[go: up one dir, main page]

JP4999193B2 - Portable device with fingerprint authentication function - Google Patents

Portable device with fingerprint authentication function Download PDF

Info

Publication number
JP4999193B2
JP4999193B2 JP2008300003A JP2008300003A JP4999193B2 JP 4999193 B2 JP4999193 B2 JP 4999193B2 JP 2008300003 A JP2008300003 A JP 2008300003A JP 2008300003 A JP2008300003 A JP 2008300003A JP 4999193 B2 JP4999193 B2 JP 4999193B2
Authority
JP
Japan
Prior art keywords
fingerprint
terminal device
fingerprint authentication
card
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2008300003A
Other languages
Japanese (ja)
Other versions
JP2010128600A (en
Inventor
尚一 清本
Original Assignee
エイエスディ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by エイエスディ株式会社 filed Critical エイエスディ株式会社
Priority to JP2008300003A priority Critical patent/JP4999193B2/en
Publication of JP2010128600A publication Critical patent/JP2010128600A/en
Application granted granted Critical
Publication of JP4999193B2 publication Critical patent/JP4999193B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Description

本発明は、広く普及している銀行カード、クレジットカード、電子マネーカード、高付加価値機能を有する乗降を制限する交通機関のパスカード等、また車のキーや鍵機能を持つ社員証等の決済、取引手段やアクセス制御手段として用いられる本人が日常的に携行するカード形状等の携帯型装置に関する。The present invention is widely used for settlement of bank cards, credit cards, electronic money cards, transportation pass cards for restricting boarding / exiting with high value-added functions, etc., as well as employee keys with car keys and key functions. The present invention relates to a portable device such as a card shape that is used as a transaction means or an access control means on a daily basis.

決済、取引手段やアクセス制御手段として本人が日常的に携行するカード形状等の携帯型装置は、サービスの増加による付加価値が高まる一方で、所有者が正当な本人(使用権限を有する者)であるかどうかの確認を行なう方法としては、当該携帯型装置を持っていることによる確認以外には、署名の提供、暗証番号の提供、カード装置に印刷された顔写真の確認等による判断に止まる。Card-type portable devices that are carried by the person on a daily basis as a means of settlement, transaction, and access control increase in added value due to an increase in services, while the owner is a legitimate person (who has authority to use). As a method of confirming whether or not there is, other than confirmation by having the portable device, determination by provision of a signature, provision of a personal identification number, confirmation of a face photograph printed on a card device, etc. .

しかし、一般的に普及する非接触カードの場合ではスキミングと呼ばれる手法によりカード内の個人情報を始め暗証番号をも容易に第三者により盗み読まれてしまい新たに偽造されたカードが不正に使用される犯罪が多発している。また、無線通信手段により車のドアーの開閉を制御出来るキーも、その利便性から普及しているが、利便性の観点からキーそのものの正当な所有者の判別手段は具備していないし、開閉制御信号の傍受、解析により車を盗まれる危険性を否定できない。However, in the case of non-contact cards, which are generally popular, a technique called skimming is used to illegally use a newly forged card because the personal information in the card and the personal identification number can be easily read by a third party. There are many crimes to be done. Keys that can control the opening and closing of car doors by wireless communication means are also popular because of their convenience, but from the viewpoint of convenience, they do not have a means for discriminating the proper owner of the key itself, and the opening and closing control is not provided. There is no denying the danger of car stealing through signal interception and analysis.

以下、本発明に関係する銀行やコンビニエントストアー等に設置されたCD(キャッシュ・ディスペンサー)端末装置或いはATM端末装置と言った金融サービス端末において使用されるクレジットカード等のICカード(携帯型装置)の運用を例として端末装置との間の送受信手段について以下に説明する。Hereinafter, an IC card (portable device) such as a credit card used in a financial service terminal such as a CD (cash dispenser) terminal device or ATM terminal device installed in a bank or a convenience store related to the present invention. The transmission / reception means with the terminal device will be described below as an example.

金融サービス端末の利用は、設置場所に訪れた利用者が金融サービス端末の操作パネルを操作し、取引種別を選択し、当該装置(クレジットカード)を金融サービス端末の所定の挿入口に挿入し、暗証番号の確認が成された後に残高照会や現金の引出しと言った取引に及ぶ。取引終了後は、金融サービス端末のカード挿入口よりカード装置が排出され所有者に戻される。この取引の間にICカードと金融サービス端末との間には図1のような通信が行われる。To use the financial service terminal, a user visiting the installation location operates the operation panel of the financial service terminal, selects a transaction type, inserts the device (credit card) into a predetermined insertion slot of the financial service terminal, After the confirmation of the PIN, it covers transactions such as balance inquiry and cash withdrawal. After the transaction ends, the card device is ejected from the card insertion slot of the financial service terminal and returned to the owner. During this transaction, communication as shown in FIG. 1 is performed between the IC card and the financial service terminal.

すなわち最初に、ICカード1が、端末装置2に挿入されると、この端末装置2との取引可能な正当なカード装置であるか否かが端末装置との間で次のように確認される。まず、カード装置1からチャレンジコード11(例えば乱数)が生成され、それを端末装置2に送信する。端末装置2は、保持している認証キー22を受け取ったチャレンジコード11と合わせ暗号化21し、その結果(レスポンス23)をICカード1に送信する。That is, first, when the IC card 1 is inserted into the terminal device 2, whether or not it is a legitimate card device that can be traded with the terminal device 2 is confirmed with the terminal device as follows. . First, a challenge code 11 (for example, a random number) is generated from the card device 1 and transmitted to the terminal device 2. The terminal device 2 encrypts 21 the authentication key 22 held together with the challenge code 11 received, and transmits the result (response 23) to the IC card 1.

この暗号データは、ICカード1において複合化15される。この複合化15は、端末装置と同じ暗号系(21、15)を持っていることと自らが生成したチャレンジコード11を知っていることでのみ可能となる。This encrypted data is decrypted 15 in the IC card 1. This decryption 15 is possible only by having the same encryption system (21, 15) as the terminal device and knowing the challenge code 11 generated by itself.

このレスポンス23を複合化15し、自装置(ICカード1)内に保持する認証キーと検証12する。This response 23 is decrypted 15 and verified 12 with the authentication key held in its own device (IC card 1).

同様のチャレンジ11/レスポンス23によるデータの守秘方式を踏襲して、端末装置の操作パネルからキー入力された暗証番号24がICカード1に記録された暗証番号13と照合16され、暗証番号の一致が確認された時点でICカード1内に記録された個人情報や取引履歴といった機密データ14が端末装置2に送出される。In accordance with the data confidentiality method using the same challenge 11 / response 23, the password number 24 key-entered from the operation panel of the terminal device is collated 16 with the password number 13 recorded on the IC card 1 to match the password number. Confidential data 14 such as personal information and transaction history recorded in the IC card 1 is sent to the terminal device 2 at the time of confirmation.

このような一連の通信手順は、例えば銀行協会、鉄道網、住基ネット等サービス機関毎に異なった手順(プロトコルと呼ばれる)として定められ、最重要機密として扱われている。Such a series of communication procedures is defined as a procedure (called a protocol) different for each service organization such as a bank association, a railway network, and a Juki network, and is treated as the most important secret.

一方、図2に現在一般的に使用されているICカード装置3内部の構成例をブロック図で示す。この図からも判るように、ICカード装置3の内部構成は、一般のコンピュータと同様の機能を備えている。すなわち、カード専用に調整されたオペレーティング・システム(OS)とプログラム等がROM31に格納されていて、稼動状態でRAM32に展開され、CPU36により逐次処理される。先の暗号系(暗号化21、複合化15)は暗号処理37により実施される。必要なチャレンジコード11(乱数)の生成も、暗号処理37の中で実現される。On the other hand, FIG. 2 is a block diagram showing an example of the internal configuration of an IC card device 3 that is currently generally used. As can be seen from this figure, the internal configuration of the IC card device 3 has the same function as a general computer. That is, an operating system (OS) and a program adjusted exclusively for the card are stored in the ROM 31, expanded in the RAM 32 in an operating state, and sequentially processed by the CPU 36. The previous encryption system (encryption 21 and decryption 15) is implemented by the encryption process 37. Generation of the necessary challenge code 11 (random number) is also realized in the cryptographic process 37.

同一サービスに帰属する端末装置2であることの確認のための認証キー22や所有者を特定する暗証番号13は、書換え可能メモリー(EEPROM34)に記録される。不揮発性メモリー33と書換え可能メモリー(EEPROM34)とは、見かけの機能上は同じであるが、一般的にセキュリティーの取扱上区別される。An authentication key 22 for confirming that the terminal device 2 belongs to the same service and a personal identification number 13 for identifying the owner are recorded in a rewritable memory (EEPROM 34). The non-volatile memory 33 and the rewritable memory (EEPROM 34) have the same apparent function, but are generally distinguished in terms of security handling.

動作の一例として図1で説明した暗証番号の確認動作を図2のブロック構成で説明すると以下のようになる。まず、端末装置2より暗号化された暗証番号24が入出力装置(I/O装置)35を通じて受信され、CPU36に送られる(図中の点線参照のこと)。CPU36は受信した暗証番号を暗号処理37に送り複合化し、EEPROM34に格納されている暗証番号と照合する。As an example of the operation, the password confirmation operation described with reference to FIG. 1 will be described with reference to the block configuration of FIG. First, the code number 24 encrypted from the terminal device 2 is received through the input / output device (I / O device) 35 and sent to the CPU 36 (refer to the dotted line in the figure). The CPU 36 sends the received personal identification number to the encryption process 37 and combines it with the personal identification number stored in the EEPROM 34.

入出力装置(I/O装置35)は、接触型ICカードの場合、カード表面に剥き出しの8端子を経由して制御を実施し、非接触型ICカードの場合は、カードの内部に埋め込まれたアンテナ回路に接続され制御を担当する。接触型ICカードの8端子の中の2端子が電源供給を受け持ち、非接触型ICカードの場合は、端末装置から発せられる磁場により内部アンテナに生じる誘導起電力を用いる。In the case of a contact type IC card, the input / output device (I / O device 35) is controlled via 8 terminals exposed on the card surface, and in the case of a non-contact type IC card, it is embedded in the inside of the card. It is connected to the antenna circuit and takes charge of control. Two of the eight terminals of the contact IC card are responsible for power supply, and in the case of a non-contact IC card, an induced electromotive force generated in the internal antenna by a magnetic field generated from the terminal device is used.

ここで注意すべき重要な点は、いずれのタイプのICカードも一度電源が供給されると、装置が有する機能は全てON状態すなわち稼動状態に入り一連の動作を始める。上述した安全対策の筈の認証キー22、暗証番号13並びに暗号系を含む通信手順を考察すると、チャレンジコード11(乱数)を除いて全てICカードに記録されたデータであり固有なデータである。すなわち認証キー22も暗証番号13も一度盗まれてしまえば、ICカードの再発行以外に変更の方法は無い。言い換えれば通信手順(プロトコル)のあらましを理解した上で通信中のデータを傍受された場合、対抗措置は無い。The important point to note here is that once the power is supplied to any type of IC card, all the functions of the device enter the ON state, that is, the operating state, and start a series of operations. Considering the above-described communication procedure including the authentication key 22 for the security measure, the personal identification number 13 and the encryption system, all data except the challenge code 11 (random number) is recorded on the IC card and is unique data. That is, once the authentication key 22 and the password 13 are stolen, there is no change method other than reissuing the IC card. In other words, there is no countermeasure if the communication data is intercepted after understanding the outline of the communication procedure (protocol).

近年問題となっているスキミングと呼ばれる非接触型ICカードのデータの盗み読みは、混雑した電車内等の雑踏の中で当該ICカードに電力供給する磁場を発する不法な小型端末装置を他人の身体に近づけICカードを起動させて短時間内にデータを読み取ってしまう方法を用いて行われる。盗んだデータは白カードと呼ばれる未使用のICカードに書込み、被害者に成りすましICカードを自由に不正使用するものである。In recent years, the non-contact type IC card data stealing called skimming, which has become a problem, is illegally using a small terminal device that emits a magnetic field to supply power to the IC card in crowds such as in crowded trains. This is performed using a method in which the IC card is activated and the data is read within a short time. The stolen data is written on an unused IC card called a white card, and the IC card pretending to be a victim is freely used illegally.

この場合、プロトコルの開始と共に発せられるチャレンジコード11(乱数)を不法な小型端末で受信出来さえすれば、複数通りの試行錯誤を試みることは近年の高速化された市販のCPUにとって造作無い事である。更にICカードに付随するサービスに固有な通信手順は、悪意の第三者が正当な手続きにより発行されたICカードを入手し解析することにより容易に解明出来る。よって、前述の複数回の試行錯誤も数種類のサービスに対応する通信手順を順次試みるだけの容易な作業で不正傍受は成立してしまう。In this case, as long as the challenge code 11 (random number) issued at the start of the protocol can be received by an illegal small terminal, trying a plurality of trials and errors is not possible for recent high-speed commercial CPUs. is there. Furthermore, the communication procedure specific to the service associated with the IC card can be easily clarified by obtaining and analyzing the IC card issued by a malicious third party through a legitimate procedure. Therefore, the above-described multiple trials and errors can be performed by simple operations that sequentially try communication procedures corresponding to several types of services.

以上のように、ICカードがコンピュータ機能と同様の構成、機能を備えている装置であり、電源投入により稼動してしまうこと事態が安全確保の上で最大の落とし穴(セキュリティー・ホール)になっている。As mentioned above, IC cards are devices that have the same configuration and functions as computer functions, and the fact that they operate when power is turned on is the biggest pitfall (security hole) for ensuring safety. Yes.

運用上、暗証番号の確認が出来ない無線通信によるドアーの開閉を制御する車のキーの場合、認証キーのみの確認照合に依拠することになり、安全面ではより一層脆弱なシステムと言わざるを得ない。In the case of a car key that controls the opening and closing of the door by wireless communication that cannot confirm the PIN code in operation, it depends on the verification verification of only the authentication key, and it must be said that the system is even more vulnerable in terms of safety. I don't get it.

また、企業のオフィスや工場で使われるようになった社員証(現在では主に、ICカードを使用している)の場合、市販の端末を入退室のアクセス制御に用いる関係で、前述の通信手順は周知のプロトコルを使用している。In addition, in the case of employee ID cards (currently mainly using IC cards) that are now used in corporate offices and factories, the above-mentioned communication is used because a commercially available terminal is used for access control of entry / exit. The procedure uses a well-known protocol.

更には、併用される暗証番号の入力行為は第三者の盗み見の危険にさらされているのが実情である。Furthermore, the actual situation is that the input operation of the personal identification number used in combination is at risk of a third party's snooping.

社員証により敷地内の全ての入退室が制御される利便性は、一方で企業の機密情報の盗難の危険性の防止に抑止力以上の効果は疑わしいと言わざるを得ない。
しかし、決済、取引手段やアクセス制御手段として本人が日常的に携行するカード形状等の携帯型装置は、サービスの増加による付加価値が高まる一方で、所有者が正当な本人(使用権限を有する者)であるかどうかの確認を行なう方法としては、当該携帯型装置を持っていることによる確認以外には、署名の提供、暗証番号の提供、カード装置に印刷された顔写真の確認等による判断に止まる。
On the other hand, the convenience of controlling all entrances and exits on the premises by the employee ID card, on the other hand, must be suspected to be more effective than deterrence in preventing the risk of theft of confidential corporate information.
However, a card-type portable device that is carried by the person on a daily basis as a means of settlement, transaction, or access control increases the added value due to an increase in services, while the owner is a legitimate person (who has authority to use it). In addition to confirming that you have the portable device, you can make a decision by providing a signature, providing a personal identification number, confirming a face photo printed on the card device, etc. Stop on.

本発明は上記に鑑みてなされたものであり、その目的は、決済、取引手段やアクセス制御手段として用いられる装置の所有者が正当な本人(使用権限を有する者)であるかどうかの確認を確実に行なうとともに、利便性を損なわない運用を実現することにある。The present invention has been made in view of the above, and its purpose is to confirm whether the owner of a device used as a settlement, transaction means or access control means is a legitimate person (a person who has authority to use). The purpose is to ensure the operation and to realize the operation without impairing the convenience.

本発明は、端末装置との間で送受信して稼働する携帯型装置であって、該装置は端末装置との間の送受信する手段と、指紋の読取、読み取られた指紋の指紋認証、指紋認証成功後所定の時間指紋認証免除する手段を備え、指紋認証成功により正当な所有者であることの確認された場合のみ端末装置との間の送受信を稼働状態にするとともに、上記認証免除時間経過後送受信手段を不活性状態にする指紋認証機能搭載携帯型装置を提供するものである。The present invention is a portable device that operates by transmitting / receiving to / from a terminal device, the device transmitting / receiving to / from the terminal device, fingerprint reading, fingerprint authentication of a read fingerprint, fingerprint authentication Provided with a means to exempt fingerprint authentication for a predetermined time after success, and when transmission / reception with the terminal device is activated only when it is confirmed that the user is a legitimate owner by successful fingerprint authentication, after the above-mentioned authentication exemption time elapses The present invention provides a portable device equipped with a fingerprint authentication function for inactivating a transmission / reception means.

具体的には、指紋の読取、読み取られた指紋の指紋認証、指紋認証成功後所定の時間指紋認証免除する手段を常時稼働状態とし、端末装置との間の送受信する手段を不活性状態とし、指紋認証成功により正当な所有者であることの確認された場合のみ端末装置との間の送受信を稼働状態にするとともに、上記認証免除時間経過後送受信手段を不活性状態にするものである。Specifically, fingerprint reading, fingerprint authentication of the read fingerprint, means for exempting fingerprint authentication for a predetermined time after successful fingerprint authentication are always in operation, and means for transmitting and receiving with the terminal device is inactive, Only when it is confirmed that the user is a legitimate owner by successful fingerprint authentication, the transmission / reception with the terminal device is put into an operating state, and the transmission / reception means is inactivated after the authentication exemption time has elapsed.

本発明は上記のように構成されているので、正当な所有者による指紋認証実施前はICカード等の携帯型装置の本来の機能を喪失しており、したがって悪意の第三者による犯罪に利用されることがなく、同時に指紋認証実施後は適切な免除時間の設定により従来携帯型装置本来の利便性を損なうことは無い。Since the present invention is configured as described above, the original function of a portable device such as an IC card is lost before fingerprint authentication by a legitimate owner, and therefore, it is used for a crime by a malicious third party. At the same time, after the fingerprint authentication is performed, the convenience inherent to the conventional portable device is not impaired by setting an appropriate exemption time.

端末装置との間で送受信して稼働する携帯型装置であって、該装置は端末装置との間の送受信する手段と、指紋の読取、読み取られた指紋の指紋認証、指紋認証成功後所定の時間指紋認証免除する手段を備え、指紋認証成功により正当な所有者であることの確認された場合のみ端末装置との間の送受信を稼働状態にするとともに、上記認証免除時間経過後送受信手段を不活性状態にすることを特徴とする指紋認証機能搭載携帯型装置。A portable device that operates by transmitting / receiving to / from a terminal device, the device transmitting / receiving to / from the terminal device, and reading a fingerprint, fingerprint authentication of a read fingerprint, and predetermined authentication after successful fingerprint authentication It is provided with means for exempting time fingerprint authentication, and only when it is confirmed that the owner is a valid owner due to successful fingerprint authentication, the transmission / reception means with the terminal device is put into operation, and the transmission / reception means is disabled after the above-mentioned authentication exemption time has elapsed. A portable device equipped with a fingerprint authentication function, wherein the portable device is activated.

以上の現状に対し、図3に沿って本発明を適用したICカード装置5の場合の実施例を説明する。An embodiment in the case of the IC card device 5 to which the present invention is applied will be described with reference to FIG.

51は指紋の検知機能を備えた指紋読取部、53は端末装置との間の送受信する手段で、図2の3と同様に端末装置2との送受信機構を内蔵したCMPU(Card Micro Processing Unit)と呼ばれるワンチップのICで構成される。51 is a fingerprint reading unit having a fingerprint detection function, 53 is a means for transmitting / receiving to / from the terminal device, and a CMPU (Card Micro Processing Unit) incorporating a transmitting / receiving mechanism with the terminal device 2 as in 3 of FIG. It consists of a one-chip IC called.

56は指紋の読取、読み取られた指紋の指紋認証、指紋認証成功後所定の時間指紋認証免除する手段で、ASIC(Application Specific Integrated Circuit)56と呼ばれるワンチップのICで構成され、58は登録指紋情報58a、指紋免除時間58bの記録装置である。Reference numeral 56 denotes a fingerprint reading, fingerprint authentication of a read fingerprint, and means for exempting fingerprint authentication for a predetermined time after successful fingerprint authentication, which is configured by a one-chip IC called ASIC (Application Specific Integrated Circuit) 56, and 58 is a registered fingerprint. This is a recording device for information 58a and fingerprint exemption time 58b.

装置の作動は、CMPU53の中のI/O装置35に端末装置2から電源供給4され、電源供給4されるとI/O装置35は、CMPU53の中のCPU36を起動し、同時に本発明の内容を実現する為の専用IC、ASIC56に電源供給54する。As for the operation of the apparatus, the power supply 4 is supplied from the terminal device 2 to the I / O device 35 in the CMPU 53, and when the power supply 4 is supplied, the I / O device 35 starts the CPU 36 in the CMPU 53 and at the same time. A power supply 54 is supplied to the ASIC 56, which is a dedicated IC for realizing the contents.

ASIC56は指紋照合手段57、具体的には指紋画像採取57a、指紋読取完了後画像処理57b、指紋の特徴が抽出57c、予め登録されている所有者の指紋情報58との照合57d、照合終了後計時57eが行われる。The ASIC 56 is a fingerprint collation means 57, specifically fingerprint image collection 57a, image processing 57b after fingerprint reading is completed, fingerprint characteristics are extracted 57c, collation 57d with the fingerprint information 58 of the registered owner, and after collation is completed. Timing 57e is performed.

この際CPU36は、ASIC56からの稼動許可信号(通常イネーブル信号と言う)であるON/OFF制御信号55の着信まで待機し、上述の本来の処理に進まない。At this time, the CPU 36 waits until an ON / OFF control signal 55 that is an operation permission signal (referred to as a normal enable signal) from the ASIC 56 arrives, and does not proceed to the above-described original processing.

指紋読取センサ51に所有者が指を置かれたことを当該ASIC56が検知すると、指紋画像採取57aが開始され、指紋読取完了後画像処理57b、指紋の特徴が抽出57cされ、その後予め登録されている所有者の指紋情報58aとの照合57dを実施する。When the ASIC 56 detects that the owner places a finger on the fingerprint reading sensor 51, fingerprint image collection 57a is started, image processing 57b after fingerprint reading is completed, fingerprint features 57c are extracted, and then registered in advance. The collation 57d with the fingerprint information 58a of the owner is performed.

照合57dの成功が確認されると、ASIC56内の計時制御57eにより指紋認証免除時間の計測を開始し、所有者にICカードがON状態すなわちアクティブ化されたことを知らせるインジケータ(表示手段)52を点灯した後、CMPU53に装置本来の処理開始(ON状態開始)信号55を通知する。When the verification 57d is confirmed to be successful, the time counting control 57e in the ASIC 56 starts measuring the fingerprint authentication exemption time, and displays an indicator (display means) 52 for notifying the owner that the IC card is in an ON state, that is, activated. After the light is turned on, the processing start (ON state start) signal 55 inherent to the apparatus is notified to the CMPU 53.

この時点で、初めて図1の11に示されたチャレンジコード(乱数)が、生成され端末装置との通常の通信が始まる。At this point, the challenge code (random number) shown at 11 in FIG. 1 is generated for the first time, and normal communication with the terminal device begins.

一連の図1に示された手続きの完了により端末装置が当該ICカードを端末装置から切り離す際には、終了信号をCMPU53のI/O装置35に通知し、CMPU53が処理を終了し、OFF状態に入る。When the terminal device disconnects the IC card from the terminal device upon completion of the series of procedures shown in FIG. 1, a termination signal is sent to the I / O device 35 of the CMPU 53, and the CMPU 53 terminates the processing and turns off. to go into.

なお、装置の使用者が正当な所有者であることの確認を端末装置との間の送受信手段に通信する際に、その通信内容を第三者に知られないための暗号化機能を具備するようにしてもよい。In addition, when communicating confirmation that the user of the device is a legitimate owner to the transmission / reception means with the terminal device, an encryption function is provided so that the communication content is not known to a third party. You may do it.

一方、計時制御57eでは指紋免除時間58bでは読み込んで時間経過を指紋免除時間57eと比較してこれを経過しないように監視する。On the other hand, in the time counting control 57e, the fingerprint exemption time 58b is read and the elapsed time is compared with the fingerprint exemption time 57e and monitored so as not to elapse.

指紋免除時間57eを経過した場合には、ASIC56側からCMPU53をOFF状態にする制御信号を送りCMPU53の処理を強制的に終了する場合も想定される。When the fingerprint exemption time 57e elapses, it may be assumed that the process of the CMPU 53 is forcibly terminated by sending a control signal for turning the CMPU 53 off from the ASIC 56 side.

指紋免除時間58eを経過した場合とは、例えば指紋読取57aに長時間応じない場合、指紋照合57dに失敗した場合や悪意の第三者が情報の盗み見又は機密情報(認証キーや暗証番号)を試行錯誤している等が想定される。For example, when the fingerprint exemption time 58e has elapsed, for example, when the fingerprint reading 57a is not responded for a long time, when the fingerprint collation 57d fails, or when a malicious third party sees information or sees confidential information (authentication key or password). A trial and error is assumed.

以上のように上述のスキミングで所有者に気付かれないようにICカードに電源供給しても、偽の端末装置との通信に応じることはなく、すなわち、不正の端末装置に対しては、本発明を適用したICカードは、通信に応じる心配は無い。As described above, even if power is supplied to the IC card so that the owner does not notice it by the above skimming, it does not respond to communication with a fake terminal device. The IC card to which the invention is applied does not have to worry about communication.

車のキーの場合や社員証によるアクセス制御の場合でも同様で、指紋認証での正当な所有者が確認されるまでは装置としての本来の処理には進まない。The same applies to the case of a car key or access control using an employee ID card, and it does not proceed to the original processing as a device until a valid owner is confirmed by fingerprint authentication.

なお、車のキーの場合、ドアーの開閉後運転席に付いた後のエンジン始動までの時間間隔を想定して指紋認証免除時間を設定することにより、複数回の指紋認証により所有者の利便性を損なうことは最小限に抑えられる。In the case of car keys, the fingerprint authentication exemption time is set based on the time interval until the engine starts after the door is opened and closed, and the convenience of the owner is obtained through multiple fingerprint authentications. It is possible to minimize the damage.

また、企業のオフィスや工場の敷地内での複数個所の入退室管理においては、一度指紋認証された装置の指紋認証免除時間を例えば就業時間内と定めれば、出社時に1回の指紋認証を実施した後は、従来の社員証の持つ機能がON状態のまま維持されるので、従来と同様の使用方法で済む。すなわち、オフィス又は工場の敷地内であれば、アクセスが制御された部屋の扉の開閉を制御する端末にON状態にある社員カードをかざすことにより入出チェックを許可される仕組みのまま、指紋認証を繰り返す必要とすることはない。In addition, in the entrance / exit management of multiple locations in the office of a company or factory, if the fingerprint authentication exemption time of the device once fingerprint-authenticated is defined as, for example, within working hours, one fingerprint authentication is performed at the time of leaving the office. After the implementation, the function of the conventional employee ID card is maintained in the ON state. In other words, if it is in the premises of an office or factory, fingerprint authentication is performed with a mechanism that allows entry / exit checking by holding the employee card in the ON state over the terminal that controls the opening and closing of the door of the room where access is controlled. There is no need to repeat.

一方、敷地内から外出する際も、例えば勤怠管理や残留者の安全管理の為にゲートの開閉を管理する入退室管理端末に社員証をかざして退社または外出するのが通常であるが、この場合、一旦ON状態にされた社員カードを管理端末にかざした時点で、管理端末はゲートから外部へ出ることを察知し、社員カードのCMPU53と交信し、計時制御部57eをリセットすると同時に、当該機能をOFF状態にすることも出来る。On the other hand, when going out from the premises, it is normal to leave or go out with an employee ID card over the entrance / exit management terminal that manages the opening and closing of the gate, for example for attendance management and safety management of the remainder. In this case, when the employee card once turned on is held over the management terminal, the management terminal senses that it goes out from the gate, communicates with the CMPU 53 of the employee card, and resets the timing control unit 57e. The function can be turned off.

更に、図3に点線で示された補助電源59として装置内部にバッテリー等の機能を設けて指紋センサ51及びASIC56のみを常に稼動状態に置き、指紋認証を予め実施後CMPU53をON状態にして指紋認証免除時間を長時間に設定することにより、当該装置への端末装置側からの電源供給4を待たずに予めICカードを稼動状態ならしめ例えば金融サービス端末の挿入口にICカードを挿入することにすると、当該端末装置の改修は不要となり、本発明のICカードを採用した後でも従来の端末装置はそのまま使えることとなる。Further, as an auxiliary power source 59 indicated by a dotted line in FIG. 3, a function such as a battery is provided inside the apparatus, and only the fingerprint sensor 51 and the ASIC 56 are always in an operating state, fingerprint authentication is performed in advance, and the CMPU 53 is turned on in advance. By setting the authentication exemption time to a long time, the IC card is put in an operating state in advance without waiting for the power supply 4 from the terminal device side to the device, for example, the IC card is inserted into the insertion slot of the financial service terminal In this case, it is not necessary to modify the terminal device, and the conventional terminal device can be used as it is even after the IC card of the present invention is adopted.

以上要するに、本発明によれば、装置本来の持つ利便性が損なわれることなく、悪意の第三者による犯罪に利用されることがないようなICカード等の携帯型装置が提供できる。In short, according to the present invention, it is possible to provide a portable device such as an IC card which is not used for a crime by a malicious third party without impairing the original convenience of the device.

は従来のICカード装置と端末装置の通信手順を説明するフローチャートIs a flowchart for explaining a communication procedure between a conventional IC card device and a terminal device は従来のICカード装置の構成を示すブロック図Is a block diagram showing the configuration of a conventional IC card device は本発明によるICカード装置の構成を示すブロック図及び処理図FIG. 2 is a block diagram and processing diagram showing the configuration of an IC card device according to the present invention.

Claims (1)

所定の敷地内に配置された複数の端末装置との間でそれぞれデータを送受信して稼働することにより、その目的を遂行する携帯型装置であって、該装置は端末装置との間のデータの送受信する手段と、指紋の読取りセンサーと、正当な所有者の指紋情報の登録記憶する手段と、登録された正当な所有者の指紋情報と上記センサーにより読み取られた指紋を照合して指紋認証する手段とを設け、端末装置との間のデータの送受信を通常時は不活性状態にし、照合の結果指紋認証に成功した場合にのみ端末装置との間のデータの送受信を稼働可能な状態にする指紋認証機能搭載携帯型装置において、所定の時間指紋認証を免除する時間を設定し、その免除時間を記憶する手段と、上記免除時間を制御する計時制御部を設け、指紋認証に成功した後上記指紋認証免除時間内においては指紋認証なく、何度でも端末装置との間のデータの送受信を稼働可能な状態にし、認証免除時間経過後は端末装置との間のデータの送受信を不活性状態に戻すようにするとともに、前記所定の敷地の外に出た場合は、指紋認証免除時間内であっても、敷地のゲートの開閉を管理する端末装置との間で交信して上記計時制御部に記録された残免除時間をリセットして端末装置との間のデータの送受信を不活性状態に戻すようにしたことを特徴とする指紋認証機能搭載携帯型装置
A portable device that performs its purpose by transmitting and receiving data to and from a plurality of terminal devices arranged in a predetermined site, and the device transmits data between the terminal devices. Fingerprint authentication is performed by collating the fingerprint information read by the sensor, the means for transmitting and receiving, the fingerprint reading sensor, the means for registering and storing the fingerprint information of the legitimate owner, and the fingerprint information of the legitimate owner registered. Means to send and receive data to and from the terminal device in an inactive state at normal times, and to enable data sending and receiving to and from the terminal device only when fingerprint authentication is successful as a result of collation In a portable device equipped with a fingerprint authentication function, after setting a time for exempting fingerprint authentication for a predetermined time, and providing a means for storing the exemption time and a timing control unit for controlling the exemption time, after successful fingerprint authentication Within the fingerprint authentication exemption time, without sending fingerprint authentication, data transmission / reception with the terminal device can be operated any number of times, and after the authentication exemption time has passed, data transmission / reception with the terminal device is inactive And when it goes out of the predetermined site, it communicates with the terminal device that manages the opening and closing of the gate of the site even during the fingerprint authentication exemption time, A portable device equipped with a fingerprint authentication function, wherein the remaining exemption time recorded on the terminal device is reset to return data transmission / reception to / from the terminal device to an inactive state .
JP2008300003A 2008-11-25 2008-11-25 Portable device with fingerprint authentication function Active JP4999193B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2008300003A JP4999193B2 (en) 2008-11-25 2008-11-25 Portable device with fingerprint authentication function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2008300003A JP4999193B2 (en) 2008-11-25 2008-11-25 Portable device with fingerprint authentication function

Publications (2)

Publication Number Publication Date
JP2010128600A JP2010128600A (en) 2010-06-10
JP4999193B2 true JP4999193B2 (en) 2012-08-15

Family

ID=42328972

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2008300003A Active JP4999193B2 (en) 2008-11-25 2008-11-25 Portable device with fingerprint authentication function

Country Status (1)

Country Link
JP (1) JP4999193B2 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5579915B2 (en) 2011-02-21 2014-08-27 株式会社Nttドコモ Gripping feature learning authentication system and gripping feature learning authentication method
JP5523388B2 (en) * 2011-05-10 2014-06-18 エイエスディ株式会社 IC card with fingerprint authentication
JP2013222410A (en) * 2012-04-18 2013-10-28 Fujitsu Frontech Ltd Portable terminal having non-contact ic card function and program therefor
JP5855217B1 (en) * 2014-12-15 2016-02-09 株式会社MoriX Smart card with fingerprint authentication and payment method using the same
JP7105540B2 (en) 2017-03-21 2022-07-25 株式会社東芝 IC card and IC card control method
JP6946031B2 (en) 2017-03-22 2021-10-06 株式会社東芝 IC card and IC card control method
KR20180135242A (en) 2017-06-12 2018-12-20 주식회사 하이딥 Terminal and method for controlling the same
KR102019373B1 (en) * 2019-05-02 2019-11-04 주식회사 하이딥 Terminal and method for controlling the same

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003064917A (en) * 2001-08-21 2003-03-05 Fuji Electric Co Ltd Lock management system
JP2004070894A (en) * 2002-08-05 2004-03-04 Terauea Kk Card system with individual identification
JP2004220175A (en) * 2003-01-10 2004-08-05 Seiko Epson Corp Information card, information card mounting device, information card device, information card processing device, and information card processing method
JP2005011187A (en) * 2003-06-20 2005-01-13 Seiko Epson Corp Electronic medical record, medical device, medical system, medical information system, medical information processing method and program
JP4474147B2 (en) * 2003-11-14 2010-06-02 パナソニック株式会社 Entrance / exit management method, entrance / exit management system, and read / write device
JP2006119811A (en) * 2004-10-20 2006-05-11 Seiko Epson Corp IC card
JP4274283B1 (en) * 2008-02-13 2009-06-03 サットンイースト株式会社 ID signal transmission device provided with biometric authentication means

Also Published As

Publication number Publication date
JP2010128600A (en) 2010-06-10

Similar Documents

Publication Publication Date Title
EP0924657B2 (en) Remote idendity verification technique using a personal identification device
JP4999193B2 (en) Portable device with fingerprint authentication function
EP0924656B2 (en) Personal identification FOB
US6523745B1 (en) Electronic transaction system including a fingerprint identification encoding
US20020043566A1 (en) Transaction card and method for reducing frauds
US20070063055A1 (en) Contactless data carrier
JP4792405B2 (en) Portable data carrier, external device, system and method for wireless data transfer
JP2007528054A (en) A system for identifying individuals in electronic transactions
JP2003271565A (en) Identity authentication system, identity authentication terminal, reader, and identity authentication method
KR100654857B1 (en) How to Control Identity Authentication Smart Card Systems
JP4689335B2 (en) Unauthorized transaction prevention system and terminal device
CN103164728A (en) IC (Integrated Circuit) card of loading fingerprint authentication function
CN203118024U (en) IC card with fingerprint authentication function
JP5075675B2 (en) Biometric authentication system and biometric authentication device
KR200208816Y1 (en) Non-power electronic signature apparatus having card reading function
JP4729187B2 (en) How to use card management system, card holder, card, card management system
JP7569826B2 (en) Fingerprint authentication IC card
JP2001067477A (en) Personal identification system
JP2004084306A (en) Equipment control system
JP2003345759A (en) Fingerprint reader
JPH10255005A (en) User authentication method
KR20040036850A (en) A finance card device recognizable bio-information, a card reader device therefor and a portable terminal including the same
HUSSAIN et al. MFAT: Security Enhancements in Integrated Biometric Smart Cards to Condense Identity Thefts
JPH10133953A (en) Data secrecy device
JP2004337428A (en) Security system for game machine

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20090525

A711 Notification of change in applicant

Free format text: JAPANESE INTERMEDIATE CODE: A711

Effective date: 20100401

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A821

Effective date: 20100401

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20120208

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20120213

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20120404

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20120509

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20120514

R150 Certificate of patent or registration of utility model

Ref document number: 4999193

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20150525

Year of fee payment: 3

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250