CN1695163A - Secure Biometric Authentication - Google Patents
Secure Biometric Authentication Download PDFInfo
- Publication number
- CN1695163A CN1695163A CN 03825009 CN03825009A CN1695163A CN 1695163 A CN1695163 A CN 1695163A CN 03825009 CN03825009 CN 03825009 CN 03825009 A CN03825009 A CN 03825009A CN 1695163 A CN1695163 A CN 1695163A
- Authority
- CN
- China
- Prior art keywords
- card
- identification card
- data
- processor
- iso
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Credit Cards Or The Like (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Storage Device Security (AREA)
Abstract
Description
相关申请related application
本发明基于如下临时申请,2002年9月10日提交的第60/409,716号(卷号为7167-102P1)、2002年9月10日提交的第60/409,715号(卷号为7167-103P)、2002年11月27日提交的第60/429,919号(卷号为7167-104P)、2002年12月13日提交的第60/433,254号(卷号为7167-105P)、2003年7月3日提交的第60/484,692号(卷号为7167-106P),并且要求这些申请的优先权,这些申请的全部内容结合于此作为参考。This application is based on Provisional Application Nos. 60/409,716, filed September 10, 2002 (Docket No. 7167-102P1), and 60/409,715, filed September 10, 2002 (Docket No. 7167-103P) , No. 60/429,919, filed November 27, 2002 (Docket No. 7167-104P), No. 60/433,254, filed December 13, 2002 (Docket No. 7167-105P), July 3, 2003 Serial No. 60/484,692 (Docket No. 7167-106P), filed on the date of 1999, and claiming priority from these applications, the entire contents of which are hereby incorporated by reference.
技术领域technical field
计算机化特别是互联网技术已经提供了对包括财务数据、医疗数据、个人数据的不断增长的数据访问,这意味着加速了金融和其它交易,其中保密数据被进行更新或者交换。Computerization and especially Internet technology has provided access to ever-increasing data including financial data, medical data, personal data, which means accelerating financial and other transactions in which confidential data is updated or exchanged.
通常用口令来维持这些数据的保密性;然而,口令经常是基于易于猜测并且根本就不安全的出生日期或者电话号码。此外,即使是复杂的随机生成的口令也经常能被轻易窃取。基于口令的数据访问系统因而容易受到非法攻击,从而给工业和经济,甚至给人的生命带来危险和损害。因此,需要一种改良的方法,用于保护数据和保护数据免遭未授权访问。Passwords are often used to maintain the confidentiality of this data; however, passwords are often based on dates of birth or phone numbers, which are easy to guess and not at all secure. Furthermore, even complex randomly generated passwords can often be easily stolen. The password-based data access system is therefore vulnerable to illegal attacks, which will bring danger and damage to industry and economy, and even human life. Therefore, there is a need for an improved method for securing data and protecting data from unauthorized access.
生物数据可以包括难以获取但是容易分析的精密细节(例如指纹细节序列),或者容易获取但是难以分析的整体图案(例如相邻指纹螺纹的空间特性)。Biometric data can include fine details that are difficult to obtain but easy to analyze (such as the sequence of fingerprint minutiae), or global patterns that are easy to obtain but difficult to analyze (such as the spatial properties of adjacent fingerprint threads).
加密算法需要仅对授权用户有效的数字密钥。没有正确的密钥,只有投入足够的时间和处理资源,而且即便如此,只有当未加密数据的某些特征是已知的(或者至少是可预知的)时,加密数据才可以被解密成可用格式。Encryption algorithms require digital keys that are valid only for authorized users. Without the correct key, encrypted data can only be decrypted into use if sufficient time and processing resources are devoted to it, and even then, only if certain characteristics of the unencrypted data are known (or at least predictable) Format.
日本公开专利申请第60-029868号(日期1985年2月15日,申请人为Tamio SAITO),提出一种个人识别系统,其使用一种具有用于记录从持卡人处获得的加密生物数据的集成存储器的身份识别卡。生物数据可以包括声波纹、指纹、外貌特征、和/或生物检验。使用中,卡中数据被读取和解密,用于与从出示该卡的人处获取的相应数据进行比较。该系统使得注册人可被高准确度地确定识别。然而,因为生物数据是通过外部设备获得和处理的,所以难以保护存储在卡上的信息免遭可能发生的改变和/或身份盗用。Japanese Laid-Open Patent Application No. 60-029868 (dated February 15, 1985, applicant is Tamio SAITO), proposes a personal identification system that uses a Identification card with integrated memory. Biological data may include voiceprints, fingerprints, physical characteristics, and/or biometric tests. In use, the card data is read and decrypted for comparison with corresponding data obtained from the person presenting the card. The system allows registrants to be identified with a high degree of accuracy. However, because the biometric data is obtained and processed by an external device, it is difficult to protect the information stored on the card from possible alteration and/or identity theft.
已经提出了一种改良的身份识别卡,其包括卡上的数据驱动多处理器芯片,以提供同时加密和隔离存储在卡上的生物数据的硬件防火墙,从而提供更好的保护来防止未经授权而改变存储数据。然而,实际的匹配程序是在同样的获取现场(live)生物数据的外部读卡器终端上执行的,因而仍然潜在地容易受到外部欺诈操作的攻击。An improved identification card has been proposed that includes a data-driven multiprocessor chip on the card to provide a hardware firewall that simultaneously encrypts and isolates biometric data stored on the card, thereby providing better protection against unauthorized access. Authorization to alter stored data. However, the actual matching procedure is performed on the same external reader terminal that captures the live biometric data, thus still potentially vulnerable to external fraudulent manipulation.
发明内容Contents of the invention
高安全性身份识别卡的第一实施例不仅包括用于存储生物数据的卡上(on-board,又称片上或板上)存储器,而且包括用于捕获现场生物数据的卡上传感器。远程认证系统维护包括生物数据的安全数据库。卡上的卡上处理器执行初步的匹配操作,以验证所捕获的生物数据与本地生物存储数据是否匹配。仅当存在正确的本地匹配时,任何获取的数据或任何敏感的存储数据才可以发送到远程认证系统用于附加的验证和/或进一步处理。作为对于恶意攻击的进一步保护,本地存储数据优选不同于远程存储数据,并且优选地使本地匹配和远程匹配采用不同的匹配算法。因而即使卡、本地存储数据、和/或与卡连接的本地终端遭受损害,很可能地,远程认证系统仍然能够发觉入侵企图。The first embodiment of the high security identification card includes not only an on-board (also called on-board or on-board) memory for storing biometric data, but also an on-board sensor for capturing on-site biometric data. The remote authentication system maintains a secure database including biometric data. An on-card processor on the card performs a preliminary matching operation to verify that the captured biometric data matches the local biometric stored data. Only when there is a correct local match can any captured data or any sensitive stored data be sent to the remote authentication system for additional verification and/or further processing. As a further protection against malicious attacks, the locally stored data is preferably different from the remotely stored data, and different matching algorithms are preferably used for local matching and remote matching. Thus even if the card, the locally stored data, and/or the local terminal connected to the card are compromised, it is likely that the remote authentication system will still be able to detect the intrusion attempt.
第二实施例也包括用于存储生物数据的卡上存储器、用于捕获现场生物数据的卡上传感器、以及卡上处理器;然而,在该实施例中,整个匹配程序由卡上处理器来执行,并且生物原始获取数据和存储在卡上存储器中的任何其它“私有”信息对于任何外部程序都是不可访问的。替代地,响应于在新获取的生物数据和先前获取的生物数据之间的成功匹配,仅产生一个验证信息。验证信息使得该卡功能类似于依据了传统的个人身份号码(PIN)的登录(log on)成功/不成功的传统ISO智能卡的方式,但是其具有由更多的安全验证程序所提供的附加的安全性。在任一实施例中,生物存储数据和任何相关的本地存储的加密算法或者加密密钥优选地在最初授予持卡人时载入卡中,其方式为阻止任何将来的外部访问,从而进一步增强了生物存储数据和整个验证程序的完整性。The second embodiment also includes on-card memory for storing biometric data, on-card sensors for capturing live biometric data, and an on-card processor; however, in this embodiment, the entire matching procedure is performed by the on-card processor execution, and the biometric raw acquisition data and any other "private" information stored in the on-card memory is inaccessible to any external program. Alternatively, only one verification message is generated in response to a successful match between newly acquired biometric data and previously acquired biometric data. The authentication information enables the card to function in a manner similar to traditional ISO smart cards based on successful/unsuccessful log on of a traditional personal identification number (PIN), but with additional security provided by a more secure verification procedure safety. In either embodiment, the biometric data and any associated locally stored encryption algorithms or encryption keys are preferably loaded onto the card upon initial award to the cardholder in a manner that prevents any future external access, thereby further enhancing Integrity of biologically stored data and the entire verification process.
在一个实施例中,ISO智能卡起到防火墙的作用,用于保护用来存储和处理受保护生物数据的安全处理器免于遭受通过ISO智能卡接口进行的外部恶意攻击。在另一个实施例中,安全处理器插于ISO智能卡接口和没有经过修改的ISO智能卡处理器之间,并一直阻止任何外部通信直到用户的指纹已经与先前注册的指纹相匹配为止。In one embodiment, the ISO smart card acts as a firewall for protecting the secure processor used to store and process protected biometric data from external malicious attacks through the ISO smart card interface. In another embodiment, the security processor is interposed between the ISO smart card interface and the unmodified ISO smart card processor, and blocks any external communication until the user's fingerprint has been matched with a previously enrolled fingerprint.
在具有卡上指纹匹配能力的高安全性身份识别卡的一个优选实施例中,当用户将其手指放到指纹传感器上方时,实时反馈被提供,从而有助于手指在传感器上方进行最佳放置。该反馈不仅降低了计算复杂性,而且提供了用于在无经验用户和欺诈用户之间进行区别的附加方法,从而进一步减少了错误否定和/或错误肯定的可能性。在另一个优选实施例中,指纹传感器被保持在提供额外稳定性的载体中。In a preferred embodiment of a high security ID card with on-card fingerprint matching capability, when the user places their finger over the fingerprint sensor, real-time feedback is provided to facilitate optimal placement of the finger over the sensor . This feedback not only reduces computational complexity, but also provides an additional method for distinguishing between inexperienced users and fraudulent users, thereby further reducing the likelihood of false negatives and/or false positives. In another preferred embodiment, the fingerprint sensor is held in a carrier which provides additional stability.
在一个示范性应用中,将获取到的生物数据和/或持卡人的身份标志在任何对保密数据在线访问的授权之前或者在任何用于完成安全交易的自动化程序之前进行加密,然后输入到包括金融机构和单独的认证服务器的交易网络中。在另一个示范性应用中,将卡的输出用于获得进入安全区域的物理通道。在任一应用中,成功的和不成功的访问企图的记录都可以被保存在卡上或者外部安全服务器上,或者在两者上都保存。In one exemplary application, captured biometric data and/or cardholder identification are encrypted prior to any authorization of online access to confidential data or prior to any automated process used to complete a secure transaction and then entered into the In a transaction network that includes financial institutions and separate authentication servers. In another exemplary application, the card's output is used to gain physical access to a secure area. In either application, records of successful and unsuccessful access attempts can be kept on the card or on an external secure server, or both.
附图说明Description of drawings
图1示出了具有卡上生物验证示卡人的身份的智能卡的一个实施例;Figure 1 shows an embodiment of a smart card with on-card biometric verification of the identity of the person presenting the card;
图2是用于帮助用户实现手指在指纹传感器上的最佳放置的示范性程序的流程图;2 is a flowchart of an exemplary procedure for assisting a user in achieving optimal placement of a finger on a fingerprint sensor;
图3是能够同时本地和远程验证出示安全身份识别卡的人的身份的生物验证系统的功能方框图;Figure 3 is a functional block diagram of a biometric authentication system capable of simultaneously locally and remotely verifying the identity of a person presenting a secure identification card;
图4是具有在初始载入持卡人生物数据期间和在验证持卡人的远程请求身份期间使用不同物理数据路径的典型的生物验证卡的功能方框图;Figure 4 is a functional block diagram of a typical biometric authentication card with different physical data paths used during initial loading of the cardholder's biometric data and during verification of the cardholder's remotely requested identity;
图5示出了图4的典型生物验证卡的可选实施例,其打算采用无修改的ISO智能卡CPU的方式;Fig. 5 shows an alternative embodiment of the exemplary biometric authentication card of Fig. 4, which is intended to be adopted in the manner of an ISO smart card CPU without modification;
图6是表示典型应用和典型验证卡之间的通信的流程图,其中只执行对持卡人身份的本地验证;Figure 6 is a flow diagram representing communication between an exemplary application and an exemplary verification card, where only local verification of the cardholder's identity is performed;
图7是类似于图6的流程图,但是改为采用图5的典型生物验证卡的方式;Fig. 7 is a flow chart similar to Fig. 6, but the mode of the typical biometric authentication card of Fig. 5 is adopted instead;
图8示出了具有可无线或者借助于电接插件连接到本地终端的卡上生物验证的智能卡的第二实施例;Figure 8 shows a second embodiment of a smart card with on-card biometric authentication connectable wirelessly or by means of an electrical connector to a local terminal;
图9是图8的卡的横截面图;Figure 9 is a cross-sectional view of the card of Figure 8;
图10是典型指纹传感器的电路图;以及Figure 10 is a circuit diagram of a typical fingerprint sensor; and
图11示出了用于图10的传感器的载体组件的一个实施例。FIG. 11 shows one embodiment of a carrier assembly for the sensor of FIG. 10 .
具体实施方式Detailed ways
智能卡smart card
此处使用的术语“智能卡(smart card)”或者“智慧卡(intelligentcard)”一般意义上是指任何物理对象,其足够小到可以握在手中,戴在脖子上,或者以其它方式随身携带,其包括微处理器,能够存储、处理和传递涉及或者其它关系到持卡者个人的数字编码信息。这种智能卡的一个众所周知的实例是ISO(International StandardsOrganization国际标准组织)智能卡,其具有与传统的信用卡相同的物理尺寸和外形,但是其包括:闪存,用于存储用户特定数据;以及微处理器,能以强大的加密算法进行编程,指示从用户终端收到的PIN(Personal Identification Number个人身份号码)是否与卡上存储的加密PIN相匹配,从而与仅依靠对签名和/或身体相貌进行视觉比较的验证系统相比,对出示卡的人是真正的持卡人给出了更高的可信度。As used herein, the term "smart card" or "intelligent card" refers generally to any physical object small enough to be held in the hand, worn around the neck, or otherwise carried on the person's body, It includes a microprocessor capable of storing, processing and communicating digitally encoded information relating to or otherwise relating to the cardholder personally. A well-known example of such a smart card is the ISO (International Standards Organization International Standards Organization) smart card, which has the same physical size and shape as a traditional credit card, but which includes: flash memory for storing user-specific data; and a microprocessor, It can be programmed with a strong encryption algorithm to indicate whether the PIN (Personal Identification Number) received from the user terminal matches the encrypted PIN stored on the card, so as to rely only on visual comparison of signature and/or physical appearance This gives a higher degree of confidence that the person presenting the card is the real cardholder compared to existing authentication systems.
接下来参照图1,其示出了具有卡上生物验证的智能卡的一个实施例。卡100通常由塑料材料制成,并且具有传统的信用卡的整体外观,其大致尺寸符合ISO7816中规定的约53.98×85.6mm且厚度约0.76mm或者更厚。Referring next to FIG. 1, one embodiment of a smart card with on-card biometric authentication is shown. The
类似于传统的信用卡,卡100包括空白的上部区域102,其沿着卡的整个横向宽度延伸,用于承载位于卡的背面上的磁条(符合ISO7811-2&7811-6的规定),该磁条上可以存储关于持卡人和任何相关帐户的传统编码字符信息,从而使卡100可在传统的磁条读取器中使用。然而,因为载入磁条中的任何数据都易于修改,所以这样的磁条仅仅适用于对老式磁条式终端的向后兼容的需要超过磁条带给系统安全性的潜在下降的特定应用中。Similar to a conventional credit card, the
上部区域102还用于支持各种防伪措施,例如持卡人的防篡改的彩色照片和/或发卡人的全息标识。卡100的下部区域104可以使用传统样式的浮雕信息(符合ISO 7811-1规定),例如持卡人姓名、数字帐(或者卡)号、以及有效日期,以使卡100可在传统的卡刻印器中使用。The
上部区域102和下部区域104被中部区域106分隔,其中嵌入一组8个可见的ISO智能卡触点108,其在卡和读卡器上相应触点之间提供方便的电连接。通过该方法,不仅数据,而且电源、时钟以及控制信号都可在读卡器和卡之间进行交换,如ISO 7816-3中所规定的。The
在区域106的右侧可以看见传感器区域110,其用于从持卡人的手指获取指纹数据。优选地,向卡提供与传感器110或者嵌入卡中其它电子元件唯一对应的ID码;例如,传统的IP和/或MAC地址格式的编码。To the right of
图1还示意性地示出了数个附加的电子元件,其与触点108和传感器110配合,与其他可能相比,提供了更强大的功能,特别是更好的安全性。Figure 1 also schematically shows several additional electronic components, which, in cooperation with the
在一个实施例中,ISO智能卡兼容处理器112直接连接到ISO触点108,以提供与外部ISO兼容读卡器(未示出)的电连接,从而不仅向卡上电子器件提供电源,而且提供用于在卡与任何运行在读卡器或者任何与读卡器联网的相关计算设备上的外部通信软件、安全软件、交易软件、和/或其它的应用软件之间传输数据的方法。In one embodiment, the ISO smart card
尽管在所述实施例中,在卡100和外部读卡器之间的数据通道是使用ISO规定的智能卡连通方案的有线连接的形式,但应当明白,在其它的实施例中,其它的传输技术也可以被使用,例如USB或RS 232C或SPI(串行)连接,可通过无线RF(Radio Frequency射频)、微波和/或IR(InfraRed红外线)通信链路。Although in the described embodiment the data channel between the
同样,尽管所述实施例从读卡器获取电源,但其它的实施例可以具有卡上电源,例如太阳能电池或者电池。该卡上电源可能具有优势,例如,如果在卡100和特定类型读卡器之间的机械接口是这样的,以使指纹传感器110在触点108连接到读卡器中相应连接的情况下不能被用户访问,从而必须在卡100不与读卡器直接有线连接的情况下捕获用户指纹数据。Also, while the described embodiment draws power from the card reader, other embodiments could have an on-card power source, such as a solar cell or battery. This on-card power supply may be advantageous, for example, if the mechanical interface between the
安全处理器security processor
如图所示,安全处理器114连接在ISO处理器112和传感器110之间,用于提供对所捕获的数据的安全处理和存储,并且提供“防火墙”,以保护存储在它的专用存储器中的数据和程序免遭任何通过ISO处理器112进行的异常访问企图,如下文所述。该防火墙可设计为仅通行使用了加密密钥的加密数据,该加密密钥基于唯一分配的网络地址或者其它与该特定卡唯一对应的东西,例如从先前存储的指纹图案提取的数据,或者唯一分配的设备号例如CPU号,或者指纹传感器号。在另一个实施例中,防火墙仅仅通行包括源自先前的传输或者数据的唯一可识别数据的数据。在其他实施例中,防火墙对不同的应用保存不同的密钥,并且用这些密钥将数据发送到各自不同的处理器或者存储器部分。As shown, a
在另一个实施例中(未示出),安全处理器114直接连接到ISO触点108,并且充当ISO处理器112与ISO触点108之间的安全门禁。该可选方案具有如下优点,提供由安全处理器114和传感器110提供的附加的安全性,而不会有任何危及任何可能已集成到ISO处理器112中的安全特性的可能。In another embodiment (not shown),
安全处理器114优选包括非易失半导体存储器或者非半导体存储器,例如FRAM、OTP、E2PROM、MRAM、MROM,用于存储先前注册的指纹图案和/或其它的人体生物信息。在其他实施例中,安全处理器114的一部分或者全部功能可在ISO处理器112中执行,和/或ISO处理器112的一些或者全部功能可在安全处理器114中执行。这样的组合执行仍能维持各功能之间的软件防火墙,如果设备以不允许对存储的软件程序作任何后续修改的方式来执行,那么这将是特别有利的。可选地,处理器112、114都可以是单个多处理器设备中单独的处理器,该设备设计为保护每个处理器免遭来自运行在不同处理器内的另一个程序的任何干扰。这种多处理器装置的一个实例是日本夏普公司(Sharp)的DDMP(Data Driven MultipleProcessor,数据驱动式多处理器)。The
尽管这些各种传感器、触点、和其它电子元件,以及用于互连的印刷电路或者其它电线路,均优选被完全装入卡100的卡体,从而保护它们免遭磨损和外部污染,而且还在上部区域102和下部区域104之间的中间区域106之内的优选位置进一步保护它们免遭来自与其它区域有机械连接的传统的磁条读卡器、压印机、以及刻印装置的可能的损害。Although these various sensors, contacts, and other electronic components, as well as printed circuits or other electrical circuits for interconnection, are preferably fully enclosed in the card body of
LED反馈LED feedback
LED 116a、116b由安全处理器114控制,向用户提供可视反馈。在所示实施例中,它们位于下部区域104中,优选地位于卡的侧边远离触点108的位置。无论如何,LED 116a、116b优选地位于在任何压印程序期间它们不会被损害的位置,以及位于当卡插入传统的ISO智能卡读取器时和/或当用户手指放到指纹传感器110上方时它们可以被看见的位置。例如:
在验证模式下:In verify mode:
·红灯闪烁:等待手指Flashing red light: waiting for finger
·停止闪烁:手指已放在传感器上·Stop blinking: finger is on the sensor
·红灯闪烁一次:不匹配,可以移动手指Red light flashes once: no match, you can move your finger
·绿灯长闪烁一次:已匹配,可以移开手指Green light flashes once: already matched, you can remove your finger
注册模式下:In registration mode:
·绿灯闪烁:等待手指Green light flashing: waiting for finger
·停止闪烁:手指已放在传感器上·Stop blinking: finger is on the sensor
·红灯闪烁一次:不能注册,可以移动手指The red light flashes once: can not register, you can move your finger
·绿灯闪烁一次:已注册,可以移开手指Green light flashes once: Registered, you can remove your finger
擦除模式下:In erase mode:
·绿灯和红灯闪烁:准备擦除Flashing green and red lights: ready to erase
·绿灯闪烁一次:已擦除·Green light flashes once: erased
优选地,在发送任何否定报告之前,用户被给予多次机会去放置其手指以得到成功的匹配或者注册。在一个实施例中,只有当用户在收到绿灯准许指示之前移开其手指时,或者当预定时限超出时,否定报告才被发送到认证服务器。该程序不仅训练用户实现其手指在传感器上方进行最佳放置,其不仅降低了计算复杂性,而且使得可使用更大的辨别阈值。该可视反馈还提供了用于在无经验用户(其通常不断尝试直到实现正确的放置)和欺诈用户(其通常不希望引起任何注意,并且将会在其恶意被发觉之前离开)之间进行辨别的心理学基础。最终结果是显著减少了错误否定和/或错误肯定的可能性。Preferably, the user is given multiple opportunities to place his finger for a successful match or registration before any negative reports are sent. In one embodiment, a negative report is sent to the authentication server only if the user removes his finger before receiving a green light grant indication, or when a predetermined time limit is exceeded. This procedure not only trains the user to achieve optimal placement of his finger over the sensor, it not only reduces computational complexity, but also allows a larger discrimination threshold to be used. This visual feedback also provides a useful way to distinguish between inexperienced users (who usually keep trying until a correct placement is achieved) and fraudulent users (who usually don't want to draw any attention and will walk away before their malice is detected). The psychological basis of discrimination. The end result is a significantly reduced chance of false negatives and/or false positives.
图2示出了帮助用户将其手指放置到传感器110上的典型程序。在方框150中,RED LED 116b正在闪烁。一旦手指被探测到(方框152),该LED就停止闪烁并进行图像质量(对应于手指皮肤的凸部和凹部的细长的限定区域)的检测(方框154)。如果质量不合格(NO分支156),那么RED LED 116b的单次闪烁指示用户移动其手指到不同的位置(方框158);否则(YES分支160)执行第二检测(方框162),以确定是否相同手指放在被用来注册用户的相同位置,从而相对简单的匹配算法就可在预定阈值范围内验证现场数据与存储数据的符合,从而验证现场手指与最初注册的手指相同(YES分支164),以及GREEN LED 116a被激活(方框166)持续足够长时间(方框168)以证实已经产生成功的匹配以及用户现在可以移开其手指。可选地,如果匹配阈不满足(NO分支170),那么红色LED 116b的单次闪烁(方框158)指示用户移动其手指到不同的位置,且该程序重复进行。FIG. 2 shows a typical procedure to assist the user in placing his finger on the
典型网络结构Typical network structure
接下来参照图3,其示出了既可本地也可远程验证出示安全身份识别卡的人的身份的生物验证系统的一个可能的实施例。其包括三个主要部分:客户终端200,应用服务器202以及认证服务器204。客户终端200包括以下功能:现场捕获和本地处理用户的指纹、加密本地处理数据、以及与应用服务器及认证服务器进行安全通信,该安全通信优选通过使用IP/TCP寻址方案和传输协议的互联网进行,并通过传统的IP防火墙206提供保护以免遭恶意访问。在其他实施例中,防火墙206可以拥有过滤器以及加密编码器/解码器,用于当发送数据被验证为授权数据后将其编码并用于当确定接收数据是否为授权数据前将其解码,其例如使用像DES 128这样的加密算法。用该方法,防火墙206不仅可根据报文头,而且可根据报文内容来将数据分类为授权数据或者潜在恶意数据。Referring next to FIG. 3, one possible embodiment of a biometric authentication system that can both locally and remotely verify the identity of a person presenting a secure identification card is shown. It includes three main parts:
客户终端200可以专用网络设备的方式来实现,或者可以应用于安装在可编程的台式电脑、笔记本电脑或者其它工作站或个人电脑上的软件当中,这些电脑由通用操作系统例如Windows XXX、OS X、Solaris XX、Linux或Free BSD所控制。优选地,客户终端200包括保持更新的“禁用”数据库(例如丢失的或者失窃的卡的身份,或者对特定的卡或者一组卡的限制),以提供附加的安全措施。The
应用服务器202包括如下功能,进行事务处理,或者在用户的身份已经被认证服务器204证实之后,响应来自在客户终端200的远程用户的指令。认证服务器204包括以下功能,与客户终端200及应用服务器202进行安全通信,存储真实指纹数据和其它关于前注册用户的信息,将存储数据与从客户终端200收到的加密的现场数据进行比较,以及通知应用服务器202指定的现场指纹数据是否匹配存储的指纹数据。The
更特别地,客户终端200还包括两个主要部件:固定读卡器208部件,其包括互联网浏览器终端210和读卡器接口108a(其可以是简单的USB线缆,端接在一组电触点上,用于形成与ISO智能卡触点108的对应电连接);以及便携式智能卡部件100’。在一个实施例中,便携式部件100’可以是前面所述的智能卡100,包括指纹传感器110、安全处理器114和ISO智能卡处理器112。More specifically, the
应用服务器202还包括互联网服务器接口,其包括防火墙206和互联网浏览器214,以及交易应用模块216和确认模块218。在应用服务器和应用模块216是未被设计成通过IP/TCP协议进行对外通信的传统设备的情况下,防火墙206可用适当的安装了确认模块218并且具有固定IP地址的协议转换程序来代替。例如,应用服务器可以由愿意通过互联网向授权用户提供服务的第三方来进行操作。
认证服务器204还包括:互联网服务器接口220;处理模块222,包括指纹匹配算法224;以及数据库226,用于存储指纹和其它当这些个人被系统注册以及其身份保证满足系统操作员的要求时从这些个人处收集的真实信息。为了进一步加强安全性,优选地,用于任何特定个人的存储数据不以单一的信息列来存储在应用服务器上,而是将各项分开存储,并且任何连接这些项目所要求的索引或者关联都只有通过相应的密钥才可以得到,该密钥保存为认证服务器中个人私人数据的一部分。
定位position
在某些实施例中,固定读卡器208和/或便携式卡100″还可以装备集成的全球定位卫星(Global Positioning Satellite,“GPS”)接收器212,其可提供关于读卡器和卡在或约在特定交易发生时的当前位置的有用信息。特别地,来自GPS接收器212的位置数据可用于在读卡器或卡被移出至其使用未获授权的区域的情况下使读卡器和/或卡失效(永久或临时)。除了通过GPS,还可以通过其他方法来自动确定位置,例如采用PHS(日本蜂窝式电话)呼叫者定位技术,或者采用对地球电磁场中的局部变化敏感的定位传感器。在装备GPS卡的特别例子中,各种GPS元件包括天线;数字放大、AD转换器以及采样和保持电路;以及计算位置的数字信息处理器,优选地,这些元件都是单块集成电路的部件或者都是安装在单块电路板上的分立器件,其被集成、嵌入或者层压到卡体中。In some embodiments, the
具有卡上匹配的ISO卡的卡结构Card structure with matching ISO card on the card
ISO处理器接口ISO processor interface
图4是典型ISO智能卡兼容生物验证卡100或100’的功能方框图,其有不同的物理数据路径,用于初始载入持卡人生物数据期间和验证持卡人对远程应用的身份期间。Figure 4 is a functional block diagram of a typical ISO smart card compatible
特别地,除了前面描述的ISO处理器112、安全处理器114、指纹传感器110、LED 116a、116b和可选的GPS接收器212,其中只有ISO处理器112通过ISO智能卡触点108直接连接到读卡器208的方式之外,还示出了独立的加载模块300和相关的临时连接302,其在初始的用户注册期间提供与安全处理器114的直接通信。可以注意到,当临时加载连接302连接到特定的I/O端口308时,ISO处理器112通过I/O端口304、306与安全处理器114进行通信。优选地,安全处理器编程为,使得任何敏感保密相关数据或者软件仅可从端口308得到而不能从端口304和306得到,从而避免了在连接302被禁止后任何恶意访问这些敏感数据的可能性。Specifically, in addition to the previously described
大多数市场上可获得的ISO处理器具有至少两个I/O端口而且有些具有至少三个。这些端口中仅有一个(I/O 1)被指定用于连接到外部ISO兼容读卡器208的传统的ISO智能卡串行数据连接108。优选地,另外的一个或者两个I/O端口提供了在ISO处理器112和安全处理器114之间的专用硬布线通信,其作为硬件防火墙,以阻止对安全处理器114重编程序或者获得对任何敏感信息的访问的任何恶意企图,该信息可能是先前被传感器110获取或者可能是被存储在处理器114内。在具有多于两条I/O线路的ISO处理器的特定情况中,甚至当安全处理器完全断电时,可能在ISO处理器和安全处理器之间的专用通信路径上的静态信息出现多于两个的状态,例如1)Ready(就绪),2)Busy(忙),3)Fail(失败),和4)Pass(通过)。当然,即使只有一个I/O端口有效,这四种状态也能作为串行数据被动态发送。Most commercially available ISO processors have at least two I/O ports and some have at least three. Only one of these ports (I/O 1) is designated for a conventional ISO smart card
可以通过ISO接口I/O 2和I/O 3在ISO CPU与安全CPU之间传输的可能的命令和数据如下:The possible commands and data that can be transferred between the ISO CPU and the safety CPU via the ISO interfaces I/O 2 and I/O 3 are as follows:
·注册或者验证用户命令,安全CPU将对其发送注册结果或者验证结果,用于本地存储和/或发送至远程应用。• Register or verify user commands, to which the security CPU will send registration or verification results for local storage and/or sending to remote applications.
·指纹信息,作为模板(参考)可从安全CPU发送到ISO CPU,用于存储到ISO智能卡存储器中以发送至远程应用。为了加强敏感私人信息的安全性,参考数据可在其发送到ISOCPU之前由安全CPU进行加密。Fingerprint information, as a template (reference) can be sent from the security CPU to the ISO CPU for storage in the ISO smart card memory for sending to remote applications. To enhance the security of sensitive private information, reference data can be encrypted by the security CPU before it is sent to the ISOCPU.
加载连接302提供与安全CPU 114的直接连接,当可在ISOCPU 112和ISO读卡器208之间维持通信时,其绕开ISO连接和相关的专用I/O端口304和306所提供的任何防火墙保护,从而电源对于安全CPU 114也是可用的。主要是用于该卡对特定用户的初始注册,并将可防止未授权访问。Load connection 302 provides a direct connection to secure
图5示出了图4所示的典型生物验证卡的可选实施例,其打算使用未修改ISO智能卡CPU(unmodified ISO SmartCard CPU)。特别地,ISO CPU 112’无论在正常使用期间或者在装载期间都不必再在读卡器208和安全CPU 114’之间执行任何网关功能,因而其可以是任何ISO许可芯片,其不以任何方式作改变,并且以对读卡器208和对任何外部应用都绝对透明的方式来使用。在该可选实施例中,如果获取的指纹和存储的指纹相匹配,那么安全CPU 114’就用作ISO CPU 112’和任何外部应用之间的透明防火墙,并且如果获取到的指纹和存储的指纹不匹配,那么其将阻止所有这些通信。Figure 5 shows an alternative embodiment of the typical biometric authentication card shown in Figure 4, which is intended to use an unmodified ISO SmartCard CPU. In particular, the ISO CPU 112' no longer has to perform any gateway functions between the
卡初始化和存储数据的保护Card initialization and protection of stored data
剪断shear
在一个实施例中,最初制造的卡具有突出的印刷电路延伸物,其提供与安全CPU,以及与至少ISO接口的部分和/或任何分立的卡上存储器的直接连接。直接连接接口仅仅用于检测卡和指纹注册数据,并且包括使注册程序生效的信号。注册完成后,将电路延伸物机械地断开,从而不再可能进行注册,并且安全CPU存储器只有通过ISO CPU和前面描述的ISO CPU与安全CPU之间的防火墙才可进行访问。In one embodiment, the card is originally manufactured with a protruding printed circuit extension that provides a direct connection to the secure CPU, and to at least part of the ISO interface and/or any discrete on-card memory. The direct connection interface is only used to detect card and fingerprint enrollment data, and includes signals to enable the enrollment procedure. After registration is complete, the circuit extension is mechanically disconnected so that registration is no longer possible and the safety CPU memory is only accessible through the ISO CPU and the previously described firewall between the ISO CPU and the safety CPU.
保险丝fuse
在另一个实施例中,安全CPU有一种存储器,一旦将注册指纹图案写入,其就将不可访问。该存储器的一个实例是一次性PROM(“OTP”),其在结构上和EEPROM相似,但是对UV不透明,因而不可擦除。另一个实例是Flash ROM,其在注册完成之后变成只读,例如对Enable或Address或Data信号路径通过施加足够的电流,以在该信号通道中形成物理断路(“保险丝”)。In another embodiment, the secure CPU has a memory that is inaccessible once the enrollment fingerprint pattern is written. One example of such memory is a one-time PROM ("OTP"), which is similar in structure to EEPROM but is opaque to UV and thus not erasable. Another example is a Flash ROM that becomes read-only after registration is complete, such as by applying enough current to the Enable or Address or Data signal path to create a physical break ("fuse") in that signal path.
典型认证程序Typical Certification Procedure
在一个实施例中,典型认证程序包括获取物理指纹数据,例如,在由访问人使用的连接到应用服务器的客户终端上使用光学或压力或传导或电容或声学或弹性或摄影技术,然后将该数据发送(优选地,以加密格式)到独立的指纹认证服务器。指纹认证服务器使用认证软件将获取的指纹数据与指纹文件进行比较,该文件包括用户的指纹注册数据,并且如果数据是匹配的,那么认证服务器发送生效指令到应用服务器。In one embodiment, a typical authentication procedure involves acquiring physical fingerprint data, for example, using optical or pressure or conductive or capacitive or acoustic or elastic or photographic techniques on a client terminal used by the visitor connected to the application server, and then applying the The data is sent (preferably, in encrypted format) to a separate fingerprint authentication server. The fingerprint authentication server uses the authentication software to compare the acquired fingerprint data with the fingerprint file, which includes the user's fingerprint registration data, and if the data is matched, the authentication server sends a validating instruction to the application server.
在另一个实施例中,用户访问指纹认证服务器的安全网络浏览器,其包括指纹文件,其中所有指纹连同个人数据一起是预注册的,例如姓名、地址、和出生日期。然后用户通过安全协议例如HTTPS格式访问的安全指纹认证服务器向客户终端发送指令以在客户终端处获取用户的指纹。响应于客户终端浏览器所显示的指令,用户将其选定的手指放到指纹传感器上,然后安装在客户终端里的指纹获取软件获取数字指纹,例如具有25微米(micron)至70微米间距分辨率以及12.5平方毫米(mm2)至25平方毫米的面积,并且还具有8位灰度级的象素图像。In another embodiment, the user accesses the fingerprint authentication server's secure web browser, which includes a fingerprint file where all fingerprints are pre-registered along with personal data such as name, address, and date of birth. Then the secure fingerprint authentication server accessed by the user through a secure protocol such as HTTPS sends an instruction to the client terminal to obtain the user's fingerprint at the client terminal. In response to the instructions displayed by the browser of the client terminal, the user puts his selected finger on the fingerprint sensor, and then the fingerprint acquisition software installed in the client terminal acquires a digital fingerprint, for example, with a resolution of 25 microns (micron) to 70 microns rate and an area of 12.5 square millimeters (mm 2 ) to 25 square millimeters, and also has an 8-bit grayscale pixel image.
安全指纹认证服务器接收指纹数据,并连同接收User ID以及互联网IP地址和/或指纹传感器单独编码(MAC地址)和/或cookie(cookie是网络服务器存放到客户终端里的数据,用于网络服务器识别该客户终端)和/或任何唯一码或其他识别特定的个体或者终端的信息(例如,来自客户终端和安全指纹认证服务器之间先前的会话的细节),通过接收以上信息,其使用认证软件将接收的指纹数据与指纹文件进行比较,该文件是预注册的指纹数据以及用户ID,个人信息,例如姓名、地址、出生日期、非法记录、驾驶执照、社会保险号,等等,其可以是细节比较和或是快速傅里叶变换比较。The secure fingerprint authentication server receives the fingerprint data, together with the received User ID and Internet IP address and/or fingerprint sensor code (MAC address) and/or cookie (cookie is the data stored in the client terminal by the web server for web server identification the client terminal) and/or any unique code or other information identifying a particular individual or terminal (e.g. details from previous sessions between the client terminal and the secure fingerprint authentication server), upon receipt of which it uses the authentication software to The fingerprint data received is compared with the fingerprint file, which is the pre-registered fingerprint data along with user ID, personal information such as name, address, date of birth, illegal records, driver's license, social security number, etc., which can be details Compare and or FFT compare.
在认证程序的开始,用于相关应用的网络服务器214从视觉上或者听觉上指示用户将其手指放到指纹获取传感器110上并且敲击其鼠标键或键盘键以从而启动安全处理器114中的指纹获取软件。接着将获取的用户指纹数据通过ISO处理器112和客户终端200的网络浏览器210以加密格式(例如,使用安全RSA加密传输协议HTTPS)发送到指纹认证服务器204的网络服务器220。如果获取的数据成功匹配其数据库226中相应的数据,那么指纹认证服务器204接着将对客户终端200和对应用服务器202确认用户的身份。At the beginning of the authentication procedure, the
以下将参照图3,描述一个采用了三路认证协议和一次性口令作为哈希(Hash)字符编码序列的典型优选实施例:Below with reference to Fig. 3, describe a typical preferred embodiment that has adopted three-way authentication protocol and one-time password as hash (Hash) character encoding sequence:
·客户终端200的网络浏览器210通过请求访问应用程序216访问相应的应用服务器202的网络接口214。• The
·应用服务器202的网络接口214以登入(LOG-IN)屏幕信息和访问应用程序216的相关指令作为响应。• The
·客户终端200指示ISO处理器112激活安全处理器114。• The
·ISO处理器112触发安全处理器114。• The
·安全处理器114等候来自指纹传感器110的指纹数据并且当收到有效数据时,提取指纹数字图案,该图案通过ISO处理器112发送到网络浏览器210。• The
·网络浏览器210将指纹提取图案的加密版连同(或与之共同加密)涉及卡100’和读卡器208的相关信息发送到认证服务器204,例如用户ID、客户终端200的IP地址、和/或传感器110的硬布线ID编码(MAC地址)。
·认证服务器204的网络接口220,由以上步骤接收指纹提取图案连同来自客户终端200的其它信息一起,将这些信息发送到指纹匹配处理器222。· The
·在匹配软件224的控制下,指纹匹配处理器222使用收到的用户ID或者其它的用户特定相关信息,从数据库226检索相应的指纹参考图案并且将指纹获取图案与指纹参考图案进行比较。• Under the control of the
·将结果(匹配或不匹配)连同对终端200、用户ID卡100’和应用请求216进行验证的相关信息一起存储到访问历史日志中,并且将控制返回给认证服务器网络接口220。• Store the result (match or no match) in the access history log along with information about the authentication of the terminal 200, user ID card 100' and
·如果结果为匹配,那么认证服务器网络接口220产生一个形式为询问(challenge)字符序列的一次性密码,其被传输到客户终端200,并且使用询问字符序列作为哈希码,以将相关信息进行加密,其被保存为相应的询问响应,用于可能的将来的参考。If the result is a match, then the authentication
·客户终端200使用收到的询问字符序列作为哈希码,以将先前存储的相关提交信息的未加密拷贝进行加密,然后将其发送到应用服务器202的网络接口214,作为其对应用登入程序的响应的一部分。The
·应用服务器202的网络接口214由以上步骤接收经过哈希转换的相关信息,将其发送到应用服务216,该服务将其与来自客户终端的登录(LOG-ON)企图结合,并且,为了确认匹配结果,将收到的相关信息发送,该信息已被客户终端使用由认证服务器提供的询问序列进行哈希转换以作为询问响应。The
·认证服务器204的网络接口220,由以上步骤接收来自应用服务器的询问响应,将该响应发送到认证处理器222,该处理器将其与先前保存的预期询问响应的参考拷贝进行比较,以决定用户身份是否事实上已被授权。The
·由该比较产生的任何授权用户身份信息接着通过认证服务器网络接口220和应用服务器202的确认接口218而返回到应用程序216。• Any authorized user identity information resulting from this comparison is then returned to the
·确认接口218通过认证以确认在初始登录企图时建立的用户身份已经生效。•
·一旦用户身份被确认,认证(应用)程序216则通过应用服务器202的网络接口214进行与客户终端200的网络浏览器210直接通信。• Once the user's identity is confirmed, the authentication (application)
图6示出了可选认证程序,其中所有的匹配通过安全CPU 114在图4的ISO兼容卡上执行,并且没有采用外部认证服务器204。图6的左边示出了由应用服务器202执行的功能,而右边示出了由ISO智能卡100执行的功能。Figure 6 shows an alternative authentication procedure where all matching is performed on the ISO compliant card of Figure 4 by the
当将智能卡100插入读卡器208时,复位信号RST从读卡器发送到ISO CPU(START方框502)和指纹CPU 114(指纹验证方框504),并且该两部件从读卡器208接收电源VCC。然后ISO CPU响应以ATR(Answer-to-Reset复位应答)消息并如有必要则发出PPS(Protocol and parameters Selection协议与参数选择)(方框506)。同时,指纹CPU进入等待状态以接收指纹数据,以及当从传感器110收到数据时,就执行认证程序(方框504)。When the
当初始请求命令被应用216发送到ISO CPU 112(方框508)时,ISO CPU向安全CPU询问(方框510)认证状态。如果响应为肯定,那么ISO CPU通过运行请求命令以响应应用(方框512)。否则(来自安全CPU 114的不管是错误信息还是没有响应)其不对请求命令做任何响应,而是等待新的第一请求(方框508b)。When the initial request command is sent to the ISO CPU 112 (block 508) by the
假定指纹被验证并且第一响应被及时收到且其被应用216确定是响应信号(方框514),那么请求/响应程序将将一直持续(方框516、518、520)到超出预定验证时限,在此期间不从该应用接收请求(方框522),或者该应用不能接收预期响应(方框524)。Assuming the fingerprint is verified and the first response is received in time and determined to be a response signal by the application 216 (block 514), the request/response procedure will continue (blocks 516, 518, 520) until the predetermined verification time limit is exceeded , during which no requests are received from the application (block 522), or the application cannot receive the expected response (block 524).
图7类似于图6的流程图,但是修改为采用了图5的典型生物验证卡。图7的最左边示出了由应用服务器202执行的功能,下一列对应于读卡器208,再下一列描绘了ISO触点108,又下一列示出了由安全CPU 114执行的功能,而最右边则示出了由无变更ISO智能卡112执行的功能。FIG. 7 is similar to the flowchart of FIG. 6 but modified to employ the exemplary biometric authentication card of FIG. 5 . The far left of Figure 7 shows the functions performed by the
·当将智能卡插入读卡器时或者应用软件开始运行读卡器设备时,将复位信号550从读卡器208发送到安全CPU 114。• A reset signal 550 is sent from the
·安全CPU收到复位信号550之后不久,其发送相应的复位信号552到ISO CPU 112。同时安全CPU等待来自指纹传感器的指纹数据。• Shortly after the safety CPU receives the reset signal 550, it sends a corresponding reset signal 552 to the
·由以上步骤收到复位信号552,ISO CPU产生ATR(Answer-to-Reset)响应554并此后如有必要则发出PPS(Protocol and parameters Selection)。Receive reset signal 552 by the above steps, ISO CPU generates ATR (Answer-to-Reset) response 554 and then sends PPS (Protocol and parameters Selection) if necessary.
·安全CPU 114一旦从ISO CPU收到ATR(Answer-to-Reset),就立即将其,包括任何相关的PPS命令,传输到读卡器(方框556)。• Once the
·同时,如果安全CPU收到指纹数据,那么其将执行前面描述的认证程序。在认证检测结果为PASS的情况下,该通过状态将维持一定的时间周期。如果结果为FAIL,那么安全CPU 114就等候新的指纹数据。• At the same time, if the security CPU receives the fingerprint data, it will execute the authentication procedure described above. In the case that the authentication test result is PASS, the passing state will be maintained for a certain period of time. If the result is FAIL, then the
·由以上步骤运行该应用,将命令请求558发送到安全CPU,只有在安全CPU仍然处于前面描述的PASS状态时或最后的正确响应具有多数据位组时,该安全CPU才将命令请求560发送到ISO CPU并还将其正确响应562发送到读卡器(检测方框564)。Run the application by the above steps, send the command request 558 to the safety CPU, only when the safety CPU is still in the PASS state described above or when the last correct response has a multi-byte group, the safety CPU will send the command request 560 to the ISO CPU and also sends its correct response 562 to the reader (check box 564).
·否则(No分支566)指纹CPU产生伪请求(dummy request,虚拟请求)568并将其发送到ISO CPU并还将该结果ERR响应570发送到读卡器216,从而在请求中的序列号与响应中的序列号之间保持正确同步。Otherwise (No branch 566) the fingerprint CPU generates a dummy request (dummy request, virtual request) 568 and sends it to the ISO CPU and also sends the result ERR response 570 to the
加密和保密Encryption and Confidentiality
在通过任何外部网络进行传输之前,优选地,将任何敏感数据和/或认证结果都进行加密,可采用DES、或Two Fish加密。加密密钥可以基于指纹获取或存储数据、用户ID编码、传感器的唯一分配编码、存储器地址、存储器里邻近的数据、其它功能上相关的数据、先前的会话(事务处理)、IP地址、终端编码、或者指定的口令。可选地,敏感数据可以使用安全HTTPS协议以通过互联网发送。Before transmission through any external network, preferably, any sensitive data and/or authentication results are encrypted, and DES, or Two Fish encryption can be used. Encryption keys can capture or store data based on fingerprints, user ID codes, uniquely assigned codes for sensors, memory addresses, nearby data in memory, other functionally relevant data, previous sessions (transactions), IP addresses, terminal codes , or the specified password. Optionally, sensitive data can be sent over the Internet using the secure HTTPS protocol.
为了提供更强的安全性,可以将虚拟个人网关,例如硬件DES加密和解密,插入安全指纹认证服务器与网络连接之间,以及相应的应用服务器与网络连接之间。通过这样来使用这些虚拟网关或者虚拟专用网络(“VPN”),将敏感数据通过附加的加密层进行附加保护,例如DES 128(通常用于VPN)和RSA(被HTTPS采用)。In order to provide stronger security, a virtual personal gateway, such as hardware DES encryption and decryption, can be inserted between the secure fingerprint authentication server and the network connection, and between the corresponding application server and the network connection. By using these virtual gateways, or virtual private networks ("VPNs"), sensitive data is additionally protected by additional layers of encryption, such as DES 128 (commonly used for VPNs) and RSA (used by HTTPS).
为了特别安全的应用,所有的通信可以用附加的保密层来包围。特别地,较低层中的报文头可以在较高层中进行加密。For particularly secure applications, all communications can be surrounded by an additional layer of security. In particular, headers in lower layers can be encrypted in higher layers.
无线通信Wireless communication
其它实施例可以包括用于既接触(ISO 7816)操作又无线(ISO1443A或B)操作的双重接口,并且优选地,安装有多接口电源单元,其允许在全部在一张卡上的ISO 7816接触、ISO 1443A、ISO1443B、ISO 15693和HID传统无线系统(在其它的之间)之间互用。可选地,卡可包括用于其它无线通信技术的备用件,例如蓝牙(短距离)或者蜂窝(中距离)或者微波(长距离)。Other embodiments may include dual interfaces for both contact (ISO 7816) operation and wireless (ISO1443A or B) operation, and preferably, install a multi-interface power supply unit which allows ISO 7816 contact all on one card , ISO 1443A, ISO1443B, ISO 15693 and HID legacy wireless systems (among others) are interoperable. Optionally, the card may include spares for other wireless communication technologies, such as Bluetooth (short range) or cellular (medium range) or microwave (long range).
接下来参照图8,其示出了具有可无线或者借助于电接插件连接到本地终端的卡上生物验证的智能卡。其大部分结构和构造相似于前面描述的图1的实施例,并且同样的标号(可能以单引号加以区分)标示相似的元件。特别地,ISO CPU 112虽然显示在不同的位置(在触点108下面,而不是一侧),但是有如前所述的相似功能。Reference is next made to Figure 8 which shows a smart card with on-card biometric authentication which can be connected to a local terminal either wirelessly or by means of an electrical connector. Much of its structure and construction is similar to the previously described embodiment of Figure 1, and like reference numerals (possibly differentiated by single quotation marks) designate like elements. In particular, the
ISO天线132包括通常设置在卡100的周边的两个环状天线,并且向ISO CPU 112提供ISO兼容无线接口,用于使数据和功率相似于有线电接口108所提供的数据和功率。另外,安全天线134(在所述例子中,内置天线132且只由一个环状天线构成)通过DC-DC功率调节器120向安全CPU 114提供独立的电源。因为除了通过ISOCPU 112没有用于无线数据的直接连接,所以存储在安全CPU 114内的敏感数据不被该无线接口破坏。可选地,如前所述的关于对外部读卡器和外部网络只有有线连接的实施例,两个处理器的功能可以被合并,或者外部接口可以是通过安全CPU 114而不是通过ISOCPU 112,其中必须将适当的无线安全措施结合到该变体构造中。The ISO antenna 132 comprises two loop antennas typically disposed on the perimeter of the
图9是图8所示的卡的截面图。注意到大多数所述元件包含在芯区126中,只有触点108延伸物穿过上保护层122。传感器110的操作面通过上层122中的上窗口和PCB(印刷电路板)134中的下窗口以可访问,该PCB 134被布置在上层122和中心层126之间,其提供各种电子元件之间必需的电连接,以及围绕传感器110有效区域的环绕的静电放电接地连接。FIG. 9 is a cross-sectional view of the card shown in FIG. 8 . Note that most of the components described are contained within the core region 126 , with only the
下层124和磁条128仍是可见的。The
指纹传感器fingerprint sensor
图10是传感器110的典型示意电路图,其中传感器单元402阵列400排列为行404和列406。如上所述,每个单元402包括激活门410和变换器412。指纹由手指上皮肤的凸部和凹部形成。当这些凸部之中的一个触及阵列400内单元402的附近时,每个传感器单元的变换器412经历一个机械的和/或电的变化,其实际上产生了基于传感器表面上的由指尖上凸部和凹部引起的微压变化的指纹数字图像。注意到尽管每个变换器412被描述为单个可变电容器,但是有各种类型的变换器可以响应人类皮肤的这些凸部之中的一个的出现。在压力传感器压电薄膜变换器的特别实例中,该薄膜在单元的附近变形并且产生存储在连接到该单元的电容器中的电荷。电容器上的电压是由压电材料的变形形成的机械应力的函数,其进而是在单元上是凸部还是凹部的函数。当来自相关列驱动414的信号将该单元的门410达到ON时以及当相关行驱动416被接地时,电压出现在行的输出线路418上,并且在输出驱动420中转换成8位数字信号。为了最大化地探测压电材料的变形,压电电气材料可以在弹性材料上形成,例如聚酰亚胺或者聚酰亚胺压电电气材料即可。其它典型的可以用类似的阵列组织实现的模拟变换器技术包括可变电阻和可变电容器。可选地,每个单元可以包括简单的数字开关,其仅仅提供单比特信息;在此情况下,信息的附加的位可以由在同一区上提供多个单元或者由以更高的频率抽样每个单元来产生。该可选实施例避免了对A/D转换器的需要。FIG. 10 is a typical schematic circuit diagram of a
在典型实施例中,传感器只有0.33毫米厚并且足够坚固以嵌入到智能卡中并且不受静电、元件或者用户皮肤状态(湿、干、热、冷)的影响。传感器110通常的装置单元尺寸是25微米至70微米并且通常的间距是25微米至70微米。典型传感器具有12.5平方毫米至25平方毫米的面积以及8位多级灵敏度。该传感器可以由TFT(薄膜晶体管)和压感电容器阵列制成,例如由薄膜压电材料形成,例如钛钡氧化物或者锶钡氧化物,并且包括上电极,其覆盖并且保护整个传感区域。如果采用机械应力,那么将产生相应的电荷并且存储在薄膜压电电容器中。可选地,基于压力的传感器可制成TFT(薄膜晶体管)连同薄膜电容器,以及压感电容器的阵列,例如由压力传导材料片形成,例如碳化纤维分散橡胶片,金属(例如铜或锡或银),电镀的碳化纤维或纸底基玻璃纤维或金属,分散弹性材料(例如硅树脂)以及覆盖整个传感区的上电极片。In a typical embodiment, the sensor is only 0.33 mm thick and is robust enough to be embedded in a smart card and is not affected by static electricity, elements, or the state of the user's skin (wet, dry, hot, cold).
指纹传感器元件402特别规定的行和列驱动416、414输出电数据到输出电路420,从而将表示用户指纹的物理输入转换为模拟电数据。然后输出电路420中的A/D转换器将该模拟电信号转换为数字电信号。每个薄膜晶体管选择性地将共享的行间互连转换为其相关的电容器上的电压,这样每个电容器上的电压可以被读取并且因此每个单元的变形可以被测量。优选地,薄膜晶体管的整个列被同时转换,从而在一个选定列中的多个单元(例如8个)可以在不同的行间互连上被并行读取。多个门如行和列间的互连减少了互连的数量,而从相同列的不同行并行读取多个单元则减少了整个阵列的读取时间时,。来自传感器的输出电压可以由差动放大器放大。可以将该放大器的输出采样和保持用于A/D转换器。The specified row and column drivers 416, 414 of the fingerprint sensor element 402 output electrical data to the output circuit 420, thereby converting the physical input representing the user's fingerprint into analog electrical data. The A/D converter in the output circuit 420 then converts the analog electrical signal into a digital electrical signal. Each thin film transistor selectively converts the shared interrow interconnect to a voltage on its associated capacitor so that the voltage on each capacitor can be read and thus the deformation of each cell can be measured. Preferably, an entire column of thin film transistors is switched simultaneously so that multiple cells (eg 8) in a selected column can be read in parallel on different inter-row interconnects. Multiple gates such as row and column interconnects reduce the number of interconnects, while reading multiple cells in parallel from different rows of the same column reduces the overall array read time. The output voltage from the sensor can be amplified by a differential amplifier. The output of this amplifier can be sampled and held for an A/D converter.
基片可以是玻璃(例如非碱性玻璃)、不锈钢、铝、陶瓷(例如氧化铝)、纸、玻璃钢,但优选是晶体硅薄板。薄膜半导体材料可以是无定形硅、多晶硅、金刚石、或者任何其它半导体薄膜。压电材料可以是压电陶瓷,例如铅-锆酸盐-钛酸盐(lead-zirconate-titanate,PZT)薄膜,优选地,厚度范围为0.1至50.0微米,或聚合物压电聚酰亚胺薄膜材料。互连材料可以是:钛/镍/铜、铝、铬/镍/金、钛/镍/金、铝/金、钨/铜、钨/金、钨/金。The substrate can be glass (eg non-alkaline glass), stainless steel, aluminum, ceramic (eg alumina), paper, fiberglass, but is preferably a thin plate of crystalline silicon. The thin film semiconductor material can be amorphous silicon, polycrystalline silicon, diamond, or any other semiconductor thin film. The piezoelectric material can be a piezoelectric ceramic, such as lead-zirconate-titanate (PZT) film, preferably with a thickness in the range of 0.1 to 50.0 μm, or a polymer piezoelectric polyimide film material. Interconnect material can be: titanium/nickel/copper, aluminum, chromium/nickel/gold, titanium/nickel/gold, aluminum/gold, tungsten/copper, tungsten/gold, tungsten/gold.
图11示出了形成在晶体硅的薄基卡上的传感器的载体组合。晶体硅具有极好的电气性质并且有利于将传感器阵列与所需驱动和输出电路集成,然而在相对大而薄的硅薄板受到局部表面压力时将会弯曲和断裂。图示的载体提供了比同样整体厚度的硅片更结实的结构。Figure 11 shows a carrier assembly for a sensor formed on a thin base card of crystalline silicon. Crystalline silicon has excellent electrical properties and facilitates the integration of sensor arrays with the required drive and output circuitry, however relatively large and thin silicon sheets will bend and break when subjected to localized surface pressure. The illustrated carrier provides a more robust structure than a silicon wafer of the same overall thickness.
如图所示,单片硅430大约0.1毫米厚,并且由相同厚度的玻璃钢框432围绕,其被安装在也是玻璃钢结构的垫板434上并且约0.05毫米厚。框432和垫板434可以很容易地使用传统的印刷电路板(PCB)技术来构造。特别地,垫板434的上和下表面由被玻璃钢芯分隔的薄铜层436所覆盖。框432包括多个在其外部边缘的焊盘440,用于连接到安全处理器114。薄硅片430用环氧树脂粘合到框432和板434,并且有效区由在围绕着受保护的上电极446的硅430的暴露的外边缘部444上的传统的布线连接442,电连接到框430中各自的电路。As shown, the
匹配算法matching algorithm
对于处理能力有限并仅试图与单一参考样本做简单的1∶1匹配的本地卡上处理,指纹匹配软件可以是基于两个图案的细节的相对简单的比较。例如,指纹的灰度图像可以被减小到两个值,白和黑,并且三维凸部被转换成二维细线(矢量)。因而,该方法的准确性还受到以下问题:模糊、粘连、失真、线段部分缺失和其它的影响。尽管细节方法理论上正确率较低,但其需要较少的计算资源并且提供与许多现有数据库兼容的可能性。For local on-card processing that has limited processing power and only attempts to do a simple 1:1 match with a single reference sample, the fingerprint matching software can be based on a relatively simple comparison of the details of the two patterns. For example, a grayscale image of a fingerprint can be reduced to two values, white and black, and the three-dimensional convexities converted into two-dimensional thin lines (vectors). Therefore, the accuracy of this method is also affected by the following problems: blurring, sticking, distortion, missing line segments and others. Although the minutiae method is theoretically less accurate, it requires less computational resources and offers the possibility of being compatible with many existing databases.
对于在具有更强处理能力的远程认证服务器上进行处理,可以要求更高的准确分辨率,例如“POC”(Phase Only Correlation仅相位对比)匹配算法。POC是基于整个图像的宏匹配的验证算法。相反地,POC匹配大范围的结构信息-从细节到总图像。因此,POC能够提供加强的准确度来避免噪声,例如粘连和部分缺失。理论上,POC方法不受来自位置移动和亮度差异的不利影响,并且快速(对于脱机匹配约为0.1秒)和高准确度。例如,POC软件可以利用二维快速傅立叶变换(“2DFFT”)来执行两个指纹图案的空间频率比较。2DFFT将表示指纹的物理二维分布的数字化数据阵列转换为频率空间,换句话说,将空间分布反转换,该处越高的密度图案具有越高的空间频率。旋转变换可用于对频率空间图案匹配进行匹配。因为不被指纹记录图案中的普通缺陷误导,POC将认为这些缺陷为噪音而细节分析将这些缺陷作为有意义的数据进行解释,所以POC图案匹配与细节向量匹配相比有更多的优点。For processing on a remote authentication server with stronger processing power, higher accurate resolution may be required, such as "POC" (Phase Only Correlation only phase comparison) matching algorithm. POC is a verification algorithm based on macro-matching of the entire image. In contrast, POC matches a large range of structural information - from details to the total image. Therefore, POC can provide enhanced accuracy to avoid noise, such as sticking and part missing. Theoretically, the POC method is not adversely affected by position shifts and brightness differences, and is fast (approximately 0.1 seconds for offline matching) and highly accurate. For example, POC software may utilize a two-dimensional fast Fourier transform ("2DFFT") to perform a spatial frequency comparison of two fingerprint patterns. 2DFFT transforms the digitized data array representing the physical two-dimensional distribution of the fingerprint into frequency space, in other words, inversely transforms the spatial distribution, where higher density patterns have higher spatial frequencies. Rotational transforms can be used to match frequency-space pattern matching. POC pattern matching has more advantages than minutiae vector matching because it is not misled by common defects in fingerprint recording patterns, which POC will consider as noise and minutiae analysis interprets these defects as meaningful data.
对于特别苛刻的应用,混合方法将可比其它任何单独的方法提供更高的准确度和安全性。例如,细节方法可以用在获取点上,而POC方法可以用在远程服务器上。作为另一个例子,匹配程序可以分析细节和空间关系以产生考虑了两种结果的结合的分数。For particularly demanding applications, the hybrid method will provide greater accuracy and safety than any other method alone. For example, the minutiae method can be used on a point of acquisition, while the POC method can be used on a remote server. As another example, a matching program can analyze details and spatial relationships to produce a score that takes into account the combination of both outcomes.
应用application
前面描述的技术提供了用于多样的应用,商用的和政府的,高水平的安全性。根据各种应用的要求,多种安全应用可以共存并在相同的卡上和/或相同的认证服务器上操作。在一个实施例中,单张卡可以包括多至24项独立的且安全的应用。例如,该技术将许可/拒绝访问(物理的和/或逻辑的),识别人员的精确位置和/或运动和/或监视列出的名单,而且同时还运行其它安全应用,各应用相互间完全地且安全地隔离。The techniques described above provide a high level of security for a variety of applications, commercial and government. Multiple security applications can co-exist and operate on the same card and/or the same authentication server, depending on the requirements of the various applications. In one embodiment, a single card may contain up to 24 separate and secure applications. For example, the technology will grant/deny access (physical and/or logical), identify the precise location and/or movement of persons and/or monitor listed lists, while also running other security applications, each fully interconnected with each other ground and safely isolated.
当前可以预期的应用如下:The currently expected applications are as follows:
·机场ID/通行·Airport ID/Pass
·大厦保安· Building security
·旅馆房间通行和记帐· Hotel room access and billing
·医院·Hospital
·在线游戏·online game
·下载娱乐·Download entertainment
·出生证明·birth certificate
·计算机访问·Computer access
·驾驶执照-TWIC·Driving License-TWIC
·电子钱包·electronic wallet
·紧急医学信息·Emergency medical information
·炸药执照·Explosives license
·政府和军用设施通行·Access to government and military facilities
·HAZMAT(危险物)许可证· HAZMAT (dangerous substance) permit
·医疗保险和福利卡·Medical insurance and welfare card
·停车场入口·parking entrance
·护照·passport
·航空执照· Aviation license
·港口ID/通行·Port ID/Pass
·保险证明·Certificate of insurance
·社会保险卡·Social insurance card
·旅行信用卡·Travel credit card
·签证或者进/出通行证·Visa or entry/exit permit
·投票注册卡·Voting registration card
·福利和粮票印花卡· Welfare and Food Stamp Cards
对于许多的这些应用,优选地,卡的卡上存储器还提供各种私人信息的安全存储,其只有当注册的持卡人证明了其身份和授权该访问时才可进行访问。这些私人信息的实例有:For many of these applications, preferably, the card's on-card memory also provides secure storage of various private information, which is only accessible when the registered cardholder proves his identity and authorizes such access. Examples of such personal information are:
·管理信息,例如姓名、地址、出生日期、出生地点、国籍、宗教、组织关系、社会保险号码、驾驶执照号码、护照号码、和移民信息例如签证类型、签证期限、国籍等。Management information such as name, address, date of birth, place of birth, nationality, religion, organizational affiliation, social insurance number, driver's license number, passport number, and immigration information such as visa type, visa period, nationality, etc.
·财务信息,例如电子钱包、VISA(VISA信用卡),MasterCard(万事达信用卡),American Express(美国运通信用卡)等信用卡信息,银行信息,例如银行名称、银行存款余额、转帐信息、IRS(美国国税局)号码、破产记录、转帐信息等。Financial information, such as electronic wallet, VISA (VISA credit card), MasterCard (MasterCard credit card), American Express (American Express credit card) and other credit card information, bank information, such as bank name, bank deposit balance, transfer information, IRS (Internal Revenue Service of the United States) ) number, bankruptcy records, transfer information, etc.
·体征和健康信息,例如:识别个人的生物信息,例如身高、体重、指纹、虹膜、视网膜、手尺寸、骨结构、声音、DNA;血型;医学诊断检测结果;病史;药物;保险信息;对一定刺激的心理和生理反应等。Physical signs and health information, such as: biological information that identifies an individual, such as height, weight, fingerprints, iris, retina, hand size, bone structure, voice, DNA; blood type; medical diagnostic test results; medical history; medication; insurance information; Certainly stimulated psychological and physiological responses.
·事件信息,例如犯罪记录、重罪、轻罪、违法。• Event information, such as criminal records, felonies, misdemeanors, violations.
·应急信息,例如墓地、亲属和其它联系信息、律师信息、宗教信息。• Emergency information such as burial sites, next of kin and other contact information, attorney information, religious information.
·教育、工作历史,包括学校、学位、就职过的与FDD有关的公司。·Education and work history, including school, degree, and FDD-related companies.
·数据访问历史(存储了进卡和出卡的访问历史数据)。·Data access history (storing access history data of card input and card output).
·ID相关信息,例如指纹图案、指纹处理图案、指纹图案的结果。• ID-related information such as fingerprint patterns, fingerprint processing patterns, results of fingerprint patterns.
·口令,例如永久口令、暂时口令、和/或一次性口令。• Passwords, such as permanent passwords, temporary passwords, and/or one-time passwords.
·加密密钥,例如公开密钥、个人密钥、和/或一次性密钥。• Encryption keys, such as public keys, private keys, and/or one-time keys.
接下来描述典型的卡注册系统。A typical card registration system is described next.
申请人:填写申请表并且将其提交,优选地,包括照片和指纹。对于大部分申请人,检查其文件附件并简单地在一个或多个政府和商业数据库中查对提交的信息就足以建立个人的真实身份。Applicant: Fill out the application form and submit it, preferably including a photo and fingerprints. For most applicants, examining their file attachments and simply checking the submitted information against one or more government and commercial databases is sufficient to establish an individual's true identity.
在其身份被识别后,申请人进入签发站,此处由发卡人将认为必要的任何信息载入卡中。申请人将其手指放在卡上的传感器上。一旦指纹符合要求地置于传感器上并且被载入卡中,就将使卡上的突出受到电冲击,其烧断某些保险丝,以阻止任何人再次写入卡的该一定区域。然后,将该小突出切断/剪断(就像带有脐带的卡)。在该点处,卡只能通过ISO接触读卡器或者ISO无线系统进行读或者写。After they have been identified, the applicant proceeds to the issuing station, where any information the issuer deems necessary is loaded onto the card. The applicant places their finger on the sensor on the card. Once the fingerprint is satisfactorily placed on the sensor and loaded into the card, a protrusion on the card is subjected to an electrical shock which blows some fuses to prevent anyone from writing to that certain area of the card again. Then, cut/snip that little protrusion (like a card with an umbilical cord). At this point, the card can only be read or written to via the ISO contact card reader or the ISO wireless system.
在网络认证服务器的情况中,卡上所载同样数据的一些或者全部也是以加密形式传输到远程服务器,可以补充附加的通常不存储在卡上但是可能需要用于高安全性应用的数据。In the case of a network authentication server, some or all of the same data carried on the card is also transmitted in encrypted form to the remote server, supplementing additional data not normally stored on the card but which may be required for high security applications.
Claims (28)
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US40971602P | 2002-09-10 | 2002-09-10 | |
| US60/409,716 | 2002-09-10 | ||
| US60/409,715 | 2002-09-10 | ||
| US60/429,919 | 2002-11-27 | ||
| US60/433,254 | 2002-12-13 | ||
| US60/484,692 | 2003-07-03 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1695163A true CN1695163A (en) | 2005-11-09 |
| CN100437635C CN100437635C (en) | 2008-11-26 |
Family
ID=35353502
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNB038250098A Expired - Fee Related CN100437635C (en) | 2002-09-10 | 2003-09-10 | Secure Biometric Authentication |
Country Status (10)
| Country | Link |
|---|---|
| CN (1) | CN100437635C (en) |
| AR (1) | AR041226A1 (en) |
| LT (1) | LT5344B (en) |
| MY (1) | MY161401A (en) |
| PA (1) | PA8581901A1 (en) |
| PE (1) | PE20040351A1 (en) |
| TN (1) | TNSN05068A1 (en) |
| TW (1) | TWI366795B (en) |
| UY (1) | UY27970A1 (en) |
| ZA (1) | ZA200502663B (en) |
Cited By (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| MD4012B2 (en) * | 2002-09-10 | 2010-01-31 | Ivi Smart Technologies, Inc | Identification card |
| CN101626296B (en) * | 2009-05-27 | 2012-04-18 | 飞天诚信科技股份有限公司 | Method for improving input information security and biological information acquisition equipment |
| CN101616416B (en) * | 2009-07-24 | 2012-08-29 | 中兴通讯股份有限公司 | Method and equipment for authenticating smart card of communication terminal |
| CN102831335A (en) * | 2011-06-16 | 2012-12-19 | 中国科学院数据与通信保护研究教育中心 | Safety protecting method and safety protecting system of Windows operating system |
| CN103733230A (en) * | 2011-08-02 | 2014-04-16 | 康宁股份有限公司 | Biometric-enabled smart card |
| CN103930893A (en) * | 2012-07-13 | 2014-07-16 | Befs有限公司 | Portable storage device using fingerprint recognition and method for controlling same |
| CN103955733A (en) * | 2014-04-22 | 2014-07-30 | 中国工商银行股份有限公司 | Electronic identity card chip card, card reader and electronic identity card verification system and method |
| CN105069436A (en) * | 2015-08-14 | 2015-11-18 | 广东欧珀移动通信有限公司 | Control method and system based on fingerprint identification, fingerprint identification module |
| GB2529214A (en) * | 2014-08-14 | 2016-02-17 | Soloprotect Ltd | An identity card holder and system |
| CN105493103A (en) * | 2013-09-26 | 2016-04-13 | 英特尔公司 | Biometric sensors for personal devices |
| CN106663216A (en) * | 2014-07-29 | 2017-05-10 | 联邦印刷有限公司 | Document with sensor means |
| CN106682477A (en) * | 2017-01-18 | 2017-05-17 | 西京学院 | Authentication method based on human body solid characteristics |
| CN107066862A (en) * | 2007-09-24 | 2017-08-18 | 苹果公司 | Embedded authentication systems in electronic equipment |
| US9819676B2 (en) | 2012-06-29 | 2017-11-14 | Apple Inc. | Biometric capture for unauthorized user identification |
| US9832189B2 (en) | 2012-06-29 | 2017-11-28 | Apple Inc. | Automatic association of authentication credentials with biometrics |
| US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
| CN108701246A (en) * | 2016-03-02 | 2018-10-23 | 维普公司 | Fingerprint can authorization device |
| US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
| US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
| CN110582770A (en) * | 2017-09-06 | 2019-12-17 | 谷歌有限责任公司 | Environmental Condition Verification and User Authentication in Safety Coprocessors |
| CN110692056A (en) * | 2017-05-30 | 2020-01-14 | 维普公司 | Smart card and method for controlling a smart card |
| US10735412B2 (en) | 2014-01-31 | 2020-08-04 | Apple Inc. | Use of a biometric image for authorization |
| CN113378630A (en) * | 2015-02-04 | 2021-09-10 | 艾瑞迪尔通信有限公司 | Local user authentication using neuro and neuro-mechanical fingerprints |
| CN113632103A (en) * | 2019-04-01 | 2021-11-09 | 安富莱控股私人有限公司 | Improved card with fingerprint biological identification technology |
| CN115661991A (en) * | 2021-09-26 | 2023-01-31 | 青岛亿联信息科技股份有限公司 | Face recognition passing linkage gateway system |
| US11619991B2 (en) | 2018-09-28 | 2023-04-04 | Apple Inc. | Device control using gaze information |
| US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
| US11676188B2 (en) | 2013-09-09 | 2023-06-13 | Apple Inc. | Methods of authenticating a user |
| US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
| US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
| US11768575B2 (en) | 2013-09-09 | 2023-09-26 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
| US11809784B2 (en) | 2018-09-28 | 2023-11-07 | Apple Inc. | Audio assisted enrollment |
| US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
| US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
| US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
| US12099586B2 (en) | 2021-01-25 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
| US12216754B2 (en) | 2021-05-10 | 2025-02-04 | Apple Inc. | User interfaces for authenticating to perform secure operations |
| US12262111B2 (en) | 2011-06-05 | 2025-03-25 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
| US12462005B2 (en) | 2017-09-09 | 2025-11-04 | Apple Inc. | Implementation of biometric authentication |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9400914B2 (en) | 2014-10-24 | 2016-07-26 | Egis Technology Inc. | Method and electronic device for generating fingerprint enrollment data |
| JP6753713B2 (en) | 2016-07-15 | 2020-09-09 | 株式会社東芝 | IC module, IC card, and collation device |
| ZA201802775B (en) * | 2018-01-22 | 2019-01-30 | Ratshephe Wright Makhene Ezekiel | A card and identity verification system |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS6029868A (en) | 1983-07-29 | 1985-02-15 | Toshiba Corp | Individual identification system |
| GB2244164A (en) * | 1990-05-18 | 1991-11-20 | Philips Electronic Associated | Fingerprint sensing |
| US5907627A (en) * | 1995-11-06 | 1999-05-25 | Dew Engineering And Development Limited | Contact imaging device |
| US5995630A (en) * | 1996-03-07 | 1999-11-30 | Dew Engineering And Development Limited | Biometric input with encryption |
| US5978495A (en) * | 1996-07-17 | 1999-11-02 | Intelnet Inc. | Method and apparatus for accurate determination of the identity of human beings |
| DE29821644U1 (en) * | 1998-12-04 | 1999-02-18 | Stocko Metallwarenfab Henkels | Authentication system for PC cards |
| AU729157B1 (en) * | 1999-08-02 | 2001-01-25 | Ming-Shiang Shen | Integrated circuit card with fingerprint verification capability |
| US6325285B1 (en) * | 1999-11-12 | 2001-12-04 | At&T Corp. | Smart card with integrated fingerprint reader |
| GB0009609D0 (en) * | 2000-04-18 | 2000-06-07 | Glaxo Group Ltd | Therapeutic compositions |
| AU2001283400A1 (en) * | 2000-08-17 | 2002-02-25 | Authentec, Inc. | Integrated circuit package including opening exposing portion of an ic |
-
2003
- 2003-09-10 UY UY27970A patent/UY27970A1/en not_active Application Discontinuation
- 2003-09-10 PA PA8581901A patent/PA8581901A1/en unknown
- 2003-09-10 TW TW092124967A patent/TWI366795B/en not_active IP Right Cessation
- 2003-09-10 MY MYPI20033420A patent/MY161401A/en unknown
- 2003-09-10 PE PE2003000916A patent/PE20040351A1/en not_active Application Discontinuation
- 2003-09-10 CN CNB038250098A patent/CN100437635C/en not_active Expired - Fee Related
- 2003-09-11 AR ARP030103284 patent/AR041226A1/en active IP Right Grant
-
2005
- 2005-03-08 TN TNP2005000068A patent/TNSN05068A1/en unknown
- 2005-04-01 ZA ZA200502663A patent/ZA200502663B/en unknown
- 2005-04-05 LT LT2005035A patent/LT5344B/en not_active IP Right Cessation
Cited By (52)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| MD4012B2 (en) * | 2002-09-10 | 2010-01-31 | Ivi Smart Technologies, Inc | Identification card |
| CN107066862A (en) * | 2007-09-24 | 2017-08-18 | 苹果公司 | Embedded authentication systems in electronic equipment |
| US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
| US12406490B2 (en) | 2008-01-03 | 2025-09-02 | Apple Inc. | Personal computing device control using face detection and recognition |
| CN101626296B (en) * | 2009-05-27 | 2012-04-18 | 飞天诚信科技股份有限公司 | Method for improving input information security and biological information acquisition equipment |
| CN101616416B (en) * | 2009-07-24 | 2012-08-29 | 中兴通讯股份有限公司 | Method and equipment for authenticating smart card of communication terminal |
| US12262111B2 (en) | 2011-06-05 | 2025-03-25 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
| CN102831335A (en) * | 2011-06-16 | 2012-12-19 | 中国科学院数据与通信保护研究教育中心 | Safety protecting method and safety protecting system of Windows operating system |
| CN102831335B (en) * | 2011-06-16 | 2015-08-05 | 中国科学院数据与通信保护研究教育中心 | A kind of method for security protection of Windows operating system and system |
| CN103733230B (en) * | 2011-08-02 | 2016-10-26 | 康宁股份有限公司 | Enable biometric smart card |
| CN103733230A (en) * | 2011-08-02 | 2014-04-16 | 康宁股份有限公司 | Biometric-enabled smart card |
| US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
| US9832189B2 (en) | 2012-06-29 | 2017-11-28 | Apple Inc. | Automatic association of authentication credentials with biometrics |
| US9819676B2 (en) | 2012-06-29 | 2017-11-14 | Apple Inc. | Biometric capture for unauthorized user identification |
| US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
| US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
| CN103930893A (en) * | 2012-07-13 | 2014-07-16 | Befs有限公司 | Portable storage device using fingerprint recognition and method for controlling same |
| US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
| US11768575B2 (en) | 2013-09-09 | 2023-09-26 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
| US12314527B2 (en) | 2013-09-09 | 2025-05-27 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
| US11676188B2 (en) | 2013-09-09 | 2023-06-13 | Apple Inc. | Methods of authenticating a user |
| CN105493103A (en) * | 2013-09-26 | 2016-04-13 | 英特尔公司 | Biometric sensors for personal devices |
| US10735412B2 (en) | 2014-01-31 | 2020-08-04 | Apple Inc. | Use of a biometric image for authorization |
| CN103955733B (en) * | 2014-04-22 | 2017-02-15 | 中国工商银行股份有限公司 | Electronic identity card chip card, card reader and electronic identity card verification system and method |
| CN103955733A (en) * | 2014-04-22 | 2014-07-30 | 中国工商银行股份有限公司 | Electronic identity card chip card, card reader and electronic identity card verification system and method |
| US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
| CN106663216A (en) * | 2014-07-29 | 2017-05-10 | 联邦印刷有限公司 | Document with sensor means |
| US10515299B2 (en) | 2014-07-29 | 2019-12-24 | Bundesdruckerei Gmbh | Document with sensor means |
| GB2529214B (en) * | 2014-08-14 | 2016-10-19 | Soloprotect Ltd | An identity card holder and system |
| GB2529214A (en) * | 2014-08-14 | 2016-02-17 | Soloprotect Ltd | An identity card holder and system |
| CN113378630A (en) * | 2015-02-04 | 2021-09-10 | 艾瑞迪尔通信有限公司 | Local user authentication using neuro and neuro-mechanical fingerprints |
| CN105069436A (en) * | 2015-08-14 | 2015-11-18 | 广东欧珀移动通信有限公司 | Control method and system based on fingerprint identification, fingerprint identification module |
| CN108701246A (en) * | 2016-03-02 | 2018-10-23 | 维普公司 | Fingerprint can authorization device |
| US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
| CN106682477A (en) * | 2017-01-18 | 2017-05-17 | 西京学院 | Authentication method based on human body solid characteristics |
| CN106682477B (en) * | 2017-01-18 | 2023-09-19 | 西京学院 | Authentication method based on solid-state characteristics of the human body |
| CN110692056A (en) * | 2017-05-30 | 2020-01-14 | 维普公司 | Smart card and method for controlling a smart card |
| CN110582770A (en) * | 2017-09-06 | 2019-12-17 | 谷歌有限责任公司 | Environmental Condition Verification and User Authentication in Safety Coprocessors |
| US10740494B2 (en) | 2017-09-06 | 2020-08-11 | Google Llc | Central and delegate security processors for a computing device |
| TWI681318B (en) * | 2017-09-06 | 2020-01-01 | 美商谷歌有限責任公司 | Mobile apparatus and method performed by apparatus |
| US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
| US12462005B2 (en) | 2017-09-09 | 2025-11-04 | Apple Inc. | Implementation of biometric authentication |
| US12189748B2 (en) | 2018-06-03 | 2025-01-07 | Apple Inc. | Implementation of biometric authentication |
| US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
| US11619991B2 (en) | 2018-09-28 | 2023-04-04 | Apple Inc. | Device control using gaze information |
| US12124770B2 (en) | 2018-09-28 | 2024-10-22 | Apple Inc. | Audio assisted enrollment |
| US12105874B2 (en) | 2018-09-28 | 2024-10-01 | Apple Inc. | Device control using gaze information |
| US11809784B2 (en) | 2018-09-28 | 2023-11-07 | Apple Inc. | Audio assisted enrollment |
| CN113632103A (en) * | 2019-04-01 | 2021-11-09 | 安富莱控股私人有限公司 | Improved card with fingerprint biological identification technology |
| US12099586B2 (en) | 2021-01-25 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
| US12216754B2 (en) | 2021-05-10 | 2025-02-04 | Apple Inc. | User interfaces for authenticating to perform secure operations |
| CN115661991A (en) * | 2021-09-26 | 2023-01-31 | 青岛亿联信息科技股份有限公司 | Face recognition passing linkage gateway system |
Also Published As
| Publication number | Publication date |
|---|---|
| TNSN05068A1 (en) | 2007-05-14 |
| CN100437635C (en) | 2008-11-26 |
| MY161401A (en) | 2017-04-14 |
| LT2005035A (en) | 2006-01-25 |
| LT5344B (en) | 2006-06-27 |
| TWI366795B (en) | 2012-06-21 |
| ZA200502663B (en) | 2006-08-30 |
| TW200411572A (en) | 2004-07-01 |
| UY27970A1 (en) | 2003-12-31 |
| PA8581901A1 (en) | 2004-05-21 |
| AR041226A1 (en) | 2005-05-11 |
| PE20040351A1 (en) | 2004-06-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1695163A (en) | Secure Biometric Authentication | |
| JP4673065B2 (en) | Secret biometric testing of identity | |
| JP5659246B2 (en) | Protected personal data processing and management system | |
| US8918900B2 (en) | Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport | |
| US11521720B2 (en) | User medical record transport using mobile identification credential | |
| US20220138298A1 (en) | Device and systems for strong identity and strong authentication | |
| JP2005508037A (en) | Method and system for establishing identity trust | |
| US12500885B2 (en) | Systems and methods for authentication and validation based on user credential and biometric data | |
| RU2339081C2 (en) | Intellectual identification card | |
| ES2336983B1 (en) | SECURITY BIOMETRIC IDENTITY VERIFICATION. | |
| US20240005719A1 (en) | Distributed biometric identity system enrollment with live confirmation | |
| WO2024263035A1 (en) | A computer implemented method for generating and storing a digital user id associated with a user and use thereof for authenticating a person | |
| LT5403B (en) | Secure biometric verification of identity |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| C17 | Cessation of patent right | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081126 Termination date: 20110910 |