摘要:
The present invention shortens the time required for watch list verification, and shortens the time required generally for the personal identification processing which includes watch list verification. In a personal identification system, a biometric information watch list comparison function (31) performs a first comparison of first biometric information in a traveler information DB (53), and biometric information on a biometric information watch list (52). Thereafter, a simplified alien immigration examination comparison function (41) performs a second comparison of the first biometric information in the traveler information DB (53), and second biometric information acquired by a biometric information acquisition function (62). As a result of the comparison, in the case where the difference between the time of the first comparison and the current time is within a previously defined time period, a terminal displays a first comparison result, and a second comparison result.
摘要:
A biometric authentication device has a threat of an attack of pretending to be someone else by such as forgery. The present invention supports a service provider to appropriately decide the level of such threat.A vulnerability verification server 150 is provided in the system, and the vulnerability of each biometric product is centrally managed. A service provider 130 sends the information that specifies the device in which a client terminal 110 executes the biometric authentication to the vulnerability verification server 150, and receives the vulnerability information. The service provider 130 decides whether the service can be provided or not to the client terminal 110 using the vulnerability information that was received.
摘要:
A biometric authentication device has a threat of an attack of pretending to be someone else by such as forgery. The present invention supports a service provider to appropriately decide the level of such threat.A vulnerability verification server 150 is provided in the system, and the vulnerability of each biometric product is centrally managed. A service provider 130 sends the information that specifies the device in which a client terminal 110 executes the biometric authentication to the vulnerability verification server 150, and receives the vulnerability information. The service provider 130 decides whether the service can be provided or not to the client terminal 110 using the vulnerability information that was received.
摘要:
A security system wherein, when a staff enters a building, a smart card carried by the staff is verified, and staff information inclusive of a staff number and fingerprint information is read from the smart card and is stored temporarily in a temporary storage file. When the staff logs on to a terminal, the fingerprint of the staff is read by a fingerprint input device (LS) and verified with the fingerprint information of the temporary storage file for verification. When the staff leaves the building, the staff number is read from the smart card the staff carries, and the corresponding staff information is erased from the temporary storage file. Security of a security object inside a security zone can be improved.
摘要:
A computer readable medium embodying a program to be executed by a terminal device used for a biometric authentication, the program including: an image generation code generating an enrolled image and a verification image from biometric information of a user collected at a sensor coupled to the terminal device; a filter generation code generating a random filter for scrambling the enrolled image and an inverse filter of the random filter; a transformation code transforming the enrolled image to a registration template by applying the random filter to the enrolled image and transforming the verification image to a filtered verification image by applying the inverse filter to the verification image; communication code transmitting the registration template and the filtered verification image to a biometric server thereby the biometric server performs biometric authentication of the user based on the cross-correlation between the registration template and the filtered verification image.
摘要:
A beacon slot position control section of a radio communication apparatus constituting a radio network system which detects whether empty beacon slots are present in a beacon period. When an empty beacon slot is present before the period in which the radio communication apparatus transmits a beacon, a movable counter starts counting a specified number of super frames. When the count is completed, the radio communication apparatus transmits a beacon of the radio communication apparatus at the earlier empty beacon slot. Consequently, since the empty beacon slots are eliminated and the beacon period is compacted, even if the number of radio communication apparatuses joining the radio network system fluctuates dynamically, the radio communication apparatus can perform radio communication with high efficiency and less waste of consumed electricity.
摘要:
A pulse modulation type transmitter apparatus and a pulse modulation type receiver apparatus wherein both a fast synchronization establishment and a low power consumption of a synchronizing part can be achieved at the same time and wherein the data transmission/reception can be performed soon after a commencement of communication, and further a fast data transmission and a low power consumption can be achieved. A first template signal (1006), which is generated based on a separately transmitted RF frame synchronization signal (1005), is used to generate a frame synchronization signal (1009), and a second frame synchronization timing adjusting part (150) is used to synchronize the frame synchronization signal (1009) with a received RF data signal (1004). Then, a synchronization detection is performed, whereby a prompt pulse acquisition and a prompt pulse phase acquisition can be achieved. After the establishment of frame synchronization, a template switching part (142) is used to switch from the first template signal (1006) to a second template signal (1007) that has been already synchronized with the first template signal (1006). Then, a synchronization detection is performed, whereby the frame synchronization can be maintained.
摘要:
Provided is a radio communication method which can reduce the power consumption as compared to the conventional technique while realizing coexistence of a plurality of radio communication methods and can perform synchronization with a super frame of other radio communication device. The super frame has life confirmation slots (2820, 2830) through which radio communication devices of various modulation types should transmit tone signals. A radio communication device has a chance to judge whether one or more radio communication devices using a different modulation type exist or no such device exists in the vicinity. If no such device exists, the slot to be used by the radio communication device of the modulation method is reported as a time that can be used by a radio communication group of other modulation method. Thus, by confirming existence of an object in the vicinity by other radio communication device with which communication cannot be performed, communication can be performed by sharing the super frame.
摘要:
A transmitting device includes a continuous pulse generating unit, modulating unit, and output unit. The continuous pulse generating unit continuously generates multiple impulse waveforms at arbitrary time intervals but shorter than the pulse string repetition cycle. The modulating unit modulates continuous pulses generated by the continuous pulse generating unit, using transmission data. The output unit outputs a modulated pulse modulated by the modulating unit. The receiving device includes a modulated pulse receiving unit that receives a modulated pulse transmitted from the above-mentioned transmitting device; and a demodulating unit that receives transmission data by demodulating a modulated pulse received by the modulated pulse receiving unit.
摘要:
A frame such as a beacon in wireless communication, with a maximum MAC address, hop count, and maximum hop count, described therein is exchanged between nodes. All the nodes measure the number of hops from a node with the maximum MAC address, and exchange the maximum hop count (hmax) out of the numbers with each other. Hop count H(a,b) between arbitrary nodes a and b is expressed by H(a,b)≦H(a,max)+H(max,b)≦2*hmax, where hmax is a hop count from node (max) with the maximum MAC address to the farthest node. That is, the number of hops between two arbitrary nodes in the group is always 2*hmax or less. Herewith, a numeric value assuredly exceeding the maximum value out of the numbers of hops between nodes in an ad-hoc network can be propagated in the entire ad-hoc network.