http://www.w3.org/ns/prov#value | - FIG. 13 is a flowchart illustrating a personal authentication method which uses iris authentication according to embodiment 2 of the present invention. In FIG. 13, the same processes as those of FIG. 1 are denoted by the same reference numerals
|