[go: up one dir, main page]

AU2003276864A1 - Cryptographically secure person identification - Google Patents

Cryptographically secure person identification Download PDF

Info

Publication number
AU2003276864A1
AU2003276864A1 AU2003276864A AU2003276864A AU2003276864A1 AU 2003276864 A1 AU2003276864 A1 AU 2003276864A1 AU 2003276864 A AU2003276864 A AU 2003276864A AU 2003276864 A AU2003276864 A AU 2003276864A AU 2003276864 A1 AU2003276864 A1 AU 2003276864A1
Authority
AU
Australia
Prior art keywords
person
face
recited
computer
distinguishing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU2003276864A
Other versions
AU2003276864B2 (en
AU2003276864A2 (en
Inventor
Nebojsa Jojic
Darko Kirovski
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of AU2003276864A1 publication Critical patent/AU2003276864A1/en
Publication of AU2003276864A2 publication Critical patent/AU2003276864A2/en
Application granted granted Critical
Publication of AU2003276864B2 publication Critical patent/AU2003276864B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)
  • Image Processing (AREA)
  • Credit Cards Or The Like (AREA)
  • Lock And Its Accessories (AREA)

Description

WO 2004/036802 PCT/US2003/027614 1 CRYPTOGRAPHICALLY SECURE PERSON IDENTIFICATION TECHNICAL FIELD 5 This invention generally relates to a technology for facilitating authentication of person identification documents. BACKGROUND OF THE INVENTION Herein, person identification document (ID) authentication refers to the 10 confirmation that the presented ID is authentic, genuine, legitimate, valid, and/or unadulterated. This may also be called person ID certification. Examples of such personal IDs include immigration documents, passports, and driver's license. In contrast, "person verification" refers to the confirmation that the personal information on an ID corresponds to the person presenting the ID. 15 There are many conventional person ID authentication approaches. Sophisticated document production is the most common approach. Other common approaches include biometrics, smart cards, and watermarks. Sophisticated Production Historically and over many cultures, the test of a person's identity is verified 20 by the possession of identifying documents. The test of the veracity of such documents has been the difficulty of producing such documents. Although it is not an identification document, paper money is a prime example of the receiver relying on its authenticity because it is difficult to produce a passable counterfeit. However, recent advances in the printing technology have made high-quality 25 printing devices relatively inexpensive. The availability of high-end printers has WO 2004/036802 PCT/US2003/027614 2 rendered forging most personal identification documents (IDs) a relatively simple task. It has also significantly raised the costs of printing the official documents by the issuing organizations. In response, issuing parties (such as governments) have implemented 5 increasingly more sophisticated and presumptively more expensive production techniques. For example, issuing parties are using holograms, watermarks, micro printing, special print paper and/or chemical coating, etc. Since the production of IDs is more complex, authentication has become correspondingly more complex, unreliable, and most importantly, expensive. 10 Biometric Approaches Biometrics has been defined as a process of automatically recognizing a person using distinguishing traits. Several biometric approaches have been proposed via face, speech, fingerprint, handwriting, and/or iris and retina recognition. A survey of these techniques is provided by "The Biometric 15 Consortium" at "http://www.biometrics.org." Typically, a biometric-based person identification system includes a human verifier who ensures the identification system is not fooled. This can happen when an adversary shows a realistic size photo of the face of an authorized person to the face detector or plays a voice recording to a speech detector. 20 While some types of biometric-based person identification (such as retina scan or fingerprint detection) can be highly reliable, often they are intimidating (e.g., retina scan) and can be used maliciously to incriminate innocent users (e.g., fingerprint scan). A malicious detector can record a person's fingerprint, create its physical copy, and then, incriminate this person at will. This renders fingerprint 25 detection systems highly undesirable for most person identification scenarios.
WO 2004/036802 PCT/US2003/027614 3 Finally, some biometrics systems are commonly subjected complaints for invasion of privacy. For example, wide-spread face detection points can disclose at any time one's location to a party who gains control over such a system. Nevertheless, the almost all biometric-based person identification systems 5 have three major disadvantages: " inconsistent reliability (especially for face and speech recognition) as the system scales up, which commonly renders these systems highly prone to false alarms and false positives; " the authenticator needs to be connected to a central trusted server 10 which actually performs the identification; and " the equipment performing the authentication is costly. For most applications, biometric-based approaches are inconvenient, costly, and most importantly, unreliable. Smart Cards 15 Smart cards represent a seemingly effective approach to person identification. An advantage of smart cards that is often touted is its all-digital communication with the authenticator. A simple scenario is having a smart card, which contains a digital photo, personal description data, and a signed hash of this information using the private 20 key of the issuer. Authentication is performed by hashing the photo and the personal description data and then authenticating this hash against the signature using the public key of the issuer. Finally, the authenticator must display the certified digital photo, so that a human can verify that the person being identified is on the photo.
WO 2004/036802 PCT/US2003/027614 4 Personal IDs are frequently lost or damaged. Replacing a smart card involves purchase of another hardware device in addition to burning this device with the appropriate identification contents. This can be expensive. Due to their relatively generous storage capabilities, smart cards may give an 5 impression that they may be used for storing additional information, in particular, private information about the owner (e.g., private keys that are revoked if smart card is lost). However, it has been demonstrated so far that smart cards cannot be considered a secure storage because it is relatively easy to extract the hidden information even without reverse engineering the smart card. 10 Exemplary attacks that have successfully identified encryption keys (both symmetric and private keys) have been based on analyzing smart card's I/O behavior via differential power analysis or timing analysis. Thus, it cannot be expected that a smart card stores anything more than the public information about the user, which is in many ways equivalent to a photo ID. 15 Watermarks Another technique for authenticating content is to hide imperceptible secret information, a watermark, in the digital photo. One serious disadvantage of this type of ID authentication is the fact that in most watermarking systems, the secret hidden in the photo must be present in the authenticator. Hence, a single broken 20 authenticating device renders the entire system broken. Surprisingly, public-key watermarking systems have been developed, however, with different target applications. In addition, this system requires significantly longer host signals than a single photo to statistically reliably detect the existence of a given secret. In addition, such a system requires that the secret 25 used to mark a photo be renewed after several photos.
WO 2004/036802 PCTIUS2003/027614 5 Finally, a malicious customer can always try to estimate the secret by taking many photos of herself and comparing them with the photo on the ID. In summary, using watermarks for public ID authentication is the least robust technology for enabling secure ID authentication. 5 Challenge All conventional approaches (e.g., sophisticated production, biometrics, smart cards, and watermarks) are riddled with shortcomings. They all have one or more of the following drawbacks: " expensive to implement, maintain, and/or scale; 10 * difficult to implement, maintain, and/or scale; " difficult for the human authenticator to effectively authenticate; * unreliable results (e.g., an unacceptable degree of false positive or misses); and " unreliable security (e.g., increasingly easier for an adversary to thwart 15 or fool the system). It is a challenge to provide an architecture for secure personal identification documents (IDs) that are difficult to forge, simply and inexpensively produced, and do not require smart card, biometric, or sophisticated production approaches. 20 SUMMARY OF THE INVENTION Described herein is a technology for facilitating authentication of person identification documents. One implementation, described herein, is a simple, inexpensive, and cryptographically secure personal ID architecture. With this implementation, one 25 may efficiently create and authenticate secure photographic personal identification WO 2004/036802 PCT/US2003/027614 6 documents (ID) that thwarts tampering and counterfeiting attempts. This ID employs a compact, cryptographically signed bar-code that is readable by an ordinary scanner. This summary itself is not intended to limit the scope of this patent. 5 Moreover, the title of this patent is not intended to limit the scope of this patent. For a better understanding of the present invention, please see the following detailed description and appending claims, taken in conjunction with the accompanying drawings. The scope of the present invention is pointed out in the appending claims. 10 BRIEF DESCRIPTION OF THE DRAWINGS The same numbers are used throughout the drawings to reference like elements and features. Fig. 1 is an illustration of an example personal identification that may be employed in accordance with an implementation described herein. 15 Fig. 2 is broad graphical representation of an issuing party issuing a personal identification in accordance with an implementation described herein. Fig. 3 is broad graphical representation of an authentication of a personal identification in accordance with an implementation described herein. Fig. 4 is a functional flow diagram showing an implementation described 20 herein... Fig. 5 is an example of a computing operating environment capable of (wholly or partially) implementing at least one embodiment described herein. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT 25 In the following description, for purposes of explanation, specific numbers, materials, and configurations are set forth in order to provide a thorough WO 2004/036802 PCT/US2003/027614 7 understanding of the present invention. However, it will be apparent to one skilled in the art that the present invention may be practiced without the specific exemplary details. In other instances, well-known features are omitted or simplified to clarify the description of the exemplary implementations of present invention, thereby 5 better explain the present invention. Furthermore, for ease of understanding, certain method steps are delineated as separate steps; however, these separately delineated steps should not be construed as necessarily order dependent in their performance. The following description sets forth one or more exemplary implementations of a Error! Reference source not found. that incorporate elements recited in the 10 appended claims. These implementations are described with specificity in order to meet statutory written description, enablement, and best-mode requirements. However, the description itself is not intended to limit the scope of this patent. The inventors intend these exemplary implementations to be examples. The inventors do not intend these exemplary implementations to limit the scope of the 15 claimed present invention. Rather, the inventors have contemplated that the claimed present invention might also be embodied and implemented in other ways, in conjunction with other present or future technologies. An example of an embodiment of a Error! Reference source not found. may be referred to as an exemplary "Face Certification" or an "exemplary 20 FACECERT" for short. Introduction The one or more exemplary implementations, described herein, of the present claimed invention may be implemented (in whole or in part) by a FACECERT architecture 400 and/or by a computing environment like that shown in 25 Fig. 5.
WO 2004/036802 PCT/US2003/027614 8 The exemplary FACECERT is a simple, inexpensive, and cryptographically secure personal ID architecture. With the exemplary FACECERT, one may efficiently create and authenticate secure photographic personal identification documents (ID) that thwarts tampering and counterfeiting attempts. 5 This ID employs a compact, cryptographically signed bar-code that is readable by an ordinary scanner. It provides an efficient, simple, inexpensive, and secure mechanism for authenticating a person's identification using IDs that are difficult to forge, but simply and inexpensively produced. In a typical conventional scenario, the authentication system (i.e., an 10 "authenticator") of a person's ID must connect to a remote database and retrieve a stored photograph for the comparison with the ID. Unlike conventional approaches, the exemplary FACECERT does not require sophisticated production, smart cards, biometrics, and/or massive, remote databases. More interestingly, the IDs need not be printed by a trusted or high-end printer (as 15 is typically the case with conventional approaches). Rather, the ID may be printed anywhere, anytime, and potentially by anyone. With the exemplary FACECERT, all the necessary data for authentication is securely stored on the ID itself, in the form of a cryptographically signed bar-code. It does not depend on face recognition technology. 20 Secure photo identification provided by the exemplary FACECERT would contribute to efficient, secure, and inexpensive digital government efforts, since they provide cryptographical security, low-cost all-digital infrastructure deployment and maintenance, and convenient usage for both users and ID issuers.
WO 2004/036802 PCT/US2003/027614 9 Exemplary FACECERT IDs The exemplary FACECERT is a simple, inexpensive, and cryptographically secure personal ID architecture. Instead of relying on the sophistication of the printing process to impose difficult forging, the exemplary FACECERT relies on 5 public-key cryptography for provable security, while deploying a standard-quality low-cost color printing process. As shown in Fig. 1, a personal FACECERT ID 100 includes "person distinguishing data" in a "human-readable" representation and a "computer readable" representation. 10 Herein, the designation of "human-readable" does not exclude the possibility that a computer may read the representation. In fact, with the exemplary FACECERT, a computing device does "read" the human-readable representation. Rather, the designation means that it is easily readable by human. Examples of such representations include photographs, images, symbols, and human-language (e.g., 15 English) text. Similarly, the designation of "computer-readable" focuses on the ease at which a computer may read the representation rather that a human's inability to read it. In general, "person-distinguishing data" includes information that reasonably 20 distinguishes one person from another. Examples of person-distinguishing data includes (but is not limited to) the following information about a specific person: one or more images of the person's face, a retina scan of the person, an iris scan of the person, the person's name, the person's social security number, the person's account number, the person's weight, the person's height, the person's hair color, 25 the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's WO 2004/036802 PCT/US2003/027614 10 personal human statistics, one or more distinguishing traits of that person, and the person's contact information. With the exemplary FACECERT, the human-readable representation includes a human-readable printout of person's portrait photo 110 and any supplemental 5 information 120 (typically, personal information). The computer-readable readable representation includes a device readable 2-D color bar-code 130, which contains a cryptographically signed message. That bar-coded message 130 includes compact versions of both the supplemental information 120 and a representation of the face (of the portrait 10 photo). The message is signed (e.g., using RSA) using the private key of the ID issuing party (i.e., the issuer). FACECERT ID Issuance As illustrated in Fig. 2, a primary example of an ID-issuer 200 is a department of government. The issuer 200 officially issues the ID 100. 15 Typically, the human-readable person-distinguishing data that is certified on a FACECERT ID is both photographic and textual. The photo 110 is a portrait of the owner of the FACECERT ID. The photo may have any suitable resolution. Since the printout on the ID fits certain fixed area, this resolution may be constrained. The resolution needs to great enough to be effectively legible by humans and machine. 20 The supplemental information 120 is any suitable data. It is likely to vary depending on the specific application. As shown in Fig. 1, it will typically be personal statistical information such as name, age, weight, height, weight, eye color, other personal data, etc. This data is printed on the ID 100.
WO 2004/036802 PCT/US2003/027614 11 Typically, the computer-readable person-distinguishing data that is certified on a FACECERT ID is a 2D color bar code (e.g., bar-code 130). Alternatively, it may be a magnetic strip or some other suitable computer-readable medium. With the exemplary FACECERT, it is desirable for a bar-code reader to read 5 the bar-code 130 on a FACECERT ID with relative accuracy. Since the likelihood of read-failure increases with the number of bits encoded in the bar-code, a balance between accuracy and data storage is typically made when producing a FACECERT ID. Also, included in this balance are the space and reproduction quality requirements of the ID. 10 Efficient compaction digital-facial-image data is advantageous in some instances because: " For a given size of the bar-code, efficient face-data compaction maximizes the presentation accuracy of the compacted face-data with respect to the face in the original image - this reduces the risk of finding 15 look-a-likes or mimicking a given face; and e For a given facial presentation accuracy, efficient compaction reduces the length of the message that needs to be cryptographically signed, thus decreasing the computational cost of authenticating a cryptographic signature, which limit the amount of data that can be signed if one wants 20 to authenticate an ID in only one or few seconds. Therefore, the exemplary FACECERT employs a bar-code of about 3Kb that balances these factors. Of course, other implementation may employ a bar-code that encodes more or less data. Modern scanners are capable of reliably reading up to about six maximally 25 separated colors. Thus, for a message of n, bits, the exemplary FACECERT uses WO 2004/036802 PCT/US2003/027614 12 Fnl log 6 2 bins in the bar-code. For example, for n. = 3072 bits, we use 1189 bins which results in a 120 x10 bin bar-code. It is desirable for the print area of each bin should be such that scanning the bar-code results in an error that is less than certain desired minimal performance 5 bound. It is realistic to assume that the longer dimension of the bar-code reaches an inch. If each bin is scanned with a 10 x 10 CCD matrix (1000 dpi 48-bit CCD sensor array is a standard equipment of most low-cost scanners), the data in the bar-code can be detected with high reliability. The exemplary FACECERT compacts an image of a face 112 into only several 10 thousand bits with preserved sharpness of the main facial characteristics. The exemplary FACECERT employs eigenface-based compression methodologies and improved variants of principal component analysis, such bit-rates can be easily achieved even when the component analysis is trained on a small database of images. 15 Loss of an ID can result in a potentially malicious reuse of the ID by an adversary if that adversary is a near-perfect look-a-like. To prevent this unlikely scenario, the ID may contain descriptive information of a certain unique mark of the ID owner. ID Authentication 20 Fig. 3 illustrates an example of FACECERT ID authentication. It is performed by an intelligent scanning device (such as FACECERT authenticator 300). As shown in Fig. 3, the authenticator 300 scans the photo, supplemental info, and bar-code of the ID 100.
WO 2004/036802 PCT/US2003/027614 13 The authenticator 300 obtains the public key of the ID-issuing party. The key may be stored on-board the authenticator or on a locally connected data storage. Alternatively, the key may be retrievable via a remote (e.g., Internet) connection. The authenticator 300 scans the bar-code, decodes the cryptographic 5 signature, and then performs signature authentication (e.g., public-key decryption of the decoded data) using the public key of the issuer 200. As a result, the authenticator 300 obtains the message signed with the private key of the issuer. That message includes person-distinguishing data. More specifically, the message contains the supplemental information 120 and a compacted representation 10 of the face 112 in the photo 110. Next, the authenticator scans the textual supplemental information 120 from the ID 100, performs character recognition, and compares the recognized text with the extracted supplemental information. Next, the authenticator 300 scans the photo of the ID 100. It detects the face in the photo and performs a statistical comparison with the de-compacted face 15 extracted from the bar-coded message. By using printed guides 114 on the ID, one may achieve accurate scanning alignment, such as rotation and scaling. If the two faces match beyond a certain threshold (which may be arbitrarily, statistically, and/or empirically determined), the authenticator 300 concludes that the ID is authentic. Otherwise, the ID has been either forged or damaged, or an 20 error occurred while scanning the ID. This indication may simply be a chromatic light (e.g., red or green light) and/or an audible tone (e.g., buzzer or beep). Therefore, tampering with the photo or the supplemental information on an officially issued ID means they will not match the person-distinguishing data encoded in the cryptographically signed bar-code.
WO 2004/036802 PCT/US2003/027614 14 Human Verification Although the authenticator 300 performs authentication of a specific FACECERTS ID, an actual human verifies that the face on the ID corresponds to the person presenting the ID. This human is called, herein, the verification official 305. 5 The human's role with the exemplary FACECERT is verifying that the face on the ID corresponds to the person presenting the ID. This is the same role that human verifiers often perform in typically security or person identification settings. Therefore, in a typical person identification setting, the role of the exemplary FACECERT is to authenticate the ID. It does this by confirming that the information 10 on the ID (including the photo) has not been altered since it was issued by the ID issuer. Instead of authorizing the ID, the role of the verification official 305 is to verify that the face on the ID (and other person-distinguishing data on the ID) corresponds to the person presenting the ID. With a positive confirmation by the exemplary FACECERT, the human 15 verifier 305 may confidently rely on the person-distinguishing data (including the photo) on the presented ID. Conversely, with a negative confirmation by the exemplary FACECERT, the human verifier 305 may have probable cause to suspect that the information on the presented ID has been modified. While this authentication and verification process is typically performed in 20 person, it may occur on-line via a web-cam, closed-circuit television, and the like. With the exemplary FACECERT, the human verifier 305 may, if desired, have the face from the bar-code displayed on a video screen and double check that everything is in order. This scenario is particularly practical at border crossings, where the immigration officers are already sitting in front of a computer, so their 25 scanning device can send all the information to a computer for display.
WO 2004/036802 PCT/US2003/027614 15 Cryptography Background The exemplary FACECERT employs a public-key infrastructure (PKI) to cryptographically sign the data in the bar-code of the ID. More specifically, it employs RSA public-key cryptography. However, other implementations of the 5 exemplary FACECERT may employ other cryptographically secure mechanism, especially those using private-public key structures. Although the RSA public-key cryptography infrastructure is well-known to those of ordinary skill in the art, many of its key aspects are discussed here to provide background for further discussion of its use with the exemplary FACECERT. 10 In the RSA public-key signing system, each communicating party is assumed to have two keys: a public-key, which is available to everyone and used for signature authentication, and a private-key, which is securely stored with the signature issuer and used to sign messages. The public-private key-pair is created in the following way: 15 * Generate two large and distinct primes p and q. " Compute n = pq and p (p -1)(q -1). * Select a random e E Z* < e < p, gcd(e, p) = 1. * Find d e Z*I< d < p,ed =1(modp) . 20 The created key-pair is: private key is d, whereas the public-key is a set of two numbers (n,e). Commonly, in communication protocols that use the RSA public-key crypto-system (e.g., the Secure Socket Layer - SSL) e is fixed, usually to e =2' +1, hence, reducing the information that represents the public-key to n as well as speeding up signature authentication. A message m e [0,n -1] is typically 25 signed using the private key d as follows: WO 2004/036802 PCT/US2003/027614 16 s = m(modn). (0.1) The authentication procedure shows that for a given message m , signature s has been obtained by signing m using d. However, the private-key d is not used, 5 rather the corresponding public-key n is typically used to perform the same task as follows: r = s"(modn). (0.2) 10 If r = m , then s is a valid signature of m , otherwise the signature s does not correspond to the message m . The exemplary FACECERT does not dependant upon a single secret stored in a single protected location. Rather, it employs a secure storage techniques for the master secrets (e.g., private keys). 15 For example, with one technique, the multiple private-public keys are used to chain the signatures (e.g., output of one RSA signing is sent as input to another RSA signing with a different private key). Each private key may be stored in geographically different but secure locations. With another example of a secure storage technique, parts of each private 20 key is stored in k different locations such that each key can be retrieved only if n out of k (n < k) collude their information to create the key. Those of skill in the art recognize this technique as "secret sharing." With this technique, the issuing organization further disperses the pieces of the puzzle that need to be assembled by the adversary to break the system. 25 With still another example of a technique, the secrets may be stored in tamperproof hardware.
WO 2004/036802 PCT/US2003/027614 17 Of course, the exemplary FACECERT may employ other suitable secure storage techniques. FaceCert Architecture and Methodology Fig. 4 illustrates the functional components and one or more methodological 5 implementations of the FACECERT architecture 400. The top portion 410 of Fig. 4 illustrates the issuance of a FACECERT ID 100 while the lower portion 420 illustrates the authentication of that ID. These one or more methodological implementations may be performed in software, hardware, or a combination thereof As shown in issuance portion 410 of Fig. 4, the FACECERT ID issuer 200 10 creates the message m that is signed by RSA. At 210, the exemplary FACECERT compacts the face in the photo 110 of the ID 100. This compact face data (e.g., message f) is a succinct, but relatively complete, representation of the specific face in the specific photo 110. The output of the face compaction is the message f with n, > nF bits. 15 Parameter n. is fixed and equals n, = k *nRSA,k E Z, where nRSA is the length of an RSA public-key (we adopt nRS, =1024) and k is commonly set to k E [2,5]. Given a fixed nF , one of the goals of the face compaction is to increase the distance between any two distinct facial structures. This goal translates directly to minimized likelihood of a false negative and false positive during the 20 authentication. At 220, the supplemental information 120 (e.g., textual data) is compressed using any suitable data compression technique. For example, the printed message can be compressed as pure text using LZ77 or semantically with optimal coding (e.g., addresses converted to latitude/longitude encoded using arithmetic encoding). 25 The output of the text compression is denoted as a message t with n, bits.
WO 2004/036802 PCT/US2003/027614 18 The exemplary FACECERT reads the data from the FACECERT ID with an error-free assumption. Then it either compresses the data or it cryptographically hashs it before combining the digest, as in Equation (1.3). Since the output is always a fixed length, hashing is sometimes desirable over compression. Exemplary 5 hash functions are SHAl and MD5. Messages f and t are merged into a message m of length n, = n, using an operator 230 that encourages each bit of m to be dependent upon at least one bit from both f and t and there exists at least one bit in m which depends upon a given bit of f or t. This helps to increase the number of bits that need to be 10 manipulated in a photo to create a certain message m. An example of such an operator is: m= t f - m =t, XORfj,i=O..nF-1, (0.3) 15 where mi, f;, and t represent the i -th bit of message m, f, and t respectively. At 240, message m is signed with the private-key 242 of the issuer of a FACECERT ID. Each nRSA bits of m are signed separately. The resulting signature s has ns =n = nF bits. The resulting signature s is printed as a 2D color bar-code 130onto the FACECERT ID 100. 20 As shown in authentication portion 420 of Fig. 4, the FACECERT authenticator 300 that the cryptographically signed data in the bar-code corresponds with the supplemental data 120 and the face 112 in the photo 110 of a FACECERT ID. The authenticator 300 initially scans all three printed components of the ID: 25 the photo 110, the supplemental textual information 120, and the bar-code 130.
WO 2004/036802 PCT/US2003/027614 19 Those are represented by photo scan 310, OCR text scan 320, and bar-code scan 330. At 322, the scanned supplemental textual information is also converted into a text-string. This text-string is compressed using the same compression technique 5 (e.g., one based on Equation (0.2)) employed above by component 220. This results in message t,. Generic optical character recognition (OCR) is not required for this task because the font used to print the text is known to the authenticator and may be optimized for improved OCR. At 332, the authenticator 300 received the scanned bar-code data. It converts 10 scanned bar-code into a authentication signature s,. The authenticator obtains the issuer's public-key 334. It performs the RSA signature authentication on s, using issuer's public-key and obtains the signed message m,. If the ID has not been tampered with, then the authentication signature s, and the originally printed signature s will match. However, the authenticator has no 15 direct access to a verifiable copy originally printed signature. Rather, it must authenticate that the authentication signature s, of the presented ID is, indeed, the originally printed signature s. Since the photo and supplemental info on the presented ID were presumptively used to generate the authentication signature s,, then the data 20 encoded in s, should match the face and supplemental data extracted there from. If the ID remains in a pristine and unmodified condition, they will match. Otherwise, there will be no match. At 340, message f, is computed from m, and t,. At 350, the authenticator 300 applies a de-compaction technique to extract 25 the digital facial-feature data from f.
WO 2004/036802 PCT/US2003/027614 20 At 360, the authenticator compares the facial-feature data extracted from f, to digital facial-feature data of the scanned photo of the presented ID. It quantifies the level of similarity (e.g., correlation) between the two faces: the de-compacted and the scanned one. 5 At 370, the authenticator 300 reports the results of component 360. If the quantified level of correlation is above a threshold, then it reports that the ID is authentic. Otherwise, it reports that it is invalid. Alternatively, the authenticator may report that the ID is valid, but provide an additional indication (e.g., flashing blue light and quick beeps) that this 10 particular person should be detained. She may be wanted by the authorities as a person of interest, a suspect, an escapee, a criminal, etc. Again, the face authentication task does not involve face recognition in the typical setting of biometrics, but rather a more straightforward task of correlating two equivalent facial structures. 15 If the authenticator 300 indicates that the ID is authentic, the human official verifier 305 confidently performs their typical duty of authenticating that the human-readable data (including the photo) on the ID corresponds with the person presenting the ID. If the authenticator 300 indicates that the ID is invalid, it gives the human official verifier 305 reasonable suspicion to investigate further. The data 20 on the ID may be forged and thus, the presenter is an imposter. The data on the ID may be corrupted or simply read incorrectly. Face Compendium A digital representation of the facial features of the face 112 in the photo 110 on the ID 100 is stored in the bar-code 130. If the balances of bar-code reading 25 accuracy and space allowed it, then the entire unabridged photo may be encoded in WO 2004/036802 PCT/US2003/027614 21 the bar-code. Since key distinguishing information is found on the face of the person, then the balances of factors may allow for an unabridged portion of the photo that represents the face to be encoded in the bar-code. Since the realities of the balance lean towards substantially less data storage 5 in the bar-code than can fully represent the unabridged face in the photo, the digital image 110 of the face is compacted with the exemplary FACECERT. While the image of the face may be compacted using traditional image compression techniques (e.g., JPEG, GIF, etc.), other techniques may be employed to reduce the storage requirements further while maintaining a fair representation of the face. 10 With the exemplary FACECERT, the digital facial-feature data in the bar-code should be a succinct, but reasonably complete, representation of the face in that photo. Unlike biometric face-recognition approaches, the digital facial-feature data does not need to represent the person's face viewed from multiple angles and conditions. 15 Rather, the digital facial-feature data on the FACECERT ID need only represent that specific face on that specific photograph. That is because the exemplary FACECERT is authenticating that the face in the photo on the ID matches the face represented by the digital facial-feature data in the bar-code. Since the digital facial-feature data is indeed a succinct, but reasonably 20 complete, representation of the face in that specific photo, it may be called "face compendium." This face compendium is "reasonably complete" in the sense that the compendium contains sufficient data to reconstruct an image of the face. Furthermore, the compendium is "reasonably complete" enough so that enough facial-feature data is encoded therein to potentially distinguish the represented face 25 from other similar faces.
WO 2004/036802 PCT/US2003/027614 22 Of course, other implementations may employ bar-codes that encode more or less data, but one implementation, described herein, employs a bar-code of about 3000 bits. This is found to be reasonable compromise of many factors, including (but not limited to) bar-code reading accuracy and space for the bar-code. 5 To improve this compromise, the exemplary FACECERT employs a compaction technique that identifies the object of interest (e.g., facial structure) and compacts its features, rather than compacting the entire image using standard image compression techniques such as JPEG. Face Detection and Compaction 10 The computer vision community has studied various models of faces over the last several years. The exemplary FACECERT does not need to encode the face image to facilitate recognition of the person in differing images, but rather in the very same photograph from which the face code has been extracted. Thus, the exemplary FACECERT does not face the difficult issue of over-training that is 15 present in a typical biometric face-recognition application. Rather, the exemplary FACECERT employs an efficient facial-features compaction technique. While generic DCT coefficients may be employed, the face images may be compacted better using subspace models learned from a large face database. 20 The problem of subspace learning can be elegantly defined in terms of a generative model that describes joint generation of the subspace coordinates, or factors, y and the image g by linearly combining image components in the so called factor loading matrix A: 25 p(g, y) = N(g; p + Ay, CD)N(y;0,I). (0.4) WO 2004/036802 PCT/US2003/027614 23 where D constitutes the non-uniform image noise (i.e., the variability not captured in the subspace model). A is an n x k matrix used to expand from the k-dimensional subspace into a full n-dimensional one, where n is the number of pixels in the image 5 g . The parameters A, ED, and u can be learned by maximizing the likelihood of a set of images , logp(,)=logj Jp(g,,y,), (0.5) ty, 10 and a good low-dimensional representation of the image tends to be E[y I g]. The above probability model, called factor analysis (FA), also allows for the design of the optimal encoding strategy for the factors y. As a result, a face image can be efficiently encoded with about 85 bytes representing 100 face factors y . 15 The subspace model may be extended that take into account the possible transformation of the facial image, such as translations, rotations, and scale. In this model, called transformed component analysis (TCA), an additional random transformation variable T is applied to the image expanded from y, and a new image h is observed: 20 p(h,g,y) = N(h;Tg,'F)N(g;,u + Ay, E)N(y; 0,). (0.6) Such a model, when trained on an image set tends to automatically align all images to create the very compact subspace representation. The regular subspace 25 models, in presence of transformational variability in the training data will tend to create blury models, while TCA creates sharper components.
WO 2004/036802 PCT/US2003/027614 24 FACECERT Authentication The task of authentication performed by the exemplary FACECERT may be viewed as template matching. A likelihood over the windows in the image can be used as a cost instead of the template differences, although even straightforward 5 correlation technique would work. For example, to use the likelihood as the similarity measure, one would take the message f , extract the window size and detection threshold thr as well as the subspace parameters y compute: 10 log p(h l y)= p(h,g,T I y), (0.7) for all windows of appropriate size. If maxh log p(h) >thr , then the ID photograph does contain the face encoded in the bar-code. If the only modeled transformations are shifts, the integration over 15 transformation T is not necessary since the search is done over all windows in the image. This process is equivalent to matching p+Ay with the window h, in the sense of a Mahalanobis distance dependent on the learned noise model. These types of computations are as effective as image correlation and can be done very efficiently using the fast Fourier transformation (FFT). 20 During the photo ID creation, the provided photograph is searched for a face, which is cropped and compacted efficiently using a transformed component analyzer. The face code, together with the compaction error and the window size (or even position) is signed with a private key. The FACECERT ID is then created as a combination of text, photo and a bar 25 code containing the encoded face. During authentication, the bar-code is decoded WO 2004/036802 PCT/US2003/027614 25 and the face code, consisting of the factors y, threshold on likelihood (or encoding error) and the window size are decoded from the bar-code using a public key and the face store in the bar-code is compared to the one in the actual photograph in the FACECERT ID. 5 Scanning 2D Color Bar-codes Of course, it is desirable to have high accuracy when reading the 2D color bar-code. Modem low-cost scanning devices typically have a 48-bit per pixel accuracy in the RGB color spectrum. However, hardly the color information of a digital image is retrieved accurately after printing and then scanning. 10 Assuming low-cost devices and print material, one can at best hope for only several colors to be transmitted reliably through this communication channel. Assuming an nB -bin bar-code p, the likelihood that it is incorrectly scanned equals: nB 15 Pr[p8 * y] = 1- (1 -Prp, #; y,]) 1 - (1- c)" (0.8) i=I where y is the scanned n, -bin bar-code and e is the maximal likelihood for a given color used in the bar-code to be incorrectly scanned. At least one implementation, described herein, adopts 6-color bar-codes: 20 RGB:1-= [0,0,0],[0,0,255],[0,255,0],[255,0,0],[255,255,255],[255,255,0] as a reliable communication channel e <10~8 that can satisfy read error probabilities of at least Pr[p # y] <10-4.
WO 2004/036802 PCT/US2003/027614 26 Commonly, for a given scanner type (e.g., CCD sensor matrix brand), one of the following colors [255,255,0], [255,0,255], [0,255,255] has the highest read error rates with respect to the other colors in F. Thus, for a given CCD scanning device type, the F spectrum is one of these colors, which results in a good read-error rate. 5 Bar-code read accuracy can be improved through error detection (e.g., parity check) and error correcting codes (e.g., Reed-Solomon codes), although typically good performance is achieved by printing the F colors at a known location on the ID to enable scanner fine-tuning. Exemplary Computing System and Environment 10 Fig. 5 illustrates an example of a suitable computing environment 500 within which an exemplary FaceCert, as described herein, may be implemented (either fully or partially). The computing environment 500 may be utilized in the computer and network architectures described herein. The exemplary computing environment 500 is only one example of a 15 computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the computer and network architectures. Neither should the computing environment 500 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary computing environment 500. 20 The exemplary FaceCert may be implemented with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use include, but are not limited to, personal computers, server computers, thin clients, thick clients, hand-held or laptop devices, 25 multiprocessor systems, microprocessor-based systems, set top boxes, WO 2004/036802 PCT/US2003/027614 27 programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The exemplary FaceCert may be described in the general context of 5 computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The exemplary FaceCert may also be practiced in distributed computing environments where tasks are performed by remote 10 processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices. The computing environment 500 includes a general-purpose computing device in the form of a computer 502. The components of computer 502 may 15 include, by are not limited to, one or more processors or processing units 504, a system memory 506, and a system bus 508 that couples various system components including the processor 504 to the system memory 506. The system bus 508 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an 20 accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures may include an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, a Video Electronics Standards Association (VESA) local bus, and a Peripheral Component Interconnects (PCI) bus also known as a 25 Mezzanine bus.
WO 2004/036802 PCT/US2003/027614 28 Computer 502 typically includes a variety of computer readable media. Such media may be any available media that is accessible by computer 502 and includes both volatile and non-volatile media, removable and non-removable media. The system memory 506 includes computer readable media in the form of 5 volatile memory, such as random access memory (RAM) 510, and/or non-volatile memory, such as read only memory (ROM) 512. A basic input/output system (BIOS) 514, containing the basic routines that help to transfer information between elements within computer 502, such as during start-up, is stored in ROM 512. RAM 510 typically contains data and/or program modules that are immediately 10 accessible to and/or presently operated on by the processing unit 504. Computer 502 may also include other removable/non-removable, volatile/non-volatile computer storage media. By way of example, Fig. 5 illustrates a hard disk drive 516 for reading from and writing to a non-removable, non-volatile magnetic media (not shown), a magnetic disk drive 518 for reading from and 15 writing to a removable, non-volatile magnetic disk 520 (e.g., a "floppy disk"), and an optical disk drive 522 for reading from and/or writing to a removable, non volatile optical disk 524 such as a CD-ROM, DVD-ROM, or other optical media. The hard disk drive 516, magnetic disk drive 518, and optical disk drive 522 are each connected to the system bus 508 by one or more data media interfaces 526. 20 Alternatively, the hard disk drive 516, magnetic disk drive 518, and optical disk drive 522 may be connected to the system bus 508 by one or more interfaces (not shown). The disk drives and their associated computer-readable media provide non volatile storage of computer readable instructions, data structures, program 25 modules, and other data for computer 502. Although the example illustrates a hard disk 516, a removable magnetic disk 520, and a removable optical disk 524, it is to WO 2004/036802 PCT/US2003/027614 29 be appreciated that other types of computer readable media which may store data that is accessible by a computer, such as magnetic cassettes or other magnetic storage devices, flash memory cards, CD-ROM, digital versatile disks (DVD) or other optical storage, random access memories (RAM), read only memories 5 (ROM), electrically erasable programmable read-only memory (EEPROM), and the like, may also be utilized to implement the exemplary computing system and environment. Any number of program modules may be stored on the hard disk 516, magnetic disk 520, optical disk 524, ROM 512, and/or RAM 510, including by way 10 of example, an operating system 526, one or more application programs 528, other program modules 530, and program data 532. A user may enter commands and information into computer 502 via input devices such as a keyboard 534 and a pointing device 536 (e.g., a "mouse"). Other input devices 538 (not shown specifically) may include a microphone, joystick, 15 game pad, satellite dish, serial port, scanner, and/or the like. These and other input devices are connected to the processing unit 504 via input/output interfaces 540 that are coupled to the system bus 508, but may be connected by other interface and bus structures, such as a parallel port, game port, or a universal serial bus (USB). A monitor 542 or other type of display device may also be connected to the 20 system bus 508 via an interface, such as a video adapter 544. In addition to the monitor 542, other output peripheral devices may include components such as speakers (not shown) and a printer 546 which may be connected to computer 502 via the input/output interfaces 540. Computer 502 may operate in a networked environment using logical 25 connections to one or more remote computers, such as a remote computing device 548. By way of example, the remote computing device 548 may be a personal WO 2004/036802 PCT/US2003/027614 30 computer, portable computer, a server, a router, a network computer, a peer device or other common network node, and the like. The remote computing device 548 is illustrated as a portable computer that may include many or all of the elements and features described herein relative to computer 502. 5 Logical connections between computer 502 and the remote computer 548 are depicted as a local area network (LAN) 550 and a general wide area network (WAN) 552. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet. When implemented in a LAN networking environment, the computer 502 is 10 connected to a local network 550 via a network interface or adapter 554. When implemented in a WAN networking environment, the computer 502 typically includes a modem 556 or other means for establishing communications over the wide network 552. The modem 556, which may be internal or external to computer 502, may be connected to the system bus 508 via the input/output interfaces 540 or 15 other appropriate mechanisms. It is to be appreciated that the illustrated network connections are exemplary and that other means of establishing communication link(s) between the computers 502 and 548 may be employed. In a networked environment, such as that illustrated with computing environment 500, program modules depicted relative to the computer 502, or 20 portions thereof, may be stored in a remote memory storage device. By way of example, remote application programs 558 reside on a memory device of remote computer 548. For purposes of illustration, application programs and other executable program components such as the operating system are illustrated herein as discrete blocks, although it is recognized that such programs and components 25 reside at various times in different storage components of the computing device 502, and are executed by the data processor(s) of the computer.
WO 2004/036802 PCT/US2003/027614 31 Computer-Executable Instructions An implementation of an exemplary FaceCert may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules 5 include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments. Exemplary Operating Environment 10 Fig. 5 illustrates an example of a suitable operating environment 500 in which an exemplary FaceCert may be implemented. Specifically, the exemplary FaceCert(s) described herein may be implemented (wholly or in part) by any program modules 528-530 and/or operating system 526 in Fig. 5 or a portion thereof. 15 The operating environment is only an example of a suitable operating environment and is not intended to suggest any limitation as to the scope or use- of functionality of the exemplary FaceCert(s) described herein. Other well known computing systems, environments, and/or configurations that are suitable for use include, but are not limited to, personal computers (PCs), server computers, hand 20 held or laptop devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, wireless phones and equipments, general- and special-purpose appliances, application-specific integrated circuits (ASICs), network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
WO 2004/036802 PCT/US2003/027614 32 Computer Readable Media An implementation of an exemplary FaceCert may be stored on or transmitted across some form of computer readable media. Computer readable media may be any available media that may be accessed by a computer. By way of 5 example, and not limitation, computer readable media may comprise "computer storage media" and "communications media." "Computer storage media" include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program 10 modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which may be used to store the desired information and which may be accessed by a 15 computer. "Communication media" typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as carrier wave or other transport mechanism. Communication media also includes any information delivery media. 20 The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media. Combinations of 25 any of the above are also included within the scope of computer readable media.
WO 2004/036802 PCT/US2003/027614 33 Comparison with Existing Approaches The exemplary FACECERT does not require smart cards or expensive biometric approaches to authenticating a person's identity. It does not rely on the sophistication of ID production to help authenticate a person's identity by reducing 5 the likelihood of counterfeits. Sophisticated Production With readily available and relatively inexpensive high-quality, sophisticated production equipment, an unscrupulous rogue can cheaply and easily produce impressive counterfeit documents, including personal IDs. In response, issuing 10 parties (such as governments) have implemented increasingly more sophisticated and presumptively more expensive production techniques. For example, issuing parties are using holograms, watermarks, micro printing, special print paper and/or chemical coating, etc. Since the production of IDs is more complex, authentication has become correspondingly more complex, 15 unreliable, and most importantly, expensive. With the exemplary FACECERT, these issuing parties can end this escalating cycle of increasingly more expensive and sophisticated production techniques and increasingly more complex, unreliable, and expensive authentication techniques. In contrast to the conventional approaches, the exemplary FACECERT does not rely on 20 the sophistication of ID production to increase the confidence level that the presented ID is not counterfeit. The FACECERT ID does not need to be printed by a trusted or high-end printer. It does not need to be produced using sophisticated production techniques to make it more difficult and expensive for a devious scoundrel to manufacture a 25 counterfeit ID.
WO 2004/036802 PCT/US2003/027614 34 Rather, the FACECERT ID may be printed anywhere, anytime, and potentially by anyone using basic, inexpensive printers. That is because the exemplary FACECERT relies on the cryptographically signed data in the bar-code to make it more difficult and expensive for an adversary to manufacture a counterfeit ID; 5 rather than rely on the sophistication of production. With the exemplary FACECERT, the Department of Motor Vehicles may, for example, e-mail a driver's license ID (in its digital format) to a customer, who can print it on her own printer creating as many copies as she wants. Unlike the conventional approaches, loss of the ID with the exemplary FACECERT incurs 10 minimal cost to the customer. Biometric Approaches With biometrics, a computer may automatically recognize a person using distinguishing traits of that person. Several biometric-based person identification approaches have been proposed. Some of these include based upon automatic 15 recognition of the distinguishing traits of a person's face, speech, fingerprints, handwriting, and/or iris and retina. While some types of biometric-based person identification (such as retina scan or fingerprint detection) can be reliable, often they are intimidating (e.g., retina scan) and can be used maliciously to incriminate innocent users (e.g., fingerprint 20 scan). A malicious detector can record a person's fingerprint, create its physical copy, and then, incriminate this person at will. This renders fingerprint detection systems highly undesirable for most person identification scenarios. Typically, a biometric-based person identification system includes a human verifier who ensures the identification system is not fooled. This can happen when WO 2004/036802 PCT/US2003/027614 35 an adversary shows a realistic size photo of the face of an authorized person to the face detector or plays a voice recording to a speech detector. Finally, some biometrics systems are commonly subjected complaints for invasion of privacy. For example, wide-spread face detection points can disclose at 5 any time one's location to a party who gains control over such a system. For most applications, biometric-based approaches are generally considered to be inconvenient, costly, and most importantly, unreliable. Smart Cards With a smart card based system, a digitally stored image of the person's face 10 must be displayed so that the human verifier can confirm that the face in the image stored on the card corresponds to the face of the presenter of the smart card. The typical display will be a LCD or other flat panel display. However, the exemplary FACECERT does not need to display any image. Instead, it employs an optical scanner (e.g., a charge-coupled device (CCD) to scan 15 the photo, supplemental information, and bar-code. The human verifier confirms that the face of the printed image corresponds to the face of the presenter of the FACECERT ID. Medium-quality displays (e.g., LCDs) are significantly more expensive than CCD scanners (up to a factor of 5). In one estimate, a mass-produced scanner of the 20 authenticator of the exemplary FACECERT should not cost more than US$15, as opposed to a smart card authenticator, which should encompass at least US$50 only for the LCD display. Consequently, the cost of the authenticating infrastructure of the exemplary FACECERT is significantly less than that of a smart-card based approach.
WO 2004/036802 PCT/US2003/027614 36 Furthermore, personal IDs are frequently lost or damaged. Replacing a FACECERT ID involves only a simple reprint. However, replacing a smart card involves purchase of another hardware device in addition to burning this device with the appropriate identification contents. 5 Moreover, the data stored on smart cards are not secure. Using various techniques, the data in the smart card can be extracted. More importantly, it can be replaced with new data. This reduces the overall confidence level in the security of smart cards. Due to their relatively generous storage capabilities, smart cards may give an 10 impression that they may be used for storing additional information, in particular, private information about the owner (e.g. private keys that are revoked if smart card is lost). Conclusion Although the invention has been described in language specific to structural 15 features and/or methodological steps, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or steps described. Rather, the specific features and steps are disclosed as preferred forms of implementing the claimed invention.

Claims (68)

1. An architecture facilitating cryptographically secure person identification, the architecture comprising: an identification issuer configured to produce one or more person 5 identification documents (IDs) for a person, the ID comprising first and second representations of person-distinguishing data which reasonably distinguishes persons, the first representation being a human-readable and second representation being a computer-readable and encrypted; an identification authenticator configured to determine whether the first 10 representation of person-distinguishing data of an ID corresponds with the decrypted second representation of person-distinguishing data of the same ID.
2. An architecture as recited in claim 1, wherein the first representation includes person-distinguishing data selected from a group consisting of one or more 15 images of the person's face, the person's name, the person's social security number, the person's account number, the person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that 20 person, and the person's contact information. WO 2004/036802 PCT/US2003/027614 38
3. An architecture as recited in claim 1, wherein the second representation includes person-distinguishing data selected from a group consisting of one or more images of the person's face, a retina scan of the person, an iris scan of the person, the person's name, the person's social security number, the person's 5 account number, the person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. 10
4. An architecture as recited in claim 1, wherein the format of the first representation is selected from a group consisting of written human-language text, color-coding, photographs, written human-language symbols, and imagery. 15
5. An architecture as recited in claim 1, wherein the format of the second representation is selected from a group consisting of a bar-code, a magnetic strip, and a memory storage device.
6. An architecture as recited in claim 1, wherein: 20 the first set of person-distinguishing data comprises a image of a person, wherein the image comprises the face of that person; the second set of person-distinguishing data comprises a face compendium of the face in the image. WO 2004/036802 PCT/US2003/027614 39
7. A computer-readable medium having computer-executable instructions that, when executed by a computer, performs a method comprising: for a specific person, obtaining person-distinguishing data for that person, which reasonably distinguishes that person for other persons; 5 encrypting the person-distinguishing data; producing one or more person identification documents (IDs) comprising a human-readable representation of the person-distinguishing data and a computer readable representation of the encrypted person-distinguishing data. 10
8. A medium as recited in claim 7, wherein producing comprises printing onto a print medium.
9. A medium as recited in claim 7, wherein the method further comprises compacting the person-distinguishing data. 15
10. A medium as recited in claim 7, wherein the person-distinguishing data comprises a face compendium of that person's face.
11. A medium as recited in claim 7, wherein the person-distinguishing 20 data comprises a face compendium derived from an image of that person's face. WO 2004/036802 PCT/US2003/027614 40
12. A medium as recited in claim 7, wherein the person-distinguishing data comprises information related to that person, the data being is selected from a group consisting of one or more images of the person's face, a retina scan of the person, an iris scan of the person, the person's name, the person's social security 5 number, the person's account number, the person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. 10
13. A medium as recited in claim 7, wherein the computer-readable and encrypted representation is selected from a group consisting of one or more bar codes, one or more magnetic strips, and one or more memory storage devices. 15
14. A person identification document (ID) issuance system comprising: a production device configured to produce person IDs; a medium as recited in claim 7.
15. A person ID produced by the method of the medium as recited in 20 claim 7, the person ID having stored thereon a computer-readable data structure, comprising the computer-readable representation of the encrypted person distinguishing data. WO 2004/036802 PCT/US2003/027614 41
16. A method for issuing person identification documents (IDs), the method comprising: for a specific person, generating a human-readable representation of person distinguishing data which reasonably distinguishes persons; 5 generating an encrypted and computer-readable representation of the same person-distinguishing data; producing one or more person IDs comprising both the human-readable representation and the encrypted and computer-readable representation of the same person-distinguishing data. 10
17. A method as recited in claim 16, wherein producing comprises printing onto a print medium.
18. A method as recited in claim 16, wherein the generating of the 15 encrypted and computer-readable representation further comprises compacting the person-distinguishing data.
19. A method as recited in claim 16, wherein the person-distinguishing data comprises a face compendium of that person's face. 20
20. A method as recited in claim 16, wherein the person-distinguishing data comprises a face compendium derived from an image of that person's face. WO 2004/036802 PCT/US2003/027614 42
21. A method as recited in claim 16, wherein the person-distinguishing data comprises information related to that person, which data is selected from a group consisting of one or more images of the person's face, a retina scan of the person, an iris scan of the person, the person's name, the person's social security 5 number, the person's account number, the person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. 10
22. A method as recited in claim 16, wherein the computer-readable and encrypted representation is selected from a group consisting of one or more bar codes, one or more magnetic strips, and one or more memory storage devices. 15
23. A method as recited in claim 16, wherein: the human-readable representation comprises a photograph of that same person, wherein the photograph comprises the face of that same person; the computer-readable representation comprises a face compendium of the face in the photograph. 20
24. A computer-readable medium having computer-executable instructions that, when executed by a computer, performs the method as recited in claim 16. WO 2004/036802 PCT/US2003/027614 43
25. . A computer comprising one or more computer-readable media having computer-executable instructions that, when executed by the computer, perform the method as recited in claim 16. 5
26. A person ID produced by a method as recited in claim 16, the person ID having stored thereon a computer-readable data structure, comprising the computer-readable representation of the encrypted person-distinguishing data.
27. A person identification document (ID) issuance system, comprising: 10 an image-acquisition device configured to obtain an image of a person's face; a data generator configured to generate person-distinguishing data for that person which reasonably distinguishes persons; a data encrypter configured to encrypt the person-distinguishing data; 15 an ID producer configured to produce one or more person identification documents (IDs) comprising a human-readable representation of the image of that person's face and a computer-readable representation of the encrypted person distinguishing data. 20
28. A system as recited in claim 27, wherein the ID producer comprises a printer configured to print on a print medium.
29. A system as recited in claim 27, wherein the data generator is further configured to compact the person-distinguishing data. 25 WO 2004/036802 PCT/US2003/027614 44
30. A system as recited in claim 27, wherein the person-distinguishing data comprises a face compendium of that person's face.
31. A system as recited in claim 27, wherein the person-distinguishing 5 data comprises a face compendium derived from an image of that person's face.
32. A system as recited in claim 27, wherein the person-distinguishing data comprises information related to that person, which data is selected from a group consisting of one or more images of the person's face, a retina scan of the 10 person, an iris scan of the person, the person's name, the person's social security number, the person's account number, the person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that 15 person, and the person's contact information.
33. A system as recited in claim 27, wherein the computer-readable and encrypted representation is selected from a group consisting of one or more bar codes, one or more magnetic strips, and one or more memory storage devices. 20
34. A system as recited in claim 27, wherein: the human-readable representation comprises a photograph of that same person, wherein the photograph comprises the face of that same person; the computer-readable representation comprises a face compendium of the 25 face in the photograph. WO 2004/036802 PCT/US2003/027614 45
35. A person ID produced by a system as recited in claim 27, the person ID having stored thereon a computer-readable data structure, comprising the computer-readable representation of the encrypted person-distinguishing data. 5
36. A person ID comprising: a first computer-readable data structure that is also human-readable, the first data structure comprising: " a first data field containing an image of a person's face; e a second data field containing personal information associated with 10 that person; a second computer-readable data structure comprising: " a first data field containing a face compendium of the face of the image; " a second data field containing the same personal information 15 associated with that person; " a third data field functioning to delimit the end of the second data structure. WO 2004/036802 PCT/US2003/027614 46
37. A person ID as recited in claim 36, wherein the personal information comprises information related to that person, which data is selected from a group consisting of a retina scan of the person, an iris scan of the person, the person's name, the person's social security number, the person's account number, the 5 person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. 10
38. A person ID as recited in claim 36, wherein second data structure is a bar-code.
39. A computer-readable medium having computer-executable instructions that, when executed by a computer, performs a method comprising: 15 obtaining a first set of person-distinguishing data from a human-readable representation of a person identification document (ID); obtaining a second set of person-distinguishing data from a computer readable representation of the same person ID; comparing the first and second sets of person-distinguishing data. 20
40. A medium as recited in claim 39, wherein the method further comprises indicating results based upon such comparing.
41. A medium as recited in claim 39, wherein the second set is encrypted 25 and the method further comprises decrypting the second set. WO 2004/036802 PCT/US2003/027614 47
42. A medium as recited in claim 39, wherein the second set of person distinguishing data comprises a face compendium of that person's face. 5
43. A medium as recited in claim 39, wherein the second set of person distinguishing data comprises a face compendium derived from an image of that person's face.
44. A medium as recited in claim 39, wherein the first set of person 10 distinguishing data comprises information related to that person, which data is selected from a group consisting of one or more images of the person's face, the person's name, the person's social security number, the person's account number, the person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's 15 birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. WO 2004/036802 PCT/US2003/027614 48
45. A medium as recited in claim 39, wherein the second set of person distinguishing data comprises information related to that person, which data is selected from a group consisting of one or more images of the person's face, a retina scan of the person, an iris scan of the person, the person's name, the person's 5 social security number, the person's account number, the person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. 10
46. A medium as recited in claim 39, wherein the computer-readable representation is selected from a group consisting of one or more bar-codes, one or more magnetic strips, and one or more memory storage devices. 15
47. A medium as recited in claim 39, wherein: the first set of person-distinguishing data comprises a photograph of that same person, wherein the photograph comprises the face of that same person; the second set of person-distinguishing data comprises a face compendium of the face in the photograph. 20
48. A person ID authentication device comprising: an audio and/or visual output unit; a medium as recited in claim 39. WO 2004/036802 PCT/US2003/027614 49
49. A method for authenticating person identification documents (IDs), the method comprising: obtaining a first set of person-distinguishing data from a human-readable representation of a person identification document (ID); 5 obtaining a second set of person-distinguishing data from a computer readable representation of the same person ID; comparing the first and second sets of person-distinguishing data.
50. A method as recited in claim 49 further comprising indicating results 10 based upon such comparing.
51. A method as recited in claim 49, wherein the obtaining of the first set comprises optical scanning. 15
52. A method as recited in claim 49, wherein the obtaining of the second set comprises optical scanning.
53. A method as recited in claim 49, wherein the second set is encrypted, the method further comprising decrypting the second set. 20
54. A method as recited in claim 49, wherein the second set of person distinguishing data comprises a face compendium of that person's face. WO 2004/036802 PCT/US2003/027614 50
55. A method as recited in claim 49, wherein the second set of person distinguishing data comprises a face compendium derived from an image of that person's face. 5
56. A method as recited in claim 49, wherein the first set of person distinguishing data comprises information related to that person, which data is selected from a group consisting of one or more images of the person's face, the person's name, the person's social security number, the person's account number, the person's weight, the person's height, the person's hair color, the person's eye 10 color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. 15
57. A method as recited in claim 49, wherein the second set of person distinguishing data comprises information related to that person, which data is selected from a group consisting of one or more images of the person's face, a retina scan of the person, an iris scan of the person, the person's name, the person's social security number, the person's account number, the person's weight, the 20 person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. WO 2004/036802 PCT/US2003/027614 51
58. A method as recited in claim 49, wherein the computer-readable representation is selected from a group consisting of one or more bar-codes, one or more magnetic strips, and one or more memory storage devices. 5
59. A method as recited in claim 49, wherein: the first set of person-distinguishing data comprises a photograph of that same person, wherein the photograph comprises the face of that same person; the second set of person-distinguishing data comprises a face compendium of the face in the photograph. 10
60. A computer comprising one or more computer-readable media having computer-executable instructions that, when executed by the computer, perform the method as recited in claim 49. 15
61. A person identification document (ID) authorization system, comprising: an optical scanner configured to obtain a first set of person-distinguishing data from a human-readable representation of a person identification document (ID) and obtain a second set of person-distinguishing data from a computer-readable 20 representation of the same person ID; a comparison unit configured to compare the first and second sets of person distinguishing data; a reporting unit configured to indicate results based upon such comparison by the comparison unit. 25 WO 2004/036802 PCT/US2003/027614 52
62. A system as recited in claim 61, wherein the second set is encrypted, the system further comprising decrypter configured to decrypt the second set.
63. A system as recited in claim 61, wherein the second set of person 5 distinguishing data comprises a face compendium of that person's face.
64. A system as recited in claim 61, wherein the second set of person distinguishing data comprises a face compendium derived from an image of that person's face. 10
65. A system as recited in claim 61, wherein the first set of person distinguishing data comprises information related to that person, which data is selected from a group consisting of one or more images of the person's face, the person's name, the person's social security number, the person's account number, 15 the person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. 20 WO 2004/036802 PCT/US2003/027614 53
66. A system as recited in claim 61, wherein the second set of person distinguishing data comprises information related to that person, which data is selected from a group consisting of one or more images of the person's face, a retina scan of the person, an iris scan of the person, the person's name, the person's 5 social security number, the person's account number, the person's weight, the person's height, the person's hair color, the person's eye color, one or more of the person's fingerprints, information about the person's birthmarks, information about the person's tattoos, the person's personal human statistics, one or more distinguishing traits of that person, and the person's contact information. 10
67. A system as recited in claim 61, wherein the computer-readable representation is selected from a group consisting of one or more bar-codes, one or more magnetic strips, and one or more memory storage devices. 15
68. A system as recited in claim 61, wherein: the first set of person-distinguishing data comprises a photograph of that same person, wherein the photograph comprises the face of that same person; the second set of person-distinguishing data comprises a face compendium of the face in the photograph. 20
AU2003276864A 2002-10-16 2003-09-04 Cryptographically secure person identification Expired - Fee Related AU2003276864B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US27207302A 2002-10-16 2002-10-16
US10/272,073 2002-10-16
PCT/US2003/027614 WO2004036802A1 (en) 2002-10-16 2003-09-04 Cryptographically secure person identification

Publications (3)

Publication Number Publication Date
AU2003276864A1 true AU2003276864A1 (en) 2004-05-04
AU2003276864A2 AU2003276864A2 (en) 2004-05-04
AU2003276864B2 AU2003276864B2 (en) 2009-06-04

Family

ID=32106425

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2003276864A Expired - Fee Related AU2003276864B2 (en) 2002-10-16 2003-09-04 Cryptographically secure person identification

Country Status (11)

Country Link
EP (1) EP1552634A1 (en)
JP (1) JP2006503374A (en)
KR (1) KR20060074912A (en)
CN (1) CN1682478A (en)
AU (1) AU2003276864B2 (en)
BR (1) BR0314376A (en)
CA (1) CA2497737A1 (en)
MX (1) MXPA05002945A (en)
RU (1) RU2346395C2 (en)
TW (1) TW200408251A (en)
WO (1) WO2004036802A1 (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7758422B2 (en) * 2005-04-13 2010-07-20 Microsoft Corporation Hard drive authentication
EP2237519A1 (en) * 2009-03-31 2010-10-06 France Telecom Method and system for securely linking digital user's data to an NFC application running on a terminal
FR2945650B1 (en) * 2009-05-13 2011-05-06 Groupe Ecoles Telecomm METHOD FOR SECURING DOCUMENTS BY APPLYING A CLEAN IDENTIFICATION NUMBER AND APPARATUS FOR AUTHENTICATING SAID NUMBER.
TW201211900A (en) * 2010-09-14 2012-03-16 rui-jin Li Method of verifying trueness of object interactively by using colored 2D variable barcode and system thereof
CN102075547B (en) * 2011-02-18 2014-03-26 天地融科技股份有限公司 Dynamic password generating method and device and authentication method and system
WO2013100825A1 (en) * 2011-12-29 2013-07-04 Bilyukin Evgeniy Yakovlevich Cash register for a system of mobile payments
RU2536367C1 (en) * 2013-04-24 2014-12-20 Александр Геннадьевич Мочкин Method of determining authenticity of documents, monetary notes, valuable items
WO2014175780A1 (en) * 2013-04-24 2014-10-30 Mochkin Aleksandr Gennadyevich Method and device for determining the authenticity of documents
RU2542886C1 (en) * 2013-12-30 2015-02-27 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный электротехнический университет "ЛЭТИ" им. В.И. Ульянова (Ленина)" Method of forming barcode on facial images and apparatus therefor
DE102014002207A1 (en) * 2014-02-20 2015-08-20 Friedrich Kisters Method and device for identifying or authenticating a person and / or an object by dynamic acoustic security information
CN107077622B (en) * 2014-10-30 2020-04-14 惠普发展公司,有限责任合伙企业 Digital Signature Authentication
US10136310B2 (en) 2015-04-24 2018-11-20 Microsoft Technology Licensing, Llc Secure data transmission
EP3304431B1 (en) 2015-06-04 2021-09-08 Chronicled, Inc. Open registry for identity of things
US10210527B2 (en) 2015-06-04 2019-02-19 Chronicled, Inc. Open registry for identity of things including social record feature
KR20170073342A (en) 2015-12-18 2017-06-28 에스프린팅솔루션 주식회사 Image forming apparatus, and method for image processing thereof
US11107088B2 (en) 2016-05-27 2021-08-31 Chronicled, Inc. Open registry for internet of things
WO2018067974A1 (en) * 2016-10-07 2018-04-12 Chronicled, Inc. Open registry for human identification
WO2018235975A1 (en) * 2017-06-22 2018-12-27 조민환 Terminal device and its remote control method
EP3662635A4 (en) 2017-07-31 2021-04-28 Chronicled, Inc. A secure and confidential custodial transaction system, method and device using zero-knowledge protocol
TWI651626B (en) * 2017-11-30 2019-02-21 大陸商北京集創北方科技股份有限公司 Biometric data encryption method and information processing device using same
US20210351919A1 (en) * 2018-09-20 2021-11-11 Gmkw Technology Wuxi Co., Ltd. A system and method for binding information to a tangible object
JP7112320B2 (en) * 2018-11-27 2022-08-03 株式会社日立製作所 Verification device and verification method
WO2022097982A1 (en) * 2020-11-06 2022-05-12 주식회사 아이온커뮤니케이션즈 Method and server for providing face recognition-based digital signature service
IT202100030338A1 (en) * 2021-11-30 2023-05-30 Bluenet S R L VERIFY DOCUMENTS THROUGH COMPARISON OF IMAGES WITH VERIFICATION CODE

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2056262T3 (en) * 1989-04-06 1994-10-01 Nestle Sa A DNA PROBE FOR LACTOBACILLUS DELBRUECKII.
US5864622A (en) * 1992-11-20 1999-01-26 Pitney Bowes Inc. Secure identification card and method and apparatus for producing and authenticating same
US5384846A (en) * 1993-04-26 1995-01-24 Pitney Bowes Inc. System and apparatus for controlled production of a secure identification card
US5420924A (en) * 1993-04-26 1995-05-30 Pitney Bowes Inc. Secure identification card and method and apparatus for producing and authenticating same by comparison of a portion of an image to the whole
RU2161826C2 (en) * 1998-08-17 2001-01-10 Пензенский научно-исследовательский электротехнический институт Automatic person identification method
RU2184391C2 (en) * 1999-07-07 2002-06-27 Закрытое акционерное общество "Научно-производственная фирма "АПЕКС" Method for carrying out person identification based on hand parameters

Also Published As

Publication number Publication date
MXPA05002945A (en) 2005-05-27
EP1552634A1 (en) 2005-07-13
WO2004036802A1 (en) 2004-04-29
RU2346395C2 (en) 2009-02-10
JP2006503374A (en) 2006-01-26
KR20060074912A (en) 2006-07-03
RU2005105948A (en) 2005-09-20
CN1682478A (en) 2005-10-12
TW200408251A (en) 2004-05-16
AU2003276864B2 (en) 2009-06-04
BR0314376A (en) 2005-07-19
AU2003276864A2 (en) 2004-05-04
CA2497737A1 (en) 2004-04-29

Similar Documents

Publication Publication Date Title
AU2003276864B2 (en) Cryptographically secure person identification
US5426700A (en) Method and apparatus for verification of classes of documents
US9729326B2 (en) Document certification and authentication system
US6748533B1 (en) Method and apparatus for protecting the legitimacy of an article
US7656559B2 (en) System and method for generating a signed hardcopy document and authentication thereof
EP0730243B1 (en) Identification card verification system and method
US6567530B1 (en) Device and method for authenticating and certifying printed documents
US11431704B2 (en) Method of authentication, server and electronic identity device
EP0612040A2 (en) Method and apparatus for credit card verification
US20030012374A1 (en) Electronic signing of documents
CA2374196A1 (en) Legitimacy protection of electronic document and a printed copy thereof
JP2004127297A (en) Bar code having extended visibility, system and method thereof
JP2001126046A (en) IC card, IC card authentication system, and authentication method thereof
EP1280098A1 (en) Electronic signing of documents
Rashid Robust steganographic techniques for secure biometric-based remote authentication
KR20040076757A (en) System for discriminating forgery in ID Card and Method thereof
Kirovski et al. Tamper-resistant biometric IDs
Kirovski et al. Cryptographically secure identity certificates
CN110942407A (en) Electronic evidence collection device and management system
KR20070109130A (en) ID card and authentication system and method of ID card
JPH117506A (en) Electronic authentication card system
Wang et al. A novel digital content protection scheme combining iris identity based digital signature and semi-fragile watermark
Jancke Tamper-Resistant Biometric IDs
JP2003060879A (en) Electronic signature for document
JP2002032755A (en) Identity authentication system, identity authentication device, and identity authentication method

Legal Events

Date Code Title Description
MK25 Application lapsed reg. 22.2i(2) - failure to pay acceptance fee