$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Personal identification devices and access control systems 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04Q-001/00
출원번호 US-0244346 (1994-05-26)
우선권정보 GB-0025540 (1991-11-30)
국제출원번호 PCT/GB92/02220 (1992-11-30)
§371/§102 date 1994May2 (1994May2)
국제공개번호 WO-9311511 (1993-06-10)
발명자 / 주소
  • Davies John H. E. (4A Cowper Road Berkhamsted
  • Hertfordshire
  • HP4 3DA GB2)
인용정보 피인용 횟수 : 93  인용 특허 : 2

초록

A lock (19) which by physical or logical means controls human access to an objective (29) such as a restricted area or a computer system is controlled by a data processing system (10) which has access to a store of authorised users (14) and a store of complex images (15), specifically images of huma

대표청구항

A personal identification device comprising a store of personal identity statements and a store of complex images including key complex images linked with personal identity statements and false complex images not associated with personal identity statements, a complex image being an image that is re

이 특허에 인용된 특허 (2)

  1. Kee, Richard C., Reproducible image and information bearing record.
  2. Williams Jarvis L. (4452 Ardmore Ct. Bloomfield Hills MI 48013), Security apparatus for controlling access to a predetermined area.

이 특허를 인용한 특허 (93)

  1. Tao, Hai, 3D pass-go.
  2. Puchek, Daniel R.; Xu, Tianning; Tumey, David M., Access control method and apparatus for members and guests.
  3. Puchek, Daniel R.; Xu, Tianning; Tumey, David M., Access control method and apparatus for members and guests.
  4. Marshall Chesney, Margaret; Donnelly, Francis, Access control reader enabling remote applications.
  5. Marshall Chesney, Margaret; Donnelly, Francis, Access control reader enabling remote applications.
  6. Jan Carlsson SE; Per Hoglund SE; Jesper Skagerberg SE, Arrangement and method for a system for administering certificates.
  7. Mizrah, Len L., Authentication method of random partial digitized path recognition with a challenge built into the path.
  8. Mizrah,Len L., Authentication system and method based upon random partial digitized path recognition.
  9. Mizrah, Len L., Authentication system and method based upon random partial pattern recognition.
  10. McCoy Mike ; Chu Kim-Ying ; Annulis James M., Biometric personnel identification system.
  11. Rozenberg Roman ; Rozenberg Tatyana, Biometric scanning aperture for a computer input device.
  12. Jurij Jakovlevich Kharon RU; Roman Rozenberg, Biometric system for biometric input, comparison, authentication and access control and method therefor.
  13. Novikov Sergey Olegovich,RUX ; Chernomordik Oleg Mikhailovich,RUX, Biometric system for biometric input, comparison, authentication and access control and method therefor.
  14. Turner, Bryan C., Challenge-based authentication protocol.
  15. Kirovski, Darko; Jojic, Nebojsa; Roberts, Paul, Click passwords.
  16. Daniel R. Puchek ; Tianning Xu ; David M. Tumey, Distributed biometric access control apparatus and method.
  17. Ryan, Andrew Edward, Distributed client/server computer network.
  18. Diehl Jeffrey W. ; Glaze Mary L. ; Braceland Joseph M., Distributed mobile biometric identification system with a centralized server and mobile workstations.
  19. Kashima, Kazunori, ELECTRONIC INFORMATION MANAGEMENT SYSTEM, IC CARD, TERMINAL APPARATUS AND ELECTRONIC INFORMATION MANAGEMENT METHOD, AND RECORDING MEDIUM ON WHICH IS RECORDED AN ELECTRONIC INFORMATION MANAGEMENT PROG.
  20. Sato,Toshio; Okazaki,Akio; Sukegawa,Hiroshi; Ogata,Jun, Entrance management apparatus and entrance management method.
  21. Hamza,Rida M.; Bazakos,Michael E.; Cooper,Murray J., Face identification verification using 3 dimensional modeling.
  22. Yamaguchi, Osamu, Face recognition for automatic adjustment of personalized device parameters.
  23. Osborn, Steven L.; Davis, Nicholas A.; Sontag, James L.; Norvell, Joel, Graphical image authentication and security system.
  24. Maloney Raymond ; Holtz Charles ; Alzona Conrad, Identification verification apparatus and method.
  25. Sourabh A. Niyogi ; William T. Freeman, Identifying images using a tree structure.
  26. Yamazaki, Akihisa, Image display apparatus and camera and image communication system.
  27. Yamazaki, Akihisa, Image display apparatus and camera and image communication system.
  28. Yamazaki,Akihisa, Image display apparatus and camera and image communication system.
  29. Nagahashi,Toshinori, Image retrieving device, method for adding keywords in image retrieving device, and computer program therefor.
  30. Bandyopadhyay, Shamik; Law, Veronica Y., Image-based unlock functionality on a computing device.
  31. Bandyopadhyay, Shamik; Law, Veronica Y., Image-based unlock functionality on a computing device.
  32. Bandyopadhyay, Shamik; Law, Veronica Y., Image-based unlock functionality on a computing device.
  33. Rozenberg Roman, Index finger biometric aperture for a mouse.
  34. Felsher, David Paul, Information record infrastructure, system and method.
  35. William N. Rallis ; Yaacov Behar, Infrared type security system for a computer.
  36. Yudkin, Roman O.; Staker, Joshua T.; Goldbach, William M.; Staker, Curtis H., Kill switch security method and system.
  37. Smith, Jr.,A. James, Method and apparatus for securing a list of passwords and personal identification numbers.
  38. McKeeth, James, Method and system for authenticating a user of a computer system.
  39. McKeeth, James, Method for controlling user access to an electronic device.
  40. Chou Wayne W., Method for preventing copying of digital video disks.
  41. Plagne,Sylvain, Method for providing secure access to a digital resource.
  42. Hillhouse,Robert D., Method for supporting dynamic password.
  43. Osborn, III, Steven L.; Davis, Nicholas A.; Sontag, James L.; Norvell, Joel, Methods and systems for graphical image authentication.
  44. Osborn, Steven L.; Davis, Nicholas A.; Sontag, James L.; Norvell, Joel, Methods and systems for graphical image authentication.
  45. Blomquist, Scott A.; Blomquist, Chad; Bong, Koesmanto; Lee, Christopher; Whitlock, John, Methods and systems for protecting website forms from automated access.
  46. Hoffberg, Steven M., Multifactorial optimization system and method.
  47. Rallis William N. ; Behar Yaacov, Notebook security system (NBS).
  48. Rallis William N. ; Behar Yaacov, Notebook security system (NBS).
  49. William N. Rallis ; Yaacov Behar, Notebook security system using infrared key.
  50. Mizrah, Len L., Operation modes for user authentication system based on random partial pattern recognition.
  51. Duke, David J., Password fraud protection apparatus.
  52. Johnson, Jeff; Seixeiro, Steve; Pace, Zachary; van der Bogert, Giles; Gilmour, Sean; Siebens, Levi; Tubbs, Ken, Picture gesture authentication.
  53. Johnson, Jeffrey Jay; Seixeiro, Steve; Pace, Zachary; van der Bogert, Giles; Gilmour, Sean; Siebens, Levi; Tubbs, Kenneth, Picture gesture authentication.
  54. Patton, David L.; Paz-Pujalt, Gustavo R., Printing verified pre-approved images.
  55. Jalili Reza, Secure data entry and visual authentication system and method.
  56. Sands, Christopher A.; Joyce, III, Arthur W., Secure display.
  57. Ganesan, Ravi; Sandhu, Ravinderpal Singh; Cottrell, Andrew Paul; Austin, Kyle, Secure login using augmented single factor split key asymmetric cryptography.
  58. Ganesan, Ravi; Sandhu, Ravinderpal Singh; Cottrell, Andrew Paul; Austin, Kyle, Secure login using single factor split key asymmetric cryptography and an augmenting factor.
  59. Elledge Dennis D., Securing restricted operations of a computer program using a visual key feature.
  60. Carta,David R.; Kelly,Guy M.; Ravenis, II,Joseph V J, Smart card access control system.
  61. Glaze Mary L. ; Braceland Joseph M., Stand-alone biometric identification system.
  62. Taylor, Michael Walsh, System and method for conducting online visual identification of a person.
  63. McKeeth, James, System and method for controlling user access to an electronic device.
  64. McKeeth, James, System and method for controlling user access to an electronic device.
  65. McKeeth, James, System and method for controlling user access to an electronic device.
  66. McKeeth, James, System and method for controlling user access to an electronic device.
  67. McKeeth, James, System and method for controlling user access to an electronic device.
  68. McKeeth, James, System and method for controlling user access to an electronic device.
  69. Hoffberg, Steven M., System and method for determining contingent relevance.
  70. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  71. Fritz,Adam T.; Wang,Yiqing, System and method for preventing automated programs in a network.
  72. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  73. Dionysian Raffi, System and method for recognizing a 3-D object by generating a rotated 2-D image of the object from a set of 2-D enrollment images.
  74. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  75. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  76. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  77. Anderson, James, System and method for user authentication.
  78. Mizrah,Len L., System and method for user authentication interface.
  79. Stubblefield, Adam; Simon, Daniel R., System and method of inkblot authentication.
  80. Goldstein, Richard J., System, method and article of manufacture for knowledge-based password protection of computers and other systems.
  81. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  82. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  83. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  84. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  85. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  86. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  87. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  88. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  89. Cho, Ku Gon; Kang, Ho Gab; Kim, In Gee; Kim, Kyu Soo, User authentication method and system using user's e-mail address and hardware information.
  90. Park,Seoung Bae, User interface and method for inputting password and password system using the same.
  91. Bedworth, Mark Dwight, User validation using images.
  92. Bedworth, Mark Dwight, User validation using images.
  93. Wilkinson, Mark, Verification of electronic financial transactions.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로