CN102089766A - Method and apparatus for improving biometric identification systems - Google Patents
Method and apparatus for improving biometric identification systems Download PDFInfo
- Publication number
- CN102089766A CN102089766A CN2009801265581A CN200980126558A CN102089766A CN 102089766 A CN102089766 A CN 102089766A CN 2009801265581 A CN2009801265581 A CN 2009801265581A CN 200980126558 A CN200980126558 A CN 200980126558A CN 102089766 A CN102089766 A CN 102089766A
- Authority
- CN
- China
- Prior art keywords
- task
- biometric data
- identification
- recognition
- individual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention relates to a method and a device for identifying a person, wherein biometric data are acquired for the person to be identified, wherein the person to be identified must carry out an identification action, the biometric data for identification being determined on the basis of the identification action, wherein at least one step is carried out from a set of checking steps, which step comprises a random selection of the identification action and a resolution of additional problems, and wherein the problems are problems which are adapted to the capabilities of the person and which cannot be resolved by an automation system or can only be resolved by the automation system with a time requirement which exceeds the specific time requirement required by a general person.
Description
Technical field
The present invention relates to a kind of method and apparatus that is used to discern the individual, in the described method and apparatus, obtain individual's to be identified biological characteristic (biometric) data, individual wherein to be identified must carry out identification maneuver, the biological attribute data that is identified for discerning based on described identification maneuver.
Background technology
Such as during maybe when the data handling system of login such as personal computer, using biometric solution to discern the individual more and more to the access control of safety zone.Its reason is, as identification and the method for access control and widely used cryptographic methods has various potential safety hazards, and because the user should often change password owing to security reason, but may meet with the problem of remembering password, so for user's inconvenience.This just means the user or relies on constant and unsafe password, or meet with difficulty between the visit recognition phase.
At this moment, living creature characteristic recognition system has safer advantage, because the visit biological attribute data, promptly to duplicate the chance of described data more much more difficult than situation about accessing to your password, and if not rightly to described cryptosecurity, then described password is easy to be used.In addition, living creature characteristic recognition system is more convenient for the user, and described user automatically and easily carries biological characteristic, therefore needn't remember password.
Yet, even living creature characteristic recognition system also has some potential safety hazards, because can expect, for example spyware etc. can obtain biological characteristic visit data record, and with the part of described biological characteristic visit data record as Replay Attack (replay attack).
Summary of the invention
Therefore, the purpose of this invention is to provide a kind of method and corresponding equipment that is used for discerning the individual based on the biometric solution of the security that can improve identification or access control.
And corresponding method and corresponding equipment also should be configured to be easy to use, so that keep biometric solution high convenience advantage for the user.
The method of the feature by having claim 1 and the equipment with feature of claim 12 are realized described purpose.Preferred embodiment is the content of dependent claims.
The present invention comes from such understanding, that is: can prevent that effectively once used data recording or signal record are used to unauthorized access or are used for duplicity ground checking individual (Replay Attack) by such biometric solution, described biometric solution based at least two, preferably based on a plurality of identification maneuvers, thereby select, select especially randomly one of two or more identification maneuvers for corresponding access control.For example, the described identification maneuver that is used for biometric solution can comprise from catching data such as the human body of fingerprint or eye.Because the people has two eyes usually, therefore can not use left eye or right eye by outlook.For fingerprint recognition, can use ten different fingers.Because it is identical that human body usually can 100%, so also can discern actual employed body part.If recognition system is designed to make system's regulation identification maneuver, and from a plurality of, promptly select identification maneuver at least two identification maneuvers, there is certain probability so, feasible use is caught before this without approval preserves the use of the identification maneuver that data lead to errors with any trial of evading identification, thereby can find fraudulent trial.Like this, can think more assuredly that what be identified is the true living person that in fact just carrying out living things feature recognition (identification of living), rather than be transmitted the data recording of having preserved with the deception machine.Have only when the deception of trial property can obtain all possible identification maneuver as data recording, just can defeat this security function.
Corresponding security feature itself can be used for for example biometric solution of thump identification easily, and individual's to be identified typewriting mode is analyzed in described thump identification from the action of keyboard or keypad etc.In this case, the system that is used to discern the individual of the present invention can specify particular text or the particular key sequence that will key on keyboard, like this, if supress correct key or correct key sequence, whether then described system attempts making current identification maneuver for current visit by simple more just can identifying, and perhaps whether is used in the identification maneuver that is write down before this and makes trial to realize undelegated visit or pseudo-identity of faking.
In addition or alternately, also can be that the attachment of a task that personal set to be identified will solve improves this corresponding living creature characteristic recognition system by the recognition system of correspondence, wherein, described task is adjusted into the ability that is fit to the people, be that comparable machine of people or data processing equipment solve described task quickly, or in fact can only solve described task by the people.
The problem that the example of this attachment of a task can comprise structure in the recognition image, reappear the structure that identified and/or answer and structurally associated to be identified.
For example, in such as display device such as displays, system can show the image of the sequence that comprises numeral and/or letter, wherein, can arrange described numeral and/or letter with any direction.In such configuration, the automated system that is used for recognition structure is difficult to discern corresponding numeral and alphabetical, and the people then can easily identify the sequence of described numeral and/or letter.
This is equally applicable to show object, therefore can require to say the name of described object by the attachment of a task.If image comprises the structure that contrasts with background, described background can hinder recognition structure, be difficult to identification more even get automatic recognition system, so so the people is become more obvious in the judgement that solves the attachment of a task, thereby is actually the people but not machine becomes more obvious at the evidence of discerning with the data of being preserved.For example, when with shown in the background that contrasts of structure just belong to this situation when having the surface that has a plurality of analogous shapes of color etc. for example and/or lines, the surface of described background and/or lines are similar to the surface and/or the lines of described structure.This situation causes great difficulty to the automatic recognition system of correspondence, even described system can solve this task, also still needs the very long time to go to solve.
Therefore, as another modification, begin or finish the solution of the attachment of a task in can requiring to require at special time based on common people.If exceed this time requirement, then because may not be that human user is attempting identification, and may be based on the trial of the unauthorized identification of automatic identification, so system identification goes out this fact and cancels identification with negative decision.
Particularly, in the situation of the living things feature recognition by the typewriting mode, can be attached in the actual identification by the thump input and with additional security feature.So, the selection of the particular text to be imported that only can easily be discerned by the people and the demonstration of image can be linked, the result is this attachment of a task that has comprised recognition structure.Simultaneously, also can and angle of incidence composition (time component), described time composition promptly begins typing character string or user to the user and finishes the typing character string and occur in affirmation in period of regulation, thereby in the biometric solution of thump identification, can easily realize all additional security feature of the present invention, i.e. specific identification maneuver (importing specific text or typewriting sequence), the solution attachment of a task (from the unreadable image of machine, reading text or typewriting sequence) and the time control of regulation from several identification maneuvers.
Description of drawings
With reference to the pure accompanying drawing of expression in schematic form,, make further advantage of the present invention, feature and characteristics become obvious by following detailed description to embodiment:
Fig. 1 is configured to realize the present invention and as the figure of the data handling system of corresponding invention equipment;
Fig. 2 is the diagram of the structure of the image that uses among the present invention, and
Fig. 3 is the diagram of another structure of the image that uses among the present invention.
Embodiment
The present invention can be used in a lot of living creature characteristic recognition systems, in the described living creature characteristic recognition system, catches the biological attribute data that is used for discerning according to several identification maneuvers the individual.Correspondingly, can use such biometric solution, described biometric solution is based on to the identification such as the body part of eye or fingerprint, perhaps, in described biometric solution, can be by means of individual to be identified to the input of equipment and catch biological attribute data.For example, this can be speech recognition, and wherein the user must say specific or sentence arbitrarily, thereby can determine frequency, frequency sequence etc. from the sound that obtains and phoneme (phonemes), so can determine user's identity.Another selection is the typewriting mode of catching the user during keyboard action.For example, this can by the user to keyboard input arbitrarily or specific text or access code etc. realize.Here, unusual this term of interpreted in its broadest sense, ie " keyboard ", described keyboard can be the QWERTY keyboard of personal computer, or is used for the simplification numeric keypad of access control, or is used to import the button of the key sequence with Morse code character.Similarly, can also be with the key of the corresponding keyboard of different ways structure.Lip-deep keypad that but described key can be traditional pressing key of computer keyboard, can respond pressure such as display etc. etc.
Fig. 1 illustrates standard personal computer PC1, and it has as the display 2 of output unit with as the conventional keyboard 3 of input media.Such PC system can be configured to according to identification equipment of the present invention, thereby the method according to identification individual of the present invention can take place in described PC system.
Following embodiment is based on the thump identification of the biometric solution described in various documents.For example, with reference to WO 98/06020A2 communique, can use the present invention in this communique.Yet, the invention is not restricted to discern the biological attribute data of catching by thump, also be not limited to embodiment in the thump identification described in the above-mentioned PCT application.
When system start-up, the prompting user imports specific on keyboard 3 or text arbitrarily, thereby can the user of PC1 be discerned.
In the storer that is stored in personal computer that is not described in further detail is to be used for user's recognition data handling procedure, and described data processor correspondingly moves and controls identification and handles.Particularly, data processor forms acquisition equipment, value or electric signal that described acquisition equipment is caught that action by keyboard 3 triggers and measured by sensor, and assess described value or electric signal, thereby produce information about the typewriting mode, corresponding assessment unit is compared described information with the individual's to be identified who is preserved biological attribute data, thereby when having corresponding coupling, can determine user's identity, described assessment unit also is that major part realizes by data processor.
The PC1 that has disposed corresponding software also can realize the module that is used for determining the authenticity of biological attribute data according to of the present invention, so that get rid of the possibility of using the biological attribute data of forging, for example be hunted down between the former recognition phase of the biological attribute data of described forgery and preserve, and want automatically to be used system with the form of being preserved with visit PC current by spyware etc.
The module that is used for the authenticity of definite biological attribute data uses random generator to select specific text at random from a plurality of different possibilities, to determine the typewriting mode.Different with system of the prior art, the user therefore can no longer always import identical text or even freely select which text of input, but must use text at least in part by the random generator defined, described text is used for determining typewriting mode feature.In this way, because that is preserved is very low with the possibility that the input of regulation is complementary by accident about the data of the action of key, so got rid of the possibility that the data recording of during identification or access control any moment being preserved is imported as the keyboard of supposition.
In addition or alternately, the module that is used for the authenticity of definite biological attribute data is provided with the task generator, described task generator is individual to be identified or for the user who attempts to visit PC system 1 produces the attachment of a task, described task preferably can solve in the common usual period for human.This task design is for making machine or automated system can not solve at all, or in fact needs the more time to solve.
For these tasks, can use so-called CAPTCHA (the open turing test of full automation is to distinguish computing machine and people).For example, this test comprises the sequence of identification letter and/or numeral, wherein, particularly with make machine or computing machine be very difficult to carry out the background of automatic mode identification to contrast, can arrange described letter and/or numeral with any direction.
Equally, the structure such as simple object can also such mode be set, described mode makes automatic recognition system be difficult to discern corresponding object.This point for example can be achieved like this, constitute object by a plurality of surface regions with same color or different colours, wherein also constitute background by the surface region of analogous shape or similar color, make skilled human eye can promptly discern described object, even and automatic recognition system can be carried out pattern-recognition, also must carry out tediously long pattern match and handle.
Fig. 2 and Fig. 3 illustrate such example, and Fig. 2 illustrates the image with alphanumeric sequence AB 12 that the background with more lines etc. contrasts, wherein the orientation difference of letter and number.Can be on display 2 alphanumeric sequence of display image 4, and the user must use keyboard 3 that the letter or number sequence of correspondence is inputed in the input mask (input mask) 5.
Fig. 3 illustrates another modification of the task of the ability that is fit to the people, wherein, must identify with a plurality of similar backgrounds of surperficial 7 form contrast such as simple structures such as desks 6.During the access control in the PC of Fig. 1 system, the image 4 of displayed map 3 on display 2, the attachment of a task can be for proposing about can identify the problem of what object in image 4, and user to be identified then or individual must import word " desk " by keyboard in square frame 5.
In this way, not only at first by the text of being selected at random by system and the stipulate basic identification of mode of typewriting, and the action of having got rid of the keyboard 3 that will be write down is used for the possibility of access control.Whether subsequently, can use the attachment of a task further to determine in fact to take in PC1 and keyboard 3 fronts, the described attachment of a task need be discerned the alphanumeric sequence of the Fig. 2 in the image 4 for example or the object of Fig. 3.If the people can solve the attachment of a task that recognition system sets for the user, the then described attachment of a task only can be solved in the given time by the people, the described time is based on the needed time requirement of general user, and the described time is significantly shorter than automated system such as image identification system and is used to solve the time that the required by task that sets is wanted.
At first, the time composition can be arranged so that correct input, i.e. solution to the task of other proposition must occur in certain period.In addition or alternately, also can described time composition be set to begin at least input to for example password.
Though use appended examples that the present invention has been described in detail in detail; but it will be appreciated by those skilled in the art that; the invention is not restricted to described embodiment; but under the situation of the protection domain of appended claim; the present invention also comprises modifications and variations, particularly comprises the omission of the individual characteristics that is proposed or other combinations of the feature that proposed.Particularly, the present invention includes all combinations of the feature of all propositions.
Claims (16)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE200810040258 DE102008040258A1 (en) | 2008-07-08 | 2008-07-08 | Method and device for improving biometric identification systems |
DE102008040258.3 | 2008-07-08 | ||
PCT/EP2009/058210 WO2010003849A1 (en) | 2008-07-08 | 2009-06-30 | Method and apparatus for improving biometric identification systems |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102089766A true CN102089766A (en) | 2011-06-08 |
Family
ID=41165610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009801265581A Pending CN102089766A (en) | 2008-07-08 | 2009-06-30 | Method and apparatus for improving biometric identification systems |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP2300955A1 (en) |
JP (1) | JP2011527475A (en) |
CN (1) | CN102089766A (en) |
DE (1) | DE102008040258A1 (en) |
EA (1) | EA201071382A1 (en) |
WO (1) | WO2010003849A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103748593A (en) * | 2011-08-17 | 2014-04-23 | 高通股份有限公司 | Method and apparatus using CAPTCHA having visual information related to the CAPTACHA's source |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102011120779B4 (en) | 2011-12-09 | 2022-02-17 | Volkswagen Aktiengesellschaft | Method, control means and system for manually switching on a high-voltage voltage for a vehicle |
EP3159820B1 (en) * | 2014-06-19 | 2025-01-22 | Nec Corporation | Authentication device, authentication system, authentication method, and program storage medium |
US10199564B2 (en) * | 2015-02-04 | 2019-02-05 | Sumitomo Chemical Company, Limited | Method for manufacturing niobate-system ferroelectric thin-film device |
JP7034808B2 (en) * | 2018-04-03 | 2022-03-14 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | Information processing method, information processing device and information processing system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1199623A2 (en) * | 2000-10-17 | 2002-04-24 | Siemens Aktiengesellschaft | Method and system for user identification |
US20070143624A1 (en) * | 2005-12-15 | 2007-06-21 | Microsoft Corporation | Client-side captcha ceremony for user verification |
WO2007139644A2 (en) * | 2006-05-24 | 2007-12-06 | Vidoop, L.L.C. | Graphical image authentication and security system |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19631484C1 (en) | 1996-08-03 | 1998-03-05 | Dieter Bartmann | Method for verifying the identity of a user of a data processing system to be operated with a keyboard for generating alphanumeric characters |
WO1999042992A1 (en) * | 1998-02-24 | 1999-08-26 | Holoubek Michael J | Randomly generated voice recognition method and apparatus |
US7149899B2 (en) * | 2002-04-25 | 2006-12-12 | Intertrust Technologies Corp. | Establishing a secure channel with a human user |
US20090153292A1 (en) * | 2005-11-23 | 2009-06-18 | Daniel Farb | Business and software security and storage methods, devices and applications |
US7864987B2 (en) * | 2006-04-18 | 2011-01-04 | Infosys Technologies Ltd. | Methods and systems for secured access to devices and systems |
US7552467B2 (en) * | 2006-04-24 | 2009-06-23 | Jeffrey Dean Lindsay | Security systems for protecting an asset |
-
2008
- 2008-07-08 DE DE200810040258 patent/DE102008040258A1/en not_active Withdrawn
-
2009
- 2009-06-30 EA EA201071382A patent/EA201071382A1/en unknown
- 2009-06-30 CN CN2009801265581A patent/CN102089766A/en active Pending
- 2009-06-30 JP JP2011517089A patent/JP2011527475A/en not_active Withdrawn
- 2009-06-30 WO PCT/EP2009/058210 patent/WO2010003849A1/en active Application Filing
- 2009-06-30 EP EP09780040A patent/EP2300955A1/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1199623A2 (en) * | 2000-10-17 | 2002-04-24 | Siemens Aktiengesellschaft | Method and system for user identification |
US20070143624A1 (en) * | 2005-12-15 | 2007-06-21 | Microsoft Corporation | Client-side captcha ceremony for user verification |
WO2007139644A2 (en) * | 2006-05-24 | 2007-12-06 | Vidoop, L.L.C. | Graphical image authentication and security system |
Non-Patent Citations (1)
Title |
---|
TAEKYOUNG KWON: "Knowledge-Based User Authentication Associated with Biometrics", 《UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION.COPING WITH DIVERSITY [LECTURE NOTES IN COMPUTER SCIENCE]》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103748593A (en) * | 2011-08-17 | 2014-04-23 | 高通股份有限公司 | Method and apparatus using CAPTCHA having visual information related to the CAPTACHA's source |
CN103748593B (en) * | 2011-08-17 | 2017-05-31 | 高通股份有限公司 | Method and device for using CAPTCHA verification code |
Also Published As
Publication number | Publication date |
---|---|
EP2300955A1 (en) | 2011-03-30 |
WO2010003849A1 (en) | 2010-01-14 |
DE102008040258A1 (en) | 2010-01-14 |
EA201071382A1 (en) | 2011-08-30 |
JP2011527475A (en) | 2011-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kindt | Privacy and data protection issues of biometric applications | |
CN104598796B (en) | Personal identification method and system | |
US9396319B2 (en) | Method of criminal profiling and person identification using cognitive/behavioral biometric fingerprint analysis | |
US20120005735A1 (en) | System for Three Level Authentication of a User | |
JP2007522551A (en) | Multi-select challenge-response user authentication system and method | |
CN103678977A (en) | Method for protecting information security and electronic device thereof | |
Moallem | Human-Computer Interaction and cybersecurity handbook | |
CN102089766A (en) | Method and apparatus for improving biometric identification systems | |
Sharma et al. | Behavioral Biometrics: Past, Present | |
Hassan et al. | Towards secure identification: A comparative analysis of biometric authentication techniques | |
Goicoechea-Telleria et al. | Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone? | |
CN113378134A (en) | Identity authentication method and device | |
Bella et al. | An investigation into the “beautification” of security ceremonies | |
Zabidi et al. | A usability evaluation of image and emojis in graphical password | |
Piccolotto et al. | BIOMETRICS FROM THE USER POINT OF VIEW: DERIVING DESIGN PRINCIPLES FROM USER PERCEPTIONS AND CONCERNS ABOUT BIOMETRIC SYSTEMS. | |
Giarimi et al. | Investigation of user acceptance for biometric verification/identification methods in mobile units | |
Barde | A multimodal biometric system-aadhar card | |
Tangawar et al. | Survey paper on graphical password authentication system in terms of usability and security attribute | |
Alharbi et al. | Biometric Authentication Systems Towards Secure and Privacy Identification: A Review | |
US20110304429A1 (en) | Method and apparatus for improving biometric identification systems | |
Chong | Usable authentication for mobile banking | |
Vorobyeva et al. | Benefits and issues of biometric technologies. Are biometrics worth using? | |
Petrie et al. | Towards Recommendations for the Universal Design of Online Authentication Systems | |
Kindt | The Processing of Biometric Data. A comparative legal analysis with a focus on the proportionality principle and recommendations for a legal framework. | |
Sungkur et al. | An enhanced mechanism for the authentication of students taking online exams |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110608 |