Information security – Access control or authentication
Reexamination Certificate
2007-12-03
2011-12-13
Cervetti, David Garcia (Department: 2436)
Information security
Access control or authentication
C713S186000
Reexamination Certificate
active
08079061
ABSTRACT:
Inputted information (such as biometric information) is compared to template information (including correlation or authentication) and the result is recorded as log information. According to log information for each of the types of the inputted information (such as information specifying the user who has inputted it and the template), analysis is executed for the inputted information for each of the types. This analysis includes the following aspects. That is, the following states are detected and an alarm is outputted for the accuracy of the corresponding type: when the ratio of negative comparison results (correlation failures) not smaller than a predetermined value is detected within a predetermined period of time; and when a negative result is detected within a predetermined time before an affirmative comparison result is obtained.
REFERENCES:
patent: 6751733 (2004-06-01), Nakamura et al.
patent: 6813010 (2004-11-01), Kono et al.
patent: 2002/0133725 (2002-09-01), Roy et al.
patent: 2004/0120556 (2004-06-01), Kono et al.
patent: 2005/0185827 (2005-08-01), Kono et al.
patent: 2005/0273866 (2005-12-01), Brown et al.
patent: 2006/0115129 (2006-06-01), Abe
patent: 2006/0174135 (2006-08-01), Takaku et al.
patent: 2006/0293892 (2006-12-01), Pathuel
patent: 2007/0050634 (2007-03-01), Makimoto et al.
patent: 2007/0057763 (2007-03-01), Blattner et al.
patent: 2007/0160198 (2007-07-01), Orsini et al.
patent: 2007/0175986 (2007-08-01), Petrone et al.
patent: 2008/0046753 (2008-02-01), Fusari
patent: 2008/0049988 (2008-02-01), Basile et al.
patent: 2008/0072283 (2008-03-01), Relyea et al.
patent: 2002-351843 (2002-12-01), None
Fujikawa, M.; Doi, H.; , “Design of Access Control System Considering Usability and Security—Application of Vital Sign Sensing Technology—,” Sensors for Industry Conference, 2005 , vol., no., pp. 15-21, Feb. 8-10, 2005, ISA.
Hashimoto, J.; , “Finger Vein Authentication Technology and Its Future,” VLSI Circuits, 2006. Digest of Technical Papers. 2006 Symposium on , vol., no., pp. 5-8, IEEE.
Sukhai, Nataliya, Access Control & Biometrics, Infosec Conference '04, Oct. 8, 2004, ACM.
Jain et al., Biometric Identification, Feb. 2000, vol. 43, No. 2, ACM.
Zhang et al., Palmprint Authentication System for Civil Applications, Springer Verlag, BioAW 2004, LNCS 3087, pp. 217-228, 2004.
Hamada Nariyasu
Isobe Yoshiaki
Shimizu Hiroyuki
Taniguchi Kazuhiko
Brundidge & Stanger, P.C.
Cervetti David Garcia
Hitachi , Ltd.
LandOfFree
Authentication system managing method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Authentication system managing method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication system managing method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4316676