首页>
外国专利>
Scheme for authenticating a user, wherein data required to complete authentication is only released from a server if a key can been authenticated
Scheme for authenticating a user, wherein data required to complete authentication is only released from a server if a key can been authenticated
A first user input terminal 5 enables a user to input at least three different types of personal identification information and transmit the input personal identification information to the server 3 for storage. The key generating device 29 generates and issues a key associated with the input personal identification information. The personal identification information and the information indicative of the key are stored at the server 3. The key is entered into the second terminal, and if authentication of this key is successful, the stored personal identification information associated with that key can be released from the server 3 and used to verify the identity of a user of the second user input terminal 7. The personal identification information can take the form of name and address of user, image of user, a handwritten signature or biometric data such as a fingerprint, iris scan or DNA sample.
展开▼