Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium
First Claim
1. A restriction method for utilization of computer file, comprising the steps of:
- storing first biometrical information previously in a computer, said first biometrical information identifying an arbitrary user individual and obtained from individual identification information input means;
obtaining second biometrical information of an operator from said individual identification information input means when the operator uses said computer;
collating said first biometrical information with the obtained second biometrical information, authenticating that the operator is the user if a match is obtained between said first biometrical information and said second biometrical information, and canceling utilization restriction of a computer file subjected to utilization restriction set therefor.
1 Assignment
0 Petitions
Accused Products
Abstract
When logging in a server via an information network, high security is ensured without using a password. When a terminal 2 accesses a server 3, a random key is sent from the server 3. An operator inputs a fingerprint from an individual identification input device, and the terminal 2 collates the fingerprint information with registered fingerprint information previously registered. If a match is obtained, the terminal 2 generates a log-in packet, and transmits the log-in packet to the server 3. If a match is not obtained, the log-in processing is suspended. The server 3 resolves the received log-in packet, takes out the registered fingerprint information, fingerprint information, and a user code, and collates the registered fingerprint information with fingerprint information. If a match is obtained, the server 3 collates the transmitted user code with a user code previously stored in the server 3. If a match is not obtained, the log-in processing is suspended. If a match is obtained, the server 3 permits log-in.
21 Citations
8 Claims
-
1. A restriction method for utilization of computer file, comprising the steps of:
-
storing first biometrical information previously in a computer, said first biometrical information identifying an arbitrary user individual and obtained from individual identification information input means;
obtaining second biometrical information of an operator from said individual identification information input means when the operator uses said computer;
collating said first biometrical information with the obtained second biometrical information, authenticating that the operator is the user if a match is obtained between said first biometrical information and said second biometrical information, and canceling utilization restriction of a computer file subjected to utilization restriction set therefor. - View Dependent Claims (2, 3, 4)
-
-
5. A recording medium having a program recorded thereon, said program causing execution of the steps of:
-
collating first biometrical information with second biometrical information, said first biometrical information identifying an arbitrary user individual and being previously stored in a computer, said second biometrical information being obtained from an operator when using said computer; and
authenticating that the operator is the user if a match is obtained between said first biometrical information and said second biometrical information, and canceling utilization restriction of a computer file subjected to utilization restriction set therefor.
-
-
6. A method for logging in a computer system, comprising the steps of:
-
storing first biometrical information previously in a computer to be provided with communication service and previously in a computer system that provides said computer with communication service, said first biometrical information identifying an arbitrary user individual and being obtained from individual identification information input means;
receiving in said computer a random key outputted from said computer system when said computer logs in said computer system;
obtaining second biometrical information of an operator from said individual identification information input means when the operator uses said computer;
collating said first biometrical information with said second biometrical information, authenticating that the operator is the user if a match is obtained between said first biometrical information and said second biometrical information, and encrypting said first biometrical information by using said received random key;
generating a log-in packet having said encrypted first biometrical information and said second biometrical information, and transmitting said log-in packet to said computer system; and
decrypting said first biometrical information of said received log-in packet by said computer system, collating said decrypted first biometrical information with said second biometrical information of said received log-in packet, authenticating that the operator is the user if a match is obtained between said first biometrical information and said second biometrical information of said log-in packet, and permitting said computer to log in said computer system. - View Dependent Claims (7)
-
-
8. A recording medium having a first program and a second program recorded thereon,
when a computer to be provided with communication service logs in a computer system that provides said computer with communication service, said first program enabling said computer system to execute the steps of: -
transmitting a random key to said computer;
decrypting first biometrical information of a received log-in packet, and collating said decrypted first biometrical information with second biometrical information of said received log-in packet; and
authenticating that an operator is a user if a match is obtained between said decrypted first biometrical information and second biometrical information of said received log-in packet, and permitting log-in of said computer; and
said second program enabling said computer to execute the steps of;
collating previously stored first biometrical information with second biometrical information, said first biometrical information identifying an arbitrary user individual, said second biometrical information being obtained from an operator when using said computer;
authenticating that the operator is the user if a match is obtained between said first biometrical information and said second biometrical information, and encrypting said first biometrical information by using said inputted random key; and
generating a log-in packet having said encrypted first biometrical information and said second biometrical information, and transmitting said log-in packet to said computer system.
-
Specification