Failure diagnosis method

ABSTRACT

A method of detecting abnormality of an information processing apparatus to be started by biometric authentication without being started when the apparatus is inoperable. The information processing apparatus performs the biometric authentication using obtained biometric data of a user and pre-registered reference biometric data of the user in order to allow the apparatus to be used. When the apparatus cannot be started, the information processing apparatus outputs the reference biometric data, a detecting apparatus capable of obtaining the reference biometric data obtains the reference biometric data, the detecting apparatus obtains biometric data of the user and detects abnormality of the information processing apparatus by comparing the biometric data of the user obtained by the information processing apparatus and the obtained reference biometric data for authentication determination.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to an information processing apparatus anda detecting apparatus for detecting abnormality of the informationprocessing apparatus.

2. Description of the Related Art

It has become important for a PC (Personal Computer) to implement astrong security feature in order to prevent problems such as externalinformation exposure. Security features include, for example biometricauthentication that unlocks a PC on the basis of biometric information,such as a fingerprint of a user, etc. In biometric authentication,matching is performed between the biometric data generated on the basisof a user's biometric information read by a biometric sensor and thereference biometric data to be a criterion of the user stored in the PC.

Here, when a security feature, such as biometric authentication, is usedin place of an input operation of a password for password lock on a BIOS(Basic Input/Output System), the security feature is used before the OS(Operating System) is started. Thus, if the biometric authenticationbecomes impossible to be carried out by a failure of a biometric sensor,the destruction of reference biometric data, etc., the OS cannot bestarted even if the hard disk, etc., is replaced. In order to deal withsuch a situation, a specific password for a maintenance person is set inadvance, and it has been customary for the maintenance person to startthe OS using this password to identify the cause of the failure of thebiometric authentication.

However, if a specific password for a maintenance person is set, amalicious third person might steal the password, and the OS might bestarted in an unauthorized manner.

Regarding security systems using biometric authentication, there are,for example techniques described in Japanese Unexamined PatentApplication Publication Nos. 2002-062803, 2005-284452, and 2006-031304.

SUMMARY OF THE INVENTION

One aspect is a failure diagnosis method of an apparatus performingauthentication by comparison of biometric data generated on the basis ofbiometric information of a user and reference biometric data of theuser. The method comprising, outputting said reference biometric data onthe apparatus, obtaining said reference biometric data outputted fromthe apparatus by a second apparatus, obtaining new biometric data on thebasis of the biometric information of the user by the second apparatus,and performing authentication by comparison of said reference biometricdata obtained by the second apparatus with the new biometric data toestimate the type of the failure of the apparatus.

According to the present invention, a detecting apparatus compares thebiometric data generated on the basis of a user's biometric informationand the reference biometric data obtained from the informationprocessing apparatus to perform authentication determination. If theauthentication is determined to be successful, the biometric dataobtained and generated by the detecting apparatus is normal, and thus itis understood that the means for generating the biometric data held bythe information processing apparatus is abnormal. Also, if theauthentication is determined to have failed, it is understood that thereference biometric data stored in the information processing apparatusis abnormal, since the biometric data obtained and generated by thedetecting apparatus is normal. Accordingly, it is possible to detectabnormality without starting the information processing apparatus usinga specific password for a maintenance person.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram of a personal computer;

FIG. 2 is a diagram illustrating the entire hardware configuration ofthe personal computer;

FIG. 3 is a functional block diagram of BIOS processing (1 of 2);

FIG. 4 is a flowchart of the BIOS processing in normal mode;

FIG. 5 is a functional block diagram of the BIOS processing (2 of 2);

FIG. 6 is a flowchart of the BIOS processing in security mode;

FIG. 7 is a view displaying a two-dimensional code on the display screenof the personal computer;

FIG. 8 is a schematic diagram of a detecting apparatus;

FIG. 9 is a diagram illustrating the entire hardware configuration ofthe detecting apparatus;

FIG. 10 is a functional block diagram of abnormality detectionprocessing; and

FIG. 11 is a flowchart of the abnormality detection processing.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

In the following, a description will be given of an embodiment of thepresent invention with reference to the drawings. In the presentembodiment, a description will be given of the case of using afingerprint for biometric information. However, veins of a palm, aniris, etc., may be used for the biometric information.

Schematic Diagram of PC:

FIG. 1 is a schematic diagram of a PC.

A PC 100 includes a PC main unit 102 including a CPU (Central ProcessingUnit), a memory, etc., a display unit 106 for displaying images onto adisplay screen 104 by instructions from the PC main unit 102, a keyboard107 for giving instructions to the PC main unit 102 by a user'soperation, a mouse 108 for moving a cursor on the display screen 104 andgiving an instruction in accordance with the icon on which the cursor isplaced by button operations, and a biometric sensor 109 for generatingbiometric data to be, used for authentication of the user's biometricinformation.

Furthermore, the PC main unit 102 has a power button 110 for turning onthe power to the PC 100, a USB connector 112 conforming to the USB(Universal Serial Bus) standard, a CD/DVD drive slot 114 into which a CD(compact Disc) or a DVD (Digital Versatile Disk) is inserted, and an FDdrive slot 116 into which a FD (Floppy (a registered trade mark) Disk)is inserted.

Hardware Configuration Diagram of PC:

FIG. 2 is a block diagram schematically illustrating an example of thehardware configuration of the PC shown in FIG. 1. In this regard, theblocks described in FIG. 1 are marked with the same reference numerals.

The PC 100 has a configuration in which a CPU 204, a main memory 206, avideo controller 208, a disc controller 210, an FDD controller 212, akeyboard controller 214, a CMOS (Complementary Metal OxideSemiconductor) 216, a non-volatile memory 218, a USB controller 220, anda power-source microcomputer 219 are connected to a system controller202 through a bus 221.

Furthermore, the display unit 106 is connected to the video controller208, an HDD (Hard Disk Drive) 222 and a CD/DVD drive 224 are connectedto the disc controller 210, an FDD 226 is connected to the FDD (Floppy(a registered trade mark) Disk Drive) controller 212, the keyboard 107and the mouse 108 are connected to the keyboard controller 214, and thebiometric sensor 109 is connected to the USB controller 220. In thefollowing, a description will be given of each block.

System Controller:

The system controller 202 controls the entire system. CPU:

The CPU 204 executes programs loaded into the main memory 206.

Main Memory:

A program read from the hard disk included in the HDD 222 is loaded intothe main memory 206 to be executed by the CPU 204, and the main memory206 is used for the working area for the execution of the program. Also,the biometric data, etc., of a user is stored into the main memory 206.

Video Controller:

The video controller 208 displays images onto the display unit 106 onthe basis of the instructions of the CPU 204 output through the systemcontroller 202. The message of successful authentication or anauthentication failure, the two-dimensional code converted fromreference biometric data by the data-conversion means 310 describedbelow, etc., are displayed onto the display unit 106.

Disc Controller:

The disc controller 210 accesses the HDD 222 included in the PC mainunit 102 and the CD/DVD inserted into the CD/DVD drive slot 114. The HDD222 stores an OS, application programs, etc. These programs are read andloaded into the main memory 206 under the control of the disc controller210, which has received instructions from the system controller 202.

FDD Controller:

The FDD controller 212 controls the FDD 226 that accesses an FD insertedinto the FD drive slot 116.

Keyboard Controller:

The keyboard controller 214 transfers the input from the keyboard 107and the mouse 108 to the system controller 202.

Non-Volatile Memory:

The non-volatile memory 218 stores the BIOS program to be executed firstafter the power to the PC is turned on, and the like. Also, thenon-volatile memory 218 stores a user name and reference biometric dataregistered by a user in advance.

CMOS:

The CMOS 216 stores the settings of the BIOS menu.

USB Controller:

The USB controller 220 performs communication control conforming to theUSB standard. Furthermore, the biometric sensor 109 is connected to theUSB controller 220 through the USB connector 112. The biometric sensor109 reads, as an image, a fingerprint that is the biometric informationof the user.

Power-Source Microcomputer:

The power-source microcomputer 219 monitors whether the power button 110has been operated.

Functional Block Diagram of BIOS Processing (1 of 2):

FIG. 3 is a functional block diagram schematically illustrating anexample of the BIOS processing function in normal mode. The BIOSprocessing function includes the biometric sensor 109, a biometricauthentication engine 304, the main memory 206, the non-volatile memory218, and the display unit 106. In the following, a description will begiven of each block. In this regard, the blocks already described aremarked with the same reference numerals, and the descriptions thereofare omitted.

Biometric Authentication Engine:

The biometric authentication engine 304 extracts characteristic points,such as starting points, joining points, and diverging points of thelines forming the fingerprint from a fingerprint image read by thebiometric sensor 109, and generates the biometric data for performingthe biometric authentication. Next, a determination is made on whetherthe authentication is successful or not on the basis of the matchingratio between the biometric data and the reference biometric data. Here,the matching ratio is referred to, for example, the ratio of thematching between the characteristic points held by the referencebiometric data and the characteristic points held by the biometric data.

BIOS Processing Flow in Normal Mode:

In the following, a description will be given of the BIOS processing innormal mode using FIG. 4.

In step S001, the power-source microcomputer 219 determines whether theuser has operated the power button 110. If the power button 110.has beenoperated, the processing proceeds to step S002.

In step S002, if the power button 110 has been operated, the CPU 204starts the BIOS program stored in the non-volatile memory 218. When theBIOS program is started by the CPU 204, the BIOS program initializes thesystem controller 202. Then, the BIOS program is loaded into the mainmemory 206. The processing proceeds to step S003.

In step S003, the BIOS program determines whether a security function bybiometric authentication is set in the PC 100 by checking whether apassword is stored in the non-volatile memory 218. If the securityfunction is set, the processing proceeds to step S005. On the otherhand, if the security function is not set, the processing proceeds tostep S004, and the BIOS program starts the OS.

In step S005, the BIOS program displays a message prompting the user toinput a fingerprint image into the biometric sensor 109. The processingproceeds to step S006.

In step 5006, the biometric authentication engine 304 generates thebiometric data based on the user's fingerprint image. The processingproceeds to step S007.

In step S007, the biometric authentication engine 304 calculates thematching ratio between the biometric data generated in step S006 and thereference biometric data stored in the non-volatile memory 218. Theprocessing proceeds to step S008.

In step S008, the biometric authentication engine 304 determines whetherthe matching ratio calculated in step S007 is greater than a thresholdvalue set by the user. The threshold value set by the user is a value todetermine that the authentication is successful if the matching ratio isgreater than the threshold value. The user determines the thresholdvalue on the basis of the security level to be achieved. If the matchingratio is greater than the threshold value, the processing proceeds tostep S009. On the other hand, if the matching ratio is not greater thanthe threshold value, the processing proceeds to step S010.

In step S009, the BIOS program displays a message of successfulauthentication to the display screen 104. Then, the processing proceedsto step S004, and the BIOS program starts the OS. The processingterminates.

In step S010, the BIOS program determines whether the matching has beenconducted for a set number of times. The following are the reasons forproviding an allowance for the number of matching times. For example, ifit is determined that the authentication has failed immediately when thematching ratio between the biometric data and the reference biometricdata becomes low, because a finger is misplaced on the biometric sensor109, the user feels troublesome. Also, if it is determined that theauthentication has failed immediately when the matching ratio becomeslow, because any one of the biometric sensor 109, the biometricauthentication engine 304, and the reference biometric data is abnormal,it is not possible to determine whether the user has misplaced his/herfinger, or any one of the biometric sensor 109, etc., is abnormal. Inthis regard, it is desirable to set the number of matching times to avalue which does not make the user feel troublesome and makes itpossible to determine whether the user has misplaced his/her finger orany one of the biometric sensor 109, etc., is abnormal. If the matchinghas been carried out for a set number of times, the processing proceedsto step S011, and the BIOS program displays a message indicating anauthentication failure onto the display screen 104. On the other hand,if the matching has not been carried out for a set number of times, theprocessing returns to step S005, and the above-described processing isrepeated.

Functional Block Diagram of BIOS Processing (2 of 2):

FIG. 5 is a functional block diagram schematically illustrating anexample of the BIOS processing in maintenance mode. The maintenance modeis a mode which is started when the security function by the biometricauthentication is abnormal. For example, the mode is started when amaintenance person detects abnormality of the security function. TheBIOS processing function includes the keyboard controller 214, personalidentification means 308, data conversion means 310, the non-volatilememory 218, and the display unit 106. In the following, a descriptionwill be given of each block. In this regard, the blocks alreadydescribed are marked with the same reference numerals, and thedescriptions thereof are omitted.

Personal Identification:

The personal identification means 308 compares the user name notifiedfrom the keyboard controller 214 and the user name registered in thenon-volatile memory 218 in advance, and carries out personalidentification.

Data Conversion Means:

The data conversion means 310 converts the reference biometric datastored in the non-volatile memory 218 into a two-dimensional code.

BIOS Processing Flow in Maintenance Mode:

In the following, a description will be given of the BIOS processing inmaintenance mode using FIG. 6.

In step S101, the power-source microcomputer 219 determines whether theuser has operated the power button 110. When the power button 110 hasbeen operated, the processing proceeds to step S102.

In step S102, when the power button 110 has been operated, the CPU 204starts the BIOS program stored in the non-volatile memory 218. When theBIOS program is started by the CPU 204, the BIOS program initializes thesystem controller 202. Then, the BIOS program is loaded into the mainmemory 206. The processing proceeds to step S103.

In step S103, the BIOS program displays a message requesting the user toinput the user name to the display screen 104. The processing proceedsto step S104.

In step S104, the personal identification means 308 compares the username input by the user and the user name stored in the non-volatilememory 218 to determine whether both of the user names match. If theuser names match, the processing proceeds to step S106. On the otherhand, if the user names do not match, the processing proceeds to stepS105.

In step S105, the personal identification means 308 displays a messagestating that the user names do not match onto the display screen 104. Inthis regard, although omitted to be shown in the flowchart, for example,if the user names do not match when the user name is repeatedly inputthree times, the BIOS program may display a message stating thatpersonal identification cannot be carried out because the user names donot match onto the display screen 104.

In step S106, the data-conversion means 310 converts the referencebiometric data stored in the non-volatile memory 218 into atwo-dimensional code, and displays the code onto the display screen 104.FIG. 7 illustrates a state in which the two-dimensional code 312 isdisplayed on the display screen 104. By this means, it is possible forthe detecting apparatus described below to obtain reference biometricdata from the PC 100 through the display screen 104 that can be usedwithout starting the OS. In this regard, the reference biometric data isencrypted at the time of the conversion. Thus, it is possible tomaintain security even if the two-dimensional coded reference biometricdata is displayed onto the display screen 104. The processingterminates.

Schematic Diagram of Detecting Apparatus:

FIG. 8 is a schematic diagram of a detecting apparatus.

The detecting apparatus 400 includes a display section 402 fordisplaying various kinds of information, an operation section 404 foraccepting data input from the user, a biometric sensor 406 for readingthe user's biometric information as an image, and an imaging device 408for capturing an image.

Hardware Configuration Diagram of Detecting Apparatus:

FIG. 9 is a block diagram schematically illustrating an example of thehardware configuration of the detecting apparatus. The detectingapparatus 400 includes a CPU 502 for executing various kinds ofcalculation processing, an operation section 404, a display section 402,a ROM 508 for storing various programs, a RAM 510 for executing theprograms and storing data, an external storage device 512 for storingthe OS, the biometric authentication programs, etc., a biometric sensor406, and an imaging device 408, which are connected through a bus 518.

When an instruction to detect abnormality of the PC 100 is given fromthe operation section 404 by the user, the CPU 502 instructs the imagingdevice 408 to read a two-dimensional code displayed on the displayscreen 104 of the PC 100. The two-dimensional code read by the imagingdevice 408 is converted into reference biometric data, and is storedinto the RAM 510. Next, the CPU 502 displays a message prompting theuser to input biometric information using the biometric sensor 406 ontothe display section 402. The biometric sensor 406 reads the biometricinformation of the user as an image. The CPU 502 reads the biometricauthentication program from the external storage device 512, loads theprogram into the RAM 510, and executes the biometric authenticationprogram. The biometric authentication program generates the biometricdata from the image of the biometric information read by the biometricsensor 406, and performs the biometric authentication by matching thebiometric data and the reference biometric data.

Functional Block Diagram of Abnormality Detection:

FIG. 10 is a functional block diagram schematically illustrating anexample of an abnormality detecting function. The abnormality detectingfunction includes the imaging device 408, data conversion means 604, thebiometric sensor 406, biometric-data generation means 602, biometricauthentication means 606, the RAM 510, and the display section 402. Inthe following, a description will be given of each block of theabnormality detecting function.

Imaging Device:

The imaging device 408 captures an image. In the present embodiment, theimaging device 408 captures the two-dimensional code displayed on thedisplay screen 104 of the PC 100.

Data Conversion Means:

The data conversion means 604 converts the two-dimensional code capturedby the imaging device 408 to generate the reference biometric data to bea criterion for the user.

Biometric Sensor:

The biometric sensor 406 reads a fingerprint, which is the biometricinformation of the user, as an image. Then, the biometric sensor 406instructs the biometric-data generation means 602 to generate thebiometric data on the basis of the image of the read fingerprint.

Biometric Data Generation Means:

The biometric-data generation means 602 extracts the characteristicpoints, etc., from the image of the fingerprint read by the biometricsensor 406, and generates the biometric data in order for the biometricauthentication means 606 to carry out biometric authentication

RAM:

The RAM 510 stores the biometric data generated by the biometric-datageneration means 602. Also, the RAM 510 stores the reference biometricdata generated by the data conversion means 604.

Biometric Authentication Means:

The biometric authentication means 606 calculates the matching ratiobetween the biometric data stored in the RAM 510 and the referencebiometric data. The biometric authentication means 606 detectsabnormality of the PC 100 on the basis of the matching ratio.

Display Section:

The display section 402 displays the detected abnormality of the PC 100.

Abnormality Detection Processing Flow:

In the following, a description will be given of the abnormalitydetection processing using FIG. 11. Firstly, a maintenance person doeschecking of operation of the detecting apparatus. In particular, themaintenance person captures his reference biometric data converted intosecond dimensional code by the imaging device 408 and generates hisbiometric data by the biometric sensor 406. The maintenance person makesthe detecting apparatus perform a biometric authentication on the basisof the reference biometric data captured by the imaging device 408 andbiometric data generated by the biometric sensor 406. Then themaintenance person determines whether the authentication has succeeded.Upon successful of the authentication the maintenance person assures thedetecting apparatus works properly.

In step S201, the imaging device 408 captures the two-dimensional codedisplayed on the display screen 104 of the PC 100 in step S106 in FIG.6. The processing proceeds to step S202.

In step S202, the data conversion means 604 generates the referencebiometric data on the basis of the two-dimensional code captured in stepS201, and stores the data into the RAM 510. The processing proceeds tostep S203.

In step S203, the biometric-data generation means 602 generates thebiometric data on the basis of the user's fingerprint data read by thebiometric sensor 406, and stores the data into the RAM 510. Theprocessing proceeds to step S204.

In step S204, the biometric authentication means 606 calculates thematching ratio between the reference biometric data generated in stepS202 and the biometric data generated in step S203. The processingproceeds to step S205.

In step S205, the biometric authentication means 606 compares thematching ratio calculated in step S204 and the threshold value set bythe user. The biometric authentication means 606 determines whether thematching ratio is greater than the threshold value. If the matchingratio is greater than the threshold value, the processing proceeds tostep S206, and the biometric authentication means 606 determines thatthe authentication has succeeded. The processing proceeds to step S207,and the biometric authentication means 606 displays a message stating afailure of the biometric sensor or the biometric authentication engineto the display section 402. Thus, it is possible to ensure that thereference biometric data stored in the non-volatile memory 218 of the PC100 is not destroyed. Also, since the biometric sensor 406 connected tothe detecting apparatus 400 is assumed be normal, it is possible for thedetecting apparatus 400 to detect abnormality in the biometric sensor109, which is generation means for generating the biometric data, or inthe biometric authentication engine 304. Furthermore, although omittedto be shown in the flowchart, it is possible to detect whether thebiometric sensor 109 or the biometric authentication engine 304 isabnormal by connecting the biometric sensor 109 to the detectingapparatus 400 and performing the biometric authentication. On the otherhand, if the matching ratio is not greater than the threshold value, theprocessing proceeds to step S208.

In step S208, the biometric authentication means 606 determines whetherthe matching has been performed for a set number of times. If thematching has been performed for the set number of times, the processingproceeds to step S209, and the biometric authentication means 606determines that the authentication has failed. The processing proceedsto step S210, and the biometric authentication means 606 displays amessage stating that the reference biometric data has been destroyedonto the display section 402. By this means, it is possible to ensurethat the biometric sensor 109 connected to the PC 100 is normal. Also,since the biometric sensor 406 connected to the detecting apparatus 400is assumed be normal, it is possible to detect abnormality in thereference biometric data stored in the non-volatile memory 218 of the PC100. On the other hand, if the matching has not been performed for theset number of times, the processing returns to step S203, and the useris requested to place his/her finger on the biometric sensor 406 again.The above-described processing is repeated, and the biometricauthentication is performed. In this regard, it is desirable to set thenumber of matching times to a value allowing to determine whether theuser misplaced his/her finger or the reference biometric data isabnormal.

As described above, in step S207, it is possible to detect whether thebiometric sensor 109 used for generating the user's biometric data orthe biometric authentication engine 304 is abnormal. Also, in step S210,it is possible to detect that the reference biometric data stored in thePC 100 is abnormal.

The above embodiment has been described specifically in order to givebetter understanding of the present inventions and another embodiment isnot restricted. Accordingly, various changes may be made in theinvention without departing from the spirit and scope thereof.

1. A failure diagnosis method of an apparatus performing authenticationby comparison of biometric data generated on the basis of biometricinformation of a user and reference biometric data of the user, themethod comprising: outputting said reference biometric data on theapparatus; obtaining said reference biometric data outputted from theapparatus by a second apparatus; obtaining new biometric data on thebasis of the biometric information of the user by the second apparatus;and performing authentication by comparison of said reference biometricdata obtained by the second apparatus with the new biometric data toestimate the type of the failure of the apparatus.
 2. The failurediagnosis method of claim 1, further comprising estimating a biometricgenerating means is a cause for the failure of the apparatus uponsuccessful of the authentication by the second apparatus.
 3. The failurediagnosis method of claim 1, further comprising estimating saidreference biometric data stored in the apparatus is cause for thefailure of the apparatus upon failure of the authentication by thesecond apparatus.
 4. The failure diagnosis method of claim 1, whereinthe outputting outputs said reference biometric data as encrypted data.5. The failure diagnosis method of claim 1, wherein the outputtingoutputs said reference biometric data as second dimensional code.
 6. Thefailure diagnosis method of claim 1, wherein the outputting outputs saidreference biometric when the apparatus is out of service.
 7. A systemcomprising a first apparatus including a function of allowing log-in bya user upon successful authentication performed by comparison ofbiometric data generated on the basis of biometric information of theuser and reference biometric data of the user stored in the firstapparatus, having a central processing unit for performing theauthentication, and upon failure of the authentication outputting saidreference biometric data on a display of the first apparatus; and asecond apparatus for estimating the type of the first apparatus having acentral processing unit for controlling the process of estimating thefailure of the first apparatus to be carried out by the secondapparatus, the process comprising: obtaining said reference biometricdata outputted from the first apparatus; obtaining new biometric data onthe basis of new biometric information of the user; and performingauthentication by comparison of said reference biometric data obtainedby the second apparatus with said new biometric data to estimate thetype of the failure of the apparatus.
 8. The system of claim 7, whereinthe process further comprises estimating biometric generating means is acause for the failure of the apparatus upon successful of theauthentication by the second apparatus.
 9. The system of claim 7,wherein the process further comprises estimating said referencebiometric data stored in the apparatus is a cause for the failure of theapparatus upon failure of the authentication by the second apparatus.10. The system of claim 7, wherein the outputting outputs said referencebiometric data as encrypted data.
 11. The system of claim 7, wherein theoutputting outputs said reference biometric data as second dimensionalcode.
 12. The system of claim 7, wherein the outputting outputs saidreference biometric when the first apparatus is out of service.
 13. Anapparatus including a function of allowing log-in by a user uponsuccessful authentication performed by comparison of biometric datagenerated on the basis of biometric information of a user and referencebiometric data of the user stored in the apparatus, the apparatuscomprising: a central processing unit for performing the authentication,and upon failure of the authentication outputting said referencebiometric data on a display of the apparatus to estimate the type of thefailure of the apparatus.
 14. The apparatus of claim 13, wherein theoutputting outputs said reference biometric data as encrypted data. 15.The apparatus of claim 13, wherein the outputting outputs said referencebiometric data as second dimensional code.
 16. The apparatus of claim13, wherein the outputting outputs said reference biometric data whenthe apparatus is out of service.