Authentication system, fingerprint identification unit, and authentication method
First Claim
Patent Images
1. An authentication system used when stored information is manipulated, comprising:
- a host computer comprising;
input means for inputting a user'"'"'s instruction;
command output means for generating from the user'"'"'s instruction an instruction command which requests a predetermined processing to be executed and for outputting the instruction command; and
communication means for communicating with an external unit; and
a fingerprint identification apparatus comprising;
communication means for communicating with said host computer;
processing control means for executing a predetermined processing according to the instruction command input from said host computer by said communication means;
fingerprint detection means for detecting a fingerprint and for generating fingerprint data;
storage-information recording means for recording the fingerprint data and storage information related to the fingerprint data; and
fingerprint identification means for verifying fingerprint data detected by said fingerprint detection means with the fingerprint data recorded by said storage-information recording means,wherein said storage-information recording means stores a private key generated by the public-key encryption method,wherein said processing control means accesses the generated private key, decrypts a symmetric key, and decrypts the encrypted text using the decrypted symmetric key when the user'"'"'s instruction specifies a decryption of an encrypted text,wherein said processing control means generates a symmetric key and a public key to encrypt the symmetric key when the user'"'"'s instruction specifies an encryption of plain text, andwherein the user'"'"'s instruction is send from the host computer through communication cable.
1 Assignment
0 Petitions
Accused Products
Abstract
When the user inputs an instruction for accessing storage information stored in a fingerprint identification unit to a host computer, the host computer sends an identification instruction command to the fingerprint identification unit. A fingerprint detection section formed of an LED, a lens barrel, a CCD, and an A/D converter read the fingerprint of the user, identifies the fingerprint by using an identification controller, and allows the user to access the storage information only when the identification result is affirmative. The identification result is also sent to the host computer simultaneously.
-
Citations
7 Claims
-
1. An authentication system used when stored information is manipulated, comprising:
-
a host computer comprising; input means for inputting a user'"'"'s instruction; command output means for generating from the user'"'"'s instruction an instruction command which requests a predetermined processing to be executed and for outputting the instruction command; and communication means for communicating with an external unit; and a fingerprint identification apparatus comprising; communication means for communicating with said host computer; processing control means for executing a predetermined processing according to the instruction command input from said host computer by said communication means; fingerprint detection means for detecting a fingerprint and for generating fingerprint data; storage-information recording means for recording the fingerprint data and storage information related to the fingerprint data; and fingerprint identification means for verifying fingerprint data detected by said fingerprint detection means with the fingerprint data recorded by said storage-information recording means, wherein said storage-information recording means stores a private key generated by the public-key encryption method, wherein said processing control means accesses the generated private key, decrypts a symmetric key, and decrypts the encrypted text using the decrypted symmetric key when the user'"'"'s instruction specifies a decryption of an encrypted text, wherein said processing control means generates a symmetric key and a public key to encrypt the symmetric key when the user'"'"'s instruction specifies an encryption of plain text, and wherein the user'"'"'s instruction is send from the host computer through communication cable. - View Dependent Claims (2, 3, 4)
-
-
5. An authentication method used when stored information is manipulated, comprising the steps of:
-
a host computer informing a user of a fingerprint-identification request according to a user'"'"'s instruction and issuing a fingerprint-identification instruction command to a fingerprint identification apparatus; the fingerprint identification apparatus reading a fingerprint after the user places a finger on the fingerprint identification apparatus, verifying the read fingerprint with a stored fingerprint, and sending a fingerprint-identification result to the host computer; the host computer allowing the user to specify the next instruction when the result is affirmative, and issuing the instruction command corresponding to the next instruction; and the fingerprint identification apparatus accessing storage information according to the instruction command and executing a predetermined processing, wherein said storage-information recording means stores a private key generated by the public-key encryption method, and wherein the fingerprint identification apparatus accesses the generated private key, decrypts a symmetric key, and decrypts the encrypted text using the decrypted symmetric key when the instruction command specifies a decryption of an encrypted text, wherein the fingerprint identification apparatus generates a symmetric key and a public key to encrypt the symmetric key when the instruction command is one that specifies an encryption of plain text, and wherein the instruction command is sent to the host computer through communication cable. - View Dependent Claims (6, 7)
-
Specification