This application is based upon and claims the benefit of priority from the prior Japanese Patent Application No. 2023-045893, filed on Mar. 22, 2023, the entire contents of which are incorporated herein by reference.
Embodiments described herein relate to a biometric authentication system, a biometric authentication device, and a biometric authentication method.
It has been common that individuals always bring a device (biometric authentication device) having a biometric authentication function, such as a smartphone or security card having a fingerprint authentication function. Thus, when a user attempts to use an information processing device, only a user having valid authority can be allowed to use the information processing device by performing mutual authentication between the information processing device and a biometric authentication device brought with the user.
In this case, the biometric authentication device and the information processing device each need to determine whether or not a security level guaranteed by the counterpart device satisfies a standard requested by the own device. Thus, the biometric authentication device and the information processing device each need to perform mutual authentication with taken into account the security level of the counterpart device.
According to one embodiment, a biometric authentication system includes a biometric authentication device and an information processing device.
The biometric authentication device includes
The information processing device includes
A biometric authentication device includes a memory and a processing circuitry.
The memory includes a first secure element configured to store data related to biometric information and data related to a first security level.
The processing circuitry includes a biometric information acquirer configured to read the data related to the biometric information from the first secure element and acquire the biometric information based on the data related to the biometric information;
According to one embodiment, a biometric authentication method includes:
Embodiments of the present invention will be described below with reference to the accompanying drawings. Any identical or corresponding elements in the drawings is denoted by the same reference sign and detailed description thereof is omitted as appropriate.
The biometric authentication device 2 includes a secure element (SE) 10, an application programmable interface (API) layer 20, and an application (APP) layer 30. The biometric authentication device 2 also includes a non-illustrated communication interface. The communication scheme of the communication interface is, for example, a wired LAN, a wireless LAN, WiFi (registered trademark), near-filed communication (NFC), Bluetooth (registered trademark), or ZigBee (registered trademark).
The SE 10 is a device having a function to encrypt and store important information in a hardware manner and is, for example, a trusted platform module (TPM) mounted on a smartphone or the like, or a security chip mounted on an IC card or the like. The SE 10 may be entirely configured as hardware such as a processing circuitry and/or a memory or may be partially configured as software.
The SE 10 stores data related to various kinds of important information such as the biometric information of the user, the role of the user, the kind of a biometric authentication function of the biometric authentication device 2, and the security level of the biometric authentication device 2. As described above, the biometric information of the user is characteristic data extracted from, for example, the fingerprint, face, iris, vein, or voice of the user. The role of the user is, for example, 0: no information, 1: general user, or 2: management user. The kind of the biometric authentication function is, for example, 0: no biometric authentication function, 1: fingerprint authentication, 2: face authentication, 3: iris authentication, 4: vein authentication, or 5: voice authentication. The security level is, for example, 0: not supported, 1: Low, 2: Middle, or 3: High.
For example, in a case of the biometric information, data related to the biometric information of the user is encrypted and stored in a hardware manner in the SE 10. The data related to the biometric information may be the biometric information itself or may be a private key for decrypting biometric information encrypted and stored at a place other than the SE 10 in the biometric authentication device 2.
Similarly, in a case of the security level, data related to the security level of the biometric authentication device 2 is encrypted and stored in a hardware manner in the SE 10. The data related to the security level may be the security level itself or may be a private key for decrypting a security level encrypted and stored at a place other than the SE 10 in the biometric authentication device 2.
The API layer 20 includes a biometric information acquirer 21, a security level acquirer 22, and a data list acquirer 23. These APIs are defined and implemented as, for example, methods, functions, or procedures in a typical programing language such as Java, Objective-C, C#, C++, or C. These APIs can be called and used by modules of the APP layer 30 to be described later. These APIs or the API layer 20 may be entirely implemented by software or may be partially or entirely implemented by hardware such as a processing circuitry and/or a memory.
The biometric information acquirer 21 reads the data related to the biometric information and stored in the SE 10 and acquires the biometric information of the user based on the data related to the biometric information. For example, when the data related to the biometric information is the biometric information itself, the biometric information acquirer 21 can directly acquire the data read from the SE 10 as the biometric information of the user. When the data related to the biometric information is a private key for decrypting biometric information encrypted and stored at another place, the biometric information acquirer 21 can acquire the biometric information of the user by decrypting the encrypted biometric information by using the private key read from the SE 10.
The security level acquirer 22 reads the data related to the security level and stored in the SE 10 and acquires the security level of the biometric authentication device 2 based on the data related to the security level. For example, when the data related to the security level is the security level itself, the security level acquirer 22 can directly acquire the data read from the SE 10 as the security level of the biometric authentication device 2. When the data related to the security level is a private key for decrypting a security level encrypted and stored at another place, the security level acquirer 22 can acquire the security level of the biometric authentication device 2 by decrypting the encrypted security level by using the private key read from the SE 10.
The data list acquirer 23 acquires a list of data stored in the SE 10.
The APP layer 30 includes an authenticator 31 and a communicator 32. These modules are written and implemented in a typical programing language. These modules can call and use APIs included in the API layer 20. These modules may be entirely implemented by software or may be partially or entirely implemented by hardware such as a processing circuitry and/or a memory.
The authenticator 31 performs authentication of the user based on the biometric information and performs authentication of the IoT device 3 based on a security level received from the IoT device 3. The communicator 32 transmits and receives various kinds of data to and from the IoT device 3 through a non-illustrated communication interface. In Embodiment 1, the communicator 32 is included in the APP layer 30, but alternatively, the communicator 32 may be included in the API layer 20.
The IoT device 3 includes a secure element (SE) 50, an API layer 60, and an APP layer 70. The IoT device 3 also includes a non-illustrated communication interface. The communication scheme of the communication interface corresponds to the communication scheme of the communication interface of the biometric authentication device 2 described above.
The SE 50 is a device having a function to encrypt and store important information in a hardware manner and is, for example, a TPM or a security chip. The SE 50 may be entirely configured as hardware such as a processing circuitry and/or a memory or may be partially configured as software. The SE 50 of the IoT device 3 and the SE 10 of the biometric authentication device 2 may have identical specifications or different specifications.
Data related to the security level of the IoT device 3 is encrypted and stored in a hardware manner in the SE 50. The data related to the security level may be the security level itself or may be a private key for decrypting a security level encrypted and stored at a place other than the SE 50 in the IoT device 3.
The API layer 60 includes a security level acquirer 61. The security level acquirer 61 reads the data related to the security level and stored in the SE 50 and acquires the security level of the IoT device 3 based on the data related to the security level. The API layer 60 may be entirely implemented by software or may be partially or entirely implemented by hardware such as a processing circuitry and/or a memory.
The APP layer 70 includes an authenticator 71 and a communicator 72. These modules are written and implemented in a typical programing language. These modules can call and use APIs included in the API layer 60. These modules may be entirely implemented by software or may be partially or entirely implemented by hardware such as a processing circuitry and/or a memory.
The authenticator 71 performs authentication of the biometric authentication device 2 based on a security level received from the biometric authentication device 2. The communicator 72 transmits and receives various kinds of data to and from the biometric authentication device 2 through a non-illustrated communication interface. In Embodiment 1, the communicator 72 is included in the APP layer 70, but alternatively, the communicator 72 may be included in the API layer 60.
Details of authentication processing by the biometric authentication system 1 according to Embodiment 1 will be described below with reference to a flowchart in
At step S101, the authenticator 71 of the IoT device 3 acquires the security level of the IoT device 3, which is protected by the SE 50, through the security level acquirer 61 of the API layer 60.
At step S102, the communicator 72 of the IoT device 3 transmits the security level of the IoT device 3, which is acquired at step S101 described above to the biometric authentication device 2.
At step S103, the communicator 32 of the biometric authentication device 2 receives the security level of the IoT device 3, which is transmitted at step S102 described above.
At step S104, the authenticator 31 of the biometric authentication device 2 acquires the biometric information of the user, which is protected by the SE 10, through the biometric information acquirer 21 of the API layer 20.
At step S105, the authenticator 31 of the biometric authentication device 2 performs biometric authentication of the user based on the biometric information acquired at step S104 described above. For example, when the biometric authentication device 2 is a smartphone having a function to acquire biometric information, the authenticator 31 compares the biometric information of the user, which is acquired by the smartphone, and the biometric information acquired at step S104 described above and determines whether or not the pieces of information match each other. When the pieces of information match each other, the authenticator 31 proceeds to processing at the next step S106. Although not illustrated in
At step S106, the authenticator 31 of the biometric authentication device 2 acquires the security level of the biometric authentication device 2, which is protected by the SE 10, through the security level acquirer 22 included in the API layer 20.
At step S107, the communicator 32 of the biometric authentication device 2 transmits the security level of the biometric authentication device 2, which is acquired at step S106 described above to the IoT device 3.
At step S108, the communicator 72 of the IoT device 3 receives the security level of the biometric authentication device 2, which is transmitted at step S107 described above.
At step S109, the authenticator 31 of the biometric authentication device 2 determines whether or not the security level of the IoT device 3, which is received at step 103 described above is equal to or larger than a predetermined threshold value.
When the security level of the IoT device 3 is equal to or larger than the predetermined threshold value (YES at S109), the authenticator 31 determines that the security level of the IoT device 3 satisfies a standard requested by the own device, and accepts the IoT device 3 (S110).
When the security level of the IoT device 3 is smaller than the predetermined threshold value (NO at S109), the authenticator 31 determines that the security level of the IoT device 3 does not satisfy the standard requested by the own device, rejects the IoT device 3, and stops the authentication processing (S111).
At step S112, the communicator 32 of the biometric authentication device 2 transmits the authentication result of acceptance or rejection to the IoT device 3.
At step S113, the communicator 72 of the IoT device 3 receives the authentication result transmitted from the biometric authentication device 2 at step S112 described above.
At step S114, the authenticator 71 of the IoT device 3 checks the authentication result received from the biometric authentication device 2 at step S113 described above.
When the authentication result received from the biometric authentication device 2 is rejection, the authenticator 71 stops the authentication processing (S115).
When the authentication result received from the biometric authentication device 2 is acceptance, the authenticator 71 performs operation setting of the IoT device 3 based on the security level of the biometric authentication device 2, which is received at step S103 described above (S116).
For example, when the security level of the biometric authentication device 2 is 3 (High), the authenticator 71 performs such operation setting that all functions of the IoT device 3 can be used. For example, when the security level of the biometric authentication device 2 is 1 (Low), the authenticator 71 restricts some functions of the IoT device 3. For example, when the security level of the biometric authentication device 2 is 0 (not supported), the authenticator 71 restricts all functions of the IoT device 3. In this case, the user cannot use the IoT device 3. When the operation setting of the IoT device 3 is completed, the authenticator 71 ends the authentication processing (END).
As described above, in the biometric authentication system 1 according to Embodiment 1, the biometric authentication device 2 performs authentication of the user based on the biometric information protected by the SE 10 and performs authentication of the IoT device 3 based on the security level received from the IoT device 3. The IoT device 3 performs authentication of the biometric authentication device 2 based on the security level received from the biometric authentication device 2.
With the characteristics as described above, each device in the biometric authentication system 1 according to Embodiment 1 can perform mutual authentication with taken into account the security level of the counterpart device.
The authenticator 71 of the IoT device 3 performs operation setting of the IoT device 3 based on the security level of the biometric authentication device 2. Accordingly, some or all functions of the IoT device 3 can be restricted in accordance with the security level of the biometric authentication device 2.
In the flowchart in
A biometric authentication device 202 has a configuration that a SE 210 is physically replaceable. Specific forms of the SE 210 are, for example, a removable chip such as a SIM, and an external device that can communicate with the biometric authentication device 202 by a USB or the like.
Data related to the biometric information, data related to a security level, and data related to verification information are encrypted and stored in a hardware manner in the SE 210. Similarly to Embodiment 1, biometric information protected by the SE 210 is the biometric information of a user.
The security level protected by the SE 210 is the security level of the SE 210. Although the security level protected by the SE 10 in Embodiment 1 is the security level of the biometric authentication device 2, the security level protected by the SE 210 in Embodiment 2 is the security level of the SE 210 itself. In Embodiment 2, the security level of the biometric authentication device 202 is stored in, for example, a ROM of the biometric authentication device 202.
The verification information is information for verifying validity of the biometric authentication device 202 when the biometric authentication device 202 is activated. For example, the verification information is information for verifying whether the firmware of the biometric authentication device 202 is falsified.
An API layer 220 of the biometric authentication device 202 includes a biometric information setter 224, a security level setter 225, a verification information setter 226, and a verification information acquirer 227 in addition to the APIs included in the API layer 20 in Embodiment 1. The API layer 220 also includes a security level acquirer 228 in place of the security level acquirer 22 of Embodiment 1. A security level acquired by the security level acquirer 228 is the security level of the SE 210.
The biometric information setter 224 writes data related to biometric information to the SE 210. The security level setter 225 writes data related to a security level to the SE 210. The verification information setter 226 writes data related to verification information to the SE 210. The verification information acquirer 227 reads the data related to the verification information and stored in the SE 210 and acquires the verification information based on the data related to the verification information.
An APP layer 230 of the biometric authentication device 202 includes an initial register 233 and a verifier 234 in addition to the modules included in the application layer 30 in Embodiment 1.
The initial register 233 causes the SE 210 to store data related to the biometric information of the user through the biometric information setter 224. The initial register 233 causes the SE 210 to store data related to the security level of the SE 210 through the security level setter 225. The initial register 233 causes the SE 210 to store data related to the verification information through the verification information setter 226. The verifier 234 verifies validity of the biometric authentication device 202 by using the verification information when the biometric authentication device 202 is activated, reactivated, and initialized.
At step S201, the SE 210 is physically attached to the biometric authentication device 202. This process is manually performed by the user or the like.
At step S202, the initial register 233 of the biometric authentication device 202 causes the SE 210 to store data related to the biometric information of the user through the biometric information setter 224 of the API layer 220. In this case, data is overwritten when data related to the biometric information of the user is already stored in the SE 210.
At step S203, the initial register 233 of the biometric authentication device 202 causes the SE 210 to store data related to the security level of the SE 210 through the security level setter 225 of the API layer 220. In this case, data is overwritten when data related to the security level is already stored in the SE 210.
At step S204, the initial register 233 of the biometric authentication device 202 causes the SE 210 to store data related to the verification information through the verification information setter 226 of the API layer 220. In this case, data is overwritten when data related to the verification information is already stored in the SE 210.
At step S205, the SE 210 is physically removed from the biometric authentication device 202. This process is manually performed by the user or the like.
Through the above-described processing, the initial registration processing by the SE 210 is completed.
At step S301, the SE 210 already attached to the biometric authentication device 202 is removed and another SE 210 is newly attached. This process is manually performed by the user.
At step S302, the biometric authentication device 202 is powered on. This process is also manually performed by the user.
At step S303, the verifier 234 of the biometric authentication device 202 acquires the verification information from the SE 210 through the verification information acquirer 227 of the API layer 220.
At step S304, the verifier 234 of the biometric authentication device 202 verifies validity of the biometric authentication device 202 by using the verification information acquired at step S303 described above. For example, the verifier 234 verifies whether the firmware of the biometric authentication device 202 is falsified by using the verification information.
At step S305, the authenticator 31 of the biometric authentication device 202 starts the processing of the flowchart in
At step S401, the SE 210 already attached to the biometric authentication device 202 is removed and another SE 210 is newly attached. This process is manually performed by the user.
At step S402, when having sensed that the SE 210 is replaced, the biometric authentication device 202 initializes or reactivates itself.
At step S403, the verifier 234 of the biometric authentication device 202 acquires the verification information from the SE 210 through the verification information acquirer 227 of the API layer 220.
At step S404, the verifier 234 of the biometric authentication device 202 verifies validity of the biometric authentication device 202 by using the verification information acquired at step S303 described above. For example, the verifier 234 verifies whether the firmware of the biometric authentication device 202 is falsified by using the verification information.
At step S405, the authenticator 31 of the biometric authentication device 202 starts the processing of the flowchart in
As described above, the biometric authentication device 202 according to Embodiment 2 has a configuration that the SE 210 is replaceable. Accordingly, for example, one biometric authentication device 202 can be shared by a plurality of users.
For example, the biometric authentication device 302a is a security card brought with a user, and the biometric authentication device 302b is a camera-equipped authentication device installed nearby the IoT device 303. When the user uses the IoT device 303, mutual authentication is first performed between the biometric authentication device 302a and the IoT device 303, and then mutual authentication is performed between the biometric authentication device 302b and the IoT device 303. The strength of security can be improved by performing such two-stage authentication processing.
At step S501 in
At step S502 in
At step 503 in
As described above, the biometric authentication system 301 according to Embodiment 3 includes the two biometric authentication devices 302a and 302b. The IoT device 303 performs authentication of the biometric authentication device 302a based on the security level of the biometric authentication device 302a, and performs authentication of the biometric authentication device 302b based on the security level of the biometric authentication device 302b. In this case, the security level is communicated between the biometric authentication device 302a and the IoT device 303, and the security level is communicated between the biometric authentication device 302b and the IoT device 303.
With the characteristics as described above, the strength of security in the biometric authentication system 301 according to Embodiment 3 improves as compared to a case in which only one biometric authentication device is used. As a matter of course, the number of biometric authentication devices 302 may be equal to or larger than three.
For example, the biometric authentication device 402a is a security card brought with a user, and the biometric authentication device 402b is an authentication device having an insertion port for a security card. When the user uses the IoT device 403, mutual authentication processing is first performed between the biometric authentication device 402a and the biometric authentication device 402b, and then mutual authentication processing is performed between the biometric authentication device 402b and the IoT device 403. The strength of security can be improved by performing such two-stage authentication processing.
At step S701 in
At step S801 in
At step S802, the biometric authentication device 402b transmits the security level of the biometric authentication device 402b, which is acquired at step S801 described above to the biometric authentication device 402a.
At step S803, the biometric authentication device 402a receives the security level of the biometric authentication device 402b, which is transmitted at step S802 described above.
At step S804, the biometric authentication device 402a acquires the biometric information of the user, which is protected by a SE.
At step S805, the biometric authentication device 402a performs biometric authentication of the user based on the biometric information acquired at step S804 described above.
At step S806, the biometric authentication device 402a acquires the security level of the biometric authentication device 402a, which is protected by the SE.
At step S807, the biometric authentication device 402a transmits the security level of the biometric authentication device 402a, which is acquired at step S806 described above to the biometric authentication device 402b.
At step S808, the biometric authentication device 402b receives the security level of the biometric authentication device 402a, which is transmitted at step S807 described above.
At step S809, the biometric authentication device 402a determines whether or not the security level of the biometric authentication device 402b, which is received at step S803 described above is equal to or larger than a predetermined threshold value.
When the security level of the biometric authentication device 402b is equal to or larger than the predetermined threshold value (YES at S809), the biometric authentication device 402a determines that the security level of the biometric authentication device 402b satisfies a standard requested by the own device, and accepts the biometric authentication device 402b (S810).
When the security level of the biometric authentication device 402b is smaller than the predetermined threshold value (NO at S809), the biometric authentication device 402a determines that the security level of the biometric authentication device 402b does not satisfy the standard requested by the own device, rejects the biometric authentication device 402b, and stops the authentication processing (S811).
At step S812, the biometric authentication device 402a transmits the authentication result of acceptance or rejection to the biometric authentication device 402b.
At step S813, the biometric authentication device 402b receives the authentication result transmitted from the biometric authentication device 402a at step S812 described above.
At step S814, the biometric authentication device 402b checks the authentication result received from the biometric authentication device 402a at step S813 described above.
When the authentication result received from the biometric authentication device 402a is rejection, the biometric authentication device 402b stops the authentication processing (S815).
When the authentication result received from the biometric authentication device 402a is acceptance, the biometric authentication device 402b proceeds to step S702 in
At step S702 in
At step S901 in
At step S902, the IoT device 403 transmits the security level of the IoT device 403, which is acquired at step S901 described above to the biometric authentication device 402b.
At step S903, the biometric authentication device 402b receives the security level of the IoT device 403, which is transmitted at step S902 described above.
At step S904, the biometric authentication device 402b acquires the biometric information of the user, which is protected by a SE.
At step S905, the biometric authentication device 402b performs biometric authentication of the user based on the biometric information acquired at step S904 described above.
At step S906, the biometric authentication device 402b acquires the security level of the biometric authentication device 402b, which is protected by a SE.
At step S907, the biometric authentication device 402b transmits the security level of the biometric authentication device 402b, which is acquired at step S906 described above to the IoT device 403.
At step S908, the IoT device 403 receives the security level of the biometric authentication device 402b, which is transmitted at step S907 described above.
At step S909, the biometric authentication device 402b determines whether or not the security level of the IoT device 403, which is received at step 903 described above is equal to or larger than a predetermined threshold value.
When the security level of the IoT device 403 is equal to or larger than the predetermined threshold value (YES at S909), the biometric authentication device 402b determines that the security level of the IoT device 403 satisfies a standard requested by the own device, and accepts the IoT device 403 (S910).
When the security level of the IoT device 403 is smaller than the predetermined threshold value (NO at S909), the biometric authentication device 402b determines that the security level of the IoT device 403 does not satisfy the standard requested by the own device, rejects the IoT device 403, and stops the authentication processing (S911).
At step S912, the biometric authentication device 402b transmits the authentication result of acceptance or rejection to the IoT device 403.
At step S913, the IoT device 403 receives the authentication result transmitted from the biometric authentication device 402b at step S912 described above.
At step S914, the IoT device 403 checks the authentication result received from the biometric authentication device 402b at step S913 described above.
When the authentication result received from the biometric authentication device 402b is rejection, the IoT device 403 stops the authentication processing (S915).
When the authentication result received from the biometric authentication device 402b is acceptance, the IoT device 403 performs operation setting of the IoT device 403 based on the security level of the biometric authentication device 402b, which is received at step S903 described above (S916). When the operation setting of the IoT device 403 is completed, the IoT device 403 returns to
As described above, the biometric authentication system 401 according to Embodiment 4 includes the two biometric authentication devices 402a and 402b. The biometric authentication device 402b performs authentication of the biometric authentication device 402a based on the security level of the biometric authentication device 402a. The IoT device 403 performs authentication of the biometric authentication device 402b based on the security level of the biometric authentication device 402b. In this case, the security level is communicated between the biometric authentication device 402a and the biometric authentication device 402b, and the security level is communicated between the biometric authentication device 402b and the IoT device 403.
With the characteristics as described above, the strength of security in the biometric authentication system 401 according to Embodiment 4 improves as compared to a case in which only one biometric authentication device is used. As a matter of course, the number of biometric authentication devices 402 may be equal to or larger than three.
While certain embodiment have been described, these embodiment have been presented by way of example only, and are not intended to limit the scope of the inventions. Indeed, the novel embodiments described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions and changes in the form of the embodiments described herein may be made without departing from the spirit of the inventions. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the inventions.
The embodiments as described before may be configured as below.
Clause 1. (Embodiments 1 to 4) A biometric authentication system comprising a biometric authentication device and an information processing device, wherein
Clause 2. (Embodiments 1 to 4) The biometric authentication system according to clause 1, wherein the first authenticator of the biometric authentication device accepts the information processing device when the second security level is equal to or larger than a predetermined threshold value, and rejects the information processing device when the second security level is smaller than the predetermined threshold value.
Clause 3. (Embodiments 1 to 4) The biometric authentication system according to clause 2, wherein the first communicator of the biometric authentication device transmits an authentication result of the information processing device to the information processing device.
Clause 4. (Embodiments 1 to 4) The biometric authentication system according to clause 3, wherein the second authenticator of the information processing device performs operation setting of the information processing device based on the first security level.
Clause 5. (Embodiments 1 to 4) The biometric authentication system according to clause 4, wherein the second authenticator of the information processing device restricts some or all functions of the information processing device based on the first security level.
Clause 6. (Embodiments 1 to 4) The biometric authentication system according to one of clauses 1 to 5, wherein the biometric information acquirer, the first security level acquirer, and the second security level acquirer are each implemented as an API.
Clause 7. (Embodiment 2) The biometric authentication system according to one of clauses 1 to 6, wherein the biometric authentication device has a configuration that the first secure element is replaceable.
Clause 8. (Embodiment 2) The biometric authentication system according to clause 7, wherein the biometric authentication device further includes
Clause 9. (Embodiment 2) The biometric authentication system according to clause 8, wherein the verifier of the biometric authentication device verifies validity of the biometric authentication device by using the verification information when the biometric authentication device is powered on.
Clause 10. (Embodiment 2) The biometric authentication system according to clause 8, wherein
Clause 11. (Embodiment 2) The biometric authentication system according to one of clauses 8 to 10, wherein the biometric authentication setter, the first security level setter, the verification information setter, and the verification information acquirer are each implemented as an API.
Clause 12. (Embodiment 3) The biometric authentication system according to one of clauses 1 to 11, wherein
Clause 13. (Embodiment 4) The biometric authentication system according to one of clauses 1 to 11, wherein
Clause 14. A biometric authentication device comprising:
Clause 15. A biometric authentication method comprising:
Number | Date | Country | Kind |
---|---|---|---|
2023-045893 | Mar 2023 | JP | national |