Detecting apparatus, input apparatus, pointing device,...

Computer graphics processing and selective visual display system – Display peripheral interface input device – Including keyboard

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C340S407100, C340S407200, C341S022000, C708S142000

Reexamination Certificate

active

06657614

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a detecting apparatus, an input apparatus, a pointing device, an individual identification apparatus, and a recording medium, and more particularly to a detecting apparatus, an input apparatus, a pointing device, an individual identification apparatus, and a recording medium that identify individuals by using the natural features and acquired features of their bodies as identification information.
2. Description of the Prior Art
There are conventionally known methods for identifying individuals, used with individual identification apparatuses. Some use, as keys, unchangeable features of a body such as a fingerprint, iris, retina, hand print, and face. Others use, as keys, properties changing with time, such as a voiceprint and signature.
Generally, to use the features of a body such as a fingerprint, iris, retina, hand print, and face as keys, they are in advance measured by a digital camera or the like, and it is determined whether those thus measured match those registered. This is also true for information changing with time, such as a voiceprint and signature; inputted audio information and text information are digitized, and it is determined whether the digitized information matches registered digital information.
In “USER AUTHENTICATION METHOD AND USER AUTHENTICATION SYSTEM” disclosed in Japanese Published Unexamined Patent Application No. Hei 10-269182, a system is proposed which uses the peculiarities of operations of keyboard and mouse buttons to identify individuals with high accuracy. The Japanese Published Unexamined Patent Application No. Hei 10-269182 proposes identifying individuals by patterns obtained based on the peculiarities of operations of keyboard and mouse buttons.
Specifically, in the Japanese Published Unexamined Patent Application No. Hei 10-269182, when a predetermined password is entered, the timings of turning on and off a keyboard are measured, and when mouse buttons are clicked plural times, on/off timings are measured. The obtained timings are converted to binary values to create patterns, which are stored as personal information. An inputted pattern and registered timing patterns are compared to identify individuals.
The method of using the peculiarities of keyboard operations for individual identification is used in, e.g., BIOPASSWORD (http://www.biopassword.com.). Anotherproposedmethodfor identifying individualsuses individual walking patterns.
By the way, it is generally performed in a computer's access management or the like that the individual identification method as described above is used for user identification at first log-in or connection to a network to determine whether a user is a registered principal or one of plural registered persons.
However, the above-described method used for a computer's access management cannot prevent the fraud of impersonating authorized users. Specifically, generally, in a computer's access management, once it has been determined that a user is a registered principal or one of plural registered persons, the lock is unlocked and no subsequent check is made.
In other words, whether the features of a body such as a fingerprint, iris, retina, hand print, and face are used as keys or keyboard operation patterns are used as keys, their measurement subjects are verified only at the first log-in or at the time of connection to a network, and after the verification, they are generally not measured repeatedly.
Consequently, where a principal is away from his seat or an access right is obtained by forging the measurement subjects or other methods, the fraud could freely gain access to secret information.
Also when a voice print or signature changing with time is used, the same problem could occur because it is usually improbable for users to keep uttering their voice or using a pen for the duration of operations of a terminal such as a computer.
The above-described method for identifying individuals by using the features of abodyas keys, which has developed originally for the purpose of identifying one of a large number of candidates, is capable of identifying one of a large number of candidates. However, it is not suitable for determining that a user is a registered principal or one of plural registered persons over time.
The above-described method has a basic problem in that because of the nature of using the features of a body as keys, identification subjects corresponding to the keys are easily forged because they always become identical, so that frauds by forging cannot be completely prevented.
For example, with the method of using a fingerprint, hand print, and face, there is a highly probable risk that they are relatively easily duplicated because it uses appearances. Also with the method of using irises, since iris patterns are scanned by a camera, they could be stolen by the same method.
Although the method of using retinas is resistant to forgery, they may be stolen by some method since the method uses shapes. Voice prints may be stolen by recording them. Signatures may also be stolen since users conduct much training so as to develop constantly stable signature.
Furthermore, once these measurement subjects have been stolen or forged, since principals cannot change measurement subjects such as fingerprints, there is another problem that principals stolen cannot use the measurement subject for individual identification during their lifetime.
These methods have problems as described below. With the method of using fingerprints, users have a strong sense of mental resistance against it because of its image of criminal investigation and therefore there is a difficult problem, independent of technology, that its image must be removed to achieve widespread use. With the method of using blood vessel patterns of retinas, there is a problem in that users suffer from a mental burden because of the need to irradiate eyes with light.
The method of using face shapes lacks stability because of the need to confine postures and illumination conditions within a given range. Voice prints and signatures depend on mental states and health and lack stability. Furthermore, fingerprints, faces, and hand prints may not, in some cases, be used because of accessories such as glasses and finger rings, and appearance change due to makeup or chemical agents, contamination, and the like.
The method of identifying individuals from keyboard operation patterns is applicable only to adequately stable typing patterns such as password entry. As a matter of course, with this method, no information can be obtained from one button operation.
There is not much information that can be obtained from typing patterns alone, produced from a small number of key operations such as password entry, including a double-clicking operation, so that it is impossible to correctly distinguish many persons. Further, the method cannot be used except during specific operations such as text preparation and programming. The accuracy of the method depends greatly on factors such as the level of typing skill, mental states, and health.
As another method for identifying individuals, a method is proposed that uses individual walking patterns. This method can be used for the management of access to buildings or the like but cannot for a computer's access management.
SUMMARY OF THE INVENTION
The present invention has been made in view of the above circumstances and provides a detecting apparatus, an input apparatus, a pointing device, an individual identification apparatus, and a recording medium that use information about users' bodies, which disables the fraud of impersonating authorized users, and is extremely difficult to forge and is obtained without giving the users a sense of inhibitions, without restraining their bodies during use, and independent of their mental states and health.
According to an aspect of the present invention, the detecting apparatus has a pressed member having a side being pressed with a finger, a detector which detects a feature

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Detecting apparatus, input apparatus, pointing device,... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Detecting apparatus, input apparatus, pointing device,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting apparatus, input apparatus, pointing device,... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3178521

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.