-in user, and an authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

It includes input means for inputting the user's physical information, means for confirming the input human body information, and authentication means for authenticating pre-registered users based on the input human body information. The human body information specifying means includes display means and index display means for displaying an index for specifying a size, a range of a position, and the like of the input human body information. The index display means has a function for the user to confirm the status of the input human body information and a function for designating the size and position of the human body information when inputting the human body information.

Description

technical field [0001] The present invention relates to an information terminal device and an authentication system having a function of personal authentication using user's body information. Background technique [0002] Currently, user authentication methods are divided into two types: access feature type and storage data type. For the access feature type, there are smart cards, credit cards, encryption keys, etc., and for the stored data type, there are passwords, user names, personal identification numbers, and the like. [0003] The problem with access signatures is that they are easily lost or stolen. On the other hand, the stored data type has a problem in that it is easy to forget or worry about forgetting and set to simple data. Although the security can be improved by adopting the means of combining the two, the same problem also exists. [0004] Biometrics technology is a technology that uses the characteristics of the body (human body information) as a means o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00G06F17/30G06F21/32G06K9/00G06T7/00G07C9/00G07F7/10G10L15/00G10L15/02G10L15/28G10L17/00G10L17/02G10L17/10G10L25/00H04L9/32H04N5/225
CPCG06F21/32G06Q20/341G06Q20/40145G07F7/1008G06F16/5838G07C9/257G06V40/16
Inventor 古山浩志长尾健司山田伸秋元俊昭
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products