Method and apparatus for personal identification
First Claim
1. A user authentication method for determining whether or not the user who is trying to use user equipment is the user who is authorized to use said user equipment, provided with a step in which the original information is divided into a first information segment and a second information segment, and in which the first information segment is stored in a user-worn device worn by a user and the second information segment is stored in a device used by a user;
- a step in which the first information segment is sent from the user-worn device;
a step in which the information is received by the user device; and
a step in which the identity of the user is authenticated when the original information can be reconstructed by combining the information received by the user device with the second information segment stored in the user device.
1 Assignment
0 Petitions
Accused Products
Abstract
A user-worn device 10a that is to be installed in user-worn equipment (wristwatch, eyeglasses, etc.) 30a that can be worn by a user, and a user device 20a that is to be installed in user equipment (card, mobile telephone, etc.) 40a to be used by the user are employed.
The original information is divided to form a first information segment (1) and a second information segment (2). The first information segment (1) is stored in the user-worn device 10a and the second information segment (2) and the original information are stored in the user device 20a. The user-worn device 10a sends the first information segment (1) stored in its storage. The user device 20a combines the second information segment (2) stored in its storage with the received first information segment (1), forming a third piece of information. The identity of the user is authenticated if the third piece of information matches the original information. Once the identity of the user is authenticated, the user device 20a permits the use of the user equipment 40a.
88 Citations
34 Claims
-
1. A user authentication method for determining whether or not the user who is trying to use user equipment is the user who is authorized to use said user equipment, provided with
a step in which the original information is divided into a first information segment and a second information segment, and in which the first information segment is stored in a user-worn device worn by a user and the second information segment is stored in a device used by a user; -
a step in which the first information segment is sent from the user-worn device;
a step in which the information is received by the user device; and
a step in which the identity of the user is authenticated when the original information can be reconstructed by combining the information received by the user device with the second information segment stored in the user device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A user authentication device for determining whether or not the user who is trying to use the user equipment is the user who is authorized to use said user equipment, provided with
a user-worn device to be worn by a user, and a user device installed in the user equipment to be used by a user, wherein the user-worn device has a first storage device for storing the first information segment obtained by dividing the original information into a first information segment and a second information segment, a modulation device for modulating the first information segment stored in the first storage device, and a first communication device, and the user device has a second storage device for storing the second information segment obtained by dividing the original information into the first information segment and the second information segment, a second communication device, a demodulation device for demodulating the information received by the second communication device, and a user authentication device that authenticates the identity of the user if the original information can be reconstructed by combining the information demodulated by the demodulation device with the second information segment stored in the second storage device.
-
20. A user authentication device for determining whether or not the user who is trying to use the user equipment is the user who is authorized to use said user equipment, provided with
N (where N is an integer that is 3 or greater) user-worn devices to be worn by the user, and a user device installed in the user equipment to be used by the user, wherein the first through (N− - 1)-th user-worn devices have first through N-th storage devices and first through (N−
1)-th communication devices for sending the information stored in the first through (N−
1)-th storage devices, respectively,the user device is provided with the N-th storage device, the N-th communication device, and a user authentication device, the first through (N−
1)-th storage devices store the first through (N−
1)-th information segments out of the first through N-th information segments formed by dividing the original information, andthe N-th storage device stores the N-th information segment out of the first through N-th information segments formed by dividing the original information, and the user authentication device authenticates the identity of the user if the original information can be reconstructed by combining the information received by the communication device with the information stored in the N-th storage device.
- 1)-th user-worn devices have first through N-th storage devices and first through (N−
-
21. A user authentication method for determining whether or not the user who is trying to use the user equipment is the user who is authorized to use said user equipment, provided with
a step in which the original information is divided into a first information segment and a second information segment, and the first information segment is stored in a user-worn device worn by the user and the second information segment is stored in a device used by the user; -
a step in which the first information segment is sent from the user-worn device;
a step in which the first information segment is received by the user device;
a step in which the first information segment received by the user device and the second information segment stored in the user device are sent from the user device to an authentication center;
a step in which the authentication center receives the first information segment and the second information segment sent from the user device, and a step in which the identity of the user is authenticated when the original information can be reconstructed by combining the first information segment with the second information segment received by the authentication center. - View Dependent Claims (22)
-
-
23. A user authentication method for determining whether or not the user who is trying to use the user equipment is the user who is authorized to use said user equipment, provided with
a step in which the original information is divided into a first information segment and a second information segment, and in which the first information segment is stored in the user-worn device to be worn by the user and the second information segment is stored in the user device to be installed in the user equipment to be used by the user; -
a step in which a public key is divided into a first public key and a second public key, and in which the first public key is stored in the user-worn device and the second public key is stored in the user device;
a step in which the first information segment and the first public key are sent from the user-worn device;
a step in which the user device receives the first information segment and the first public key;
a step in which the first information segment received by the user device and the second information segment stored in the user device are encrypted using the public key obtained by combining the first public key received by the user device with the second public key maintained by the user device before sending the encrypted information to an authentication center;
a step in which the authentication center receives the encrypted information, and a step in which the encrypted information received by the authentication center is decrypted into the first information segment and the second information segment using the secret key that corresponds to the public key being used by the user device, and in which the identity of the user is authenticated if the original information can be reconstructed by combining the decrypted first information segment with the second information segment.
-
-
24. A user authentication device for determining whether or not the user who is trying to use the user equipment is the user who is authorized to use said user equipment, provided with
a user-worn device to be worn by the user, a user device installed in the user equipment to be used by the user, and an authentication center, wherein the user-worn device has a first storage device for storing the first information segment obtained by dividing the original information into a first information segment and a second information segment, and a first communication device for sending the first information segment stored in the first storage device; -
the user device has a second storage device for storing the second information segment obtained by dividing the original information into the first information segment and the second information segment, a second communication device, and a third communication device for sending the first information segment received by the second communication device and the second information segment stored in the second storage device to the authentication center; and
the authentication center has a user authentication device that authenticates the identity of the user if the original information can be reconstructed by combining the first information segment with the second information segment sent from the user device. - View Dependent Claims (25, 26)
-
-
27. A user authentication device for determining whether or not the user who is trying to use the user equipment is the user who is authorized to use said user equipment, provided with
a user-worn device to be worn by the user, a user device installed in the user equipment to be used by the user, and an authentication center, wherein the user-worn device has a first storage device for storing the first information segment formed by dividing the original information into a first information segment and a second information segment as well as the first public key obtained by dividing a public key into a first public key and a second public key, and a first communication device for sending the first information segment and the first public key stored in the first storage device; -
the user device has a second storage device for storing the second information segment formed by dividing the original information into the first information segment and the second information segment as well as the second public key obtained by dividing a public key into a first public key and a second public key, a second communication device, and a third communication device for encrypting the first information segment received by the second communication device and the second information segment stored in the second storage device using the public key formed by combining the first public key received by the second communication device with the second public key stored in the second storage device, before sending the encrypted information to the authentication center; and
the authentication center has a user authentication device that decrypts the encrypted information received from the user device using the secret key that corresponds to the public key being used by the user device, and which authenticates the identity of the user if the original information can be reconstructed by combining the decrypted first information segment with the second information segment.
-
-
28. A generation device for a user authentication device comprised of
a user-worn device to be worn by a user and having a first storage device for storing the first information segment formed by dividing the original information into a first information segment and a second information segment, and a first communication device for sending the first information segment stored in the first storage device, and a user device to be installed in user equipment to be used by a user, having a second storage device for storing the second information segment formed by dividing the original information into a first information segment and a second information segment, a second communication device, and a user authentication device that authenticates the identity of the user if the original information can be reconstructed by combining the information received by the second communication device with the second information segment; - provided with
a processing device, an information-writing device, and a display device, wherein the processing device forms a first information segment and a second information segment by dividing the original information being displayed on the display device based on the dividing line being displayed on the display device, and outputs the first information segment and the second information segment that have been formed to the information-writing device, and the information-writing device writes the first information segment that is output from the processing device into the first storage device of the user-worn device and also writes the second information segment that is output from the processing device into the second storage device of the user device.
- provided with
-
29. A generation device for a user authentication device comprised of
a user-worn device to be worn by a user and having a first storage device for storing the first information segment formed by dividing the original information into a first information segment and a second information segment, and a first communication device for sending the first information segment stored in the first storage device, and a user device to be installed in user equipment to be used by a user, having a second storage device for storing the second information segment formed by dividing the original information into a first information segment and a second information segment, a second communication device, and a user authentication device that authenticates the identity of the user if the original information can be reconstructed by combining the information received by the second communication device with the second information segment; - provided with
a processing device, an information-writing device, and a display device, wherein the processing device forms the first information segment and the second information segment by dividing the original information that has been input from an input device using the dividing method specified by the input device, and outputs the first information segment and the second information segment that have been formed to the information-writing device, and the information-writing device writes the first information segment that is output from the processing device into the first storage device of the user-worn device and also writes the second information segment that is output from the processing device into the second storage device of the user device. - View Dependent Claims (30)
- provided with
-
31. A generation method for a user authentication device, a first device that sends the first information segment, and that authenticates the identity of the user if the original information can be reconstructed by combining the first information segment received from the first device with the second information segment locally stored, provided with
a step for preparing a printed circuit board having an encryption device that generates both an encryption formula and a decryption formula, and that performs encryption using the encryption formula and decryption using the decryption formula; - an encrypted code storage device for storing the encrypted code obtained by encrypting the original code using the encryption formula generated by the encryption device; and
an original code storage device for storing both the decryption formula generated by the encryption device and the original code;
a step for forming a first printed circuit board provided with the encryption device and the original code storage device, and a second printed circuit board provided with the encrypted code storage device, by cutting the printed circuit board; and
a step that uses the first printed circuit board as the second device and the second printed circuit board as the first device. - View Dependent Claims (32, 33, 34)
- an encrypted code storage device for storing the encrypted code obtained by encrypting the original code using the encryption formula generated by the encryption device; and
Specification