WO2015056979A1 - 지문 인증을 수행하는 보안카드와 그에 따른 보안카드 처리 시스템 및 그 처리 방법 - Google Patents
지문 인증을 수행하는 보안카드와 그에 따른 보안카드 처리 시스템 및 그 처리 방법 Download PDFInfo
- Publication number
- WO2015056979A1 WO2015056979A1 PCT/KR2014/009693 KR2014009693W WO2015056979A1 WO 2015056979 A1 WO2015056979 A1 WO 2015056979A1 KR 2014009693 W KR2014009693 W KR 2014009693W WO 2015056979 A1 WO2015056979 A1 WO 2015056979A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- security
- card
- fingerprint
- security card
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/50—Maintenance of biometric data or enrolment thereof
- G06V40/55—Performing matching on a personal external card, e.g. to avoid submitting reference information
Definitions
- the present invention relates to a security card for performing fingerprint authentication, a security card processing system and a method thereof, and more particularly, to activate a card only when a fingerprint of a card owner is authenticated through a fingerprint sensor applied to the card.
- the present invention relates to a security card for performing fingerprint authentication, which can prevent unauthorized use of others by exporting security information stored in a card, and a system for processing the security card and a method of processing the same.
- Encryption algorithms require digital keys that are only available to authorized users. Without the proper key, the encrypted data can be decrypted in a usable format only after spending a lot of time, processing resources, and knowing (at least predictable) certain characteristics of the unencrypted data.
- a personal identification system using an identification card having an integrated memory for registration of encrypted biometric data obtained from a card holder is disclosed.
- This biometric data may include voiceprints, fingerprints, physical appearance and / or biological assays.
- the data on the card is read, decrypted and compared with the corresponding data obtained from the person holding the card. According to this system, registered individuals are positively identified and their accuracy is very high.
- biometric data is obtained and processed by external equipment, it is not easy to protect the information stored on the card from tampering and / or identity theft.
- the problem to be solved by the present invention by activating the card only when the fingerprint of the card owner through the fingerprint sensor applied to the card to export the security information stored in the card to the outside to prevent unauthorized use of others.
- the present invention provides a security card for performing fingerprint authentication, a system for processing the security card, and a processing method thereof.
- the present invention only by authenticating the fingerprint of the card holder through the built-in fingerprint sensor to activate the security card to export the security information stored in the security card to prevent unauthorized use of another person's security card In addition, it can prevent leakage of security information of the security card holder.
- FIG. 1 is a diagram illustrating a security processing system and a security processing method according to the present invention.
- FIG. 2 is a block diagram showing a security card according to the present invention.
- Figure 3 is a block diagram showing a novel issuer according to the present invention.
- FIG. 4 is a block diagram showing a management server according to the present invention.
- FIG. 5 is a block diagram showing a card identifier according to the present invention.
- FIG. 6 is a flow chart showing a security card processing method according to the present invention.
- FIG. 7 is a flow chart showing a new issuance step of the security card.
- FIG. 8 is a flowchart showing a use activation step and an access permission step of a security card.
- the fingerprint sensor for sensing the fingerprint of the holder to generate fingerprint information
- a memory storing reference fingerprint information in a secure area, and further storing at least one of financial information, personal information, personal identification number (PIN) and authority information for financial services in the secure area
- a control unit which provides information stored in the security area to the outside through an input / output interface or an RF (radio frequency) module only when the sensed fingerprint information matches the reference fingerprint information. It is characterized by providing.
- the present invention provides a security card processing system including a security card, a new issuer, and a management server.
- the new issuer receives the new issuance information including the card number and the personal information of the owner. Transmits issuance security information including the first information corresponding to the first key value, the second information corresponding to the second key value, and the card number, and transmits the received security information to the management server; Receiving the completion signal is transmitted to the security card, the security card, the fingerprint is sensed through the fingerprint sensor, when receiving the authorization signal stored in the security area of the memory as the reference fingerprint information and the reference fingerprint information is recalled Transmit to the management server through the new issuer, and upon receiving the issuance completion signal, start monitoring the security area of the memory to change the security area.
- the management server upon receiving the new issuance information, generates and transmits a first key value to the new issuer and sends an e-mail or text message to the owner of the security card.
- the second key value is generated and transmitted. If the first information and the second information included in the issuance security information coincide with the first key value and the second key value, the issuance permission signal is transmitted. It characterized in that to provide a security card processing system for generating and transmitting to the new issuer.
- first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
- the first component may be referred to as the second component, and similarly, the second component may also be referred to as the first component.
- FIG. 1 is a diagram illustrating a security processing system and a security processing method according to the present invention.
- the present invention relates to a security card and a security card processing system for performing fingerprint authentication that can be used only after a user is identified by recognizing a fingerprint, and a method of processing the same.
- the security card processing system includes a security card for performing fingerprint authentication, a new issuer for performing a new issuance procedure for the security card, a card checker for performing an access permission procedure by checking the security card, and a user and a security card. It includes a management server that manages the information in the system and handles new issuance and access authorization procedures.
- the security card senses the fingerprint of the owner at the time of new issuance through a fingerprint sensor embedded in the card, and stores the sensed fingerprint as reference fingerprint information in a storage unit embedded in the security card, and after the new issuance is completed, the fingerprint is completed.
- a fingerprint sensor embedded in the card stores the sensed fingerprint as reference fingerprint information in a storage unit embedded in the security card, and after the new issuance is completed, the fingerprint is completed.
- the security card according to the present invention can be used as a credit card by storing financial information and personal identification number (PIN), including credit card number or account information, based on the fingerprint information of the owner in the internal memory
- PIN personal identification number
- the fingerprint information can be used as an identification card by comparing the fingerprint information sensed by the fingerprint sensor with the reference fingerprint information and verifying whether the owner is the user by storing the fingerprint information.
- the security card according to the present invention generates an OTP (one time password) only after the identity of the owner is confirmed for financial security and OTP available only to the owner by outputting the generated OTP through a liquid crystal display (LCD) It can also be used as a generation card.
- OTP one time password
- the security card when used as a credit card, identity card, and OTP generation card, compares the fingerprint information sensed every time it is used with the reference fingerprint information stored in the card and uses the credit card only when identity is matched. Permit access, create OTP.
- the security processing system 100 may include a security card 110, a new issuer 120, and a management server 130, and may further include a card checker 140.
- the security processing system 100 performs a new issuance step of performing a new issuance procedure of the security card 110 and a use activation step of enabling the security card 110 by checking a fingerprint of the user, and further, a security card.
- Checking 110, the user of the security card 110 performs an access permission step for performing various security procedures, for example, restricted access area access procedures and financial processing procedures.
- the security card 110 In the new issuance phase, in order to enable a true owner to newly issue his security card 110, the security card 110, the new issuer 120 and the management server 130 work together to perform a new issuance step. Perform.
- the person in charge of new issuance of the security card 110 receives the new issuance application through the new issuer 120, when the new issuance application is received, the management server 130 is the first key value Generate and transmit the security card 110 to the issuer, and generates a second key value is sent to the e-mail or mobile phone of the new issuer 120 or the person in charge of the new issue.
- the management server 130 includes the personal information included in the new issuance application. Based on the information, the database is searched to extract an e-mail address or a mobile phone number of a user to be newly issued, and the first key value is transmitted to the extracted e-mail address or mobile phone number.
- the management server 130 may generate the expiration information including the maximum expiration date for issuing the new security card 110, and if the first key value and the second key value are not received until the expiration date corresponding to the expiration information, the security card 110 It may not allow new issuance for (110).
- the new issuer 120 transmits the first and second information to the management server 130.
- the management server 130 If the first information and the second information match the previously generated first key value and the second key value, respectively, and the first information and the second information are entered within a time limit corresponding to the due date information, the management server 130 is issued.
- the card number is generated, the generated issuance card number is matched with the issuer, stored in the database, the issuance permission signal including the generated issuance card number is generated and transmitted to the new issuer 120.
- the new issuer 120 Upon receiving the issuance permission signal, the new issuer 120 transmits the issuance permission signal to the security card 110, thereby allowing the security information to be stored in the internal memory of the security card 110.
- the security card 110 includes a fingerprint sensor 111 for generating fingerprint information by sensing a fingerprint.
- the security card 110 only receives an issuance permission signal through the new issuer 120 in a new issuance step.
- Fingerprint information sensed by the fingerprint sensor 111 may be stored in the memory as reference fingerprint information.
- the new issuance procedure for the security card 110 is completed through the above process, and when the new issuance procedure is completed, the user can use the security card 110.
- the personal information included in the new issuer list previously stored in the database may be used.
- sending the first key value to the issuer's e-mail or mobile phone on the basis, and comparing the first key value with the first information input by the issuer it is possible to block new issuance of the security card 110 by someone other than the person. have.
- the person in charge of the new issuer 120 is a security card ( Issuing 110 or a person who is not in charge can be prevented to randomly issue the security card (110).
- the issuer may use the security card 110, and a use activation step for normally using the security card 110 is performed.
- the use activation step is performed by the security card 110 itself.
- the issuer When the issuer wants to perform access or financial processing for the restricted access area using the security card 110, the issuer first places a finger on the fingerprint sensor 111 embedded in the security card 110.
- the fingerprint sensor 111 of the security card 110 checks the identity by sensing the fingerprint and comparing it with the reference fingerprint information stored in the memory.
- the security card 110 controls to activate the use of the card, and generates a fingerprint confirmation signal that the fingerprint is confirmed.
- the use of the card is activated, which means that the security information stored in the memory can be transmitted to the outside or an OTP can be created only when it is confirmed that the card is correct.
- the security information includes at least one of reference fingerprint information, issuance card number, financial information such as credit card number or account information, personal information of the issuer, personal identification number (PIN), and authority information.
- the personal information of the issuer is personal information of the issuer, and includes at least one of a name, sex, age, address, social security number, and a mobile phone number
- the authority information is about at least one of the issuer's accessible area and the issuer's work. Contains information.
- the card By using the card only when the identity is confirmed through the fingerprint, it is possible to prevent others from using the security card 110 according to the present invention.
- the security card 110 By only allowing the security card 110 to be used by the user, it is possible to prevent the unauthorized use of the credit card, unauthorized access by the unauthorized person, and the creation of OTP for financial processing by others. .
- the access permission step is a step of controlling the financial procedures or access to the restricted area through the security card 110, the security card 110, the card checker 140, and the management server 130 is linked Is performed together.
- the card checker 140 reads out the security information stored in the security card 110 for the processing of the financial procedure or access control for the restricted access area.
- the memory of the security card 110 is divided into a general area for storing general information that may be leaked to the outside and a security area for storing security information requiring security.
- the security information stored in the security area includes at least one of an issuing card number, financial information (credit card number and / or linked account information), personal information of the issuer, personal identification number (PIN), and reference fingerprint information. .
- the card checker 140 may read security information in a contact manner through the input / output interface of the IC chip of the security card 110 or read the security information in a non-contact manner through the RF module of the security card 110. However, as described above, only when the security card 110 is activated through the card activation step, the security card 110 may transmit security information stored therein to the outside. Therefore, only when the use of the security card 110 is activated, the card checker 140 may receive the security information contained in the security card 110.
- the card checker 140 delivers the received security information to the management server 130, the management server 130 searches the database based on the received security information Identify users and control them to perform financial or access control procedures accordingly.
- FIG. 2 is a block diagram showing a security card according to the present invention.
- Security card 110 is the control unit 111, the battery 112, LED 113, the display 114, RTC (real-time clock, 115), fingerprint sensor 116, RF (radio frequency) Module) 117, an input / output interface 118, and a memory 119.
- the control unit 111 may be implemented with one or two CPUs, and includes a monitoring unit 1111, a fingerprint registration unit 1112, a disposal unit 1113, a fingerprint authentication unit 1114, an activation unit 1115, and an OTP. (one time password) generation unit 1116.
- the monitoring unit 1111 performs a role of performing a security function of the security card 110.
- the security function means both of the following two functions.
- the first security function refers to the security information stored only when the fingerprint information sensed by the fingerprint sensor 116 matches the reference fingerprint information stored therein.
- the second security function is to monitor access to security information and to discard the security information when unauthorized write access is detected.
- the monitoring unit 1111 checks whether the reference fingerprint information exists in the security area 119_2 of the memory 119 when a fingerprint is sensed through the fingerprint sensor 116, and secures the memory 119 externally. When accessing the area 119_2, it monitors whether the corresponding access is a valid access. If it is not authorized access, for example, if a write operation for changing the security information is detected, the monitoring unit 1111 informs the discarding unit 1113 of the fact that the base fingerprint information or the security information is discarded. Control to perform.
- the monitoring unit 1111 checks the presence of the reference fingerprint information in the security area 119_2 of the memory 119, if the reference fingerprint information does not exist To perform a new issuance step of the security card 110 to be described later.
- the monitoring unit 1111 performs a fingerprint authentication operation for comparing the reference fingerprint information with the sensed fingerprint.
- the security registration unit 1112 stores the fingerprint sensed by the fingerprint sensor 116 in the new issuing stage as the reference fingerprint information in the security area 119_2 and stores security information that requires various security in the security area 119_2. It acts as a store. At this time, the security register 1112 stores the security information in the security area 119_2 only when receiving the issuance permission signal from the new issuer 120.
- the security information includes at least one of an issuance card number, financial information such as a credit card number or account information, personal information of a card holder, a personal identification number (PIN), and reference fingerprint information.
- the discarding unit 1113 discards the security information stored in the security area 119_2 when the monitoring unit 1111 receives notification of illegal access to the security information stored in the security area 119_2. do.
- the fingerprint authentication unit 1114 compares the fingerprint information sensed by the fingerprint sensor 116 with the reference fingerprint information stored in the security area 119_2 to check whether there is a match.
- the activation unit 1115 When the sensed fingerprint information and the reference fingerprint information match, the activation unit 1115 generates a fingerprint confirmation signal including information on whether the detected fingerprint information and the reference fingerprint information match, and the security card 110 By activating, the security information 1192 to 1195 may be transmitted to the outside through the input / output interface 118 or the RF module 117. At this time, the activator 1115 extracts the security information suitable for the external request from the security area 119_2 and provides the extracted security information to the input / output interface 1116 or the RF module 117 to the outside. To be transmitted. For example, when the card checker 140 requests the issuance card number or financial information, the activator 1115 extracts the issuing card number or financial information from the security area 119_2 only after the fingerprint authentication is successful. The extracted issuance card number or financial information is transmitted to the card checker 140 through the input / output interface 1116 or the RF module 117.
- the activation unit 1115 deactivates the security card 110 so that security information is never transmitted to the outside through the input / output interface 118 or the RF module 117. Control not to In this case, the fingerprint confirmation signal contains information that the sensed fingerprint information and the reference fingerprint information are different from each other.
- the security card 110 is not activated due to the mismatch between the fingerprint information and the reference fingerprint information, the security information contained in the security area 119_2 is never provided to the outside, so that someone other than the person is the security card 110. Cannot be used.
- the OTP generation unit 1116 serves to generate a one-time password in financial processing tasks such as deposit and withdrawal, and only through the RTC 115 when the security card 110 is activated through the activation unit 1115. After confirming, generate OTP number according to general OTP creation procedure. The number generated by the OTP generation unit 1116 is output through the display 114, so that the owner of the security card 110 can visually check the generated OTP number.
- the battery 112 includes components of the security card 110 that requires a power supply such as a control unit 111, an LED 113, a display 114, an RTC 115, a fingerprint sensor 116, and a memory 119. It serves to supply power.
- the LED 113 serves to indicate the success or failure of fingerprint sensing and fingerprint authentication, and may be implemented as two LEDs to indicate success or failure, respectively.
- the green LED 1131 may be flickered when the fingerprint sensing and the fingerprint authentication are successful
- the red LED 1132 may be flickered when the fingerprint sensing and the fingerprint authentication have failed.
- the fingerprint sensor 116 senses a fingerprint to generate fingerprint information.
- the sensed fingerprint information is provided to the control unit 111.
- the sensed fingerprint information is stored in the memory 119 as reference fingerprint information, and after the new issue is completed, the sensed fingerprint information is used for fingerprint authentication. Used to compare with fingerprint information.
- the RF module 117 transmits security information stored in the memory 119 to the outside in a non-contact manner.
- the security information stored in the memory 119 may be transmitted to the outside only when the fingerprint authentication is successful in the controller 111.
- the input / output interface 118 is a passage for exchanging information with the outside, and is implemented with an ISO pad used in a general credit card incorporating an IC chip. Like the RF module 117, the input / output interface 118 may transmit the security information to the outside only when the fingerprint authentication is successful in the controller 111.
- the memory 119 is a space for storing various types of information.
- the memory 119 is divided into a general area 1191_1 which requires no security and a security area 1191_2 which absolutely requires security.
- general information without a specific format is stored, and in the security area 1191_2, issuance card numbers and personal identification numbers (PIN, 1192), reference fingerprint information (1193), and credit card numbers should not be exposed to the outside.
- financial information 1194 such as account number, and personal information 1195 of the card issuer.
- Figure 3 is a block diagram showing a novel issuer according to the present invention.
- the new issuer 120 is a device used when issuing a new security card 110, the person in charge of managing the new issuer 120 is secured by inputting various information to the security card 110 through the new issuer 120 A new issuance procedure of the card 110 is performed.
- the new issuer 120 is connected to the management server 130 in communication with each other, and exchanges information.
- the management server 130 receives the issuance permission signal
- the issued issuance permission signal is transmitted to the security card 110 by the security card.
- the new issuer 120 includes a card input / output unit 121, an issuing application unit 122, and an issuing permission unit 123.
- the card input / output unit 121 is connected to the input / output interface 118 of the security card 110 or the RF module 117 so that the security information is stored in the security area 119_2 of the security card 110.
- the issuing application unit 122 transmits the new issuance information including the personal information of the issuer of the security card 110 to the management server upon issuing the security card 110, and issues security for issuing the security card 110. It receives the information and transmits to the management server 130.
- the issuing application unit 122 receives the first key value and the due date information from the management server 130 after transmitting the new issue information, and the person in charge checks the first key value and the due date information and then applies the first key value through various input devices.
- the corresponding first information should be entered within the time limit corresponding to the time limit information.
- the issuing application unit 122 receives the second information corresponding to the second key value from the owner of the security card (110).
- the issuing application unit 122 generates issuing security information including first information input from the person in charge and second information input from the owner of the security card 110 and transmits the generated issuing information to the management server 130. do.
- the issuing permission unit 123 receives the issuance permission signal from the management server 130 and transmits the received issuance permission signal to the security card 110 to store security information in the security area 119_2 of the security card 110. To be possible.
- the issuance permission unit 123 completes the issuance of the security card 110 and receives the issuance completion signal from the management server 130, the issuance completion signal is transmitted to the security card 110, and then the security card ( Performance of the security function is initiated.
- FIG. 4 is a block diagram showing a management server according to the present invention.
- the management server 130 is connected to the new issuer 120 and the card checker 140 in communication with each other to exchange various information, and process the new issuance and access permission through the security card 110 for the security card 110 It plays a role.
- the management server 130 includes an issuing start unit 131, an issuing processor 132, an access permission unit 133, and a database 134.
- Issuing start unit 131 is involved in the new issuance of the security card 110, when receiving new issuance information from the new issuing machine 120 generates and transmits a first key value to the new issuing machine 120, issuing scheduled database ( In step 136, the personal information of the issuer is checked and the second key value is transmitted to the issuer of the security card 110 in the form of an e-mail or a text message.
- the issuing start unit 131 may generate and transmit time information together to receive the first key value and the second key value when the first key value and the second key value are transmitted.
- the issuing processing unit 132 receives the issuing security information including the first information input by the person in charge and the second information input by the owner of the security card 110 from the new issuing machine 120, the first It is checked whether the information and the second information correspond to the first key value and the second key value, respectively, and whether the first information and the second information are received in the time limit information .
- the issuing processor 132 When the first information and the second information are received within the time limit information, and the first information and the second information coincide with the first key value and the second key value, respectively, the issuing processor 132 generates an issuing card number and generates the issued card number. An issue permission signal including an issue card number is generated and transmitted to the new issuer 120.
- the issuing processing unit 132 when receiving the reference fingerprint information from the new issuing machine 120, stores the reference fingerprint information in the database and generates a new issue completion signal that means that the issuance procedure of the security card 110 is completed. Send to the issuer 120.
- the access permission unit 133 determines whether to access the security card 110. For example, the owner of the security card 110 may wish to perform access or financial processing for the restricted access area.
- the access permission unit 133 receives security information from the card checker 140 and determines whether the corresponding security card 110 is a security card that is legal for the security procedure with reference to the database 134.
- the database 134 is a database that stores various types of information about the security card 110 and personal information about the user.
- the database 134 includes a registration database 135, a scheduled database 136, and a history database 137.
- the registration database 135 stores the issuance card number, the reference fingerprint information, and the personal information of the security card issuer of the newly issued security card 110, and is accessible to each security card 110 or each security card ( The tasks that can be performed with 110 are also stored together.
- the access permission unit 133 searches the registration database 134 with the card number received from the card checker 140 to determine whether the owner of the security card is a legitimate person for the procedure, and then the access permission or access denied. An access permission signal including the information is generated and transmitted to the card checker 140.
- the issuing database 136 stores the personal information of the person who is about to issue the security card 110 and information on the security stage.
- the issuing start unit 131 receives new issuance information including personal information of the issuer of the security card 110
- the issuing start unit 131 searches the issuing scheduled database 136 with the personal information included in the new issuance information.
- the second key value is transmitted to the issuer of the security card 110.
- the history database 137 stores both the issuance history of each security card through the new issuer 120 and the access and work history of each security card 110 to the card checker 140.
- FIG. 5 is a block diagram showing a card identifier according to the present invention.
- the card checker 140 reads the security information stored in the security card 110 in a contact or contactless manner, transfers the read card number to the management server 130 and receives an access permission signal therefor. If the issuer of 110 is an authorized person for each security procedure, the device controls to perform subsequent security tasks.
- the card checker 140 includes a card reader 1411 and an access processor 1412, is connected to the management server 130 in communication, the financial processing unit 141, the access opening and closing unit 142 and identity It is connected in communication with at least one of the processing units 143.
- the card reader 1411 reads the security information and the fingerprint confirmation signal stored in the security card 110 in a contact or contactless manner, and transfers the read security information and the fingerprint confirmation signal to the management server 130.
- the security card 110 may generate a fingerprint confirmation signal only when the fingerprint of the person is confirmed, and may export the security information to the outside. Therefore, the card reader 1411 may be implemented to read the card number only when the fingerprint confirmation signal is received from the security card 110.
- the access permission unit 1412 When the access permission unit 1412 receives an access permission signal from the management server 130, the access permission signal controls the owner of the security card 100 to access the corresponding security procedure according to the access permission signal.
- the access permission unit 1412 Since the access permission unit 1412 is connected in communication with at least one of the financial processing unit 141, the access opening and closing unit 142, and the identity processing unit 143, the security card (only when an access permission signal means access permission is received ( The owner of 110) performs an operation such as a financial service, an entry into an area, or an identity verification. If an access permission signal is received, which means access is not allowed, the access permission unit 1412 controls the holder of the security card 110 not to perform the corresponding task.
- FIG. 6 is a flowchart illustrating a security card processing method according to the present invention.
- the fingerprint sensor 116 senses the fingerprint to generate fingerprint information.
- the control unit 111 of the security card 110 determines whether the reference fingerprint information exists in the memory 119 (S20), and if the reference fingerprint information does not exist in the memory 119, a new issuance step is performed ( S80).
- the control unit 111 of the security card 110 is sensed through the fingerprint sensor.
- a fingerprint authentication operation for comparing the fingerprint information with the reference fingerprint information is performed (S40).
- the control unit 111 of the security card 110 When the fingerprint authentication is successful because the reference fingerprint information and the sensed fingerprint information match, the control unit 111 of the security card 110 generates a fingerprint confirmation signal, activates the use of the security card 110, and secures it according to an external request. Control to transmit the security information stored in the card 110 to the external card checker 140 (S60).
- the security information is transmitted to the management server 130 through the card checker 140, the management server 130 is the owner of the security card 110 using the issuance card number included in the security information, the security procedure An access permission signal including information on whether or not is accessible is generated and the generated access permission signal is transmitted to the card checker 140.
- the card checker 140 Upon receiving the access permission signal, the card checker 140 performs an operation according to whether the owner of the security card 110 access is allowed according to the access permission signal (S70).
- FIG. 7 is a flowchart illustrating a new issuance step of the security card.
- the new issuer 120 transmits new issuance information including the personal information of the issuer of the security card 110 to the management server 130 at the time of new issuance of the security card 110 (S110).
- the management server 130 When receiving the new issuance information, the management server 130 generates a first key value and transmits it to the new issuer 120 or the person in charge of the new issuance (S111), and generates a second key value to the issuer of the security card 110. It is sent in the form of e-mail or text message (S112). On the other hand, the management server 130 may generate the deadline information along with the first key value and the second key value and transmit it to the new issuer and issuer.
- the new issuer 120 receives first information corresponding to the first key value and second information corresponding to the second key value from the new issuer and the issuer of the security card 110, respectively (S113).
- the new issuer 120 may receive the authority information associated with the issuer of the security card 110 from the new issuer.
- the authority information includes information on at least one of the issuer's access zone and the issuer's work to be performed.
- the new issuer generates issuing security information including the inputted first information and the inputted second information (S114), and transmits the generated issuance security information to the management server 130 (S115).
- the issuance security information may further include the authority information of the issuer.
- the management server 130 Upon receipt of the security information for issue, the management server 130 compares and verifies the previously generated first and second key values with the first and second information, respectively (S116). A card number is generated (S117). Although not shown in the drawing, when the issuing card number is generated, the issuing card number and the personal information of the issuer are stored in the database 134. If the issuance security information includes authority information, the authority information is also stored together.
- the management server 130 generates an issuance permission signal including the issuance card number and transmits it to the new issuer 120 (S118).
- the issue permission signal transmitted to the new issuer 120 is transmitted to the security card 110 connected to the new issuer 120 (S119).
- the security card 110 Upon receiving the issuance permission signal, the security card 110 stores the fingerprint information sensed by the fingerprint sensor in the security area 119_2 of the memory 119 as reference fingerprint information (S120).
- the generated reference fingerprint information is transmitted to the new issuer 120 and the management server 130 (S121 and S122), and the management server 130 stores the reference fingerprint information in the database 134 (S123).
- the management server 130 generates an issuance completion signal indicating that the new issuance of the security card 110 is completed, and transmits it to the new issuer 120 (S125). Transmitted to the security card 110 (S126)
- the security card 110 Upon receiving the issuance completion signal, the security card 110 initiates a security function for monitoring access to the security area 119_2 of the memory 119 (S126).
- FIG. 8 is a flowchart illustrating a use activation step and an access permission step of a security card.
- the security card 110 senses a fingerprint through a fingerprint sensor (S210), and performs a fingerprint authentication procedure for comparing the sensed fingerprint with reference fingerprint information (S211).
- the security card 110 activates the use of the security card 110 when the fingerprint authentication succeeds (S212), and generates a fingerprint confirmation signal that the fingerprint authentication succeeds.
- the security card 110 may transmit the security information stored in the security area 119_2 to the outside only when the fingerprint authentication is successful. If the fingerprint authentication fails, the security card 110 blocks access to the security information and does not transmit the security information to the outside. Therefore, when the fingerprint authentication fails, the card checker 140 cannot read any information in the security information from the security card 110.
- the card checker 140 transmits the security information read from the security card 110 to the management server 130 (S216), and the management server 130 stores the issuing card number included in the received security information in the database 134. It is determined whether the holder of the security card 110 is accessible to the corresponding security procedure by comparing with the information stored in the (S217).
- the management server 130 generates an access permission signal including information on whether the holder of the security card 110 is accessible to the corresponding security procedure, and the generated access permission signal to the card checker 140 It transmits (S218).
- the card checker 140 performs a security procedure for the security card 110 by performing an operation according to the access permission signal (S219).
- the security card 110 determines whether the generation of the OTP number is selected by the holder after the steps S212 and S213 is performed. If the generation of the OTP number is selected by the holder after the steps S212 and S213 is performed, the security card 110 generates an OTP number for financial services. Of course, if the fingerprint authentication fails, the security card 110 does not generate an OTP number for financial work.
- FIG. 9 is a diagram illustrating a security card according to the present invention.
- the security card 110 has a size similar to a credit card generally used, the front portion of the LED 113, which informs the success or failure of fingerprint recognition, financial business
- a display 114 for outputting an OTP number for the user, a fingerprint sensor 116 for reading the holder's fingerprint, an OTP generation button 117 for initiating generation of the OTP number by the user's selection upon successful fingerprint authentication, and security by contact
- An ISO pad 118 is implemented that can export information to the outside.
- each component in the security card 110 of FIG. 9 is an example, and may be arranged in various sizes and various locations.
- the method of the present invention can also be embodied as computer readable code on a computer readable recording medium.
- the computer-readable recording medium includes all kinds of recording devices in which data that can be read by a computer system is stored. Examples of computer-readable recording media include ROM, RAM, CD-ROM, magnetic tape, floppy disk, optical data storage, and the like, and may also be implemented in the form of a carrier wave (for example, transmission over the Internet). Include.
- the computer readable recording medium can also be distributed over network coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Bioinformatics & Computational Biology (AREA)
- Data Mining & Analysis (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Life Sciences & Earth Sciences (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Artificial Intelligence (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Collating Specific Patterns (AREA)
- Credit Cards Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (5)
- 소지자의 지문을 센싱하여 지문정보를 생성하는 지문센서;보안영역에 기준지문정보를 저장하고 있으며, 상기 보안영역에 금융 업무를 위한 금융정보, 인적정보, 개인식별번호(PIN, personal identification number) 및 권한정보 중의 적어도 하나를 더 저장하는 메모리; 및상기 센싱한 지문정보와 상기 기준지문정보가 일치하는 경우에만 상기 보안영역에 저장되어 있는 정보를 입출력 인터페이스 또는 RF(radio frequency) 모듈을 통해 외부로 제공하는 제어부를 포함하는, 지문 인증을 수행하는 보안카드.
- 제1항에 있어서, 상기 제어부는,금융 업무를 위한 OTP(one time password) 번호를 생성하는 OTP 생성부를 포함하며,상기 OTP 번호는 상기 센싱한 지문정보와 상기 기준지문정보가 일치하는 경우에만 생성되는 것을 특징으로 하는, 지문 인증을 수행하는 보안카드.
- 제1항에 있어서, 상기 제어부는,상기 보안영역에 저장되어 있는 정보에 대한 변경을 감지하는 감시부; 및상기 보안영역에 저장되어 있는 정보에 대한 변경이 감지되면, 상기 보안영역에 저장되어 있는 정보의 폐기를 수행하는 폐기부를 더 포함하는 것을 특징으로 하는, 지문 인증을 수행하는 보안카드.
- 제1항에 따른 보안카드, 신규발급기 및 관리서버를 포함하는 보안카드 처리 시스템으로서,상기 신규발급기는, 발급자의 인적정보를 포함하는 신규발급정보를 입력받아 상기 관리서버로 전송하고, 제1키값에 대응하는 제1정보와 제2키값에 대응하는 제2정보를 포함하는 발급보안정보를 입력받아 상기 관리서버로 전송하고, 상기 관리서버로부터 발급허가신호 및 발급완료신호를 수신하면 상기 보안카드로 전송하고,상기 보안카드는, 상기 발급허가신호를 수신하면 상기 지문센서를 통해 센싱한 지문을 상기 보안영역에 상기 기준지문정보로서 저장하고, 상기 기준지문정보를 상기 신규발급기를 통해 상기 관리서버로 전송하고, 상기 발급완료신호를 수신하면 상기 보안영역에 대한 감시를 개시하여 상기 보안영역에 대한 변경이 감지되면 상기 보안영역에 저장된 상기 기준지문정보를 폐기하고,상기 관리서버는, 상기 신규발급정보를 수신하면 상기 신규발급기로 상기 제1키값을 생성하여 전송하고, 상기 보안카드의 발급자에게 이메일이나 문자메시지 형태로 제2키값을 생성하여 전송하고, 상기 발급보안정보에 포함된 제1정보와 제2정보가 상기 제1키값 및 제2키값과 일치하면 상기 발급허가신호를 전송하고, 상기 기준지문정보를 수신하면 발급완료신호를 생성하여 상기 신규발급기로 전송하는 것을 특징으로 하는, 보안카드 처리 시스템.
- 제4항에 있어서, 상기 보안카드 처리 시스템은,상기 보안영역에 저장되어 있는 정보를 리딩하고, 상기 리딩한 정보를 상기 관리서버로 송신하며, 상기 관리서버로부터 접근 허가 여부에 대한 접근허가신호를 수신하면 수신한 접근허가신호에 따른 동작을 수행하는 카드확인기를 더 포함하는 것을 특징으로 하는, 보안카드 처리 시스템.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201480068707.4A CN105900114B (zh) | 2013-10-15 | 2014-10-15 | 用于执行指纹认证的安全卡及基于此的安全卡处理***及其处理方法 |
US15/029,884 US10140439B2 (en) | 2013-10-15 | 2014-10-15 | Security card having fingerprint authentication, processing system and processing method therefor |
JP2016524439A JP6188938B2 (ja) | 2013-10-15 | 2014-10-15 | 指紋認証を遂行する保安カードとそれによる保安カード処理システム及びその処理方法 |
EP14854792.0A EP3059696A4 (en) | 2013-10-15 | 2014-10-15 | Security card having fingerprint authentication, processing system and processing method therefor |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2013-0122946 | 2013-10-15 | ||
KR1020130122946A KR101343349B1 (ko) | 2013-10-15 | 2013-10-15 | 지문 인증을 수행하는 보안카드와 그에 따른 보안카드 처리 시스템 및 그 처리 방법 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015056979A1 true WO2015056979A1 (ko) | 2015-04-23 |
Family
ID=49988729
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2014/009693 WO2015056979A1 (ko) | 2013-10-15 | 2014-10-15 | 지문 인증을 수행하는 보안카드와 그에 따른 보안카드 처리 시스템 및 그 처리 방법 |
Country Status (6)
Country | Link |
---|---|
US (1) | US10140439B2 (ko) |
EP (1) | EP3059696A4 (ko) |
JP (1) | JP6188938B2 (ko) |
KR (1) | KR101343349B1 (ko) |
CN (1) | CN105900114B (ko) |
WO (1) | WO2015056979A1 (ko) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2017054350A (ja) * | 2015-09-10 | 2017-03-16 | 大日本印刷株式会社 | ユーザ認証システム |
US9792516B2 (en) | 2016-01-26 | 2017-10-17 | Next Biometrics Group Asa | Flexible card with fingerprint sensor |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160300236A1 (en) * | 2015-04-09 | 2016-10-13 | Mastercard International Incorporated | Systems and Methods for Confirming Identities of Verified Individuals, in Connection With Establishing New Accounts for the Individuals |
KR101748172B1 (ko) * | 2015-06-30 | 2017-06-27 | 한국산업은행 | 지문 인증을 통한 서비스 제공 방법 및 이를 수행하는 스마트카드 |
DE102016110274B4 (de) * | 2016-06-03 | 2020-11-19 | Bundesdruckerei Gmbh | Verfahren für ein biometrisch basiertes Auslösen einer Nutzaktion mittels einem Nutzer zugeordneten ID-Tokens |
KR101899334B1 (ko) * | 2016-12-19 | 2018-09-17 | 코나아이 (주) | 지문 인식 카드 및 지문 인식 카드를 이용한 전원 동작 방법 |
KR102425295B1 (ko) * | 2016-12-19 | 2022-07-27 | 코나아이 (주) | 지문 인식 카드 및 지문 인식 카드를 이용한 전원 동작 방법 |
US10984304B2 (en) | 2017-02-02 | 2021-04-20 | Jonny B. Vu | Methods for placing an EMV chip onto a metal card |
KR20190079926A (ko) | 2017-12-28 | 2019-07-08 | 주식회사 에스씨테크원 | 생체정보를 이용한 보안카드의 개인식별번호 대체 인증 장치 및 방법 |
KR101894086B1 (ko) * | 2018-01-04 | 2018-10-04 | 한국스마트아이디(주) | 지문 스마트 카드의 지문 등록 시스템 및 지문 스마트 카드의 지문 등록 방법 |
USD956760S1 (en) * | 2018-07-30 | 2022-07-05 | Lion Credit Card Inc. | Multi EMV chip card |
CN110412794B (zh) * | 2019-08-01 | 2022-05-27 | 京东方科技集团股份有限公司 | 一种显示基板和显示面板 |
US20230146678A1 (en) * | 2021-11-05 | 2023-05-11 | Capital One Services, Llc | Fingerprint-based credential entry |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11338985A (ja) * | 1998-05-26 | 1999-12-10 | Nippon Telegr & Teleph Corp <Ntt> | セキュリティレベル設定判別方法とicカード及びその使用方法 |
JP2002312732A (ja) * | 2001-04-09 | 2002-10-25 | Nippon Telegr & Teleph Corp <Ntt> | プリペイドカード及びカードシステム |
KR20060125033A (ko) * | 2005-06-01 | 2006-12-06 | 최재호 | 지문인식을 이용한 아이씨카드 활성화/비활성화 장치 |
US20070277044A1 (en) * | 2004-04-07 | 2007-11-29 | Hans Graf | Data Support With Tan-Generator And Display |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0765134A (ja) * | 1993-08-27 | 1995-03-10 | Tamura Electric Works Ltd | データ通信方法 |
JP2951844B2 (ja) * | 1994-06-30 | 1999-09-20 | 日本信販株式会社 | クレジットカードシステム及び該システムを用いたクレジットカードの発行方法 |
US6041410A (en) * | 1997-12-22 | 2000-03-21 | Trw Inc. | Personal identification fob |
KR20010025234A (ko) * | 2000-11-09 | 2001-04-06 | 김진삼 | 지문정보를 이용한 카드거래 인증방법 및 그 시스템 |
JP2002207874A (ja) * | 2001-01-09 | 2002-07-26 | Nec Corp | カード発行代行システム |
US20020095588A1 (en) * | 2001-01-12 | 2002-07-18 | Satoshi Shigematsu | Authentication token and authentication system |
US7174463B2 (en) * | 2001-10-04 | 2007-02-06 | Lenovo (Singapore) Pte. Ltd. | Method and system for preboot user authentication |
US6929413B2 (en) * | 2001-12-11 | 2005-08-16 | Zebra Atlantek, Inc. | Printer driver log security verification for identification cards |
CZ2005209A3 (cs) * | 2002-09-10 | 2005-12-14 | Ivi Smart Technologies, Inc. | Bezpečné biometrické ověření identity |
DK200300384A (da) * | 2003-03-13 | 2004-09-14 | Quard Technology I S | Selvgodkendende Biometrisk anordning med Dynamisk PIN kode skabelse |
US7161465B2 (en) * | 2003-04-08 | 2007-01-09 | Richard Glee Wood | Enhancing security for facilities and authorizing providers |
US8296573B2 (en) * | 2004-04-06 | 2012-10-23 | International Business Machines Corporation | System and method for remote self-enrollment in biometric databases |
FR2882878B1 (fr) * | 2005-03-07 | 2007-04-27 | Christophe Richard | Dispositif, procede et systeme de securite pour transactions financieres, reposant sur l'identification d'un individu grace a son profil biometrique, et utilisant une carte a microprocesseur |
CN101167080B (zh) * | 2005-03-23 | 2012-01-04 | 株式会社Ihc | 验证*** |
JP2007066008A (ja) * | 2005-08-31 | 2007-03-15 | Seiko Instruments Inc | 電子装置 |
US20070061590A1 (en) * | 2005-09-13 | 2007-03-15 | Boye Dag E | Secure biometric authentication system |
WO2007092715A2 (en) * | 2006-02-06 | 2007-08-16 | Solidus Networks, Inc. | Method and system for providing online authentication utilizing biometric data |
JPWO2007094165A1 (ja) * | 2006-02-15 | 2009-07-02 | 日本電気株式会社 | 本人確認システムおよびプログラム、並びに、本人確認方法 |
US20070291995A1 (en) * | 2006-06-09 | 2007-12-20 | Rivera Paul G | System, Method, and Apparatus for Preventing Identity Fraud Associated With Payment and Identity Cards |
US7845553B2 (en) * | 2006-11-17 | 2010-12-07 | Ncr Corporation | Data management |
AU2008278263A1 (en) * | 2007-07-17 | 2009-01-22 | Valid8 Technologies Pty Ltd | A method and arrangement for user validation |
US7945792B2 (en) * | 2007-10-17 | 2011-05-17 | Spansion Llc | Tamper reactive memory device to secure data from tamper attacks |
US20090313129A1 (en) * | 2008-06-11 | 2009-12-17 | Lmr Inventions, Llc | System and method for verifying user identity information in financial transactions |
JP2011023854A (ja) * | 2009-07-14 | 2011-02-03 | Sony Corp | 情報処理装置、情報処理方法およびプログラム |
KR101147683B1 (ko) * | 2009-10-08 | 2012-05-22 | 최운호 | 생체인식 카드와 csd를 활용한 컨테이너 및 물류추적시스템 |
US8461961B2 (en) * | 2009-11-04 | 2013-06-11 | Ming-Yuan Wu | Tamper-proof secure card with stored biometric data and method for using the secure card |
US8824749B2 (en) * | 2011-04-05 | 2014-09-02 | Microsoft Corporation | Biometric recognition |
JP2013164835A (ja) * | 2012-01-13 | 2013-08-22 | Ricoh Co Ltd | 認証システム、認証方法、機器、及びプログラム |
KR102460459B1 (ko) * | 2015-02-27 | 2022-10-28 | 삼성전자주식회사 | 전자 장치를 이용한 카드 서비스 방법 및 장치 |
JP6426504B2 (ja) * | 2015-03-10 | 2018-11-21 | 株式会社東芝 | 携帯可能電子装置、及びシステム |
KR102368614B1 (ko) * | 2015-08-12 | 2022-02-25 | 삼성전자주식회사 | 인증 처리 방법 및 이를 지원하는 전자 장치 |
-
2013
- 2013-10-15 KR KR1020130122946A patent/KR101343349B1/ko active IP Right Grant
-
2014
- 2014-10-15 CN CN201480068707.4A patent/CN105900114B/zh not_active Expired - Fee Related
- 2014-10-15 US US15/029,884 patent/US10140439B2/en not_active Expired - Fee Related
- 2014-10-15 JP JP2016524439A patent/JP6188938B2/ja not_active Expired - Fee Related
- 2014-10-15 EP EP14854792.0A patent/EP3059696A4/en not_active Withdrawn
- 2014-10-15 WO PCT/KR2014/009693 patent/WO2015056979A1/ko active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11338985A (ja) * | 1998-05-26 | 1999-12-10 | Nippon Telegr & Teleph Corp <Ntt> | セキュリティレベル設定判別方法とicカード及びその使用方法 |
JP2002312732A (ja) * | 2001-04-09 | 2002-10-25 | Nippon Telegr & Teleph Corp <Ntt> | プリペイドカード及びカードシステム |
US20070277044A1 (en) * | 2004-04-07 | 2007-11-29 | Hans Graf | Data Support With Tan-Generator And Display |
KR20060125033A (ko) * | 2005-06-01 | 2006-12-06 | 최재호 | 지문인식을 이용한 아이씨카드 활성화/비활성화 장치 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3059696A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2017054350A (ja) * | 2015-09-10 | 2017-03-16 | 大日本印刷株式会社 | ユーザ認証システム |
US9792516B2 (en) | 2016-01-26 | 2017-10-17 | Next Biometrics Group Asa | Flexible card with fingerprint sensor |
US10055664B2 (en) | 2016-01-26 | 2018-08-21 | Next Biometrics Group Asa | Flexible card with fingerprint sensor |
Also Published As
Publication number | Publication date |
---|---|
CN105900114A (zh) | 2016-08-24 |
US10140439B2 (en) | 2018-11-27 |
CN105900114B (zh) | 2019-03-08 |
US20160246954A1 (en) | 2016-08-25 |
KR101343349B1 (ko) | 2013-12-20 |
JP6188938B2 (ja) | 2017-08-30 |
EP3059696A4 (en) | 2017-03-22 |
EP3059696A1 (en) | 2016-08-24 |
JP2016535886A (ja) | 2016-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015056979A1 (ko) | 지문 인증을 수행하는 보안카드와 그에 따른 보안카드 처리 시스템 및 그 처리 방법 | |
US7697737B2 (en) | Method and system for providing fingerprint enabled wireless add-on for personal identification number (PIN) accessible smartcards | |
WO2018101727A1 (ko) | 인증프로세스의 단계분할과 생체인증을 접목한 개인정보침해 방어 방법 및 시스템 | |
US8689013B2 (en) | Dual-interface key management | |
US8589696B2 (en) | Biometric identification method | |
WO2015199501A1 (ko) | 가변 키패드와 생체 인식을 이용한 본인 인증 방법 및 시스템 | |
US20090228714A1 (en) | Secure mobile device with online vault | |
WO2016056853A1 (ko) | 이동통신단말기 및 실물 금융카드를 이용한 간편 본인 인증 시스템 및 그 방법 | |
WO2008041286A1 (fr) | Processeur d'informations et procédé de gestion d'informations | |
JPH1139483A (ja) | 指紋認証カード、メモリカード、認証システム、認証装置及び携帯機器 | |
JP2004518229A (ja) | コンピュータ・ネットワークのセキュリティを保障する方法およびシステム、並びにネットワーク・コンポーネントへのアクセスを制御するために同システム内で用いられる個人識別装置 | |
JP6399605B2 (ja) | 認証装置、認証方法及びプログラム | |
WO2020190099A1 (en) | Electronic device for managing personal information and operating method thereof | |
WO2013035927A1 (ko) | 홍채이미지 정보를 포함하는 일회용 비밀번호가 탑재된 스마트카드 | |
EP3622429B1 (en) | Methods and devices of enabling authentication of a user of a client device over a secure communication channel based on biometric data | |
WO2011077613A1 (ja) | 生体認証システム | |
US20100319058A1 (en) | Method using electronic chip for authentication and configuring one time password | |
WO2022114290A1 (ko) | 비대면 본인인증 시스템 및 그 방법 | |
WO2015182940A1 (ko) | 개인 식별 카드, 개인 식별 카드의 발급 방법 및 시스템, 개인 식별 카드의 인증 방법 및 시스템 | |
US11165772B2 (en) | Methods and devices of enabling authentication of a user of a client device over a secure communication channel based on biometric data | |
JP2000020727A (ja) | 指紋照合システム及びそれに用いるメモリカード | |
KR20190061606A (ko) | 인증프로세스의 단계분할과 생체인증을 접목한 개인정보침해 방어 방법 및 시스템 | |
JP2008033805A (ja) | 個人情報保護システム、個人情報保護方法、及び個人情報保護プログラム | |
JPH09204401A (ja) | データベース検索システムおよびデータベース保護方法 | |
JPH0469791A (ja) | 情報記憶媒体 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14854792 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2016524439 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15029884 Country of ref document: US |
|
REEP | Request for entry into the european phase |
Ref document number: 2014854792 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014854792 Country of ref document: EP |