摘要 |
<p>PROBLEM TO BE SOLVED: To evade a case where a person can easily substitute for another by using a combination of at least two or more of the authentication means of images, voices, IDs and fingerprints and then authenticating a specific private person when the authentication results of those combined authentication means are all authenticated. SOLUTION: An image collation part 110 of an image authentication part 101 collates a photographed face image with a stored face image and authenticates a specific private person if the patterns of both face images are approximate to each other. At the same time, a voice collation part 114 of a voice authentication part 102 collates the waveforms of input voices with those of stored voices and authenticates a specific private person when both waveforms are approximate to each other. Then an ID collation part 118 of an ID authentication part 103 authenticates a specific private person when the input characters are coincident with the stored characters, and a fingerprint collation part 122 of a fingerprint authentication part 104 authenticates a specific private person when an input finger print is coincident with a stored fingerprint. Finally, an integrated authentication part 105 decides the identity of the private person on the basis of those authentication results. Then an authentication control part 106 executes the operation of a device to be controlled only when the identity of the private person is confirmed.</p> |