WO2009096767A1 - Method of secure pin entry and operation mode setting - Google Patents

Method of secure pin entry and operation mode setting Download PDF

Info

Publication number
WO2009096767A1
WO2009096767A1 PCT/MY2008/000005 MY2008000005W WO2009096767A1 WO 2009096767 A1 WO2009096767 A1 WO 2009096767A1 MY 2008000005 W MY2008000005 W MY 2008000005W WO 2009096767 A1 WO2009096767 A1 WO 2009096767A1
Authority
WO
WIPO (PCT)
Prior art keywords
finger
fingerprint
sensor
pin
entry
Prior art date
Application number
PCT/MY2008/000005
Other languages
French (fr)
Inventor
Kong Pheng Lee
Arendt Henning
Original Assignee
Advanced Product Design Sdn Bhd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced Product Design Sdn Bhd filed Critical Advanced Product Design Sdn Bhd
Priority to PCT/MY2008/000005 priority Critical patent/WO2009096767A1/en
Priority to PCT/EP2009/000632 priority patent/WO2009095263A1/en
Publication of WO2009096767A1 publication Critical patent/WO2009096767A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3572Multiple accounts on card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0853On-card keyboard means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user

Definitions

  • the BLUE LED is ON as long as the Finger is present on the sensor. [STEP 58].

Abstract

This invention describes a method of a secure PIN (Personal Identification Number) entry and operation mode setting using a fingerprint sensor integrated in a portable device, which comprises of at least a fingerprint biometrics processing unit. The fingerprint biometrics processing unit retrieves the fingerprint data, external to the device, performs signal processing, authenticates the signal retrieved against identity parameters stored within the device, independent from a PC Host. The result of the authentication is used to enable secured portable device functions e.g. flash memory, security token, smart card etc. In the present invention, the fingerprint sensor is not only used to capture the fingerprint image but also to detect if a fingerprint or finger is present or absent. The finger detection together with the detection time and duration or together with the direction of movement of finger on the sensor defines a method of a secure PIN entry and operation mode setting.

Description

Description
Method of Secure PIN Entry and Operation Mode Setting
Description of the Art
Typically, a fingerprint sensor is used to scan a fingerprint image. The fingerprint image retrieved is then processed to generate a fingerprint template or identity parameter. This identity parameter is then authenticated against identity parameters that are stored within the portable device.
If the fingerprint is found to be valid, the device is enabled. These devices are present in the market place, particularly as biometrics flash disks, biometrics tokens, biometrics smart cards etc.
Typically there are features built in for recovery in situations where the fingerprint identity parameters are to be erased and the authentication of the fingerprint identity parameter needs to be bypassed. In addition, there may be other requirements of adding an additional authentication factor. In both cases a password or PIN input is used where the password or PIN is entered from the PC or a tactile switch, built into the portable device, to operate without any special software on the PC.
In the prior art devices, the PIN entry is done by keying the PIN in through a computer terminal and transmit it via computer serial ports such as RS232 or USB, or a wireless interface. This allows a hacker to use known attacks like a keystroke logger to retrieve the PIN numbers.
In addition, the application software that enables the PIN entry may work in one operating systems such as Windows but may not work on in another operating systems such as Mac OS or Linux. Therefore, the use of a password entry via a PC is quite limited. In another type of prior art devices, a tactile switch is used. The use of a tactile switch is easily subjected to hacking too. Atypical tactile switch circuitry is shown in Figure 1. It is an input line to the device central processing unit. The input line is connected to a pull up resistor. The line is typically HIGH. When a tactile switch is pressed the LINE becomes LOW. Usually the small tactile switch is pressed by a finger nail or a pencil tip. However, since it is only an input line, a potential hacker, who gets hold of the device and knows how the device works, could tap the line and send HIGH and LOW signals -representing the PIN -to get unauthorized access. Another disadvantage with the use of tactile switch is that it is made of small mechanical parts. It is an additional component and potentially subjected to fail due to wear and tear.
In the present invention, the fingerprint sensor is used to detect the presence of a finger and the time and duration of its presence. The LED indicators are used to indicate if time and sufficient duration have been achieved, as required. The mechanisms of a PIN input for both, tactile switch and finger detection, appear to be similar . However, the approach by finger detection is for more secure as it depends on detection algorithms to detect a finger instead of a low/high signal PIN input from a tactile switch.
In addition, the biometrics fingerprint sensor is for more accessible and durable compared with a tactile switch.
Figure 2 provides an overview diagram of the current method of secure PIN entry in a portable biometrics device. The device has 3 LEDs as shown in Figure 2. The device 10 may be connected to the host PC via a communication interface connector 14. The LED indicators 08 are visible and the biometrics sensor 12 is accessible on the top surface of the device. The biometrics fingerprint sensor 12 in the current description can be either a swipe sensor or an areal sensor.
The internal building block of device 10 is shown in Figure 3. It consists of a USB connector 14, a flash memory 22, LED indicators 08, a biometric fingerprint sensor 12 and a micro-controller 50. The micro-controller 50 consists of a biometric fingerprint processing unit and a USB flash controller unit. Device 10 is a biometric flash disk.
The user's fingerprint data is captured via the fingerprint sensor 12. Once the fingerprint is authenticated against the stored identity parameters, the micro-controller 50 will activate its USB flash controller and the user will then be able to access to flash memory 22. The micro-controller 50 can be set into 'PIN entry mode' to allow the sequential entry of each PIN digit. When TIN entry mode' is detected, the micro-controller within the device will set a digital control parameter for the PIN entry to 0, to indicate that this is the first digit of the PIN entry. The value of the digit is also set to zero. User guidance is done by LED indicators 08 which consist of a BLUE LED, a RED LED and a GREEN LED. The BLUE LED indicates that the sensor has sensed the presence of a finger. GREEN LED indicates a DIGIT entry and indicates also ON when the entered PIN matches with a previously stored PIN. The RED LED indicates that the PIN entered does not match with a previously stored PIN or PIN entry time has expired. If the finger presence at the sensor is short, let say less that 1 second, it is considered as an increment of current digit. If the finger presence at the sensor is longer than 1 second, it means the current DIGIT is complete and has to be stored. Now the next digit to be entered is initialized to ZERO. If the finger is present at the sensor for more than 3 seconds, it means the PIN entry is complete. Here is an example of the sequence of entering PIN 5034 in the PIN entry mode,
1. briefly touch the sensor 5 times (each less than 1 second). The BLUE LED confirms each time that the finger presence has been sensed and therefore the digit value is incremented by one to a total of 5. 2. touch the sensor continuously for 1 second to complete the first digit entry. There is a short blink of the GREEN LED to indicate the digit entry is complete. The BLUE LED is ON indicating that finger presence at the sensor.
3. to enter the next digit, the zero, just touch the sensor for 1 second until the GREEN LED is on in order to complete the second digit entry. (Note: each new digit is zero by default and for a zero no increment entry is needed)
4. briefly touch the sensor 3 times. Each digit increment is confirmed by a short blink of the Blue LED.
5. touch the sensor for 1 second to complete the third digit entry. There is a short blink of the GREEN LED to indicate the digit entry is complete.
6. briefly touch the sensor 4 times. Each digit increment is confirmed by a short blink of the Blue LED.
7. touch the sensor for 3 seconds to complete the PIN entry. If the PIN matches, then GREEN LED will be ON; otherwise, the RED LED will be ON briefly. In another method, a PIN entry can be made by finger detect together with the direction of movement of the fingerprint on the sensor. For example, swiping of a finger from left to right is considered as an increment of current digit. If the finger swipes on the sensor from right to left on the sensor, it means the current DIGIT is complete and has to be stored. The next digit to be entered is initialized to ZERO. Here is an example of entering PIN 5034
1. swipe the finger from left to right on the sensor 5 times, The BLUE LED confirms each time that the finger swiping has been sensed and therefore the digit value is incremented by one to a total of 5.
2. swipe the finger from right to left on the sensor. There is a short blink of the GREEN LED to indicate the digit entry is complete.
3. to enter the next digit, the zero, just swipe the finger from right to left on the sensor, the GREEN LED turns on to indicate the second digit entry is complete. (Note: each new digit is zero by default and for a zero no increment entry is needed) 4. swipe the finger on the sensor from left to right on the sensor 3 times. Each digit increment is confirmed by a short blink of the Blue LED. 5. swipe the finger on the sensor from right to left on the sensor to complete the third digit entry. There is a short blink of the GREEN LED to indicate the digit entry is complete. 6. swipe the finger from left to right on the sensor 4 times. Each digit increment is confirmed by a short blink of the Blue LED.
7. touch the sensor for 3 seconds to complete the PIN entry. If the PIN matches, then GREEN LED will be ON; otherwise, the RED LED will be ON briefly. One advantage of using the fingerprint sensor instead of a tactile switch is that it is easier to use, compared with a small little tactile switch.
Additionally, the fingerprint sensor can be used without help of a pen or paper-clip, compared with a hidden small tactile switch and it is more durable against hard pressure which may damage a small tactile switch easily.
Another significant advantage of the finger detect input is that it is independent of any operating system. It does not leave any software traces in a PC with the PIN entry and can not be traced by any malicious program on a PC. (Note: To enter a PIN from a PC you need to run a program in that PC before you can key in your PIN. A PC program that runs on a Windows operating systems environment may not run on Linux or Mac OS).
Additionally, the finger detect allows for a 2-factor authentication. In order to enable the device, the user has to provide both, a valid fingerprint AND a valid PIN entry, using the finger detection. The described method of detecting the presence of a finger, including it's time and duration, allows for setting the device in different modes of operation. An example is provided in Figure 4. It shows various options of how a 2-factor authentication, the re- enrollment of fingerprints and a method of bypassing fingerprint authentication by PIN input can be achieved by simply detecting the absence and presence of a finger by analyzing time and duration of its presence.
Compared with the tactile switch, the described method of using the biometric sensor allows to add another layer of security for the PIN entry or enablement of a specific operation mode by checking if a real finger is present, using the biometric sensing features functionalities of the sensor. When the portable biometric fingerprint device is inserted into a USB port, the device checks if there is a finger present on the sensor [STEP 50]. If it is not, it proceeds with the BLUE LED blinking to invite the user to scan the finger for authentication [STEP 64].
If there is a finger present on the sensor, the BLUE LED is ON until the finger is removed. When the finger is removed and then placed back again on the sensor within
3 seconds [STEP 52 & 54], this is to confirm to operate in other modes than the normal authentication mode.
A finger detect timer, FDTimer, is then set to check the duration of the finger presence and to light up the GREEN LED when 3 seconds duration is achieved and to light up the RED LED when the 8 seconds duration has been reached. [STEP 56]
The BLUE LED is ON as long as the Finger is present on the sensor. [STEP 58].
When the finger is lifted, and the duration was more than 8 seconds [STEP 60], then the user is prompted to enter the PIN number to enable the secured functions (like access to the flash memory) [STEP 66]. In this mode of operation, the user bypasses the fingerprint authentication.
If the finger is present for more than 3 seconds [STEP 62], it will proceed to re- enrollment of fingerprint [STEP 68]. The user is prompted to authenticate the re- enrollment with a valid fingerprint. Once a valid fingerprint is authenticated, all the fingerprint identity parameters are erased.
Alternately, the user has to enter a PIN as the first factor of authentication [STEP 70]. Once the PIN entry is validated, the user will be prompted for the second factor of authentication which is an entry of a valid fingerprint [STEP 64]. Similarly, after the unit has been authenticated by a fingerprint and/or PIN entry, the user can
1. place the finger on the sensor for 3 seconds continuously and then set the PIN number to delete the fingerprint identity parameters
2. place the finger on the sensor for 6 seconds continuously and then set the PIN for bypassing the fingerprint authentication
3. place the finger on the sensor for 9 seconds continuously and then set the PIN ;for deleting the fingerprint identity parameters.
While the present invention is described by means of specific embodiments, it will be understood that modifications may be made without departing from the spirit of the invention. The scope of the invention is not to be considered as limited by the description of the invention set forth in this description, but rather defined by the following claims:

Claims

Claims
[ 1 ] A portable device which comprises of at least a fingerprint biometrics processing unit whereby the fingerprint biometrics sensor is not only used to retrieve the user fingerprint image but is also used to detect the presence and absence of the finger and also the direction of movement of the finger.
[2] The finger detection of claim one of the said portable device together with the timing and sequence of detection of presence and absence of a finger on the surface of the fingerprint sensor or together with the direction of movement of the finger, are used as method of PIN input to the said device
[3] The finger detection of claim one of the said portable device together with the timing and sequence of detection of presence and absence of a finger on the surface of the fingerprint sensor, are used as method of enabling different modes of operations of the said device, specifically to enable specific secured operations
[4] The method of PIN entry together with the biometric fingerprint authentication of the said device are used as two factor authentication of the device.
[5] The claims 1-5 of a portable device apply also to components which may be embedded and integrated into other electronic devices to secure specific functions like notebooks, smart card readers, phones, cameras, desktop boxes, TV-sets, cars etc. to allow for an independence from the existing operating system or bus structure
[6] A portable or embedded device of claim 1 -5 using the biometric sensor to add another layer of security for the PIN entry or enablement of a specific operation mode checking if a real finger is present before or when the commands/PIN are entered, using the biometric sensing features and functionalities of the sensor.
PCT/MY2008/000005 2008-01-30 2008-01-30 Method of secure pin entry and operation mode setting WO2009096767A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/MY2008/000005 WO2009096767A1 (en) 2008-01-30 2008-01-30 Method of secure pin entry and operation mode setting
PCT/EP2009/000632 WO2009095263A1 (en) 2008-01-30 2009-01-30 Method of secure pin entry and operation mode setting in a personal portable device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/MY2008/000005 WO2009096767A1 (en) 2008-01-30 2008-01-30 Method of secure pin entry and operation mode setting

Publications (1)

Publication Number Publication Date
WO2009096767A1 true WO2009096767A1 (en) 2009-08-06

Family

ID=40551252

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/MY2008/000005 WO2009096767A1 (en) 2008-01-30 2008-01-30 Method of secure pin entry and operation mode setting
PCT/EP2009/000632 WO2009095263A1 (en) 2008-01-30 2009-01-30 Method of secure pin entry and operation mode setting in a personal portable device

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/EP2009/000632 WO2009095263A1 (en) 2008-01-30 2009-01-30 Method of secure pin entry and operation mode setting in a personal portable device

Country Status (1)

Country Link
WO (2) WO2009096767A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102012219504A1 (en) 2011-11-08 2013-05-08 International Business Machines Corporation Passive mobile article with passcode touch sensor array
CN103167138A (en) * 2012-09-14 2013-06-19 深圳市金立通信设备有限公司 Achieving system and achieving method of mobile phone arbitrary system mixed cryptogram
WO2015063474A1 (en) * 2013-10-29 2015-05-07 Cryptomathic Ltd Secure mobile user interface and mobile device case

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8572394B2 (en) 2009-09-04 2013-10-29 Computer Associates Think, Inc. OTP generation using a camouflaged key
US8533460B2 (en) 2009-11-06 2013-09-10 Computer Associates Think, Inc. Key camouflaging method using a machine identifier
US8843757B2 (en) 2009-11-12 2014-09-23 Ca, Inc. One time PIN generation
US8582778B2 (en) 2011-06-01 2013-11-12 International Business Machines Corporation Integrated key server
EP2575084A1 (en) * 2011-09-30 2013-04-03 Nxp B.V. Security token and authentication system
DE102012100797A1 (en) * 2012-01-31 2013-08-01 Authentidate International Ag authentication device
US8955746B2 (en) 2012-09-27 2015-02-17 Intel Corporation Providing a locking technique for electronic displays
CN102902903B (en) * 2012-10-10 2016-03-30 中孚信息股份有限公司 A kind of ecommerce intelligent code key with button and its implementation
EP2782074B1 (en) * 2013-03-19 2019-06-26 Nxp B.V. Control system with security token and control method
EP2782073B1 (en) * 2013-03-19 2019-11-20 Nxp B.V. Smart card comprising tactile sensing user interface
NO336008B1 (en) 2013-06-26 2015-04-20 Steinar Pedersen Easy and reliable authentication of fingerprints
EP3213242B1 (en) * 2014-10-30 2021-09-15 Hewlett-Packard Development Company, L.P. Transaction medium
DE102015112891A1 (en) * 2015-08-05 2017-02-09 Iseconsult Device and method for secure storage, management and provision of authentication information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6484260B1 (en) * 1998-04-24 2002-11-19 Identix, Inc. Personal identification system
US6766040B1 (en) * 2000-10-02 2004-07-20 Biometric Solutions, Llc System and method for capturing, enrolling and verifying a fingerprint
US6836554B1 (en) * 2000-06-16 2004-12-28 International Business Machines Corporation System and method for distorting a biometric for transactions with enhanced security and privacy

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7272723B1 (en) * 1999-01-15 2007-09-18 Safenet, Inc. USB-compliant personal key with integral input and output devices
US6509847B1 (en) * 1999-09-01 2003-01-21 Gateway, Inc. Pressure password input device and method
KR100641434B1 (en) * 2004-03-22 2006-10-31 엘지전자 주식회사 Mobile station having fingerprint recognition means and operating method thereof
US8090945B2 (en) * 2005-09-16 2012-01-03 Tara Chand Singhal Systems and methods for multi-factor remote user authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6484260B1 (en) * 1998-04-24 2002-11-19 Identix, Inc. Personal identification system
US6836554B1 (en) * 2000-06-16 2004-12-28 International Business Machines Corporation System and method for distorting a biometric for transactions with enhanced security and privacy
US6766040B1 (en) * 2000-10-02 2004-07-20 Biometric Solutions, Llc System and method for capturing, enrolling and verifying a fingerprint

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102012219504A1 (en) 2011-11-08 2013-05-08 International Business Machines Corporation Passive mobile article with passcode touch sensor array
DE102012219504B4 (en) 2011-11-08 2021-08-05 International Business Machines Corporation Passive mobile article with identification code touch sensor array
CN103167138A (en) * 2012-09-14 2013-06-19 深圳市金立通信设备有限公司 Achieving system and achieving method of mobile phone arbitrary system mixed cryptogram
CN103167138B (en) * 2012-09-14 2015-10-07 深圳市金立通信设备有限公司 A kind of system that realizes of mobile phone arbitrary carry system combination pin and implementation method
WO2015063474A1 (en) * 2013-10-29 2015-05-07 Cryptomathic Ltd Secure mobile user interface and mobile device case
KR20160077096A (en) * 2013-10-29 2016-07-01 크립토매틱 엘티디 Secure Mobile User Interface
JP2017502549A (en) * 2013-10-29 2017-01-19 クリプトマティック リミテッドCryptomathic Ltd Secure mobile user interface and mobile device case
US9760888B2 (en) 2013-10-29 2017-09-12 Cryptomathic Ltd. Secure mobile user interface
US10719831B2 (en) 2013-10-29 2020-07-21 Cryptomathic Ltd. Secure mobile user interface
KR102278236B1 (en) * 2013-10-29 2021-07-15 크립토매틱 엘티디 Secure Mobile User Interface

Also Published As

Publication number Publication date
WO2009095263A1 (en) 2009-08-06
WO2009095263A8 (en) 2010-03-18

Similar Documents

Publication Publication Date Title
WO2009096767A1 (en) Method of secure pin entry and operation mode setting
TWI474263B (en) Method of executing software functions using biometric detection and related electronic device
EP1990734A1 (en) Portable and independent system for storage and display of passwords and pins
US20140210589A1 (en) Smart card and smart system with enhanced security features
US20140028439A1 (en) Sensor-embedded door handle with fingerprint identification function
US20170228631A1 (en) Smartcard and method for controlling a smartcard
US20170286789A1 (en) Biometric authorised smartcard and method for controlling a biometric authorised smartcard
WO2010030157A1 (en) A method of authentication of computer id for portable data storage devices
US9268928B2 (en) Smart pen system to restrict access to security sensitive devices while continuously authenticating the user
KR101853270B1 (en) Authentication method for portable secure authentication apparatus using fingerprint
JP4734088B2 (en) User authentication apparatus and control method thereof
US10262165B2 (en) Authentication of a smart pen and computing device
US9824219B2 (en) Electronic device having wake up verification and electronic system having the electronic device
US10762182B2 (en) Detection system, fingerprint sensor, and method of finger touch authentication thereof
JP2002074365A (en) Identity authentication system
CN101646262A (en) Wireless data card and identity certification method thereof
KR101853266B1 (en) Portable secure authentication apparatus using fingerprint
US11409853B2 (en) System and method for authenticating before waking an information handling system
CN109583168B (en) Unlocking control method and electronic device
WO2004055738A1 (en) Devices for combined access and input
KR20050034506A (en) Stand alone usb storage device using finger printing cognition
KR20070109488A (en) The mouse of finger drive ring with nand flash memory
US11113376B2 (en) Detection system, fingerprint sensor, and method of finger touch authentication thereof
TW201445358A (en) Navigation device and method of triggering security setting
US20070181697A1 (en) Method of a USB interface device with a discrimination function

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08712568

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 02/11/10)

122 Ep: pct application non-entry in european phase

Ref document number: 08712568

Country of ref document: EP

Kind code of ref document: A1