User identification method and device
First Claim
1. A user identification method in which, in a first identification procedure identification data (ID1) of a first type belonging to a target individual to be identified are determined and the identification data (ID1) determined of the first type are compared with previously stored user identification data (ND1) of the first type assigned to an authorized user, and in which, given a coincidence present at least to a certain extent of the logged identification data (ID1) with the stored user identification data (ND1), the identity of the target individual with the authorized user is established, characterized in that identification data (ID2) of a second type that belong with a certain probability to the same target individual as the identification data (ID1) of the first type are additionally automatically determined, and in that, after successfully establishing the identity of the target individual with the authorized user, on the basis of the identification data (ID1) of the first type for the respective authorized user, user identification data (ND2) of the second type are stored using the identification data (ID2) of the second type determined for use in a subsequent identification procedure that takes place optionally on the basis of identification data (ID1) of the first type determined during said identification procedure and/or identification data (ID2) of the second type of said target individual.
1 Assignment
0 Petitions
Accused Products
Abstract
A user identification method is described in which, in a first identification procedure, identification data (ID1) of a first type belonging to a target individual to be identified are determined and are compared with previously stored user identification data (ND1) of the first type assigned to an authorized user. In addition, identification data (ID2) of a second type that belong with a certain probability to the same target individual are automatically determined. After a successful confirmation of the identify of the target individual with the authorized user from the identification data (ID1) of the first type, user identification data (ND2) of the second type are stored for the respective authorized user using the determined identification data (ID2) of the second type in order to use said data in a subsequent identification procedure. In addition, a corresponding user identification device is disclosed.
-
Citations
11 Claims
- 1. A user identification method in which, in a first identification procedure identification data (ID1) of a first type belonging to a target individual to be identified are determined and the identification data (ID1) determined of the first type are compared with previously stored user identification data (ND1) of the first type assigned to an authorized user, and in which, given a coincidence present at least to a certain extent of the logged identification data (ID1) with the stored user identification data (ND1), the identity of the target individual with the authorized user is established, characterized in that identification data (ID2) of a second type that belong with a certain probability to the same target individual as the identification data (ID1) of the first type are additionally automatically determined, and in that, after successfully establishing the identity of the target individual with the authorized user, on the basis of the identification data (ID1) of the first type for the respective authorized user, user identification data (ND2) of the second type are stored using the identification data (ID2) of the second type determined for use in a subsequent identification procedure that takes place optionally on the basis of identification data (ID1) of the first type determined during said identification procedure and/or identification data (ID2) of the second type of said target individual.
Specification