Person authentication system, person authentication method, and program providing medium
First Claim
1. A person authentication system for executing person authentication by comparing a template which is previously acquired person identification data with sampling information input by a user, said system comprising:
- a person identification authority which creates a person identification certificate for storing the template and which issues the person identification certificate to an entity which executes person authentication,whereinsaid person identification authority acquires the template and data for person identification from the user to be certified with the person identification certificate, and encrypts the template using a public key and creates and registers, on the basis of the identification of the user, the person identification certificate for storing the encrypted template which is the person identification data,the entity which decrypts the encrypted template stored in the person identification certificate and executes person authentication compares the decrypted template with the sampling information of the user so as to execute person authentication, andthe public key used to encrypt or decrypt the template stored in the person identification certificate being a different public key depending upon the entity which executes authentication of a person.
1 Assignment
0 Petitions
Accused Products
Abstract
A person authentication system includes a person identification authority. In the system, a service provider, a user device, or the like performs person authentication by acquiring a template from a person identification certificate created by the person identification authority, which is a third-party agency. The person identification authority identifies a person who requests issue of the person identification certificate, creates and registers the person identification certificate. Furthermore, the person identification authority deletes and changes the person identification certificate and performs registration, addition, deletion, invalidation process, and re-validation process of the template stored in the person identification certificate.
-
Citations
30 Claims
-
1. A person authentication system for executing person authentication by comparing a template which is previously acquired person identification data with sampling information input by a user, said system comprising:
-
a person identification authority which creates a person identification certificate for storing the template and which issues the person identification certificate to an entity which executes person authentication, wherein said person identification authority acquires the template and data for person identification from the user to be certified with the person identification certificate, and encrypts the template using a public key and creates and registers, on the basis of the identification of the user, the person identification certificate for storing the encrypted template which is the person identification data, the entity which decrypts the encrypted template stored in the person identification certificate and executes person authentication compares the decrypted template with the sampling information of the user so as to execute person authentication, and the public key used to encrypt or decrypt the template stored in the person identification certificate being a different public key depending upon the entity which executes authentication of a person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A person authentication method for executing person authentication by comparing a template which is previously acquired person identification data with sampling information input by a user, said method comprising the steps of:
-
creating a person identification certificate for storing the template and issuing the person identification certificate to an entity which executes person authentication in a person identification authority, acquiring the template and data for person identification from the user to be certified with the person identification certificate, and encrypting the template using a public key and creating and registering, on the basis of the identification of the user, the person identification certificate for storing the encrypted template which is the person identification data, and decrypting the encrypted template and comparing the decrypted template with the sampling information of the user so as to execute person authentication in the entity which executes person authentication, the public key used to encrypt or decrypt the template stored in the person identification certificate being a different public key depending upon the entity which executes authentication of a person. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A program providing medium for providing a computer program which executes person authentication in a computer system by comparing a template which is previously acquired person identification data with sampling information input by a user, said computer program comprising the steps of:
-
acquiring the template and data for person identification from the user to be certified with a person identification certificate, encrypting the template using a public key, creating and registering, on the basis of the identification of the user, the person identification certificate for storing the encrypted template which is the person identification data, and decrypting the encrypted template and comparing the decrypted template with the sampling information of the user so as to execute person authentication in the entity which executes person authentication, the public key used to encrypt or decrypt the template stored in the person identification certificate being a different public key depending upon the entity which executes authentication of a person.
-
Specification