$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method of providing secure user access 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-009/00
출원번호 US-0065523 (1998-04-24)
발명자 / 주소
  • Hamid Laurence,CAX
  • Hillhouse Robert D.,CAX
출원인 / 주소
  • DEW Engineering and Development Limited, CAX
대리인 / 주소
    Freedman & Associates
인용정보 피인용 횟수 : 145  인용 특허 : 3

초록

A method of providing secure user access for doorways and network computer systems is disclosed. An overall system security level is provided. A user provides biometric information that is compared against stored biometric information of each of a plurality of users to identify the individual. When

대표청구항

[ What is claimed is:] [1.] A method of performing one of authorising individuals and identifying individuals using a biometric security system comprising the steps of:storing a system security level;determining an initial security level for a plurality of individuals, the initial security level det

이 특허에 인용된 특허 (3)

  1. Chou Ken W. (Glendora CA) Tang Ruey-Long (Hacienda Heights CA), Personal identification system for use with fingerprint data in secured transactions.
  2. Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN), Secure data processing system architecture with format control.
  3. Aoyama Mitsunobu (Oome JPX), Security administrator for automatically updating security levels associated with operator personal identification data.

이 특허를 인용한 특허 (145)

  1. Puchek, Daniel R.; Xu, Tianning; Tumey, David M., Access control method and apparatus for members and guests.
  2. Puchek, Daniel R.; Xu, Tianning; Tumey, David M., Access control method and apparatus for members and guests.
  3. Dinges, Clemens; Schlereth, Michael, Access control system based on brain patterns.
  4. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  5. Shin, Yo-Shik; Kim, Geum-yong, Apparatus and method for recognizing fingerprint dually.
  6. Hodge, Stephen Lee, Authentication and control of incoming communication.
  7. Watanabe,Isao, Authentication method, apparatus, and system.
  8. Dabbish,Ezzat A.; Puhl,Larry C., Authentication of vehicle components.
  9. Jonas, Jeffrey J., Authorized anonymous authentication.
  10. Jonas, Jeffrey J., Authorized anonymous authentication.
  11. Ortiz, Luis M.; Lopez, Kermit D., Biometric authentication utilizing unique biometric signatures and portable electronic devices.
  12. Ting,David M. T., Biometric authentication with security against eavesdropping.
  13. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Biometric based multi-party authentication.
  14. Benini, David, Biometric identification and verification.
  15. Benini, David, Biometric identification and verification.
  16. Benini, David, Biometric identification and verification.
  17. Benini, David, Biometric identification and verification.
  18. Benini, David, Biometric identification and verification.
  19. Benini, David, Biometric identification and verification.
  20. Benini, David, Biometric identification and verification.
  21. Benini, David, Biometric identification and verification.
  22. Bloomberg, Michael R.; Waanders, John D.; Ozolins, Helmars E., Computer terminals biometrically enabled for network functions and voice communication.
  23. Bloomberg, Michael R.; Waanders, John D.; Ozolins, Helmars Ericks, Computer terminals biometrically enabled for network functions and voice communication.
  24. Bloomberg,Michael R.; Waanders,John D.; Ozolins,Helmars E., Computer terminals biometrically enabled for network functions and voice communication.
  25. Mathews, Paul D.; Cheng, Theodore Y.; Sinha, Ajit Kumar, Configurable and stand alone verification module.
  26. Mathews, Paul D; Cheng, Theodore Y.; Sinha, Ajit Kumar, Configurable and stand-alone verification module.
  27. Awad, Nadim; Keljo, Jonathan White; Dolbakian, Levon; Froment, Arnaud Marie; Kiraly, Kenneth Paul; Dumont, Michael David; Sridharan, Srinivasan, Controlling access based on recognition of a user.
  28. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  29. Jonas,Jeffrey James, Data set comparison and net change processing.
  30. Hodge, Stephen, Digital telecommunications call management and monitoring system.
  31. Daniel R. Puchek ; Tianning Xu ; David M. Tumey, Distributed biometric access control apparatus and method.
  32. Bostrom,Susan J., Distributed biometric access control method and apparatus.
  33. Shastry, Vishwanath; Blum, Marc; Hammad, Ayman; Katzin, Edward; Purves, Thomas; Hua, Julian, E-wallet store injection search apparatuses, methods and systems.
  34. Kim, Min-Chul; Kim, Sang-Heon; Son, Hyo-Jin; Wi, Tae-Hwan; Lee, Eun-Yeung; Lee, Hae-Dong; Lim, Yeon-Wook; Han, Yong-Gil, Electronic device and method of providing security using complex biometric information.
  35. Boshra, Michael, Electronic device for processing composite finger matching biometric data and related methods.
  36. Boshra, Michael, Electronic device for processing composite finger matching biometric data and related methods.
  37. Kalgi, Avinash, Electronic wallet checkout platform apparatuses, methods and systems.
  38. Sato,Toshio; Okazaki,Akio; Sukegawa,Hiroshi; Ogata,Jun, Entrance management apparatus and entrance management method.
  39. Sogo,Koji; Takahashi,Mihoko; Kuroda,Takuya, Face collation apparatus and biometrics data collation apparatus.
  40. Dobashi,Hironori, Face image recognition apparatus.
  41. Hamid, Laurence, Flexible method of user authentication.
  42. Hamid, Laurence; Hillhouse, Robert D., Flexible method of user authentication.
  43. Hamid, Laurence; Hillhouse, Robert D., Flexible method of user authentication.
  44. Anbai, Noriyoshi, Gate management system.
  45. Craft,David John, Hardware-based secure code authentication.
  46. Kalgi, Avinash, Hybrid applications utilizing distributed models and views apparatuses, methods and systems.
  47. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  48. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  49. Nagatomo, Wataru; Abe, Yuichi, Inspection apparatus and method using pattern matching.
  50. Avery, IV, Albert M.; Adelson, Jay Steven; Vogt, Derrald Curtis, Internet co-location facility security system.
  51. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  52. Goldberg, Jason, Medical monitoring/consumables tracking device.
  53. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  54. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  55. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  56. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  57. Ser,Wee; Jiang,Xudong; Yau,Wei Yun, Method and device for computer-based processing a template minutia set of a fingerprint and a computer readable storage medium.
  58. Fehr,Walton L.; Dabbish,Ezzat A.; Levenson,Samuel M.; Puhl,Larry C.; Reinold,Jurgen, Method and system for authorizing reconfiguration of a vehicle.
  59. Levenson,Samuel M.; Bruner,John D.; Dabbish,Ezzat A.; Fehr,Walton L.; Puhl,Larry C.; Reinold,Jurgen, Method and system for component authentication of a vehicle.
  60. Craft,David John, Method and system for ensuring security of code in a system on a chip.
  61. Kiran, Kumar K.; Cho, Sung Hyun; Chung, Min Gyu; Pak, Koo Yong; Park, Il Gon; Kim, Soo Jung, Method and system for secure communication.
  62. Lu, Zhou; Yu, Huazhang, Method and system for securely accessing to protected resource.
  63. Dabbish,Ezzat A.; Fehr,Walton L.; Levenson,Samuel M.; Puhl,Larry C.; Reinold,Jurgen, Method and system for technician authentication of a vehicle.
  64. Dabbish,Ezzat A.; Puhl,Larry C., Method and system for vehicle authentication of a component class.
  65. Fehr,Walton L.; Levenson,Samuel M.; Reinold,Jurgen, Method and system for vehicle authentication of a remote access device.
  66. Reinold, Jurgen; Fehr, Walton L.; Levenson, Samuel M., Method and system for vehicle authentication of another vehicle.
  67. Fehr, Walton L.; Dabbish, Ezzat A.; Levenson, Samuel M.; Puhl, Larry C.; Reinold, Jurgen, Method and system for vehicle authorization of a service technician.
  68. Chung, Min Gyu; Cho, Sung Hyun; Pak, Koo Yong; Park, Il Gon; Kim, Soo Jung; Kiran, Kumar K., Method for protecting contents, method for sharing contents and device based on security level.
  69. Uno, Kazuya; Niinuma, Koichiro, Method of adjusting reference information for biometric authentication and apparatus.
  70. Royer, Coby, Methods and apparatus for credential validation.
  71. Royer, Coby, Methods and apparatus for credential validation.
  72. Peirce, Michael, Methods and systems for determining biometric data for use in authentication transactions.
  73. Ortiz, Luis M.; Lopez, Kermit D., Methods and systems for providing enhanced security over, while also facilitating access through, secured points of entry.
  74. Avery IV, Albert M.; Adelson, Jay Steven; Vogt, Derrald Curtis, Multi-ringed internet co-location facility security system and method.
  75. Faith, Patrick; Harris, Theodore David, Multi-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems.
  76. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  77. Goldberg, Jason, Personal health management device, method and system.
  78. Goldberg, Jason; Beckerman, Thomas C., Personal health monitoring and/or communication system.
  79. Hiratsuka, Seiichi; Yano, Satoru, Personal identification method, personal identification apparatus, and recording medium.
  80. Arunachalam, Annamalai, Phalangeal authentication device.
  81. Jonas, Jeffrey J., Post-anonymous fuzzy comparisons without the use of pre-anonymization variants.
  82. Ortiz, Luis Melisendro, Random biometric authentication apparatus.
  83. Jonas, Jeffrey J., Real time data warehousing.
  84. Jonas, Jeffrey James, Real time data warehousing.
  85. Jonas, Jeffrey James, Real time data warehousing.
  86. Ahluwalia, Inderpreet Singh, Rejection notification to the UICC.
  87. Ahluwalia, Inderpreet Singh, Rejection notification to the UICC.
  88. Purves, Thomas, Remote decoupled application persistent state apparatuses, methods and systems.
  89. Craft, David J., Secure code authentication.
  90. Jonas, Jeffrey J.; Dunham, Steven Bruce, Secure coordinate identification method, system and program.
  91. Min-Hsiung Lin ; Shu Gao ; Kung-Shiuh Huang ; Jian-Ming Wang, Sequence-encoded multiple biometric template security system.
  92. Robinson,Timothy, System and method for biometric authorization for financial transactions.
  93. Mather, Jonathan Francis; Othman, Asem; Streit, Scott; Dumitran, Ionut; Wood, Thomas, System and method for biometric protocol standards.
  94. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for categorizing transactions.
  95. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for categorizing transactions.
  96. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J.; Watson,Timothy Neil, System and method for categorizing transactions.
  97. Rokosky, James P., System and method for controlling free phone calls through an institutional phone system.
  98. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  99. Azar, Cyrus; Brostoff, George, System and method for disabling secure access to an electronic device using detection of a predetermined device orientation.
  100. Azar, Cyrus; Brostoff, George, System and method for enabling a camera used with an electronic device using detection of a unique motion.
  101. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for enrolling in a biometric system.
  102. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  103. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  104. Robinson, Timothy L.; Schildt, Bradford R.; Gott, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  105. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Robinson,Mark B., System and method for enrolling in a biometric system.
  106. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  107. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  108. Hodge, Stephen L., System and method for multilingual authentication access to communication system in controlled environment.
  109. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for offering in-lane periodical subscriptions.
  110. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for operating a parking facility.
  111. Azar, Cyrus; Brostoff, George, System and method for providing secure access to an electronic device using continuous facial biometrics.
  112. Azar, Cyrus; Brostoff, George, System and method for providing secure access to an electronic device using facial biometrics.
  113. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for purchase benefits at a point of sale.
  114. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J.; Watson,Timothy Neil, System and method for purchase benefits at a point of sale.
  115. Matusis, Alec, System and method for selecting functions based on a finger feature such as a fingerprint.
  116. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  117. Olligschlaeger, Andreas M., System and method for three-way call detection.
  118. Olligschlaeger, Andreas M., System and method for three-way call detection.
  119. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for upgrading biometric data.
  120. Kim, Hyun-Soo; Yoon, Je-Han; Lee, Ji-Hyo; Lee, Jae-Yeon; Chi, Su-Young; Yun, Woo-Han, System and method for verifying face of user using light mask.
  121. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for verifying identity.
  122. Poleshuk, Michael; Sclafani, Anthony; Widjaja, Lany, Systems and methods for DMARC in a cage mesh design.
  123. Tieu, Kinh; Schwartz, Adam, Systems and methods for biometric authentication.
  124. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  125. Howard,James V.; Frazier,Francis, Systems and methods for recognition of individuals using multiple biometric searches.
  126. Hodge, Stephen Lee, Telecommunication call management and monitoring system using wearable device with radio frequency identification (RFID).
  127. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  128. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  129. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  130. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  131. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  132. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  133. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  134. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  135. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  136. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  137. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  138. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  139. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  140. Katzin, Edward; Hua, Julian; Storey, Gregory Kenneth; Mori, Michael; Shrivastava, Abhinav; Bhargava, Amit; Beck, Andrew; Hammad, Ayman; Pfisterer, Ben; Salmon, Diane; Karpenko, Igor; Schulz, Jennifer; Gavrilov, Miroslav; Ciurea, Peter; Faith, Patrick; Kumnick, Phillip; Chatterjee, Saurav; Badea, Sebastian; Li, Shaw; Jha, Shipra; Pourfallah, Stacy; French, Susan; Theurer, Tenni; Harris, Theodore; Purves, Thomas; Pandey, Vanita; Graham, Victoria; Hariramani, Prakash, Universal electronic payment apparatuses, methods and systems.
  141. Uchida, Kaoru, User authentication apparatus which uses biometrics and user authentication method for use with user authentication apparatus.
  142. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  143. Parker, Benjamin J.; Werner, Shane R.; Frederick, Terry M., Verification of identity and continued presence of computer users.
  144. Talmor, Eli; Talmor, Rita; Talmor, Alon, Voice authentication method and system utilizing same.
  145. Chaudhari,Upendra V.; Maes,Stephane H.; Navratil,Jiri, Weight based background discriminant functions in authentication systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로