会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • METHOD OF USING FINGERPRINTS TO AUTHENTICATE WIRELESS COMMUNICATIONS
    • 使用指纹识别无线通信的方法
    • WO9811750A2
    • 1998-03-19
    • PCT/US9716094
    • 1997-09-10
    • LI YANGRAO D RAMESK KSUBBIAH SUBRAMANIAN
    • LI YANGRAO D RAMESK KSUBBIAH SUBRAMANIAN
    • B60R25/00G07C9/00H04W12/06H04Q7/38
    • H04W12/06G06F2203/0336G06K9/00899G07C9/00158G07C2009/00095H04L63/0861H04W12/02
    • Disclosed are a system and a method employing a user's fingerprint to authenticate a wireless communication. The user's personal fingerprint is employed as the secret key in the context of a modified "challenge-response" scenario. The system includes a fingerprint capture module on a mobile personal wireless communication device (e.g., a wireless telephone) and a central authentication system coupled to a conventional mobile switching center. The central authentication system contains information that associates each mobile identification number ("MIN") with a particular user's fingerprint. When a wireless communication is to be initiated, the central authentication system engages in a challenge-response authentication with the mobile switching station or the wireless phone using the stored fingerprint associated with the MIN through the common air interface. The correct response from the mobile station will only be generated when the user's fingerprint entered through the fingerprint capture module attached to the mobile station matches the information sent from the central authentication system, and only calls placed from authorized users are connected.
    • 公开了采用用户指纹来认证无线通信的系统和方法。 在修改的“质询 - 响应”场景的上下文中,用户的个人指纹被用作秘密密钥。 该系统包括在移动个人无线通信设备(例如,无线电话)上的指纹捕获模块以及耦合到常规移动交换中心的中央认证系统。 中央认证系统包含将每个移动识别号码(“MIN”)与特定用户的指纹相关联的信息。 当要启动无线通信时,中央认证系统通过公共空中接口使用与MIN相关联的存储的指纹与移动交换站或无线电话进行询问 - 响应认证。 移动台的正确响应只有当用户通过附着在移动台上的指纹识别模块输入的指纹与从中央认证系统发送的信息相匹配,才能产生,仅连接来自授权用户的呼叫。
    • 3. 发明申请
    • EMBEDDABLE MODULE FOR FINGERPRINT CAPTURE AND MATCHING
    • 用于指纹捕获和匹配的可嵌入模块
    • WO1998011501A2
    • 1998-03-19
    • PCT/US1997016092
    • 1997-09-10
    • RAO, D., Ramesh, K.SUBBIAH, SubramanianLI, YangCHU, Donna
    • G06K09/00
    • G07C9/00158G06F3/03543G06F2203/0336G06K9/00013
    • Disclosed is a low-cost fingerprint capture device that can be integrated in a computer mouse. Fingerprint information captured with such a device is transmitted to a computer via a serial port. As such ports are relatively slow, the capture device provides a low resolution fingerprint image (having less than 512 x 512 pixels). This low resolution data is processed by an iterative method that contrasts sectors of the image in a direction specified by "flow vectors". These flow vectors specify an average direction of fingerprint ridgelines in the sector under consideration. These methodologies enable the transmission of fingerprint data over the relatively slow RS232 serial protocol, in a manner that allows virtually instantaneous fingerprint identification.
    • 公开了可以集成在计算机鼠标中的低成本指纹捕获装置。 用这种设备捕获的指纹信息通过串行端口发送到计算机。 由于这些端口相对较慢,捕获设备提供低分辨率指纹图像(具有小于512×512像素)。 该低分辨率数据通过迭代方法进行处理,该方法将由“流向量”指定的方向对比图像的扇区。 这些流向量指定了正在考虑的部门中指纹脊线的平均方向。 这些方法使得能够以相对较慢的RS232串行协议传输指纹数据,以允许几乎瞬时的指纹识别的方式。
    • 4. 发明申请
    • A BIOMETRIC BASED METHOD FOR SOFTWARE DISTRIBUTION
    • 一种用于软件分发的基于BIOMETRIC的方法
    • WO9811478A8
    • 1999-04-01
    • PCT/US9716093
    • 1997-09-10
    • SUBBIAH SUBRAMANIANLI YANGRAO D RAMESH K
    • SUBBIAH SUBRAMANIANLI YANGRAO D RAMESH K
    • G06F1/00G06F21/00
    • G06F21/32G06F21/10G06F2211/007
    • A method is provided for protecting distributed software, either through the internet/telephone networks or via physical storage media like floppy diskettes, magnetic tapes, CD-ROMS, DVD-ROMS, etc., by using biometric information (personal fingerprint information in particular). In one approach, the fingerprint of the software purchaser is embedded into the purchased software at the time of purchase. All subsequent use of the software by the purchaser at his/her home or office is subject to (a) providing his/her fingerprint again and (b) the fingerprint matches that embedded in the purchased software. In another related approach, prior to the use or installation of distributed software, the user's computer calls a central management server station. The software then requests the user to provide his or her fingerprint by any device that would capture such information. The fingerprint information is then processed on the local user computer by any image processing program, and the relevant information is then sent to the central server along with a key or serial number that is built into the distributed software. The central management server then compares the provided information with the information previously stored in its central database and decides whether the user is authorized. Such a method can also be employed in a licence management system whereby software product usage can be remotely monitored and fees for usage charged appropriately.
    • 通过使用生物特征信息(特别是个人指纹信息),提供了通过互联网/电话网络或通过诸如软盘,磁带,CD-ROM,DVD-ROM等物理存储介质来保护分布式软件的方法, 。 在一种方法中,软件购买者的指纹在购买时嵌入购买的软件中。 购买者随后在其家庭或办公室使用软件的做法应遵循(a)再次提供他/她的指纹,(b)嵌入在购买的软件中的指纹匹配。 在另一种相关方法中,在使用或安装分布式软件之前,用户的计算机呼叫中央管理服务器站。 软件然后请求用户通过捕获这些信息的任何设备提供他或她的指纹。 然后通过任何图像处理程序在本地用户计算机上处​​理指纹信息,然后将相关信息与内置于分布式软件中的密钥或序列号一起发送到中央服务器。 然后,中央管理服务器将所提供的信息与先前存储在其中央数据库中的信息进行比较,并且确定用户是否被授权。 这种方法也可以用于许可证管理系统,由此可以远程监视软件产品的使用,并且适当地收取使用费。
    • 6. 发明申请
    • A BIOMETRIC BASED METHOD FOR SOFTWARE DISTRIBUTION
    • 一种用于软件分发的基于生物学的方法
    • WO1998011478A2
    • 1998-03-19
    • PCT/US1997016093
    • 1997-09-10
    • SUBBIAH, SubramanianLI, YangRAO, D., Ramesh, K.
    • G06F01/00
    • G06F21/32G06F21/10G06F2211/007
    • A method is provided for protecting distributed software, either through the internet/telephone networks or via physical storage media like floppy diskettes, magnetic tapes, CD-ROMS, DVD-ROMS, etc., by using biometric information (personal fingerprint information in particular). In one approach, the fingerprint of the software purchaser is embedded into the purchased software at the time of purchase. All subsequent use of the software by the purchaser at his/her home or office is subject to (a) providing his/her fingerprint again and (b) the fingerprint matches that embedded in the purchased software. In another related approach, prior to the use or installation of distributed software, the user's computer calls a central management server station. The software then requests the user to provide his or her fingerprint by any device that would capture such information. The fingerprint information is then processed on the local user computer by any image processing program, and the relevant information is then sent to the central server along with a key or serial number that is built into the distributed software. The central management server then compares the provided information with the information previously stored in its central database and decides whether the user is authorized. Such a method can also be employed in a licence management system whereby software product usage can be remotely monitored and fees for usage charged appropriately.
    • 通过使用生物特征信息(特别是个人指纹信息),提供了通过互联网/电话网络或通过诸如软盘,磁带,CD-ROM,DVD-ROM等物理存储介质来保护分布式软件的方法, 。 在一种方法中,软件购买者的指纹在购买时被嵌入购买的软件中。 购买者随后在其家庭或办公室使用软件的做法应遵循(a)再次提供他/她的指纹,(b)嵌入在购买的软件中的指纹匹配。 在另一相关方法中,在使用或安装分布式软件之前,用户的计算机呼叫中央管理服务器站。 软件然后请求用户通过捕获这些信息的任何设备提供他或她的指纹。 然后通过任何图像处理程序在本地用户计算机上处​​理指纹信息,然后将相关信息与内置于分布式软件中的密钥或序列号一起发送到中央服务器。 然后,中央管理服务器将所提供的信息与先前存储在其中央数据库中的信息进行比较,并判断用户是否被授权。 这种方法也可以用于许可证管理系统中,从而可以远程监视软件产品的使用,并且适当地收取使用费。
    • 8. 发明申请
    • A biometric based method for software distribution
    • 一种基于生物特征的软件分发方法
    • WO9811478A3
    • 1998-05-22
    • PCT/US9716093
    • 1997-09-10
    • SUBBIAH SUBRAMANIANLI YANGRAO D RAMESH K
    • SUBBIAH SUBRAMANIANLI YANGRAO D RAMESH K
    • G06F1/00G06F21/00
    • G06F21/32G06F21/10G06F2211/007
    • A method is provided for protecting distributed software, either through the internet/telephone networks or via physical storage media like floppy diskettes, magnetic tapes, CD-ROMS, DVD-ROMS, etc., by using biometric information (personal fingerprint information in particular). In one approach, the fingerprint of the software purchaser is embedded into the purchased software at the time of purchase. All subsequent use of the software by the purchaser at his/her home or office is subject to (a) providing his/her fingerprint again and (b) the fingerprint matches that embedded in the purchased software. In another related approach, prior to the use or installation of distributed software, the user's computer calls a central management server station. The software then requests the user to provide his or her fingerprint by any device that would capture such information. The fingerprint information is then processed on the local user computer by any image processing program, and the relevant information is then sent to the central server along with a key or serial number that is built into the distributed software. The central management server then compares the provided information with the information previously stored in its central database and decides whether the user is authorized. Such a method can also be employed in a licence management system whereby software product usage can be remotely monitored and fees for usage charged appropriately.