Information processing apparatus preventing unauthorized use

Information

  • Patent Application
  • 20070192591
  • Publication Number
    20070192591
  • Date Filed
    January 24, 2007
    17 years ago
  • Date Published
    August 16, 2007
    16 years ago
Abstract
A degree of security set for an application and a valid time corresponding to the degree of security are stored in a memory. When an authentication unit performs user authentication using a fingerprint image input through an authentication information input unit and authorizes use of the application by the user, a control unit monitors lapse of the valid time corresponding to the application. When the valid time expires, the control unit request the user to input authentication information, and authentication is repeated at the authentication unit.
Description

BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram of a processing apparatus 1 with the authentication function in accordance with Embodiment 1.



FIG. 2 shows a configuration of a computer in which processing apparatus 1 with authentication function in accordance with Embodiment 1 is mounted.



FIG. 3 shows a specific example of a table storing correspondence between security rank and application valid time, and applications classified by the security rank.



FIG. 4 is a flowchart representing a process in processing apparatus 1 with authentication function in accordance with Embodiment 1.



FIG. 5 is a flowchart representing an example of the authentication process at step F01.



FIG. 6 is a flowchart representing a process of calculating similarity score between images A and B at step T16.



FIG. 7 is a flowchart of a process of limiting use by a user through individual authentication, in a conventional information processing apparatus.


Claims
  • 1. An information processing apparatus, comprising: a storage unit storing a degree of security set for a function of the information processing apparatus, and a function valid time corresponding to said degree of security;an authentication information obtaining unit obtaining authentication information as a piece of information for identifying a user;an authentication unit authorizing use of said function by said user, using said authentication information; anda control unit requesting, when it is detected that the function valid time corresponding to the degree of security set for said function has elapsed since the start of use of said function, said authentication information and causing said authentication unit to execute said authentication.
  • 2. The information processing apparatus according to claim 1, wherein said function includes a first function and a second function;said degree of security includes a first degree of security and a second degree of security lower than said first degree of security;a first function valid time corresponding to said first degree of security is shorter than a second function valid time corresponding to said second degree of security; andwhen said first degree of security is set for said first function and said second degree of security is set for said second function, said control unit requests, when it is detected that said first function valid time has elapsed since the start of use of said function, said authentication information related to use of said first function to execute said authentication, and when it is detected that said second function valid time has elapsed, said authentication information related to use of said second function to execute said authentication.
  • 3. The information processing apparatus according to claim 2, wherein said first function includes a function of electronic commercial transaction.
  • 4. The information processing apparatus according to claim 2, wherein said second function includes an electronic mail processing function and a call processing function.
  • 5. The information processing apparatus according to claim 1, wherein said control unit limits use of said function by said user, when authentication of said user at said authentication unit fails.
  • 6. The information processing apparatus according to claim 1, wherein said authentication information is information derived from biologic body.
  • 7. The information processing apparatus according to claim 6, wherein said information derived from biologic body is a fingerprint image.
  • 8. The information processing apparatus according to claim 7, wherein said authentication information obtaining unit obtains first and second fingerprint images as said authentication information; andsaid authentication unit includesa maximum matching score position searching unit searching for a position of an image of a partial area having maximum matching score in said second fingerprint image, corresponding to each of a plurality of partial areas set in said first fingerprint image,a similarity score calculating unit calculating a similarity score between said first and second fingerprint images and outputting an image similarity score, using information related to that partial area of which positional relation amount is within a prescribed range, said positional relation amount representing positional relation between a reference position, for each of said partial areas, for specifying a position of the partial area within said first fingerprint image, and said maximum matching score position corresponding to the partial area searched out by said maximum matching score position searching unit, anddetermining unit determining whether said first and second fingerprint images match or not, based on said image similarity score.
  • 9. The information processing apparatus according to claim 8, wherein said similarity score calculating unit calculates and outputs as said image similarity score, the number of said partial areas of which distance and direction of said maximum matching score position searched by said maximum matching score position searching unit from said reference positions are within said prescribed range among said plurality of partial areas.
  • 10. In an information processing apparatus storing a degree of security set for a function and a function valid time corresponding to the degree of security, a method of authentication, comprising: authentication information obtaining step of obtaining authentication information as information for identifying a user;authentication step of authorizing use of said function by said user using said authentication information; andcontrol step of requesting, when it is detected that the function valid time corresponding to the degree of security set for said function has elapsed since the start of use of said function, said authentication information and executing said authentication.
  • 11. A program product causing an information processing apparatus to execute an authentication process, wherein said information processing apparatus stores a degree of security set for a function and a function valid time corresponding to the degree of security;said authentication process includingauthentication information obtaining step of obtaining authentication information as information for identifying a user;authentication step of authorizing use of said function by said user using said authentication information; andcontrol step of requesting, when it is detected that the function valid time corresponding to the degree of security set for said function has elapsed since the start of use of said function, said authentication information and executing said authentication.
Priority Claims (1)
Number Date Country Kind
2006-035404 Feb 2006 JP national