To provide a user authentication method and a device for the same by graphic encryption.
The user authentication method uses the degree of matching between an inputted graphic cryptogram and a registered graphic cryptogram and an input history of the graphic encryption, and determines whether or not to authenticate the user or whether or not it is an intrusion. In addition the method varies a threshold of bio recognition by the degree of matching between the inputted graphic cryptogram and the registered graphic cryptogram, compares the inputted user's bio recognition information to registered bio recognition information, and determines whether or not the user is authenticated. In the user authentication by the graphic cryptogram in a PDA or the like lacking a key operating part, convenience, reliability and security can be ensured. Also, by varying the threshold for the bio recognition as a result of the user authentication by the graphic cryptogram, imperfect recognition performance of the bio recognizer is improved, and FAR and FRR can be lowered at the same time.
WO/2008/089156 | CODE OPTIMIZATION ACROSS INTERFACES |
WO/2007/063547 | SYSTEM AND METHOD FOR APPENDING SECURITY INFORMATION TO SEARCH ENGINE RESULTS |
WO/2013/095589 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM |
HWANG EUI-HYEON
JP2002269047A | 2002-09-20 | |||
JP2001307102A | 2001-11-02 | |||
JP3086701Y | ||||
JP2001092785A | 2001-04-06 | |||
JPH11345206A | 1999-12-14 | |||
JPH11126191A | 1999-05-11 | |||
JPH1188324A | 1999-03-30 | |||
JPH11149454A | 1999-06-02 |
US20010036297A1 | 2001-11-01 |
Next Patent: OPERATION ENVIRONMENT RESTORATION METHOD OF CLIENT IN NETWORK SYSTEM