18284091. AUTHENTICATION TERMINAL, CODE GENERATION TERMINAL, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM simplified abstract (NEC Corporation)
Contents
- 1 AUTHENTICATION TERMINAL, CODE GENERATION TERMINAL, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 AUTHENTICATION TERMINAL, CODE GENERATION TERMINAL, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
AUTHENTICATION TERMINAL, CODE GENERATION TERMINAL, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
Organization Name
Inventor(s)
Daisuke Kawasaki of Tokyo (JP)
AUTHENTICATION TERMINAL, CODE GENERATION TERMINAL, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A simplified explanation of the abstract
This abstract first appeared for US patent application 18284091 titled 'AUTHENTICATION TERMINAL, CODE GENERATION TERMINAL, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
Simplified Explanation
The image acquisition unit acquires a body image and a code image for biometric authentication.
- Body image and code image are captured for biometric authentication.
- Code image contains embedded information including biometric and identification information.
- Biometric authentication is performed by comparing biometric information from the code image with biometric information from the body image.
- Successful authentication triggers notification to a management apparatus.
Potential Applications
This technology can be applied in various fields such as:
- Access control systems
- Security systems
- Identity verification processes
Problems Solved
This technology addresses the following issues:
- Unauthorized access
- Identity theft
- Security breaches
Benefits
The benefits of this technology include:
- Enhanced security
- Accurate identification
- Streamlined authentication processes
Potential Commercial Applications
The potential commercial applications of this technology include:
- Biometric security solutions
- Identity verification services
- Access control systems
Possible Prior Art
One possible prior art for this technology could be traditional biometric authentication methods using fingerprints or facial recognition.
What are the specific biometric information used for authentication in this technology?
The specific biometric information used for authentication in this technology includes biometric information for registration and biometric information generated based on the body image.
How does the notification unit communicate with the management apparatus?
The notification unit communicates with the management apparatus through a secure network connection, sending the identification information on the target person once the biometric authentication has been successful.
Original Abstract Submitted
The image acquisition unit acquires a body image generated by capturing an image of a body of a target person and a code image generated by capturing an image of a code recording medium. The code recording medium includes a code symbol that can be visually recognized and in which embedded information including biometric information for registration of the target person and identification information on the target person are recorded. The embedded information acquisition unit acquires the embedded information from the code image. The authentication unit executes biometric authentication by collating the biometric information for registration included in the embedded information with biometric information for authentication generated based on the body image. The notification unit notifies a management apparatus of the identification information on the target person when the biometric authentication has been successful.