Movatterモバイル変換


[0]ホーム

URL:


GB2360618A - Fingerprint reader and method of identification - Google Patents

Fingerprint reader and method of identification
Download PDF

Info

Publication number
GB2360618A
GB2360618AGB0027692AGB0027692AGB2360618AGB 2360618 AGB2360618 AGB 2360618AGB 0027692 AGB0027692 AGB 0027692AGB 0027692 AGB0027692 AGB 0027692AGB 2360618 AGB2360618 AGB 2360618A
Authority
GB
United Kingdom
Prior art keywords
fingerprint
keyboard
plug
user
button
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0027692A
Other versions
GB0027692D0 (en
GB2360618B (en
Inventor
Chien-Tzu Hou
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Publication of GB0027692D0publicationCriticalpatent/GB0027692D0/en
Publication of GB2360618ApublicationCriticalpatent/GB2360618A/en
Application grantedgrantedCritical
Publication of GB2360618BpublicationCriticalpatent/GB2360618B/en
Anticipated expirationlegal-statusCritical
Expired - Fee Relatedlegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

To verify user identity and authorise use, at least one button (key) (e.g. "enter" or "return") on a keyboard 10 includes a fingerprint reader 11 which supplies fingerprint data to a keyboard controller 12 which compares it with fingerprint data of authorised user(s) decrypted (using a stored key 13) from a fingerprint database held in encrypted form in a memory 14. The database is initially loaded with the fingerprint of the first user and those of other users authorised by him, all obtained from the fingerprint reader 11. Failure in the comparison gives a warning and locks the keyboard. Unplugging of the keyboard 10 from a host computer 30 (which provides control signals for the verification) also gives a warning.

Description

2360618 FINGERPRINT READER AND,YIETIIOD OF IDENI1FICA'11ON
FIELD OF THE INVENTION
The present invention relates to fingerprint reader and method of identification, and more particularly, to an unique biological fingerprint identification to verify someone's status, so that misappropriating and breaking of an individual secret codelpassword. or an invasion of working scope of an authorized person are prevented.
BACKGROUND OF THE INVENTION
Password or personal identification number (PIN) is popular used in cybemation environment, such as personal computer, electronic commerce, financial institution and banking business. However, it is pure number, but not human being, validates the verifying process. Moreover, the secret codelpassword will be broke and used by hacker during the verifying process. For example, a hacker can intercept a memory region where the secret code located and inserts a program (so called, bug) into this region and transforms original programs located at this region into checking or non-checking by the use of soft in circuit emulator (Soft ICE). Therefore, this hacker can login the computer and uses all of the resources in the computer. The hacker will be a verified user for the computer since his login process is successful. According to "computer crime and security investigation" published by CSI/FBI 1999, the crime rate of unauthorized access by internal unauthorized person is raised continuously. This shows that PIN and personal password do not provide sufficient security for the PIN and password holder. Therefore, a method of identification provides a computer to be restricted to legal 2 authorized users only, so as to prevent the usage of computer by unauthorized person. In accordance with one aspect of the invention, there is provided a Fingerprint reader and a method of identification. Fingerprint is most stable, unduplicable, unchangeable, and unique character in the biological properties of human being.
In addition, keyboard is most popular input device for computer. Therefore, the real authorized user can be confirmed by the use of access protection of the keyboard, wherein the status verification of user is performed by identifying user's fingerprint rather than PIN or personal password that are obtainable by non-specific person. For this reason, computer access is secure against from the hackers than before by the use of Fingerprint.
SUNINIARY OF THE INVENTION Accordingly, the present invention includes that at least one fingerprint reader is placed in an "Enter" button or a "Return" button of keyboard for reading fingerprint- In addition, other buttons of the keyboard can also be equipped with fingerprint reader for reading fingerprint anytime; a keyboard controller for encryption, decryption, and comparison of fingerprint database; and a memory device for storing data of users fingerprint who is real authorized; while user presses the button having the fingerprint reader, the user's fingerprint is then read and transformed into a kind of signal and thereafter transmitted into the keyboard controller; the key in the keyboard controller receives the command transmitted from the CPU in order to encrypt the fingerprint data stored in the memory device and is then compared with the fingerprint signal transmitted from the keyboard controller so that the user's status is verified.
BRIEF DESCRIPTION OF THE DRAWINGS
3 The accompanying drawings are included to provide a further understanding of tile invention, and are incorporated in and constitute a part of this specification. The drawings illustrate embodiments of the invention and, together with the description, serve to explain the principtes of the invention. In the drawings, FIG. 1 is a block diagram ofthe keyboard frame of the present invention; FIG. 2 shows a flow chart of input and store of fingerprint of the present invention; FIG. 3 shows a plug of the present invention; and FIG. 4 shows a warning signal cause of the departing of the plug of FIG. 3.
io DESCRIPTION OF THE PREFERRED EMBODIMENTS
Reference will now be made in detail to the present preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers are used in the drawings and the description to refer to the same or like parts.
FIG. 1 is a block diagram of the keyboard frame of the present invention. First, as shown in FIG. 1, the keyboard device 10 includes:
At least a fingerprint reader 11 located in the "enter" or "return" button of the keyboard controller, for transforming the fingerprint data into a digital signal and transmitting the digital signal to the keyboard controller 12. The fingerprint reader 11 may locates in other buttons of the keyboard controller.
A keyboard controller 12 having an unique key 13 located therein for performing an encryption, decryption, and comparison steps of the fingerprint daw The key 13 is triggered by the CPU 31 of the computer system 30 for encryption of all inputted fingerprint data.
A memory device 14, for example, flash memory for storing a real authorized user's 4 fingerprint data that i's encrypted and protected within the keyboard controller As mention above, the real authorized useCs fingerphint data that is stored within the memory device is established while the keyboard device 10 is first used. A Fingerprint reader 11 located in the "enter" or other buttons of the keyboard device 10 is illustrated for explanation. Firstly, the computer system 30 will performs " input and store steps of fingerprint"; For example, when the "enter" button is pressed, the fingerprint reader 11 located in the "enter" button will read the users Fingerprint data and then transmit to the keyboard controller 12. At the same time, the CPU 31 will send a control command A to trigger the unique key 13, which is located in the keyboard controller 12, then encrypt the fingerpnint data, and thereafter store the encrypted fingerprint data B in the memory device 14 of the keyboard device 10.
The first legal authorized user can input his/her fingerprint to determine other legal authorized users, and request the other legal authonized users input desired fingerprint data. In other words, the first user act as administrator and determine whether other users are legally authorized to use the keyboard or not. The users can also be divided into several user group with different authorization. The first user can also input his/her fingerprint and assign a new user to succeed his/her power by assigning the new user as super user. The new user then become the administrator later on.
FIG. 2 shows a flow chart of input and store of fingerprint of the present invention.
After the fingerprint database is established, fingerprint detected by the fingerprint reader 11 (step 20) in the "enter" or other buttons of the keyboard device 10 will be transformed into a digital signal and transmitted to the keyboard controller 12. At the same time, the CPU will send a command C to decrypt the fingerprint data stored in the memory device 14 (step 2 1) by the key 13 of the keyboard controller 12. Thereafter, the keyboard controller 12 will compare the fingerprint data and the legal authorized user's fingerprint data, which is decrypted (step 22). If the compan'son result shows that these two data do not match, the computer system 30 will send a warning message D, then all function of the keyboard device 10 will be locked (step 23), therefore any access request from the unauthorized user will be denied. If the comparison result shows that these two data match each other, then any access request E from the user will be allowed (step 24) Notice that the key 13 in each keyboard controller is difTerent, therefore, the stored fingerprint data in memory device 14 will be different in each keyboard even with the same user. The fingerprint comparison (step 22) is built in the keyboard controller and can not be controlled by other devices including the CPU.
In addition, the present keyboard device 10 is connected to the computer system by way of wire or wireless, and the user can change the keyboard device if he wants. Therefore, it is desired to prevent the unauthorized user from replacing the original keyboard device with another keyboard device having the unauthorized user's fingerpn'nt data and evading the verifying step ofthe computer system. As shown in FIG. 3, the present invention provides a set of hidden plug 41 and real plug 42 in the plug 40 of the keyboard device 10 which is connected to the peripheral interface of the computer system 30. The hidden plug 41 and the real plug 42 are located in each keyboard device of the present invention is unique.
The hidden plug 41 mentioned above is a thin film located between the real plug 42 and the computer system 30. There are two metal connection points 411 and 431 located on the hidden plug 41 and the real plug 42, respectively.
The hidden plug 41 will be fixed on the peripheral interface of the computer system 30 after the plug of the keyboard device 10 is inserted into the peripheral interface of the computer system 30 while the keyboard device 10 is first-time used. The hidden plug 41 is therefore become a part of the computer system 30 and is not separable. A circuit connection is formed while the two metal connection points 411 are connected to the two metal connection points 43 1. The commands from the keyboard device 10 can be 6 transmitted to the computer system 30 by the use of the circuit connection. While the keyboard device 10 is separated from the peripheral interface, the real plug 42 will also he disassembled from the hidden plug 4 1, which disconnect the circuit connection and can be detected by the system As shown in FIG. 4, the hidden plug 41 and the real plug 42 can also be made unique.
Namely, only one hidden plug 41 is matched With the real plug 42 so that the metal connection points 411 and 431 can be connected to each other. Therefore, the non connection of the keyboard device 10 or the non-matching of the metal connection points 411, 43 1 will also destroy the circuit connection.
Whenever a circuit disconnection is detected, a warning voice can be then sent by the computer system 30 followed by the lockup of the whole function of the keyboard device 10. Therefore, the unauthorized user can not replace the keyboard to login the computer system 30.
Additionally, batteries can be used in the keyboard device 10 as a power supply to provide the continuation of the circuit connection and to send out a warning voice while the sys tern's power is off.
Accordingly, the present invention provides a fingerprint reader and method of identification by the use of an unique biological fingerprint identification to verify someone's status, so that misappropriating and breaking of an individual secret code/password, or an invasion of working scope of an authorized person are prevented.
Therefore, the shortcoming of the prior art is overcome by the present invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the structure of the present invention without departing from the scope or spirit of the invention. In view of the foregoing, it is intended that the present invention cover modifications and variations of this invention provided they fall within the scope of the following claims and their equivalents.
h ' r

Claims (8)

WIIATIS CLAIIXIED IS:
1. A fingerprint reader, comprising:
at least a fingerprint reader located in a button of keyboard for reading Fingerprint, transforming a fingerprint data into a digital signal, and transmitting the digital signal to a keyboard controller; a keyboard controller for performing an encryption, decryption and comparison of the fingerprint data, wherein an unique key, which is triggered by the CPU, is located in the keyboard controller; and a memory device for storing the real authorized user's fingerpnint data which is encrypted.
2. The fingerprint reader of claim 1, wherein the button is "entee' button, "return" button, or other buttons.
3. The fingerprint reader of claim 1, wherein the memory device is a flash mernory.
is
4. The fingerprint reader of claim 1, wherein a battery is supplied for the keyboard device as a power source for producing voice.
5. The fingerprint reader of claim 1, wherein the keyboard device further comprises a plug connecting to a peripheral interface of the computer system, the plug is composed ora set of unique hidden plug and a real plug, wherein the hidden plug is a thin film located between the hidden plug and the peripheral interface, and having two metal connection points, these two connection plugs will become a part of the computer system and is not separable, in addition the hidden plug will be fixed on the peripheral interface after plug is connected to the peripheral interface; two metal connection points are located in the real plug, a circuit connection is formed after these two metal connection points of the real plug are connected to these two metal connection points of the hidden plug so that a command from the keyboard can be sent to 8 the computer systcm.
6, A method of fingerprint Identification, comprising the following step:
a. establishing an authonized user's fingerprint database, b. receiving an user's fingerprint data after a button is pressed; c. decrypting an authorized user's fingerprint data stored in a memory by use of a key in a keyboard controller; d. comparing the received fingerprint data and the authorized user's fingerprint data; e. sending a warning message and locking whole function of the keyboard If the comparison result shows that they are not match; and f. performing all commands requested by the user if the comparison result shows that they are match.
7. The method of claim 5, wherein the database is established when the computer is first time used, and the key in the keyboard controller is triggered by a CPU.
8. The method of claim 5, wherein the database is established by the first user by inputting his all fingerprint, and the first user determines other authorized users and requests their fingerprint data to establish the fingerprint database.
k
GB0027692A2000-03-202000-11-13Fingerprint reader and method of identificationExpired - Fee RelatedGB2360618B (en)

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN 00103142CN1263324A (en)2000-03-202000-03-20 Fingerprint identification keyboard device and identification method thereof

Publications (3)

Publication NumberPublication Date
GB0027692D0 GB0027692D0 (en)2000-12-27
GB2360618Atrue GB2360618A (en)2001-09-26
GB2360618B GB2360618B (en)2002-05-01

Family

ID=4576786

Family Applications (1)

Application NumberTitlePriority DateFiling Date
GB0027692AExpired - Fee RelatedGB2360618B (en)2000-03-202000-11-13Fingerprint reader and method of identification

Country Status (2)

CountryLink
CN (1)CN1263324A (en)
GB (1)GB2360618B (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1332279C (en)*2004-01-092007-08-15佛山市顺德区顺达电脑厂有限公司Warning function operating method for portable computer
WO2009042392A3 (en)*2007-09-242009-08-27Apple Inc.Embedded authentication systems in an electronic device
US20100030696A1 (en)*2006-08-222010-02-04David NaccacheBiometric electronic payment terminal and transaction method
US8391480B2 (en)2002-02-152013-03-05Qualcomm IncorporatedDigital authentication over acoustic channel
US8943583B2 (en)2002-05-152015-01-27Qualcomm IncorporatedSystem and method for managing sonic token verifiers
US9342674B2 (en)2003-05-302016-05-17Apple Inc.Man-machine interface for controlling access to electronic devices
US9847999B2 (en)2016-05-192017-12-19Apple Inc.User interface for a device requesting remote authorization
US9898642B2 (en)2013-09-092018-02-20Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10142835B2 (en)2011-09-292018-11-27Apple Inc.Authentication with secondary approver
US10395128B2 (en)2017-09-092019-08-27Apple Inc.Implementation of biometric authentication
US10438205B2 (en)2014-05-292019-10-08Apple Inc.User interface for payments
US10484384B2 (en)2011-09-292019-11-19Apple Inc.Indirect authentication
US10521579B2 (en)2017-09-092019-12-31Apple Inc.Implementation of biometric authentication
US10860096B2 (en)2018-09-282020-12-08Apple Inc.Device control using gaze information
US11100349B2 (en)2018-09-282021-08-24Apple Inc.Audio assisted enrollment
US11170085B2 (en)2018-06-032021-11-09Apple Inc.Implementation of biometric authentication
US11209961B2 (en)2012-05-182021-12-28Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US11676373B2 (en)2008-01-032023-06-13Apple Inc.Personal computing device control using face detection and recognition
EP4235490A4 (en)*2020-12-182024-05-01Huawei Technologies Co., Ltd.Device starting system and method
US12079458B2 (en)2016-09-232024-09-03Apple Inc.Image data for enhanced user interactions
US12099586B2 (en)2021-01-252024-09-24Apple Inc.Implementation of biometric authentication
US12210603B2 (en)2021-03-042025-01-28Apple Inc.User interface for enrolling a biometric feature
US12216754B2 (en)2021-05-102025-02-04Apple Inc.User interfaces for authenticating to perform secure operations
US12262111B2 (en)2011-06-052025-03-25Apple Inc.Device, method, and graphical user interface for accessing an application in a locked device

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6876312B2 (en)*2001-07-102005-04-05Behavior Tech Computer CorporationKeyboard with multi-function keys
CN100483995C (en)*2004-03-102009-04-29技嘉科技股份有限公司Method for automatically filling in user data by fingerprint identification
CN102667797B (en)*2009-10-262015-03-25深圳市永盛世纪科技有限公司Security keyboard and authorization usage method thereof
CN102052018A (en)*2010-11-042011-05-11谢文军Fingerprint/password computer control device
CN104375658A (en)*2014-12-042015-02-25成都思邦力克科技有限公司Small rapid printing keyboard for computer printing
CN104636650A (en)*2015-02-052015-05-20惠州Tcl移动通信有限公司Sliding type capacitance fingerprint identification method and system and unblocking method of system
CN105117032A (en)*2015-08-262015-12-02无锡伊佩克科技有限公司Two-dimensional code verification-based computer wireless keyboard
CN106648125A (en)*2016-11-302017-05-10上海斐讯数据通信技术有限公司Fingerprint keyboard, verification system and method based on fingerprint keyboard
JP7064578B2 (en)*2017-08-292022-05-10ホーム コントロール シンガポール プライベート リミテッド Clever user recognition

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO1997029477A1 (en)*1996-02-121997-08-14Identix IncorporatedAn input device for controlling a pointer on the screen of a computer
GB2331825A (en)*1997-11-281999-06-02Nec CorpPersonal identification authentication using fingerprints
GB2342749A (en)*1999-10-282000-04-19Catherine ToppingIdentification system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO1997029477A1 (en)*1996-02-121997-08-14Identix IncorporatedAn input device for controlling a pointer on the screen of a computer
GB2331825A (en)*1997-11-281999-06-02Nec CorpPersonal identification authentication using fingerprints
GB2342749A (en)*1999-10-282000-04-19Catherine ToppingIdentification system

Cited By (76)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8391480B2 (en)2002-02-152013-03-05Qualcomm IncorporatedDigital authentication over acoustic channel
US8943583B2 (en)2002-05-152015-01-27Qualcomm IncorporatedSystem and method for managing sonic token verifiers
US9342674B2 (en)2003-05-302016-05-17Apple Inc.Man-machine interface for controlling access to electronic devices
CN1332279C (en)*2004-01-092007-08-15佛山市顺德区顺达电脑厂有限公司Warning function operating method for portable computer
US20100030696A1 (en)*2006-08-222010-02-04David NaccacheBiometric electronic payment terminal and transaction method
US9038167B2 (en)2007-09-242015-05-19Apple Inc.Embedded authentication systems in an electronic device
WO2009042392A3 (en)*2007-09-242009-08-27Apple Inc.Embedded authentication systems in an electronic device
US8943580B2 (en)2007-09-242015-01-27Apple Inc.Embedded authentication systems in an electronic device
US10956550B2 (en)2007-09-242021-03-23Apple Inc.Embedded authentication systems in an electronic device
US9128601B2 (en)2007-09-242015-09-08Apple Inc.Embedded authentication systems in an electronic device
US9134896B2 (en)2007-09-242015-09-15Apple Inc.Embedded authentication systems in an electronic device
EP2947592A1 (en)*2007-09-242015-11-25Apple Inc.Embedded authentication systems in an electronic device
US9250795B2 (en)2007-09-242016-02-02Apple Inc.Embedded authentication systems in an electronic device
US9274647B2 (en)2007-09-242016-03-01Apple Inc.Embedded authentication systems in an electronic device
US9304624B2 (en)2007-09-242016-04-05Apple Inc.Embedded authentication systems in an electronic device
US9329771B2 (en)2007-09-242016-05-03Apple IncEmbedded authentication systems in an electronic device
US8782775B2 (en)2007-09-242014-07-15Apple Inc.Embedded authentication systems in an electronic device
US9495531B2 (en)2007-09-242016-11-15Apple Inc.Embedded authentication systems in an electronic device
US9519771B2 (en)2007-09-242016-12-13Apple Inc.Embedded authentication systems in an electronic device
US11468155B2 (en)2007-09-242022-10-11Apple Inc.Embedded authentication systems in an electronic device
CN101809581B (en)*2007-09-242014-12-10苹果公司 Embedded Authentication Systems in Electronic Devices
US9953152B2 (en)2007-09-242018-04-24Apple Inc.Embedded authentication systems in an electronic device
US10275585B2 (en)2007-09-242019-04-30Apple Inc.Embedded authentication systems in an electronic device
US11676373B2 (en)2008-01-032023-06-13Apple Inc.Personal computing device control using face detection and recognition
US12406490B2 (en)2008-01-032025-09-02Apple Inc.Personal computing device control using face detection and recognition
US12262111B2 (en)2011-06-052025-03-25Apple Inc.Device, method, and graphical user interface for accessing an application in a locked device
US10142835B2 (en)2011-09-292018-11-27Apple Inc.Authentication with secondary approver
US11755712B2 (en)2011-09-292023-09-12Apple Inc.Authentication with secondary approver
US11200309B2 (en)2011-09-292021-12-14Apple Inc.Authentication with secondary approver
US10419933B2 (en)2011-09-292019-09-17Apple Inc.Authentication with secondary approver
US10516997B2 (en)2011-09-292019-12-24Apple Inc.Authentication with secondary approver
US10484384B2 (en)2011-09-292019-11-19Apple Inc.Indirect authentication
US11989394B2 (en)2012-05-182024-05-21Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US11209961B2 (en)2012-05-182021-12-28Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US9898642B2 (en)2013-09-092018-02-20Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10262182B2 (en)2013-09-092019-04-16Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US12314527B2 (en)2013-09-092025-05-27Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US10055634B2 (en)2013-09-092018-08-21Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US11768575B2 (en)2013-09-092023-09-26Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US10372963B2 (en)2013-09-092019-08-06Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10803281B2 (en)2013-09-092020-10-13Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US11494046B2 (en)2013-09-092022-11-08Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US11287942B2 (en)2013-09-092022-03-29Apple Inc.Device, method, and graphical user interface for manipulating user interfaces
US10410035B2 (en)2013-09-092019-09-10Apple Inc.Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10796309B2 (en)2014-05-292020-10-06Apple Inc.User interface for payments
US10977651B2 (en)2014-05-292021-04-13Apple Inc.User interface for payments
US10748153B2 (en)2014-05-292020-08-18Apple Inc.User interface for payments
US10902424B2 (en)2014-05-292021-01-26Apple Inc.User interface for payments
US11836725B2 (en)2014-05-292023-12-05Apple Inc.User interface for payments
US10438205B2 (en)2014-05-292019-10-08Apple Inc.User interface for payments
US9847999B2 (en)2016-05-192017-12-19Apple Inc.User interface for a device requesting remote authorization
US10749967B2 (en)2016-05-192020-08-18Apple Inc.User interface for remote authorization
US11206309B2 (en)2016-05-192021-12-21Apple Inc.User interface for remote authorization
US10334054B2 (en)2016-05-192019-06-25Apple Inc.User interface for a device requesting remote authorization
US12079458B2 (en)2016-09-232024-09-03Apple Inc.Image data for enhanced user interactions
US10783227B2 (en)2017-09-092020-09-22Apple Inc.Implementation of biometric authentication
US10872256B2 (en)2017-09-092020-12-22Apple Inc.Implementation of biometric authentication
US10395128B2 (en)2017-09-092019-08-27Apple Inc.Implementation of biometric authentication
US11765163B2 (en)2017-09-092023-09-19Apple Inc.Implementation of biometric authentication
US11393258B2 (en)2017-09-092022-07-19Apple Inc.Implementation of biometric authentication
US10410076B2 (en)2017-09-092019-09-10Apple Inc.Implementation of biometric authentication
US11386189B2 (en)2017-09-092022-07-12Apple Inc.Implementation of biometric authentication
US10521579B2 (en)2017-09-092019-12-31Apple Inc.Implementation of biometric authentication
US11170085B2 (en)2018-06-032021-11-09Apple Inc.Implementation of biometric authentication
US11928200B2 (en)2018-06-032024-03-12Apple Inc.Implementation of biometric authentication
US12189748B2 (en)2018-06-032025-01-07Apple Inc.Implementation of biometric authentication
US11809784B2 (en)2018-09-282023-11-07Apple Inc.Audio assisted enrollment
US12105874B2 (en)2018-09-282024-10-01Apple Inc.Device control using gaze information
US12124770B2 (en)2018-09-282024-10-22Apple Inc.Audio assisted enrollment
US11619991B2 (en)2018-09-282023-04-04Apple Inc.Device control using gaze information
US10860096B2 (en)2018-09-282020-12-08Apple Inc.Device control using gaze information
US11100349B2 (en)2018-09-282021-08-24Apple Inc.Audio assisted enrollment
EP4235490A4 (en)*2020-12-182024-05-01Huawei Technologies Co., Ltd.Device starting system and method
US12099586B2 (en)2021-01-252024-09-24Apple Inc.Implementation of biometric authentication
US12210603B2 (en)2021-03-042025-01-28Apple Inc.User interface for enrolling a biometric feature
US12216754B2 (en)2021-05-102025-02-04Apple Inc.User interfaces for authenticating to perform secure operations

Also Published As

Publication numberPublication date
GB0027692D0 (en)2000-12-27
GB2360618B (en)2002-05-01
CN1263324A (en)2000-08-16

Similar Documents

PublicationPublication DateTitle
GB2360618A (en)Fingerprint reader and method of identification
US8572392B2 (en)Access authentication method, information processing unit, and computer product
US6775776B1 (en)Biometric-based authentication in a nonvolatile memory device
US6084968A (en)Security token and method for wireless applications
US6816970B2 (en)Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
US9923884B2 (en)In-circuit security system and methods for controlling access to and use of sensitive data
US7802112B2 (en)Information processing apparatus with security module
US6367017B1 (en)Apparatus and method for providing and authentication system
US5513261A (en)Key management scheme for use with electronic cards
US6230272B1 (en)System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user
US6910132B1 (en)Secure system and method for accessing files in computers using fingerprints
US5548721A (en)Method of conducting secure operations on an uncontrolled network
US8543764B2 (en)Storage device with accessible partitions
US20050044377A1 (en)Method of authenticating user access to network stations
US20100138667A1 (en)Authentication using stored biometric data
CA2345688A1 (en)Automatic recovery of forgotten passwords
JPH0524696B2 (en)
KR100332690B1 (en)Secret key security device with USB port
JPH11306088A (en) IC card and IC card system
CN108900296B (en)Secret key storage method based on biological feature identification
WO2005101977A2 (en)Multi-factor security system with portable devices and security kernels
EP2590101B1 (en)Authentication using stored biometric data
JP2001344212A (en)Method for limiting application of computer file by biometrics information, method for logging in to computer system, and recording medium
US20030014642A1 (en)Security arrangement
US20030046565A1 (en)Method for encrypting and decrypting contents data distributed through network, and system and user terminal using that method

Legal Events

DateCodeTitleDescription
PCNPPatent ceased through non-payment of renewal fee

Effective date:20041113


[8]ページ先頭

©2009-2025 Movatter.jp