Browse Prior Art Database

Fingerprint Log-In on Displays

IP.com Disclosure Number: IPCOM000099076D
Published in the IP.com Journal: Volume 5 Issue 4 (2005-04-16)
Included in the Prior Art Database: 2005-Apr-16
Document File: 1 page(s) / 198K

Publishing Venue

Siemens

Related People

Juergen Carstens: CONTACT

Abstract

Most current log-in processes rely only on passwords and do not use biometric identifiers like e.g. fingerprints. Recently, some log-in systems that utilize the computer mouse to detect the fingerprint of the user have been introduced. However, in some environments no mouse is used. Therefore, it is proposed to deploy the display (e.g. monitor) to detect the fingerprint. This not only improves the security standard of the system, but it is also more user-friendly and faster. Furthermore, it avoids mistakes at the log-in, which cost a considerable amount of administrator time.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

S

Fingerprint Log-In on Displays

Idea: Ernst Bartsch, DE-Erlangen; Mike Ward, US-Ann Arbor

Most current log-in processes rely only on passwords and do not use biometric identifiers like e.g. fingerprints. Recently, some log-in systems that utilize the computer mouse to detect the fingerprint of the user have been introduced. However, in some environments no mouse is used. Therefore, it is proposed to deploy the display (e.g. monitor) to detect the fingerprint. This not only improves the security standard of the system, but it is also more user-friendly and faster. Furthermore, it avoids mistakes at the log-in, which cost a considerable amount of administrator time.

When the fingerprint sensor is embedded in a monitor, the log-in, form the user's perspective, becomes equivalent to switching on the monitor. The sensor detects and records the fingerprint of the person in front of the terminal. A fingerprint matching component compares it to a database that holds the fingerprints of all authorized users and identifies the user. Depending on the user's profile, which is stored in another database, access to the according subsystems is granted. A process chart of the log-in process is depicted in Figure 1.

Figure 1:

© SIEMENS AG 2005 file: 2004J21423.doc page: 1

[This page contains 1 picture or other non-text object]