[go: up one dir, main page]

CN102089766A - Method and apparatus for improving biometric identification systems - Google Patents

Method and apparatus for improving biometric identification systems Download PDF

Info

Publication number
CN102089766A
CN102089766A CN2009801265581A CN200980126558A CN102089766A CN 102089766 A CN102089766 A CN 102089766A CN 2009801265581 A CN2009801265581 A CN 2009801265581A CN 200980126558 A CN200980126558 A CN 200980126558A CN 102089766 A CN102089766 A CN 102089766A
Authority
CN
China
Prior art keywords
task
biometric data
identification
recognition
individual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009801265581A
Other languages
Chinese (zh)
Inventor
托马斯·沃尔夫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PSYLOCK GmbH
Original Assignee
PSYLOCK GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PSYLOCK GmbH filed Critical PSYLOCK GmbH
Publication of CN102089766A publication Critical patent/CN102089766A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention relates to a method and a device for identifying a person, wherein biometric data are acquired for the person to be identified, wherein the person to be identified must carry out an identification action, the biometric data for identification being determined on the basis of the identification action, wherein at least one step is carried out from a set of checking steps, which step comprises a random selection of the identification action and a resolution of additional problems, and wherein the problems are problems which are adapted to the capabilities of the person and which cannot be resolved by an automation system or can only be resolved by the automation system with a time requirement which exceeds the specific time requirement required by a general person.

Description

Be used to improve the method and apparatus of living creature characteristic recognition system
Technical field
The present invention relates to a kind of method and apparatus that is used to discern the individual, in the described method and apparatus, obtain individual's to be identified biological characteristic (biometric) data, individual wherein to be identified must carry out identification maneuver, the biological attribute data that is identified for discerning based on described identification maneuver.
Background technology
Such as during maybe when the data handling system of login such as personal computer, using biometric solution to discern the individual more and more to the access control of safety zone.Its reason is, as identification and the method for access control and widely used cryptographic methods has various potential safety hazards, and because the user should often change password owing to security reason, but may meet with the problem of remembering password, so for user's inconvenience.This just means the user or relies on constant and unsafe password, or meet with difficulty between the visit recognition phase.
At this moment, living creature characteristic recognition system has safer advantage, because the visit biological attribute data, promptly to duplicate the chance of described data more much more difficult than situation about accessing to your password, and if not rightly to described cryptosecurity, then described password is easy to be used.In addition, living creature characteristic recognition system is more convenient for the user, and described user automatically and easily carries biological characteristic, therefore needn't remember password.
Yet, even living creature characteristic recognition system also has some potential safety hazards, because can expect, for example spyware etc. can obtain biological characteristic visit data record, and with the part of described biological characteristic visit data record as Replay Attack (replay attack).
Summary of the invention
Therefore, the purpose of this invention is to provide a kind of method and corresponding equipment that is used for discerning the individual based on the biometric solution of the security that can improve identification or access control.
And corresponding method and corresponding equipment also should be configured to be easy to use, so that keep biometric solution high convenience advantage for the user.
The method of the feature by having claim 1 and the equipment with feature of claim 12 are realized described purpose.Preferred embodiment is the content of dependent claims.
The present invention comes from such understanding, that is: can prevent that effectively once used data recording or signal record are used to unauthorized access or are used for duplicity ground checking individual (Replay Attack) by such biometric solution, described biometric solution based at least two, preferably based on a plurality of identification maneuvers, thereby select, select especially randomly one of two or more identification maneuvers for corresponding access control.For example, the described identification maneuver that is used for biometric solution can comprise from catching data such as the human body of fingerprint or eye.Because the people has two eyes usually, therefore can not use left eye or right eye by outlook.For fingerprint recognition, can use ten different fingers.Because it is identical that human body usually can 100%, so also can discern actual employed body part.If recognition system is designed to make system's regulation identification maneuver, and from a plurality of, promptly select identification maneuver at least two identification maneuvers, there is certain probability so, feasible use is caught before this without approval preserves the use of the identification maneuver that data lead to errors with any trial of evading identification, thereby can find fraudulent trial.Like this, can think more assuredly that what be identified is the true living person that in fact just carrying out living things feature recognition (identification of living), rather than be transmitted the data recording of having preserved with the deception machine.Have only when the deception of trial property can obtain all possible identification maneuver as data recording, just can defeat this security function.
Corresponding security feature itself can be used for for example biometric solution of thump identification easily, and individual's to be identified typewriting mode is analyzed in described thump identification from the action of keyboard or keypad etc.In this case, the system that is used to discern the individual of the present invention can specify particular text or the particular key sequence that will key on keyboard, like this, if supress correct key or correct key sequence, whether then described system attempts making current identification maneuver for current visit by simple more just can identifying, and perhaps whether is used in the identification maneuver that is write down before this and makes trial to realize undelegated visit or pseudo-identity of faking.
In addition or alternately, also can be that the attachment of a task that personal set to be identified will solve improves this corresponding living creature characteristic recognition system by the recognition system of correspondence, wherein, described task is adjusted into the ability that is fit to the people, be that comparable machine of people or data processing equipment solve described task quickly, or in fact can only solve described task by the people.
The problem that the example of this attachment of a task can comprise structure in the recognition image, reappear the structure that identified and/or answer and structurally associated to be identified.
For example, in such as display device such as displays, system can show the image of the sequence that comprises numeral and/or letter, wherein, can arrange described numeral and/or letter with any direction.In such configuration, the automated system that is used for recognition structure is difficult to discern corresponding numeral and alphabetical, and the people then can easily identify the sequence of described numeral and/or letter.
This is equally applicable to show object, therefore can require to say the name of described object by the attachment of a task.If image comprises the structure that contrasts with background, described background can hinder recognition structure, be difficult to identification more even get automatic recognition system, so so the people is become more obvious in the judgement that solves the attachment of a task, thereby is actually the people but not machine becomes more obvious at the evidence of discerning with the data of being preserved.For example, when with shown in the background that contrasts of structure just belong to this situation when having the surface that has a plurality of analogous shapes of color etc. for example and/or lines, the surface of described background and/or lines are similar to the surface and/or the lines of described structure.This situation causes great difficulty to the automatic recognition system of correspondence, even described system can solve this task, also still needs the very long time to go to solve.
Therefore, as another modification, begin or finish the solution of the attachment of a task in can requiring to require at special time based on common people.If exceed this time requirement, then because may not be that human user is attempting identification, and may be based on the trial of the unauthorized identification of automatic identification, so system identification goes out this fact and cancels identification with negative decision.
Particularly, in the situation of the living things feature recognition by the typewriting mode, can be attached in the actual identification by the thump input and with additional security feature.So, the selection of the particular text to be imported that only can easily be discerned by the people and the demonstration of image can be linked, the result is this attachment of a task that has comprised recognition structure.Simultaneously, also can and angle of incidence composition (time component), described time composition promptly begins typing character string or user to the user and finishes the typing character string and occur in affirmation in period of regulation, thereby in the biometric solution of thump identification, can easily realize all additional security feature of the present invention, i.e. specific identification maneuver (importing specific text or typewriting sequence), the solution attachment of a task (from the unreadable image of machine, reading text or typewriting sequence) and the time control of regulation from several identification maneuvers.
Description of drawings
With reference to the pure accompanying drawing of expression in schematic form,, make further advantage of the present invention, feature and characteristics become obvious by following detailed description to embodiment:
Fig. 1 is configured to realize the present invention and as the figure of the data handling system of corresponding invention equipment;
Fig. 2 is the diagram of the structure of the image that uses among the present invention, and
Fig. 3 is the diagram of another structure of the image that uses among the present invention.
Embodiment
The present invention can be used in a lot of living creature characteristic recognition systems, in the described living creature characteristic recognition system, catches the biological attribute data that is used for discerning according to several identification maneuvers the individual.Correspondingly, can use such biometric solution, described biometric solution is based on to the identification such as the body part of eye or fingerprint, perhaps, in described biometric solution, can be by means of individual to be identified to the input of equipment and catch biological attribute data.For example, this can be speech recognition, and wherein the user must say specific or sentence arbitrarily, thereby can determine frequency, frequency sequence etc. from the sound that obtains and phoneme (phonemes), so can determine user's identity.Another selection is the typewriting mode of catching the user during keyboard action.For example, this can by the user to keyboard input arbitrarily or specific text or access code etc. realize.Here, unusual this term of interpreted in its broadest sense, ie " keyboard ", described keyboard can be the QWERTY keyboard of personal computer, or is used for the simplification numeric keypad of access control, or is used to import the button of the key sequence with Morse code character.Similarly, can also be with the key of the corresponding keyboard of different ways structure.Lip-deep keypad that but described key can be traditional pressing key of computer keyboard, can respond pressure such as display etc. etc.
Fig. 1 illustrates standard personal computer PC1, and it has as the display 2 of output unit with as the conventional keyboard 3 of input media.Such PC system can be configured to according to identification equipment of the present invention, thereby the method according to identification individual of the present invention can take place in described PC system.
Following embodiment is based on the thump identification of the biometric solution described in various documents.For example, with reference to WO 98/06020A2 communique, can use the present invention in this communique.Yet, the invention is not restricted to discern the biological attribute data of catching by thump, also be not limited to embodiment in the thump identification described in the above-mentioned PCT application.
When system start-up, the prompting user imports specific on keyboard 3 or text arbitrarily, thereby can the user of PC1 be discerned.
In the storer that is stored in personal computer that is not described in further detail is to be used for user's recognition data handling procedure, and described data processor correspondingly moves and controls identification and handles.Particularly, data processor forms acquisition equipment, value or electric signal that described acquisition equipment is caught that action by keyboard 3 triggers and measured by sensor, and assess described value or electric signal, thereby produce information about the typewriting mode, corresponding assessment unit is compared described information with the individual's to be identified who is preserved biological attribute data, thereby when having corresponding coupling, can determine user's identity, described assessment unit also is that major part realizes by data processor.
The PC1 that has disposed corresponding software also can realize the module that is used for determining the authenticity of biological attribute data according to of the present invention, so that get rid of the possibility of using the biological attribute data of forging, for example be hunted down between the former recognition phase of the biological attribute data of described forgery and preserve, and want automatically to be used system with the form of being preserved with visit PC current by spyware etc.
The module that is used for the authenticity of definite biological attribute data uses random generator to select specific text at random from a plurality of different possibilities, to determine the typewriting mode.Different with system of the prior art, the user therefore can no longer always import identical text or even freely select which text of input, but must use text at least in part by the random generator defined, described text is used for determining typewriting mode feature.In this way, because that is preserved is very low with the possibility that the input of regulation is complementary by accident about the data of the action of key, so got rid of the possibility that the data recording of during identification or access control any moment being preserved is imported as the keyboard of supposition.
In addition or alternately, the module that is used for the authenticity of definite biological attribute data is provided with the task generator, described task generator is individual to be identified or for the user who attempts to visit PC system 1 produces the attachment of a task, described task preferably can solve in the common usual period for human.This task design is for making machine or automated system can not solve at all, or in fact needs the more time to solve.
For these tasks, can use so-called CAPTCHA (the open turing test of full automation is to distinguish computing machine and people).For example, this test comprises the sequence of identification letter and/or numeral, wherein, particularly with make machine or computing machine be very difficult to carry out the background of automatic mode identification to contrast, can arrange described letter and/or numeral with any direction.
Equally, the structure such as simple object can also such mode be set, described mode makes automatic recognition system be difficult to discern corresponding object.This point for example can be achieved like this, constitute object by a plurality of surface regions with same color or different colours, wherein also constitute background by the surface region of analogous shape or similar color, make skilled human eye can promptly discern described object, even and automatic recognition system can be carried out pattern-recognition, also must carry out tediously long pattern match and handle.
Fig. 2 and Fig. 3 illustrate such example, and Fig. 2 illustrates the image with alphanumeric sequence AB 12 that the background with more lines etc. contrasts, wherein the orientation difference of letter and number.Can be on display 2 alphanumeric sequence of display image 4, and the user must use keyboard 3 that the letter or number sequence of correspondence is inputed in the input mask (input mask) 5.
Fig. 3 illustrates another modification of the task of the ability that is fit to the people, wherein, must identify with a plurality of similar backgrounds of surperficial 7 form contrast such as simple structures such as desks 6.During the access control in the PC of Fig. 1 system, the image 4 of displayed map 3 on display 2, the attachment of a task can be for proposing about can identify the problem of what object in image 4, and user to be identified then or individual must import word " desk " by keyboard in square frame 5.
In this way, not only at first by the text of being selected at random by system and the stipulate basic identification of mode of typewriting, and the action of having got rid of the keyboard 3 that will be write down is used for the possibility of access control.Whether subsequently, can use the attachment of a task further to determine in fact to take in PC1 and keyboard 3 fronts, the described attachment of a task need be discerned the alphanumeric sequence of the Fig. 2 in the image 4 for example or the object of Fig. 3.If the people can solve the attachment of a task that recognition system sets for the user, the then described attachment of a task only can be solved in the given time by the people, the described time is based on the needed time requirement of general user, and the described time is significantly shorter than automated system such as image identification system and is used to solve the time that the required by task that sets is wanted.
At first, the time composition can be arranged so that correct input, i.e. solution to the task of other proposition must occur in certain period.In addition or alternately, also can described time composition be set to begin at least input to for example password.
Though use appended examples that the present invention has been described in detail in detail; but it will be appreciated by those skilled in the art that; the invention is not restricted to described embodiment; but under the situation of the protection domain of appended claim; the present invention also comprises modifications and variations, particularly comprises the omission of the individual characteristics that is proposed or other combinations of the feature that proposed.Particularly, the present invention includes all combinations of the feature of all propositions.

Claims (16)

1.一种用于识别个人的方法,该方法中,为待识别的所述个人获取生物特征数据,这里,待识别的所述个人必须进行识别动作,基于所述识别动作而确定用于识别的所述生物特征数据,1. A method for identifying an individual, in which method biometric data is obtained for said individual to be identified, where said individual to be identified must perform an identification action, based on which identification is determined to be used for identification of said biometric data, 其特征在于,执行一组检查步骤中的至少一个步骤,该步骤包括随机选择所述识别动作和对附加任务的解决,并且其中所述任务是适合于人的能力且无法由自动化系统解决、或只能由自动化系统以超出一般人所需要的特定时间要求的时间要求方可解决的任务。characterized in that at least one of a set of checking steps is carried out comprising a random selection of said recognition action and the solution of an additional task, and wherein said task is adapted to human capabilities and cannot be solved by an automated system, or A task that can only be solved by an automated system with time requirements that exceed the specific time requirements required by an average human being. 2.如权利要求1所述的方法,其特征在于,必须在少于一定时间要求的时段内开始或完成对所述任务的所述解决。2. The method of claim 1, wherein said solving of said task must be started or completed within a period of less than a certain time requirement. 3.如前述权利要求的任一项所述的方法,其特征在于,所述识别动作选自于在键盘上打字、语音重现和捕获人体部位。3. The method according to any one of the preceding claims, wherein the recognition action is selected from typing on a keyboard, speech reproduction and capturing body parts. 4.如前述权利要求的任一项所述的方法,其特征在于,所述生物特征数据包括打字方式、声音或语音识别、指纹识别和/或眼识别。4. A method according to any one of the preceding claims, wherein the biometric data includes typing, voice or voice recognition, fingerprint recognition and/or eye recognition. 5.如前述权利要求的任一项所述的方法,其特征在于,所述附加任务包括对图像中的结构的识别和对所识别出的结构的重现和/或回答与待识别的结构有关的问题。5. The method according to any one of the preceding claims, characterized in that said additional tasks comprise the recognition of structures in the image and the reproduction and/or answering of the recognized structures in relation to the structures to be recognized related questions. 6.如权利要求5所述的方法,其特征在于,所述图像作为结构包括数字和/或字母的序列,其中的所述数字和/或字母可以以任何方向排列。6. The method according to claim 5, wherein the image comprises a sequence of numbers and/or letters as a structure, wherein the numbers and/or letters can be arranged in any direction. 7.如权利要求5或6所述的方法,其特征在于,所述图像作为结构至少包括对物体的画面表示,且对所述结构的所述重现包括说出所述物体的名字。7. A method as claimed in claim 5 or 6, wherein said image as a structure comprises at least a pictorial representation of an object, and said reproduction of said structure comprises speaking the name of said object. 8.如权利要求5至7的任一项所述的方法,其特征在于,所述图像包括所述结构和妨碍识别所述结构的背景。8. A method as claimed in any one of claims 5 to 7, wherein the image comprises the structure and a background which prevents recognition of the structure. 9.如权利要求8所述的方法,其特征在于,所述结构和所述背景包括多个形状类似的表面和/或线条和/或类似的颜色。9. The method of claim 8, wherein the structure and the background comprise a plurality of similarly shaped surfaces and/or lines and/or similar colours. 10.如前述权利要求的任一项所述的方法,其特征在于,所述识别动作和所述附加任务的解决作为单个动作进行。10. The method according to any one of the preceding claims, characterized in that the act of recognizing and the solving of the additional task are performed as a single action. 11.如前述权利要求的任一项所述的方法,其特征在于,从多个不同的任务中选择所述附加任务。11. A method as claimed in any one of the preceding claims, characterized in that the additional task is selected from a plurality of different tasks. 12.一种用于识别个人的设备,该设备包括捕获装置和评估单元,所述捕获装置用于捕获待识别的个人的生物特征数据,所述评估单元用于将所捕获的生物特征数据与待识别的个人的已保存数据作比较并确定所述待识别的个人的身份,12. An apparatus for identifying an individual, the apparatus comprising capture means for capturing biometric data of the individual to be identified and an evaluation unit for combining the captured biometric data with compare the stored data of the identified individual and determine the identity of said identified individual, 其特征在于,所述设备包括用于确定所述生物特征数据的真实性的模块,该模块具有随机发生器和/或具有任务发生器,所述随机发生器用于随机地确定捕获哪个生物特征数据,所述任务发生器用于产生适合于人的能力并且无法由自动化系统解决、或只能由自动化系统以超过特定时间要求的时间要求方可解决的任务。It is characterized in that said device comprises a module for determining the authenticity of said biometric data, which module has a random generator and/or has a task generator for randomly determining which biometric data to capture , the task generator is used to generate tasks that are suitable for human capabilities and cannot be solved by the automated system, or can only be solved by the automated system with a time requirement exceeding a certain time requirement. 13.如权利要求12所述的设备,其特征在于,用于确定所述生物特征数据的所述真实性的所述模块包括用于保存附加任务和指定解决方案的存储器。13. The device of claim 12, wherein the means for determining the authenticity of the biometric data includes memory for storing additional tasks and specifying solutions. 14.如权利要求12或13所述的设备,其特征在于,用于确定所述生物特征数据的所述真实性的所述模块包括用于输入所述解决方案的输入单元以及用于判断所述解决方案的正确性的比较单元。14. Device according to claim 12 or 13, characterized in that said means for determining said authenticity of said biometric data comprises an input unit for inputting said solution and for judging said A unit of comparison for the correctness of the stated solution. 15.如权利要求12至14的任一项所述的设备,其特征在于,用于确定所述生物特征数据的所述真实性的所述模块包括时间捕捉单元,所述时间捕捉单元用于确定任务显示与开始和/或完成所输入的解决方案之间的时间。15. An apparatus according to any one of claims 12 to 14, wherein said means for determining said authenticity of said biometric data comprises a time capture unit for Determines the time between when a task is displayed and when the entered solution is started and/or completed. 16.如权利要求12至15的任一项所述的设备,其特征在于,将所述设备构建为使得根据权利要求1至11的任一项所述的方法可以通过数据处理程序的序列来实现。16. The device according to any one of claims 12 to 15, characterized in that the device is constructed such that the method according to any one of claims 1 to 11 can be performed by a sequence of data processing programs accomplish.
CN2009801265581A 2008-07-08 2009-06-30 Method and apparatus for improving biometric identification systems Pending CN102089766A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE200810040258 DE102008040258A1 (en) 2008-07-08 2008-07-08 Method and device for improving biometric identification systems
DE102008040258.3 2008-07-08
PCT/EP2009/058210 WO2010003849A1 (en) 2008-07-08 2009-06-30 Method and apparatus for improving biometric identification systems

Publications (1)

Publication Number Publication Date
CN102089766A true CN102089766A (en) 2011-06-08

Family

ID=41165610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009801265581A Pending CN102089766A (en) 2008-07-08 2009-06-30 Method and apparatus for improving biometric identification systems

Country Status (6)

Country Link
EP (1) EP2300955A1 (en)
JP (1) JP2011527475A (en)
CN (1) CN102089766A (en)
DE (1) DE102008040258A1 (en)
EA (1) EA201071382A1 (en)
WO (1) WO2010003849A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103748593A (en) * 2011-08-17 2014-04-23 高通股份有限公司 Method and apparatus using CAPTCHA having visual information related to the CAPTACHA's source

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011120779B4 (en) 2011-12-09 2022-02-17 Volkswagen Aktiengesellschaft Method, control means and system for manually switching on a high-voltage voltage for a vehicle
EP3159820B1 (en) * 2014-06-19 2025-01-22 Nec Corporation Authentication device, authentication system, authentication method, and program storage medium
US10199564B2 (en) * 2015-02-04 2019-02-05 Sumitomo Chemical Company, Limited Method for manufacturing niobate-system ferroelectric thin-film device
JP7034808B2 (en) * 2018-04-03 2022-03-14 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Information processing method, information processing device and information processing system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1199623A2 (en) * 2000-10-17 2002-04-24 Siemens Aktiengesellschaft Method and system for user identification
US20070143624A1 (en) * 2005-12-15 2007-06-21 Microsoft Corporation Client-side captcha ceremony for user verification
WO2007139644A2 (en) * 2006-05-24 2007-12-06 Vidoop, L.L.C. Graphical image authentication and security system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19631484C1 (en) 1996-08-03 1998-03-05 Dieter Bartmann Method for verifying the identity of a user of a data processing system to be operated with a keyboard for generating alphanumeric characters
WO1999042992A1 (en) * 1998-02-24 1999-08-26 Holoubek Michael J Randomly generated voice recognition method and apparatus
US7149899B2 (en) * 2002-04-25 2006-12-12 Intertrust Technologies Corp. Establishing a secure channel with a human user
US20090153292A1 (en) * 2005-11-23 2009-06-18 Daniel Farb Business and software security and storage methods, devices and applications
US7864987B2 (en) * 2006-04-18 2011-01-04 Infosys Technologies Ltd. Methods and systems for secured access to devices and systems
US7552467B2 (en) * 2006-04-24 2009-06-23 Jeffrey Dean Lindsay Security systems for protecting an asset

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1199623A2 (en) * 2000-10-17 2002-04-24 Siemens Aktiengesellschaft Method and system for user identification
US20070143624A1 (en) * 2005-12-15 2007-06-21 Microsoft Corporation Client-side captcha ceremony for user verification
WO2007139644A2 (en) * 2006-05-24 2007-12-06 Vidoop, L.L.C. Graphical image authentication and security system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
TAEKYOUNG KWON: "Knowledge-Based User Authentication Associated with Biometrics", 《UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION.COPING WITH DIVERSITY [LECTURE NOTES IN COMPUTER SCIENCE]》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103748593A (en) * 2011-08-17 2014-04-23 高通股份有限公司 Method and apparatus using CAPTCHA having visual information related to the CAPTACHA's source
CN103748593B (en) * 2011-08-17 2017-05-31 高通股份有限公司 Method and device for using CAPTCHA verification code

Also Published As

Publication number Publication date
EP2300955A1 (en) 2011-03-30
WO2010003849A1 (en) 2010-01-14
DE102008040258A1 (en) 2010-01-14
EA201071382A1 (en) 2011-08-30
JP2011527475A (en) 2011-10-27

Similar Documents

Publication Publication Date Title
Kindt Privacy and data protection issues of biometric applications
CN104598796B (en) Personal identification method and system
US9396319B2 (en) Method of criminal profiling and person identification using cognitive/behavioral biometric fingerprint analysis
US20120005735A1 (en) System for Three Level Authentication of a User
JP2007522551A (en) Multi-select challenge-response user authentication system and method
CN103678977A (en) Method for protecting information security and electronic device thereof
Moallem Human-Computer Interaction and cybersecurity handbook
CN102089766A (en) Method and apparatus for improving biometric identification systems
Sharma et al. Behavioral Biometrics: Past, Present
Hassan et al. Towards secure identification: A comparative analysis of biometric authentication techniques
Goicoechea-Telleria et al. Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone?
CN113378134A (en) Identity authentication method and device
Bella et al. An investigation into the “beautification” of security ceremonies
Zabidi et al. A usability evaluation of image and emojis in graphical password
Piccolotto et al. BIOMETRICS FROM THE USER POINT OF VIEW: DERIVING DESIGN PRINCIPLES FROM USER PERCEPTIONS AND CONCERNS ABOUT BIOMETRIC SYSTEMS.
Giarimi et al. Investigation of user acceptance for biometric verification/identification methods in mobile units
Barde A multimodal biometric system-aadhar card
Tangawar et al. Survey paper on graphical password authentication system in terms of usability and security attribute
Alharbi et al. Biometric Authentication Systems Towards Secure and Privacy Identification: A Review
US20110304429A1 (en) Method and apparatus for improving biometric identification systems
Chong Usable authentication for mobile banking
Vorobyeva et al. Benefits and issues of biometric technologies. Are biometrics worth using?
Petrie et al. Towards Recommendations for the Universal Design of Online Authentication Systems
Kindt The Processing of Biometric Data. A comparative legal analysis with a focus on the proportionality principle and recommendations for a legal framework.
Sungkur et al. An enhanced mechanism for the authentication of students taking online exams

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110608