Patent application number | Description | Published |
20090154780 | SECURITY SYSTEM AND METHOD FOR SECURITY CERTIFICATION THEREOF, METHOD OF GENERATING RELATIVE CHARACTER INFORMATION, TERMINAL SYSTEM, AND SMART CARD - A security system is provided. The security system includes a terminal system and a smart card. The terminal system generates relative fingerprint information of a user from absolute fingerprint information of the user, determines a similarity between the generated relative feature information of the user and registered relative fingerprint information of a smart card owner transmitted from the smart card to generate variation information, and applies the variation information to the user absolute fingerprint information to generate modified user absolute fingerprint information. The smart card determines the similarity between the modified user absolute feature information and registered absolute feature information of the smart card owner to perform a certification operation. | 06-18-2009 |
20100254579 | Apparatus and method for determining the acceptability of a fingerprint image to be analyzed - A method of determining acceptability of an image of a fingerprint to be analyzed, includes dividing the image into a plurality of blocks, determining a focus for each block, determining a validity of a block, the block being valid if the focus is sufficient, otherwise the block being invalid, totaling a number of valid blocks in the image, and determining a validity of the image, the image being valid if a number of valid blocks is sufficient. | 10-07-2010 |
20130254842 | OPERATION OF MOBILE DEVICE AS TRUSTED MOBILE WEB CLIENT OR TRUSTED MOBILE WEB SERVER - A method of operating a mobile device comprises executing a trusted service application in a trusted operating system through secure access, executing a trusted web server module in the trusted operating system, wherein the trusted web server module is configured to transfer information using an internet protocol and the information is generated by execution of the trusted service application, and executing a user application in a rich operating system through normal access, wherein the user application is configured to relay communication between a remote web server and the trusted web server module through a security session. | 09-26-2013 |