专利摘要:
The invention relates to an authentication system (14), comprising a data terminal (1) with a data terminal device, a communication network (15) and an authentication service (16), wherein the data terminal device comprises an image recording device (3), an image processing module (4 ) and a wireless communication interface (5), wherein via the communication network (15), between the data terminal device and the authentication service (16), a communication link (17), wherein the data terminal (1) is formed by a clock.
公开号:AT514861A2
申请号:T50598/2013
申请日:2013-09-20
公开日:2015-04-15
发明作者:
申请人:Asmag Holding Gmbh;
IPC主号:
专利说明:

The invention relates to an authentication system comprising a data terminal, a communication network and an authentication service.
In the age of increased mobility, a mobile authentication option is becoming increasingly important. At times of document-based authentication scenarios, authentication of a person was usually possible only at a few, selected, and locally established institutions. For example, this has been done by authorities, offices and legal institutions such as notaries and lawyers. Due to the shift in service provision from fixed premises to mobile service offering via mobile data terminals, the requirement for authentication in the mobile domain is also shifting.
On the one hand, the service provider has an understandable interest in reliably and securely authenticating the person wishing to use a service offered. On the other hand, there is also an increased interest in the person to be able to reliably authenticate himself to a service provider or, for example, an authority.
It is known from the prior art to use mobile computers for this purpose, for example laptops. With such devices, a sufficient processing capacity is usually available in order to be able to carry out the sometimes quite complex analysis methods for carrying out the authentication. With such systems, a database was usually stored on the device in which authorized users were stored. To perform the user authentication, a biometric feature of the person was recorded, prepared accordingly and compared with the deposited features. A match found granted access to the device or requested transaction.
A disadvantage of such systems lies above all in the fact that biometric reference data are stored on the device and, in particular, a mobile computer due to its size and the sometimes quite long high start times, is rather unsuitable for rapid authentication.
In the course of technical development, the so-called smartphones on the one hand to a significant reduction of mobile data terminals while significantly increasing performance. On the other hand find such smartphones are becoming more widespread. When a smart phone is used as intended, it is assumed that such a device has a permanent data connection to a communications network, in particular a permanent connection to the Internet must be assumed. Therefore, it is less and less necessary to store extensive user reference data on the mobile terminal. These data can be stored on a central and mostly well secured server. The mobile data terminal then essentially serves as a recording and processing device, which detects a biometric feature of the person to be authenticated and transmits it via the communication network to a central service.
For example, document WO 2013/134299 A1 shows a two-stage system for processing a secure payment. In this case, a biometric feature is detected after a payment request by means of a smartphone, this is transmitted to a billing system, where the detected biometric feature is analyzed. If agreed, the payment will be released.
Furthermore, systems are also known which use an external medium as the unique identification feature of a person. Preferably, a so-called smart card is used for this, which is assumed to have only the assigned user or that only this person has access to the smart card. For example, the documents US 2013/0237190 A1 and US 2013/239202 A1 show systems in which a mobile data terminal is coupled to a smart card in order to establish an authentication over it.
The disadvantage of mobile computer systems is above all their size and the associated inflexibility with regard to a quick and simple authentication of a person. Smartphones have the advantage in this respect that they are much smaller and more compact and thus also a better distribution is given.
A disadvantage of both systems, however, is that they are also used for a variety of other applications due to the intended processing capacity. Thus, there is always a significant risk that due to a tampering attack, the authentication process on the device can be compromised. Furthermore, it is disadvantageous that in particular smartphones and laptops are often the subject of property offenses, so that in such a case an authentication of the person, for example in the course of the display of the property crime, is no longer possible.
The object of the invention is therefore to provide an authentication system which offers the highest degree of security with regard to the reliable authentication of a person and which overcomes the disadvantages of the prior art with regard to a simple availability.
The object of the invention is achieved by an authentication system comprising a data terminal with a data terminal, a communication network and an authentication service. The data terminal comprises an image capture device, an imaging module, and a wireless communication interface. Through the communication network, there is a communication link between the data terminal and the authentication service. In particular, the data terminal is formed by a clock.
The advantage of this embodiment is, in particular, that a watch is usually always carried as an object of daily use, without requiring its own carrying device or space in a bag or the like.
Thus, the data terminal is always available for performing an authentication available.
To this end, a further development is also that the clock is designed as a wristwatch, or pocket watch, or Ansteckuhr. An advantage of this development is also that a watch is usually not seen as a data terminal, which is helpful if an authentication process is to be obfuscated.
According to a development, it is also provided that the image recording device is formed by a flat image sensor. For example, this may be a well-known CCD image sensor with a square, or rectangular sensor surface. For reliable authentication, the sensor should have a minimum resolution of 640 points on the shortest side.
It is further provided that the communication interface is designed as a long-range interface and / or as a short-range interface. WLAN is preferably used as the remote area interface since this ensures good connectivity to a multiplicity of receiving stations. As is well known, a distance of several tens of meters can be bridged with WLAN. As a short-range interface, for example, Bluetooth, ZigBee or NFC can be used. The range of such communication system is limited to a few meters or centimeters. Thus, it can be ensured that connectivity is limited to a very limited area. This demarcated area can be easily observed by the user during the authentication in order to be able to detect a spying attempt.
It is also advantageous if the communication interface is designed as a mobile radio interface according to an international mobile radio standard. Thus, the data terminal can establish a direct connection to the communication network or to the authentication service, without having to rely on an interposition of a long-range communication system. Remote area communication systems can be difficult but more easily spied out when properly secured than a cellular connection. With regard to securing the communication connection, this training is therefore advantageous.
An advantage is an embodiment, according to which the communication interface is unidirectional, whereby a two-way authentication can be achieved. In this case, an authentication request is initiated by the mobile data terminal, the response via a positive / negative authentication by the authentication service via another way. For example, the authentication request at the POS (point of sale) could be done with the POS identifier, the response of the authentication service is sent directly to the POS.
In addition to the authentication of a person, it may be advantageous if a device of the person can be authenticated with the subject system. It is therefore provided according to a development that the data terminal has a data interface. Thus, the data terminal can be connected to the device to be authenticated and the authentication can be performed. After successful authentication, the device can perform actions with the permissions of the person.
Since the subject data terminal is a clock, whereby a good contact with the skin surface is usually given, especially in the execution as a wristwatch, it is provided according to a development that the data terminal further has an interface for a body area network (BAN) , In a BAN, various sensors for monitoring a person's vital signs can communicate with each other through the near field of the skin. This may, for example, be used to monitor the arrangement of the watch on a person with vital signs. Thus, an unambiguous assignment of the data terminal to a living person can be ensured.
According to a development, it is provided that the authentication service has a 2D / 3D image analysis module. It analyzes whether the image was captured by a 2D photo or a 3D object. Thus, a manipulation attempt with a photo of the person to be authenticated can be prevented. Such a system is known from the prior art, for example EP 2 584 493 A2.
It is further provided that the authentication service has a face finding and face recognition module. In a captured image, it is important to find the face, in order to be able to perform this after a further analysis to carry out the authentication. Methods for finding objects or for exempting faces are known from the prior art, for example from EP 1 119 822 B1 and DE 101 26 375 A1.
Another embodiment for ensuring a living person and not an authentication image is that the authentication service has a motion detection module. In particular, a movement recognition module can be used to check whether the acquired image performs randomly given movement patterns in an expected manner. Thus, the person to be authenticated may be required to take certain points of view. When changing the direction, proportions in the face of the person must change in certain dimensions. If they do not do this, it can be assumed that a 2D photo of the person is held in front of the image recording device. For example, EP 1 147 494 B1 shows such a motion detection module.
According to a further embodiment, it is provided that the authentication service comprises a database in which user reference data is stored. This database will preferably be particularly secure, physically, as well as data technology, to ensure the highest possible security of the stored data.
An advantageous development also consists in that the clock is integrated in a mobile communication device, in particular in a smartphone.
Furthermore, it is also provided that the data terminal is arranged in a separate housing. By an independent housing, all components of the terminal, in particular the data terminal, com pact and protected order. Preferably, the housing will be formed as a watch case, so as to be able to disguise the safety-related function of the data terminal if necessary.
In order to be able to give the person to be authenticated feedback about the authentication process, it is advantageous if the data terminal device has an output device which is arranged on the data terminal, preferably in a front side of the housing. The output device may be formed, for example, by a display, preferably an LCD or TFT display is selected. Furthermore, it is also advantageous if in addition, or alternatively, a status display, for example in the form of a light indicator is present. For correct authentication, it is necessary for the person to be in a certain distance to the data terminal. In particular, the image capture device must be able to fully capture the relevant feature of a person. Therefore, the person can be given feedback by means of the output means as to how the recording distance is to be changed, or whether the recording or the authentication was successful.
An important security risk in the authentication of a person by means of a mobile data terminal is to be sure that the data terminal can actually be assigned to a person who performs the authentication. Therefore, it is advantageous if in a rear wall of the housing, a biometric detection device is arranged, which is connected to the data terminal device. Thus, it can be ensured that in carrying out the authentication, the data terminal is mounted on a body part with biometric features. It is particularly advantageous if the biometric detection device is designed to detect the vein structure of the skin, which represents a unique biometric feature. Thus, a unique assignment of the terminal to a person is possible. Such a biometric security device is known, for example, from EP 2 240 882 B2. In this case, biometric reference patterns of, for example, the vein structure are deposited on the data terminal, which must match the detected coincidence.
According to a development, the housing has a holding device, or on the housing a holding device is arranged, wherein the holding device is designed for the arrangement of the housing to a person. This development has the advantage that the mobile data terminal can be worn like a wristwatch.
In terms of a reliable assignment of the mobile data terminal to a person is provided according to a development that the holding device has a closure element, which closure element is connected via a contact feed line with a safety circuit module of the data terminal. Thus, it can be clearly understood whether the holding device is closed and thus an assignment of the mobile data terminal is given to the person. However, it is particularly possible to detect when the closure element has been opened and thus an unambiguous assignment is no longer given. This is particularly important in that it is thus possible to maintain a Au-thentification as long as the holding device is closed - and thus associated with a person. As soon as the closure element is opened, the authentication can be canceled.
For a better understanding of the invention, this will be explained in more detail with reference to the following figures.
In each case, in a highly simplified, schematic representation:
1 shows an objective data terminal;
2 shows the subject authentication system;
Fig. 3 shows another possible embodiment of the subject authentication system.
Fig. 1 shows a data terminal 1 of the subject authentication system. The data terminal 1 is designed as a clock, which clock is arranged in a separate housing 2. The data terminal 1 further has a data terminal device, which data terminal device has an image recording device 3, an image processing module 4 and a wireless communication interface 5.
For arranging the data terminal 1 on a person, in particular on a body part of a person, it is further provided that the housing 2 has a holding device 6, or that a holding device 6 is arranged on the housing 2.
Preferably, the holding device 6 will have a closure element 7, which is connected via a contact feed line 8 with a safety circuit module of the data terminal.
According to a development, it can be provided that the data terminal has a data interface 9, which data interface 9 is preferably designed for connecting the data terminal 1 with a device to be authenticated.
According to a development, it can further be provided that the data terminal device has an output device 10, which is preferably arranged in a front side 11 of the housing 2. The output means may, for example, comprise a display 12, which reproduces the image captured by the image recording device 3. Thus, during the execution of the authentication, the user can be given a visual check as to whether the data terminal 1 is held in correct relation to the body of the person, in particular to the face. In a correct positioning, for example, by a color change of the display 12, the correct positioning can be displayed.
However, it is also possible that the output means 10 additionally or alternatively has a light indicator 13, by means of which the user can also be given a feedback about the correct positioning of the data terminal 1. For example, in the sense of a traffic light system, the correct positioning can be displayed.
FIG. 2 shows a possible embodiment of the subject authentication system 14, comprising a mobile data terminal 1, a communication network 15 and an authentication service 16. A communications connection 17 is established via the communication network 15 between the wireless communication interface 5 and the authentication service 16. Preferably, this communication link 17 is bidirectional, but it is also a unidirectional training, from the terminal 1 to the authentication service 16 possible. The authentication service 16 preferably has a 2D / 3D image analysis module 18, a face finding and recognition module 19 and a motion detection module 20. Furthermore, the authentication service 16 comprises a database 21 in which user reference data is stored.
If an authentication request is now triggered by the data terminal 1, an image, or a sequence of images, of the person to be authenticated is recorded by the image recording device 3, optionally processed and transmitted via the communication connection 17 to the authentication service 16. The face finding and face recognition module 19, to determine a face, or the position of the face in the image for further processing from the transmitted recording data. Subsequently, a check is made by the 2D / 3D image analysis module 18 as to whether a captured image is an image of a real person, ie a 3D object, or whether an image of a 2D photo has been acquired.
Since motion pictures can also be recorded by the image recording device 3 in addition to one or more still images, the motion detection module 20 can analyze a sequence of movements which can only occur if the images were acquired by a real person. After performing one or more image analyzes, the analysis result is compared with the user reference data stored in the database 21, and if a match is found, a positive authentication signal is sent back to the data terminal 1, or provided via an interface 22 to an external service provider.
Fig. 3 shows another possible embodiment of the subject authentication runqs system 14. In Fiq. 2 was an implementation in which an external
Service provider could receive a positive authentication via an interface 22 of the authentication service 16 and could then provide the requested service.
3 now shows a possibility in which a user can trigger an authentication request at the point of sale (POS) 23 at the point of service provision. For example, this POS 23 may be a cash desk, an access control and / or an identity check with an authority. For this purpose, the communication interface 5 is preferably additionally designed as a short-range interface and thus can produce a short-range data connection with a corresponding remote station of the point of sale (POS) 23. The authentication result can now be transmitted back to the data terminal 1 by the authentication service 16 via the communication connection 17 in order to be transmitted by the authentication service 16 to the POS 23 via the communication interface 5. However, it is also possible for the short-range interface to be unidirectional and thus for example to be able to transmit only a unique identifier of the POS 23 to the authentication service 16. The authentication result of the authentication service 16 can now be transmitted directly to the POS by means of the transmitted identifier of the POS, for example via the interface 22 of the authentication service 16. Thus, an increase of the authentication security can be achieved since the result of the authentication is not limited by the Authentication triggering device is provided, but that this is transmitted back via an independent path.
Finally, it should be noted that in the differently described embodiments, the same parts are provided with the same reference numerals and the same component names, the disclosures contained throughout the description can be mutatis mutandis to the same parts with the same reference numerals or identical component names. Also, the location information chosen in the description, such as top, bottom, side, etc. related to the immediately described and illustrated figure and these position information in a change in position mutatis mutandis to transfer to the new location.
Furthermore, individual features or combinations of features from the different exemplary embodiments shown and described can also represent independent, inventive or inventive solutions.
The task underlying the independent inventive solutions can be taken from the description. All statements of value ranges in the present description should be understood to include any and all sub-ranges thereof, e.g. is the statement 1 to 10 to be understood that all sub-areas, starting from the lower limit 1 and the upper limit 10 are included, ie. all sub-areas begin with a lower limit of 1 or greater and end at an upper limit of 10 or less, e.g. 1 to 1.7, or 3.2 to 8.1, or 5.5 to 10.
For the sake of order, it should finally be pointed out that in order to better understand the structure of the authentication system, these or their components have been partially displayed out of scale and / or enlarged and / or reduced in size.
LIST OF REFERENCE NUMERALS 1 Data terminal 2 Housing 3 Image recording device 4 Image processing module 5 Communication interface 6 Holding device 7 Closing element 8 Contact delivery line 9 Data interface 10 Output device 11 Front 12 Display 13 Illuminated display 14 Authentication system 15 Communication network 16 Authentication service 17 Communication connection 18 2D / 3D image analysis module 19 Face Detection and Face Detection Module 20 Motion Detection Module 21 Database 22 Interface 23 point of sale (POS)
权利要求:
Claims (18)
[1]
An authentication system (14) comprising a data terminal (1) with a data terminal, a communication network (15) and an authentication service (16), the data terminal comprising an image capture device (3), a rendering module ( 4) and a wireless communication interface (5), wherein via the communication network (15), between the data terminal device and the authentication service (16), a communication link (17) is characterized in that the data terminal (1) is formed by a clock.
[2]
2. Authentication system according to claim 1, characterized in that the clock is designed as a wristwatch, or pocket watch, or Ansteckuhr.
[3]
3. Authentication system according to one of claims 1 or 2, characterized in that the image recording device (3) is formed by a flat image sensor.
[4]
4. Authentication system according to one of claims 1 to 3, characterized in that the communication interface (5) is designed as a long-range interface and / or as a short-range interface.
[5]
5. Authentication system according to one of claims 1 to 4, characterized in that the communication interface (5) is designed as a mobile radio interface according to an international mobile radio standard.
[6]
6. authentication system according to one of claims 1 to 5, characterized in that the communication interface (5) is formed unidirectionally.
[7]
7. Authentication system according to one of claims 1 to 6, characterized in that the data terminal device has a data interface (9).
[8]
8. Authentication system according to one of claims 1 to 7, characterized in that the data terminal further comprises an interface for a body area network.
[9]
9. Authentication system according to one of claims 1 to 8, characterized in that the authentication service (16) comprises a 2D / 3D image analysis module (18).
[10]
10. Authentication system according to one of claims 1 to 9, characterized in that the authentication service (16) comprises a face finding and face recognition module (19).
[11]
11. Authentication system according to one of claims 1 to 10, characterized in that the authentication service (16) comprises a motion detection module (20).
[12]
The authentication system according to claim 1, wherein the authentication service comprises a database in which user reference data is stored
[13]
13. Authentication system according to one of claims 1 to 12, characterized in that the clock is integrated in a mobile communication device, in particular in a smartphone.
[14]
14. Authentication system according to one of claims 1 to 13, characterized in that the data terminal (1) is arranged in a separate housing (2).
[15]
15. Authentication system according to claim 14, characterized in that the data terminal device has an output means (10), which is arranged on the data terminal (1), preferably in a front side (11) of the housing. (2)
[16]
16. Authentication system according to one of claims 14 or 15, characterized in that in a rear wall of the housing (2) a biometric detection device is arranged, which is connected to the data terminal device.
[17]
17. Authentication system according to one of claims 14 to 16, characterized in that the housing (2) has a holding device or on the housing (2) a holding device (6) is arranged, wherein the holding device for the arrangement of the housing (2) is formed on a person.
[18]
18. Authentication system according to claim 17, characterized in that the holding device has a closure element (7), which closure element (7) via a contact feed line (8) is connected to a safety circuit module of the data terminal.
类似技术:
公开号 | 公开日 | 专利标题
EP3025200B1|2020-08-19|Method and device for verifying diffractive elements
DE102013201027A1|2014-07-24|Method for authenticating a user to a vending machine
DE102008023914A1|2009-12-10|Method for authenticating an RFID tag
EP2393032B1|2020-04-22|Method for running an application with the help of a portable data storage device
EP2715684A1|2014-04-09|Electronic system for quickly and securely processing transactions using mobile devices
EP3047670B1|2020-12-02|Authentication system for a mobile data terminal
EP2770484B1|2016-10-12|Reader for a document, method for reading a data object and computer program product
AT504581B1|2009-03-15|METHOD AND SYSTEM FOR READING DATA FROM A MEMORY OF A REMOTE DEVICE THROUGH A SERVER
EP2199944A2|2010-06-23|Method for authenticating a person for an electronic data processing assembly with an electronic key
EP2949096B1|2016-12-21|Production of positional data by means of a distance-bounding protocol
DE102005043053A1|2007-03-22|User authorization information e.g. name, identification unit for use in company, has release and locking unit for identifying and representing user authorization information on indicating unit that is in form of electronic paper
EP2994890B1|2021-01-27|Method and device for providing data for toll charging and toll system
DE10245347A1|2004-04-08|Digital data signing
DE102014002602B4|2021-10-21|Method for authorizing a transaction and the use of a clock and a cash register system in this method
WO2005081193A1|2005-09-01|User controlled detection system
EP2768199B1|2018-11-21|Method for transferring authorization information through a telecommunications network or an authorization associated with a telecommunication terminal. telecommunications terminal, system. computer program and a computer program product
EP2592584A1|2013-05-15|Secure wireless transaction
DE102014209191A1|2015-12-03|System and method for downloading data stored on a tachograph
WO2007062888A1|2007-06-07|Mobile chip card device and method for authenticating at least one device using a chip card
DE102019133836A1|2021-06-10|Check card-shaped device and method for activating data transmission of a check card-shaped device
DE102014011853A1|2016-02-11|Method for performing a financial transaction
EP3671669A1|2020-06-24|Access control device and method for checking an access request in an access control device
DE102010054061A1|2012-06-14|Portable system for authenticating person e.g. during opening of account in bank, has integrated semiconductor chip comprising evaluation unit for evaluating user input and storage region for storing user input
EP3014838B1|2017-05-17|Protection of a near-field transaction between a terminal and a security module
DE102013021935A1|2015-06-25|Method and apparatus for using a security element with a mobile terminal
同族专利:
公开号 | 公开日
CN105723762A|2016-06-29|
KR102232720B1|2021-03-29|
US20160285865A1|2016-09-29|
EP3047670B1|2020-12-02|
RU2701208C2|2019-09-25|
BR112016006195A2|2017-08-01|
RU2016115057A|2017-10-25|
RU2016115057A3|2018-06-08|
AT514861A3|2015-05-15|
CN105723762B|2019-08-23|
EP3047670A1|2016-07-27|
KR20160070080A|2016-06-17|
WO2015039157A1|2015-03-26|
US10341340B2|2019-07-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

DE19847261A1|1998-10-05|2000-04-06|Dcs Dialog Communication Syste|Process and system for person recognition with model-based face finding|
DE19901881A1|1999-01-19|2000-07-27|Dcs Dialog Communication Syste|Falsification protection method for biometric identification process for people using multiple data samples,|
JP2001195145A|2000-01-07|2001-07-19|Seiko Instruments Inc|Information processor, individual authentication method and computer readable recording medium recording program to make computer execute the method|
US6937135B2|2001-05-30|2005-08-30|Hewlett-Packard Development Company, L.P.|Face and environment sensing watch|
DE10126375B4|2001-05-30|2004-03-25|Humanscan Gmbh|Object detection method and system|
US7474592B2|2001-12-05|2009-01-06|Hewlett-Packard Development Company, L.P.|Secure operation of a versatile device based on whether an authenticated user continues to wear the versatile device after initiating its use|
JP2004133794A|2002-10-11|2004-04-30|Ntt Docomo Inc|Authentication device, authentication system, and authentication method|
JP2004318828A|2003-03-31|2004-11-11|Seiko Epson Corp|Data backup system, data backup method, wearable computer, mail transmission system, image information transmission system and data backup program|
JP2005301539A|2004-04-09|2005-10-27|Oki Electric Ind Co Ltd|Individual identification system using face authentication|
JP2006236251A|2005-02-28|2006-09-07|Fujitsu Ltd|Time stamp device, time calibration method and time calibration program|
EP1914656A4|2005-08-05|2012-06-13|Sharp Kk|Communication device and communication system|
TW200841683A|2007-04-04|2008-10-16|Hsien-Chin Chiang|Watch shape cellular phone|
AT506236B1|2008-01-09|2011-01-15|Nanoident Technologies Ag|BIOMETRIC SAFETY DEVICE|
US8424079B2|2008-01-25|2013-04-16|Research In Motion Limited|Method, system and mobile device employing enhanced user authentication|
RU74231U1|2008-02-04|2008-06-20|Александр Александрович Тузов|MONEY TRANSFER SYSTEM|
EP2313847A4|2008-08-19|2015-12-09|Digimarc Corp|Methods and systems for content processing|
RU2419154C2|2008-11-06|2011-05-20|Наталья Петровна Катина|Method and system to remotely identify and verify customer identity when rendering financial services|
CN101621519A|2009-03-17|2010-01-06|腾讯数码(天津)有限公司|Method and device for video authentication of user|
US20160342784A1|2011-07-15|2016-11-24|Vmware, Inc.|Mobile device authentication|
KR20120122587A|2011-04-29|2012-11-07|이청종|Apparatus and method of mobile terminal security using fingerprint and face recognition|
US9495550B2|2011-08-04|2016-11-15|J. Chance Anderson|System and method for sharing of data securely between electronic devices|
DE102011054658A1|2011-10-20|2013-04-25|Bioid Ag|Method for distinguishing between a real face and a two-dimensional image of the face in a biometric capture process|
US10165440B2|2012-01-17|2018-12-25|Entrust, Inc.|Method and apparatus for remote portable wireless device authentication|
EP2823438A4|2012-03-05|2015-05-06|Visa Int Service Ass|Authentication using biometric technology through a consumer device|
CN103235476A|2013-05-06|2013-08-07|苏州百纳思光学科技有限公司|Minicamera and flash lamp device for intelligent watches|
US10235508B2|2013-05-08|2019-03-19|Jpmorgan Chase Bank, N.A.|Systems and methods for high fidelity multi-modal out-of-band biometric authentication with human cross-checking|
KR102127927B1|2013-07-30|2020-07-09|엘지전자 주식회사|Mobile terminal, smart watch and security authorizing method therbetween|
US9892576B2|2013-08-02|2018-02-13|Jpmorgan Chase Bank, N.A.|Biometrics identification module and personal wearable electronics network based authentication and transaction processing|TWI680401B|2017-01-25|2019-12-21|華碩電腦股份有限公司|Electronic device and operation method thereof|
DE202017106362U1|2017-10-20|2017-12-14|STAHLWILLE Eduard Wille GmbH & Co. KG|Operating tool and / or measuring device with SIM card|
EP3651057A1|2018-11-09|2020-05-13|Tissot S.A.|Procedure for facial authentication of a wearer of a watch|
法律状态:
优先权:
申请号 | 申请日 | 专利标题
AT505982013A|AT514861A3|2013-09-20|2013-09-20|Authentication system for a mobile data terminal|AT505982013A| AT514861A3|2013-09-20|2013-09-20|Authentication system for a mobile data terminal|
KR1020167010228A| KR102232720B1|2013-09-20|2014-09-18|Authentication system for a mobile data terminal|
PCT/AT2014/050210| WO2015039157A1|2013-09-20|2014-09-18|Authentication system for a mobile data terminal|
EP14798676.4A| EP3047670B1|2013-09-20|2014-09-18|Authentication system for a mobile data terminal|
RU2016115057A| RU2701208C2|2013-09-20|2014-09-18|Authentication system for mobile data terminal|
US15/023,462| US10341340B2|2013-09-20|2014-09-18|Authentication system for a mobile data terminal|
BR112016006195A| BR112016006195A2|2013-09-20|2014-09-18|authentication system for a data terminal device|
CN201480061592.6A| CN105723762B|2013-09-20|2014-09-18|Verification System for moving data terminal equipment|
[返回顶部]