[go: up one dir, main page]

CN1695163A - Secure Biometric Authentication - Google Patents

Secure Biometric Authentication Download PDF

Info

Publication number
CN1695163A
CN1695163A CN 03825009 CN03825009A CN1695163A CN 1695163 A CN1695163 A CN 1695163A CN 03825009 CN03825009 CN 03825009 CN 03825009 A CN03825009 A CN 03825009A CN 1695163 A CN1695163 A CN 1695163A
Authority
CN
China
Prior art keywords
card
identification card
data
processor
iso
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 03825009
Other languages
Chinese (zh)
Other versions
CN100437635C (en
Inventor
塔米奥·萨伊托
会田刚
韦恩·德里辛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
IVI Smart Technologies Inc
Original Assignee
IVI Smart Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IVI Smart Technologies Inc filed Critical IVI Smart Technologies Inc
Publication of CN1695163A publication Critical patent/CN1695163A/en
Application granted granted Critical
Publication of CN100437635C publication Critical patent/CN100437635C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Credit Cards Or The Like (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Storage Device Security (AREA)

Abstract

A high security identification card includes an on-board memory for stored biometric data and an on-board sensor for capturing live biometric data. An on-board processor on the card performs a matching operation to verify that the captured biometric data matches the locally stored biometric data. Only if there is a positive match is any data transmitted from the card for additional verification and/or further processing. Preferably, the card is ISO SmartCard compatible. In one embodiment, the ISO SmartCard functions as a firewall for protecting the security processor used for storing and processing the protected biometric data from malicious external attack via the ISO SmartCard interface. In another embodiment, the security processor is inserted between the ISO SmartCard Interface and an unmodified ISO SmartCard processor and blocks any external communications until the user's fingerprint has been matched with a previously registered fingerprint. Real-time feedback is provided while the user is manipulating his finger over the fingerprint sensor, thereby facilitating an optimal placement of the finger over the sensor. The card may be used to enable communication with a transactional network or to obtain physical access into a secure area.

Description

安全的生物身份验证Secure Biometric Authentication

相关申请related application

本发明基于如下临时申请,2002年9月10日提交的第60/409,716号(卷号为7167-102P1)、2002年9月10日提交的第60/409,715号(卷号为7167-103P)、2002年11月27日提交的第60/429,919号(卷号为7167-104P)、2002年12月13日提交的第60/433,254号(卷号为7167-105P)、2003年7月3日提交的第60/484,692号(卷号为7167-106P),并且要求这些申请的优先权,这些申请的全部内容结合于此作为参考。This application is based on Provisional Application Nos. 60/409,716, filed September 10, 2002 (Docket No. 7167-102P1), and 60/409,715, filed September 10, 2002 (Docket No. 7167-103P) , No. 60/429,919, filed November 27, 2002 (Docket No. 7167-104P), No. 60/433,254, filed December 13, 2002 (Docket No. 7167-105P), July 3, 2003 Serial No. 60/484,692 (Docket No. 7167-106P), filed on the date of 1999, and claiming priority from these applications, the entire contents of which are hereby incorporated by reference.

技术领域technical field

计算机化特别是互联网技术已经提供了对包括财务数据、医疗数据、个人数据的不断增长的数据访问,这意味着加速了金融和其它交易,其中保密数据被进行更新或者交换。Computerization and especially Internet technology has provided access to ever-increasing data including financial data, medical data, personal data, which means accelerating financial and other transactions in which confidential data is updated or exchanged.

通常用口令来维持这些数据的保密性;然而,口令经常是基于易于猜测并且根本就不安全的出生日期或者电话号码。此外,即使是复杂的随机生成的口令也经常能被轻易窃取。基于口令的数据访问系统因而容易受到非法攻击,从而给工业和经济,甚至给人的生命带来危险和损害。因此,需要一种改良的方法,用于保护数据和保护数据免遭未授权访问。Passwords are often used to maintain the confidentiality of this data; however, passwords are often based on dates of birth or phone numbers, which are easy to guess and not at all secure. Furthermore, even complex randomly generated passwords can often be easily stolen. The password-based data access system is therefore vulnerable to illegal attacks, which will bring danger and damage to industry and economy, and even human life. Therefore, there is a need for an improved method for securing data and protecting data from unauthorized access.

生物数据可以包括难以获取但是容易分析的精密细节(例如指纹细节序列),或者容易获取但是难以分析的整体图案(例如相邻指纹螺纹的空间特性)。Biometric data can include fine details that are difficult to obtain but easy to analyze (such as the sequence of fingerprint minutiae), or global patterns that are easy to obtain but difficult to analyze (such as the spatial properties of adjacent fingerprint threads).

加密算法需要仅对授权用户有效的数字密钥。没有正确的密钥,只有投入足够的时间和处理资源,而且即便如此,只有当未加密数据的某些特征是已知的(或者至少是可预知的)时,加密数据才可以被解密成可用格式。Encryption algorithms require digital keys that are valid only for authorized users. Without the correct key, encrypted data can only be decrypted into use if sufficient time and processing resources are devoted to it, and even then, only if certain characteristics of the unencrypted data are known (or at least predictable) Format.

日本公开专利申请第60-029868号(日期1985年2月15日,申请人为Tamio SAITO),提出一种个人识别系统,其使用一种具有用于记录从持卡人处获得的加密生物数据的集成存储器的身份识别卡。生物数据可以包括声波纹、指纹、外貌特征、和/或生物检验。使用中,卡中数据被读取和解密,用于与从出示该卡的人处获取的相应数据进行比较。该系统使得注册人可被高准确度地确定识别。然而,因为生物数据是通过外部设备获得和处理的,所以难以保护存储在卡上的信息免遭可能发生的改变和/或身份盗用。Japanese Laid-Open Patent Application No. 60-029868 (dated February 15, 1985, applicant is Tamio SAITO), proposes a personal identification system that uses a Identification card with integrated memory. Biological data may include voiceprints, fingerprints, physical characteristics, and/or biometric tests. In use, the card data is read and decrypted for comparison with corresponding data obtained from the person presenting the card. The system allows registrants to be identified with a high degree of accuracy. However, because the biometric data is obtained and processed by an external device, it is difficult to protect the information stored on the card from possible alteration and/or identity theft.

已经提出了一种改良的身份识别卡,其包括卡上的数据驱动多处理器芯片,以提供同时加密和隔离存储在卡上的生物数据的硬件防火墙,从而提供更好的保护来防止未经授权而改变存储数据。然而,实际的匹配程序是在同样的获取现场(live)生物数据的外部读卡器终端上执行的,因而仍然潜在地容易受到外部欺诈操作的攻击。An improved identification card has been proposed that includes a data-driven multiprocessor chip on the card to provide a hardware firewall that simultaneously encrypts and isolates biometric data stored on the card, thereby providing better protection against unauthorized access. Authorization to alter stored data. However, the actual matching procedure is performed on the same external reader terminal that captures the live biometric data, thus still potentially vulnerable to external fraudulent manipulation.

发明内容Contents of the invention

高安全性身份识别卡的第一实施例不仅包括用于存储生物数据的卡上(on-board,又称片上或板上)存储器,而且包括用于捕获现场生物数据的卡上传感器。远程认证系统维护包括生物数据的安全数据库。卡上的卡上处理器执行初步的匹配操作,以验证所捕获的生物数据与本地生物存储数据是否匹配。仅当存在正确的本地匹配时,任何获取的数据或任何敏感的存储数据才可以发送到远程认证系统用于附加的验证和/或进一步处理。作为对于恶意攻击的进一步保护,本地存储数据优选不同于远程存储数据,并且优选地使本地匹配和远程匹配采用不同的匹配算法。因而即使卡、本地存储数据、和/或与卡连接的本地终端遭受损害,很可能地,远程认证系统仍然能够发觉入侵企图。The first embodiment of the high security identification card includes not only an on-board (also called on-board or on-board) memory for storing biometric data, but also an on-board sensor for capturing on-site biometric data. The remote authentication system maintains a secure database including biometric data. An on-card processor on the card performs a preliminary matching operation to verify that the captured biometric data matches the local biometric stored data. Only when there is a correct local match can any captured data or any sensitive stored data be sent to the remote authentication system for additional verification and/or further processing. As a further protection against malicious attacks, the locally stored data is preferably different from the remotely stored data, and different matching algorithms are preferably used for local matching and remote matching. Thus even if the card, the locally stored data, and/or the local terminal connected to the card are compromised, it is likely that the remote authentication system will still be able to detect the intrusion attempt.

第二实施例也包括用于存储生物数据的卡上存储器、用于捕获现场生物数据的卡上传感器、以及卡上处理器;然而,在该实施例中,整个匹配程序由卡上处理器来执行,并且生物原始获取数据和存储在卡上存储器中的任何其它“私有”信息对于任何外部程序都是不可访问的。替代地,响应于在新获取的生物数据和先前获取的生物数据之间的成功匹配,仅产生一个验证信息。验证信息使得该卡功能类似于依据了传统的个人身份号码(PIN)的登录(log on)成功/不成功的传统ISO智能卡的方式,但是其具有由更多的安全验证程序所提供的附加的安全性。在任一实施例中,生物存储数据和任何相关的本地存储的加密算法或者加密密钥优选地在最初授予持卡人时载入卡中,其方式为阻止任何将来的外部访问,从而进一步增强了生物存储数据和整个验证程序的完整性。The second embodiment also includes on-card memory for storing biometric data, on-card sensors for capturing live biometric data, and an on-card processor; however, in this embodiment, the entire matching procedure is performed by the on-card processor execution, and the biometric raw acquisition data and any other "private" information stored in the on-card memory is inaccessible to any external program. Alternatively, only one verification message is generated in response to a successful match between newly acquired biometric data and previously acquired biometric data. The authentication information enables the card to function in a manner similar to traditional ISO smart cards based on successful/unsuccessful log on of a traditional personal identification number (PIN), but with additional security provided by a more secure verification procedure safety. In either embodiment, the biometric data and any associated locally stored encryption algorithms or encryption keys are preferably loaded onto the card upon initial award to the cardholder in a manner that prevents any future external access, thereby further enhancing Integrity of biologically stored data and the entire verification process.

在一个实施例中,ISO智能卡起到防火墙的作用,用于保护用来存储和处理受保护生物数据的安全处理器免于遭受通过ISO智能卡接口进行的外部恶意攻击。在另一个实施例中,安全处理器插于ISO智能卡接口和没有经过修改的ISO智能卡处理器之间,并一直阻止任何外部通信直到用户的指纹已经与先前注册的指纹相匹配为止。In one embodiment, the ISO smart card acts as a firewall for protecting the secure processor used to store and process protected biometric data from external malicious attacks through the ISO smart card interface. In another embodiment, the security processor is interposed between the ISO smart card interface and the unmodified ISO smart card processor, and blocks any external communication until the user's fingerprint has been matched with a previously enrolled fingerprint.

在具有卡上指纹匹配能力的高安全性身份识别卡的一个优选实施例中,当用户将其手指放到指纹传感器上方时,实时反馈被提供,从而有助于手指在传感器上方进行最佳放置。该反馈不仅降低了计算复杂性,而且提供了用于在无经验用户和欺诈用户之间进行区别的附加方法,从而进一步减少了错误否定和/或错误肯定的可能性。在另一个优选实施例中,指纹传感器被保持在提供额外稳定性的载体中。In a preferred embodiment of a high security ID card with on-card fingerprint matching capability, when the user places their finger over the fingerprint sensor, real-time feedback is provided to facilitate optimal placement of the finger over the sensor . This feedback not only reduces computational complexity, but also provides an additional method for distinguishing between inexperienced users and fraudulent users, thereby further reducing the likelihood of false negatives and/or false positives. In another preferred embodiment, the fingerprint sensor is held in a carrier which provides additional stability.

在一个示范性应用中,将获取到的生物数据和/或持卡人的身份标志在任何对保密数据在线访问的授权之前或者在任何用于完成安全交易的自动化程序之前进行加密,然后输入到包括金融机构和单独的认证服务器的交易网络中。在另一个示范性应用中,将卡的输出用于获得进入安全区域的物理通道。在任一应用中,成功的和不成功的访问企图的记录都可以被保存在卡上或者外部安全服务器上,或者在两者上都保存。In one exemplary application, captured biometric data and/or cardholder identification are encrypted prior to any authorization of online access to confidential data or prior to any automated process used to complete a secure transaction and then entered into the In a transaction network that includes financial institutions and separate authentication servers. In another exemplary application, the card's output is used to gain physical access to a secure area. In either application, records of successful and unsuccessful access attempts can be kept on the card or on an external secure server, or both.

附图说明Description of drawings

图1示出了具有卡上生物验证示卡人的身份的智能卡的一个实施例;Figure 1 shows an embodiment of a smart card with on-card biometric verification of the identity of the person presenting the card;

图2是用于帮助用户实现手指在指纹传感器上的最佳放置的示范性程序的流程图;2 is a flowchart of an exemplary procedure for assisting a user in achieving optimal placement of a finger on a fingerprint sensor;

图3是能够同时本地和远程验证出示安全身份识别卡的人的身份的生物验证系统的功能方框图;Figure 3 is a functional block diagram of a biometric authentication system capable of simultaneously locally and remotely verifying the identity of a person presenting a secure identification card;

图4是具有在初始载入持卡人生物数据期间和在验证持卡人的远程请求身份期间使用不同物理数据路径的典型的生物验证卡的功能方框图;Figure 4 is a functional block diagram of a typical biometric authentication card with different physical data paths used during initial loading of the cardholder's biometric data and during verification of the cardholder's remotely requested identity;

图5示出了图4的典型生物验证卡的可选实施例,其打算采用无修改的ISO智能卡CPU的方式;Fig. 5 shows an alternative embodiment of the exemplary biometric authentication card of Fig. 4, which is intended to be adopted in the manner of an ISO smart card CPU without modification;

图6是表示典型应用和典型验证卡之间的通信的流程图,其中只执行对持卡人身份的本地验证;Figure 6 is a flow diagram representing communication between an exemplary application and an exemplary verification card, where only local verification of the cardholder's identity is performed;

图7是类似于图6的流程图,但是改为采用图5的典型生物验证卡的方式;Fig. 7 is a flow chart similar to Fig. 6, but the mode of the typical biometric authentication card of Fig. 5 is adopted instead;

图8示出了具有可无线或者借助于电接插件连接到本地终端的卡上生物验证的智能卡的第二实施例;Figure 8 shows a second embodiment of a smart card with on-card biometric authentication connectable wirelessly or by means of an electrical connector to a local terminal;

图9是图8的卡的横截面图;Figure 9 is a cross-sectional view of the card of Figure 8;

图10是典型指纹传感器的电路图;以及Figure 10 is a circuit diagram of a typical fingerprint sensor; and

图11示出了用于图10的传感器的载体组件的一个实施例。FIG. 11 shows one embodiment of a carrier assembly for the sensor of FIG. 10 .

具体实施方式Detailed ways

智能卡smart card

此处使用的术语“智能卡(smart card)”或者“智慧卡(intelligentcard)”一般意义上是指任何物理对象,其足够小到可以握在手中,戴在脖子上,或者以其它方式随身携带,其包括微处理器,能够存储、处理和传递涉及或者其它关系到持卡者个人的数字编码信息。这种智能卡的一个众所周知的实例是ISO(International StandardsOrganization国际标准组织)智能卡,其具有与传统的信用卡相同的物理尺寸和外形,但是其包括:闪存,用于存储用户特定数据;以及微处理器,能以强大的加密算法进行编程,指示从用户终端收到的PIN(Personal Identification Number个人身份号码)是否与卡上存储的加密PIN相匹配,从而与仅依靠对签名和/或身体相貌进行视觉比较的验证系统相比,对出示卡的人是真正的持卡人给出了更高的可信度。As used herein, the term "smart card" or "intelligent card" refers generally to any physical object small enough to be held in the hand, worn around the neck, or otherwise carried on the person's body, It includes a microprocessor capable of storing, processing and communicating digitally encoded information relating to or otherwise relating to the cardholder personally. A well-known example of such a smart card is the ISO (International Standards Organization International Standards Organization) smart card, which has the same physical size and shape as a traditional credit card, but which includes: flash memory for storing user-specific data; and a microprocessor, It can be programmed with a strong encryption algorithm to indicate whether the PIN (Personal Identification Number) received from the user terminal matches the encrypted PIN stored on the card, so as to rely only on visual comparison of signature and/or physical appearance This gives a higher degree of confidence that the person presenting the card is the real cardholder compared to existing authentication systems.

接下来参照图1,其示出了具有卡上生物验证的智能卡的一个实施例。卡100通常由塑料材料制成,并且具有传统的信用卡的整体外观,其大致尺寸符合ISO7816中规定的约53.98×85.6mm且厚度约0.76mm或者更厚。Referring next to FIG. 1, one embodiment of a smart card with on-card biometric authentication is shown. The card 100 is generally made of plastic material and has the overall appearance of a traditional credit card, with approximate dimensions of about 53.98 x 85.6 mm and a thickness of about 0.76 mm or more specified in ISO7816.

类似于传统的信用卡,卡100包括空白的上部区域102,其沿着卡的整个横向宽度延伸,用于承载位于卡的背面上的磁条(符合ISO7811-2&7811-6的规定),该磁条上可以存储关于持卡人和任何相关帐户的传统编码字符信息,从而使卡100可在传统的磁条读取器中使用。然而,因为载入磁条中的任何数据都易于修改,所以这样的磁条仅仅适用于对老式磁条式终端的向后兼容的需要超过磁条带给系统安全性的潜在下降的特定应用中。Similar to a conventional credit card, the card 100 includes a blank upper region 102 extending along the entire lateral width of the card for carrying a magnetic strip (according to ISO7811-2 & 7811-6) on the back of the card, the magnetic strip Conventional coded character information about the cardholder and any associated account may be stored on the card 100, allowing the card 100 to be used in conventional magnetic stripe readers. However, since any data loaded on a magnetic stripe can be easily modified, such a magnetic stripe is only suitable for certain applications where the need for backward compatibility with older magnetic stripe terminals outweighs the potential reduction in system security that the magnetic stripe brings .

上部区域102还用于支持各种防伪措施,例如持卡人的防篡改的彩色照片和/或发卡人的全息标识。卡100的下部区域104可以使用传统样式的浮雕信息(符合ISO 7811-1规定),例如持卡人姓名、数字帐(或者卡)号、以及有效日期,以使卡100可在传统的卡刻印器中使用。The upper region 102 is also used to support various anti-counterfeiting measures, such as a tamper-proof color photo of the cardholder and/or a holographic identification of the cardholder. The lower region 104 of the card 100 may emboss information in a conventional style (according to ISO 7811-1), such as the cardholder's name, digital account (or card) number, and expiration date, so that the card 100 may be embossed on a conventional card. used in the device.

上部区域102和下部区域104被中部区域106分隔,其中嵌入一组8个可见的ISO智能卡触点108,其在卡和读卡器上相应触点之间提供方便的电连接。通过该方法,不仅数据,而且电源、时钟以及控制信号都可在读卡器和卡之间进行交换,如ISO 7816-3中所规定的。The upper area 102 and lower area 104 are separated by a middle area 106 in which is embedded a set of eight visible ISO smart card contacts 108 which provide a convenient electrical connection between corresponding contacts on the card and card reader. With this method, not only data but also power, clock and control signals are exchanged between the reader and the card as specified in ISO 7816-3.

在区域106的右侧可以看见传感器区域110,其用于从持卡人的手指获取指纹数据。优选地,向卡提供与传感器110或者嵌入卡中其它电子元件唯一对应的ID码;例如,传统的IP和/或MAC地址格式的编码。To the right of area 106 can be seen a sensor area 110 which is used to acquire fingerprint data from the cardholder's finger. Preferably, the card is provided with an ID code that uniquely corresponds to the sensor 110 or other electronic component embedded in the card; for example, a code in conventional IP and/or MAC address format.

图1还示意性地示出了数个附加的电子元件,其与触点108和传感器110配合,与其他可能相比,提供了更强大的功能,特别是更好的安全性。Figure 1 also schematically shows several additional electronic components, which, in cooperation with the contacts 108 and the sensors 110, provide greater functionality and in particular better safety than would otherwise be possible.

在一个实施例中,ISO智能卡兼容处理器112直接连接到ISO触点108,以提供与外部ISO兼容读卡器(未示出)的电连接,从而不仅向卡上电子器件提供电源,而且提供用于在卡与任何运行在读卡器或者任何与读卡器联网的相关计算设备上的外部通信软件、安全软件、交易软件、和/或其它的应用软件之间传输数据的方法。In one embodiment, the ISO smart card compatible processor 112 is directly connected to the ISO contacts 108 to provide an electrical connection to an external ISO compatible card reader (not shown) to provide power not only to the on-card electronics but also The method used to transfer data between the card and any external communication software, security software, transaction software, and/or other application software running on the card reader or any associated computing device networked with the card reader.

尽管在所述实施例中,在卡100和外部读卡器之间的数据通道是使用ISO规定的智能卡连通方案的有线连接的形式,但应当明白,在其它的实施例中,其它的传输技术也可以被使用,例如USB或RS 232C或SPI(串行)连接,可通过无线RF(Radio Frequency射频)、微波和/或IR(InfraRed红外线)通信链路。Although in the described embodiment the data channel between the card 100 and the external reader is in the form of a wired connection using the ISO specified smart card connectivity scheme, it should be understood that in other embodiments other transmission technologies Can also be used, for example USB or RS 232C or SPI (serial) connections, via wireless RF (Radio Frequency radio frequency), microwave and/or IR (InfraRed infrared) communication links.

同样,尽管所述实施例从读卡器获取电源,但其它的实施例可以具有卡上电源,例如太阳能电池或者电池。该卡上电源可能具有优势,例如,如果在卡100和特定类型读卡器之间的机械接口是这样的,以使指纹传感器110在触点108连接到读卡器中相应连接的情况下不能被用户访问,从而必须在卡100不与读卡器直接有线连接的情况下捕获用户指纹数据。Also, while the described embodiment draws power from the card reader, other embodiments could have an on-card power source, such as a solar cell or battery. This on-card power supply may be advantageous, for example, if the mechanical interface between the card 100 and a particular type of card reader is such that the fingerprint sensor 110 cannot Accessed by the user, user fingerprint data must therefore be captured without a direct wired connection of the card 100 to the reader.

安全处理器security processor

如图所示,安全处理器114连接在ISO处理器112和传感器110之间,用于提供对所捕获的数据的安全处理和存储,并且提供“防火墙”,以保护存储在它的专用存储器中的数据和程序免遭任何通过ISO处理器112进行的异常访问企图,如下文所述。该防火墙可设计为仅通行使用了加密密钥的加密数据,该加密密钥基于唯一分配的网络地址或者其它与该特定卡唯一对应的东西,例如从先前存储的指纹图案提取的数据,或者唯一分配的设备号例如CPU号,或者指纹传感器号。在另一个实施例中,防火墙仅仅通行包括源自先前的传输或者数据的唯一可识别数据的数据。在其他实施例中,防火墙对不同的应用保存不同的密钥,并且用这些密钥将数据发送到各自不同的处理器或者存储器部分。As shown, a security processor 114 is coupled between the ISO processor 112 and the sensor 110 to provide secure processing and storage of captured data and to provide a "firewall" to protect data stored in its dedicated memory The data and programs are protected from any unusual access attempts by the ISO processor 112, as described below. The firewall can be designed to pass only encrypted data using an encryption key based on a uniquely assigned network address or something else that uniquely corresponds to that particular card, such as data extracted from a previously stored fingerprint pattern, or a unique The assigned device number such as the CPU number, or the fingerprint sensor number. In another embodiment, the firewall only passes data that includes uniquely identifiable data from previous transmissions or data. In other embodiments, the firewall maintains different keys for different applications, and uses these keys to send data to respective different processors or portions of memory.

在另一个实施例中(未示出),安全处理器114直接连接到ISO触点108,并且充当ISO处理器112与ISO触点108之间的安全门禁。该可选方案具有如下优点,提供由安全处理器114和传感器110提供的附加的安全性,而不会有任何危及任何可能已集成到ISO处理器112中的安全特性的可能。In another embodiment (not shown), security processor 114 is directly connected to ISO contacts 108 and acts as a security gate between ISO processor 112 and ISO contacts 108 . This alternative has the advantage of providing the additional security provided by the security processor 114 and sensor 110 without any possibility of compromising any security features that may have been integrated into the ISO processor 112 .

安全处理器114优选包括非易失半导体存储器或者非半导体存储器,例如FRAM、OTP、E2PROM、MRAM、MROM,用于存储先前注册的指纹图案和/或其它的人体生物信息。在其他实施例中,安全处理器114的一部分或者全部功能可在ISO处理器112中执行,和/或ISO处理器112的一些或者全部功能可在安全处理器114中执行。这样的组合执行仍能维持各功能之间的软件防火墙,如果设备以不允许对存储的软件程序作任何后续修改的方式来执行,那么这将是特别有利的。可选地,处理器112、114都可以是单个多处理器设备中单独的处理器,该设备设计为保护每个处理器免遭来自运行在不同处理器内的另一个程序的任何干扰。这种多处理器装置的一个实例是日本夏普公司(Sharp)的DDMP(Data Driven MultipleProcessor,数据驱动式多处理器)。The security processor 114 preferably includes non-volatile semiconductor memory or non-semiconductor memory, such as FRAM, OTP, E 2 PROM, MRAM, MROM, for storing previously registered fingerprint patterns and/or other human biological information. In other embodiments, some or all of the functions of the security processor 114 may be performed in the ISO processor 112 , and/or some or all of the functions of the ISO processor 112 may be performed in the security processor 114 . Such a combined implementation still maintains a software firewall between the functions, which is particularly advantageous if the device is executed in a manner that does not allow any subsequent modification of the stored software programs. Alternatively, both processors 112, 114 may be separate processors in a single multiprocessor device designed to protect each processor from any interference from another program running on a different processor. An example of such a multiprocessor device is DDMP (Data Driven Multiple Processor, Data Driven Multiple Processor) of Sharp Corporation of Japan.

尽管这些各种传感器、触点、和其它电子元件,以及用于互连的印刷电路或者其它电线路,均优选被完全装入卡100的卡体,从而保护它们免遭磨损和外部污染,而且还在上部区域102和下部区域104之间的中间区域106之内的优选位置进一步保护它们免遭来自与其它区域有机械连接的传统的磁条读卡器、压印机、以及刻印装置的可能的损害。Although these various sensors, contacts, and other electronic components, as well as printed circuits or other electrical circuits for interconnection, are preferably fully enclosed in the card body of card 100, they are protected from wear and external contamination, and Also their preferred location within the intermediate zone 106 between the upper zone 102 and the lower zone 104 further protects them from the possibility of conventional magnetic stripe readers, imprinters, and imprinting devices having mechanical connections to other zones. damage.

LED反馈LED feedback

LED 116a、116b由安全处理器114控制,向用户提供可视反馈。在所示实施例中,它们位于下部区域104中,优选地位于卡的侧边远离触点108的位置。无论如何,LED 116a、116b优选地位于在任何压印程序期间它们不会被损害的位置,以及位于当卡插入传统的ISO智能卡读取器时和/或当用户手指放到指纹传感器110上方时它们可以被看见的位置。例如:LEDs 116a, 116b are controlled by security processor 114 to provide visual feedback to the user. In the illustrated embodiment, they are located in the lower region 104 , preferably on the side of the card away from the contacts 108 . Regardless, the LEDs 116a, 116b are preferably located where they will not be damaged during any imprinting procedure, and when the card is inserted into a conventional ISO smart card reader and/or when the user's finger is placed over the fingerprint sensor 110 where they can be seen. For example:

在验证模式下:In verify mode:

·红灯闪烁:等待手指Flashing red light: waiting for finger

·停止闪烁:手指已放在传感器上·Stop blinking: finger is on the sensor

·红灯闪烁一次:不匹配,可以移动手指Red light flashes once: no match, you can move your finger

·绿灯长闪烁一次:已匹配,可以移开手指Green light flashes once: already matched, you can remove your finger

注册模式下:In registration mode:

·绿灯闪烁:等待手指Green light flashing: waiting for finger

·停止闪烁:手指已放在传感器上·Stop blinking: finger is on the sensor

·红灯闪烁一次:不能注册,可以移动手指The red light flashes once: can not register, you can move your finger

·绿灯闪烁一次:已注册,可以移开手指Green light flashes once: Registered, you can remove your finger

擦除模式下:In erase mode:

·绿灯和红灯闪烁:准备擦除Flashing green and red lights: ready to erase

·绿灯闪烁一次:已擦除·Green light flashes once: erased

优选地,在发送任何否定报告之前,用户被给予多次机会去放置其手指以得到成功的匹配或者注册。在一个实施例中,只有当用户在收到绿灯准许指示之前移开其手指时,或者当预定时限超出时,否定报告才被发送到认证服务器。该程序不仅训练用户实现其手指在传感器上方进行最佳放置,其不仅降低了计算复杂性,而且使得可使用更大的辨别阈值。该可视反馈还提供了用于在无经验用户(其通常不断尝试直到实现正确的放置)和欺诈用户(其通常不希望引起任何注意,并且将会在其恶意被发觉之前离开)之间进行辨别的心理学基础。最终结果是显著减少了错误否定和/或错误肯定的可能性。Preferably, the user is given multiple opportunities to place his finger for a successful match or registration before any negative reports are sent. In one embodiment, a negative report is sent to the authentication server only if the user removes his finger before receiving a green light grant indication, or when a predetermined time limit is exceeded. This procedure not only trains the user to achieve optimal placement of his finger over the sensor, it not only reduces computational complexity, but also allows a larger discrimination threshold to be used. This visual feedback also provides a useful way to distinguish between inexperienced users (who usually keep trying until a correct placement is achieved) and fraudulent users (who usually don't want to draw any attention and will walk away before their malice is detected). The psychological basis of discrimination. The end result is a significantly reduced chance of false negatives and/or false positives.

图2示出了帮助用户将其手指放置到传感器110上的典型程序。在方框150中,RED LED 116b正在闪烁。一旦手指被探测到(方框152),该LED就停止闪烁并进行图像质量(对应于手指皮肤的凸部和凹部的细长的限定区域)的检测(方框154)。如果质量不合格(NO分支156),那么RED LED 116b的单次闪烁指示用户移动其手指到不同的位置(方框158);否则(YES分支160)执行第二检测(方框162),以确定是否相同手指放在被用来注册用户的相同位置,从而相对简单的匹配算法就可在预定阈值范围内验证现场数据与存储数据的符合,从而验证现场手指与最初注册的手指相同(YES分支164),以及GREEN LED 116a被激活(方框166)持续足够长时间(方框168)以证实已经产生成功的匹配以及用户现在可以移开其手指。可选地,如果匹配阈不满足(NO分支170),那么红色LED 116b的单次闪烁(方框158)指示用户移动其手指到不同的位置,且该程序重复进行。FIG. 2 shows a typical procedure to assist the user in placing his finger on the sensor 110 . In block 150, the RED LED 116b is blinking. Once a finger is detected (block 152), the LED stops blinking and the image quality (elongated defined area corresponding to the bumps and valleys of the finger skin) is checked (block 154). If the quality is not acceptable (NO branch 156), then a single blink of the RED LED 116b indicates that the user has moved his finger to a different location (block 158); otherwise (YES branch 160) a second test is performed (block 162) to Determining whether the same finger is placed in the same position as used to enroll the user, so that a relatively simple matching algorithm can verify that the live data matches the stored data within a predetermined threshold, thereby verifying that the live finger is the same as the originally enrolled finger (YES branch 164), and the GREEN LED 116a is activated (block 166) for a long enough time (block 168) to confirm that a successful match has been made and the user can now remove his finger. Optionally, if the match threshold is not met (NO branch 170), then a single blink of the red LED 116b (block 158) indicates that the user has moved his finger to a different location, and the procedure repeats.

典型网络结构Typical network structure

接下来参照图3,其示出了既可本地也可远程验证出示安全身份识别卡的人的身份的生物验证系统的一个可能的实施例。其包括三个主要部分:客户终端200,应用服务器202以及认证服务器204。客户终端200包括以下功能:现场捕获和本地处理用户的指纹、加密本地处理数据、以及与应用服务器及认证服务器进行安全通信,该安全通信优选通过使用IP/TCP寻址方案和传输协议的互联网进行,并通过传统的IP防火墙206提供保护以免遭恶意访问。在其他实施例中,防火墙206可以拥有过滤器以及加密编码器/解码器,用于当发送数据被验证为授权数据后将其编码并用于当确定接收数据是否为授权数据前将其解码,其例如使用像DES 128这样的加密算法。用该方法,防火墙206不仅可根据报文头,而且可根据报文内容来将数据分类为授权数据或者潜在恶意数据。Referring next to FIG. 3, one possible embodiment of a biometric authentication system that can both locally and remotely verify the identity of a person presenting a secure identification card is shown. It includes three main parts: client terminal 200 , application server 202 and authentication server 204 . The client terminal 200 includes the functionality of capturing and locally processing the user's fingerprint on-site, encrypting locally processed data, and securely communicating with the application server and authentication server, preferably over the Internet using the IP/TCP addressing scheme and transport protocol , and provide protection from malicious access through the traditional IP firewall 206. In other embodiments, the firewall 206 may have filters and encryption encoders/decoders for encoding sent data after it is verified as authorized data and for decoding received data before determining whether it is authorized data, which For example using an encryption algorithm like DES 128. In this way, the firewall 206 can classify data as authorized data or potentially malicious data not only according to the packet header, but also according to the packet content.

客户终端200可以专用网络设备的方式来实现,或者可以应用于安装在可编程的台式电脑、笔记本电脑或者其它工作站或个人电脑上的软件当中,这些电脑由通用操作系统例如Windows XXX、OS X、Solaris XX、Linux或Free BSD所控制。优选地,客户终端200包括保持更新的“禁用”数据库(例如丢失的或者失窃的卡的身份,或者对特定的卡或者一组卡的限制),以提供附加的安全措施。The client terminal 200 can be implemented as a dedicated network device, or can be applied to software installed on programmable desktop computers, notebook computers, or other workstations or personal computers. These computers are run by general-purpose operating systems such as Windows XXX, OS X, Controlled by Solaris XX, Linux or Free BSD. Preferably, the client terminal 200 includes a "disabled" database (such as the identity of lost or stolen cards, or restrictions on a particular card or group of cards) that is kept updated to provide an additional measure of security.

应用服务器202包括如下功能,进行事务处理,或者在用户的身份已经被认证服务器204证实之后,响应来自在客户终端200的远程用户的指令。认证服务器204包括以下功能,与客户终端200及应用服务器202进行安全通信,存储真实指纹数据和其它关于前注册用户的信息,将存储数据与从客户终端200收到的加密的现场数据进行比较,以及通知应用服务器202指定的现场指纹数据是否匹配存储的指纹数据。The application server 202 includes functionality to conduct transactions or to respond to instructions from a remote user at the client terminal 200 after the user's identity has been verified by the authentication server 204 . Authentication server 204 includes following functions, carries out secure communication with client terminal 200 and application server 202, stores real fingerprint data and other information about former registered user, compares stored data with the field data of encryption received from client terminal 200, And notify the application server 202 whether the specified on-site fingerprint data matches the stored fingerprint data.

更特别地,客户终端200还包括两个主要部件:固定读卡器208部件,其包括互联网浏览器终端210和读卡器接口108a(其可以是简单的USB线缆,端接在一组电触点上,用于形成与ISO智能卡触点108的对应电连接);以及便携式智能卡部件100’。在一个实施例中,便携式部件100’可以是前面所述的智能卡100,包括指纹传感器110、安全处理器114和ISO智能卡处理器112。More specifically, the client terminal 200 also includes two main components: a fixed card reader 208 component, which includes an Internet browser terminal 210 and a card reader interface 108a (which can be a simple USB cable terminated in a set of electrical contacts for forming corresponding electrical connections with the ISO smart card contacts 108); and the portable smart card component 100'. In one embodiment, the portable unit 100'

应用服务器202还包括互联网服务器接口,其包括防火墙206和互联网浏览器214,以及交易应用模块216和确认模块218。在应用服务器和应用模块216是未被设计成通过IP/TCP协议进行对外通信的传统设备的情况下,防火墙206可用适当的安装了确认模块218并且具有固定IP地址的协议转换程序来代替。例如,应用服务器可以由愿意通过互联网向授权用户提供服务的第三方来进行操作。Application server 202 also includes an Internet server interface, including firewall 206 and Internet browser 214 , and transaction application module 216 and validation module 218 . In the case that the application server and the application module 216 are traditional devices not designed to communicate externally through the IP/TCP protocol, the firewall 206 can be replaced by a proper protocol conversion program installed with the confirmation module 218 and having a fixed IP address. For example, the application server may be operated by a third party willing to provide services to authorized users over the Internet.

认证服务器204还包括:互联网服务器接口220;处理模块222,包括指纹匹配算法224;以及数据库226,用于存储指纹和其它当这些个人被系统注册以及其身份保证满足系统操作员的要求时从这些个人处收集的真实信息。为了进一步加强安全性,优选地,用于任何特定个人的存储数据不以单一的信息列来存储在应用服务器上,而是将各项分开存储,并且任何连接这些项目所要求的索引或者关联都只有通过相应的密钥才可以得到,该密钥保存为认证服务器中个人私人数据的一部分。Authentication server 204 also includes: Internet server interface 220; processing module 222, including fingerprint matching algorithm 224; ACTUAL INFORMATION COLLECTED FROM INDIVIDUALS. To further enhance security, preferably, stored data for any particular individual is not stored on the application server as a single column of information, but rather the items are stored separately, and any indexes or associations required to link these items are This is only available via the corresponding key, which is stored as part of the individual's private data on the authentication server.

定位position

在某些实施例中,固定读卡器208和/或便携式卡100″还可以装备集成的全球定位卫星(Global Positioning Satellite,“GPS”)接收器212,其可提供关于读卡器和卡在或约在特定交易发生时的当前位置的有用信息。特别地,来自GPS接收器212的位置数据可用于在读卡器或卡被移出至其使用未获授权的区域的情况下使读卡器和/或卡失效(永久或临时)。除了通过GPS,还可以通过其他方法来自动确定位置,例如采用PHS(日本蜂窝式电话)呼叫者定位技术,或者采用对地球电磁场中的局部变化敏感的定位传感器。在装备GPS卡的特别例子中,各种GPS元件包括天线;数字放大、AD转换器以及采样和保持电路;以及计算位置的数字信息处理器,优选地,这些元件都是单块集成电路的部件或者都是安装在单块电路板上的分立器件,其被集成、嵌入或者层压到卡体中。In some embodiments, the fixed card reader 208 and/or the portable card 100" can also be equipped with an integrated Global Positioning Satellite (Global Positioning Satellite, "GPS") receiver 212, which can provide information about the location of the card reader and the card. or useful information about the current location when a particular transaction occurred. Particularly, location data from the GPS receiver 212 can be used to enable the reader and / or card failure (permanent or temporary). In addition to GPS, location can also be determined automatically by other methods, such as using PHS (Japanese Cellular Phone) caller location technology, or using location sensitive to local changes in the earth's electromagnetic field Sensors. In a particular example equipped with a GPS card, the various GPS components include antennas; digital amplification, AD converters, and sample and hold circuits; The components are either discrete devices mounted on a single circuit board, which are integrated, embedded or laminated into the card body.

具有卡上匹配的ISO卡的卡结构Card structure with matching ISO card on the card

ISO处理器接口ISO processor interface

图4是典型ISO智能卡兼容生物验证卡100或100’的功能方框图,其有不同的物理数据路径,用于初始载入持卡人生物数据期间和验证持卡人对远程应用的身份期间。Figure 4 is a functional block diagram of a typical ISO smart card compatible biometric authentication card 100 or 100' having different physical data paths for both during initial loading of the cardholder's biometric data and during verification of the cardholder's identity to remote applications.

特别地,除了前面描述的ISO处理器112、安全处理器114、指纹传感器110、LED 116a、116b和可选的GPS接收器212,其中只有ISO处理器112通过ISO智能卡触点108直接连接到读卡器208的方式之外,还示出了独立的加载模块300和相关的临时连接302,其在初始的用户注册期间提供与安全处理器114的直接通信。可以注意到,当临时加载连接302连接到特定的I/O端口308时,ISO处理器112通过I/O端口304、306与安全处理器114进行通信。优选地,安全处理器编程为,使得任何敏感保密相关数据或者软件仅可从端口308得到而不能从端口304和306得到,从而避免了在连接302被禁止后任何恶意访问这些敏感数据的可能性。Specifically, in addition to the previously described ISO processor 112, security processor 114, fingerprint sensor 110, LEDs 116a, 116b, and optional GPS receiver 212, only the ISO processor 112 is directly connected to the reader via the ISO smart card contacts 108. In addition to the card 208, a separate load module 300 and associated temporary connection 302 are shown, which provide direct communication with the security processor 114 during initial user registration. It can be noted that the ISO processor 112 communicates with the security processor 114 through the I/O ports 304 , 306 when the temporary load connection 302 is connected to a specific I/O port 308 . Preferably, the security processor is programmed such that any sensitive security-related data or software is only available from port 308 and not from ports 304 and 306, thereby avoiding any possibility of malicious access to such sensitive data after connection 302 is disabled .

大多数市场上可获得的ISO处理器具有至少两个I/O端口而且有些具有至少三个。这些端口中仅有一个(I/O 1)被指定用于连接到外部ISO兼容读卡器208的传统的ISO智能卡串行数据连接108。优选地,另外的一个或者两个I/O端口提供了在ISO处理器112和安全处理器114之间的专用硬布线通信,其作为硬件防火墙,以阻止对安全处理器114重编程序或者获得对任何敏感信息的访问的任何恶意企图,该信息可能是先前被传感器110获取或者可能是被存储在处理器114内。在具有多于两条I/O线路的ISO处理器的特定情况中,甚至当安全处理器完全断电时,可能在ISO处理器和安全处理器之间的专用通信路径上的静态信息出现多于两个的状态,例如1)Ready(就绪),2)Busy(忙),3)Fail(失败),和4)Pass(通过)。当然,即使只有一个I/O端口有效,这四种状态也能作为串行数据被动态发送。Most commercially available ISO processors have at least two I/O ports and some have at least three. Only one of these ports (I/O 1) is designated for a conventional ISO smart card serial data connection 108 to an external ISO compatible card reader 208. Preferably, an additional one or two I/O ports provide dedicated hardwired communication between the ISO processor 112 and the security processor 114, which acts as a hardware firewall to prevent reprogramming of the security processor 114 or obtaining Any malicious attempt to access any sensitive information that may have been previously acquired by sensor 110 or may be stored within processor 114 . In the specific case of an ISO processor with more than two I/O lines, even when the safety processor is completely powered down, there may be too many static messages on the dedicated communication path between the ISO processor and the safety processor. There are two states, such as 1) Ready (ready), 2) Busy (busy), 3) Fail (failure), and 4) Pass (pass). Of course, even if only one I/O port is active, these four states can be sent dynamically as serial data.

可以通过ISO接口I/O 2和I/O 3在ISO CPU与安全CPU之间传输的可能的命令和数据如下:The possible commands and data that can be transferred between the ISO CPU and the safety CPU via the ISO interfaces I/O 2 and I/O 3 are as follows:

·注册或者验证用户命令,安全CPU将对其发送注册结果或者验证结果,用于本地存储和/或发送至远程应用。• Register or verify user commands, to which the security CPU will send registration or verification results for local storage and/or sending to remote applications.

·指纹信息,作为模板(参考)可从安全CPU发送到ISO CPU,用于存储到ISO智能卡存储器中以发送至远程应用。为了加强敏感私人信息的安全性,参考数据可在其发送到ISOCPU之前由安全CPU进行加密。Fingerprint information, as a template (reference) can be sent from the security CPU to the ISO CPU for storage in the ISO smart card memory for sending to remote applications. To enhance the security of sensitive private information, reference data can be encrypted by the security CPU before it is sent to the ISOCPU.

加载连接302提供与安全CPU 114的直接连接,当可在ISOCPU 112和ISO读卡器208之间维持通信时,其绕开ISO连接和相关的专用I/O端口304和306所提供的任何防火墙保护,从而电源对于安全CPU 114也是可用的。主要是用于该卡对特定用户的初始注册,并将可防止未授权访问。Load connection 302 provides a direct connection to secure CPU 114, which bypasses any firewalls provided by the ISO connection and associated dedicated I/O ports 304 and 306 while communications can be maintained between ISO CPU 112 and ISO card reader 208 protection so that power is also available to the secure CPU 114. Primarily it is used for the initial registration of the card to a specific user and will prevent unauthorized access.

图5示出了图4所示的典型生物验证卡的可选实施例,其打算使用未修改ISO智能卡CPU(unmodified ISO SmartCard CPU)。特别地,ISO CPU 112’无论在正常使用期间或者在装载期间都不必再在读卡器208和安全CPU 114’之间执行任何网关功能,因而其可以是任何ISO许可芯片,其不以任何方式作改变,并且以对读卡器208和对任何外部应用都绝对透明的方式来使用。在该可选实施例中,如果获取的指纹和存储的指纹相匹配,那么安全CPU 114’就用作ISO CPU 112’和任何外部应用之间的透明防火墙,并且如果获取到的指纹和存储的指纹不匹配,那么其将阻止所有这些通信。Figure 5 shows an alternative embodiment of the typical biometric authentication card shown in Figure 4, which is intended to use an unmodified ISO SmartCard CPU. In particular, the ISO CPU 112' no longer has to perform any gateway functions between the card reader 208 and the security CPU 114', either during normal use or during loading, so it can be any ISO licensed chip, which does not in any way changes and is used in an absolutely transparent manner to the reader 208 and to any external application. In this alternative embodiment, if the captured fingerprint matches the stored fingerprint, the secure CPU 114' acts as a transparent firewall between the ISO CPU 112' and any external applications, and if the captured fingerprint matches the stored If the fingerprints do not match, it will block all such communications.

卡初始化和存储数据的保护Card initialization and protection of stored data

剪断shear

在一个实施例中,最初制造的卡具有突出的印刷电路延伸物,其提供与安全CPU,以及与至少ISO接口的部分和/或任何分立的卡上存储器的直接连接。直接连接接口仅仅用于检测卡和指纹注册数据,并且包括使注册程序生效的信号。注册完成后,将电路延伸物机械地断开,从而不再可能进行注册,并且安全CPU存储器只有通过ISO CPU和前面描述的ISO CPU与安全CPU之间的防火墙才可进行访问。In one embodiment, the card is originally manufactured with a protruding printed circuit extension that provides a direct connection to the secure CPU, and to at least part of the ISO interface and/or any discrete on-card memory. The direct connection interface is only used to detect card and fingerprint enrollment data, and includes signals to enable the enrollment procedure. After registration is complete, the circuit extension is mechanically disconnected so that registration is no longer possible and the safety CPU memory is only accessible through the ISO CPU and the previously described firewall between the ISO CPU and the safety CPU.

保险丝fuse

在另一个实施例中,安全CPU有一种存储器,一旦将注册指纹图案写入,其就将不可访问。该存储器的一个实例是一次性PROM(“OTP”),其在结构上和EEPROM相似,但是对UV不透明,因而不可擦除。另一个实例是Flash ROM,其在注册完成之后变成只读,例如对Enable或Address或Data信号路径通过施加足够的电流,以在该信号通道中形成物理断路(“保险丝”)。In another embodiment, the secure CPU has a memory that is inaccessible once the enrollment fingerprint pattern is written. One example of such memory is a one-time PROM ("OTP"), which is similar in structure to EEPROM but is opaque to UV and thus not erasable. Another example is a Flash ROM that becomes read-only after registration is complete, such as by applying enough current to the Enable or Address or Data signal path to create a physical break ("fuse") in that signal path.

典型认证程序Typical Certification Procedure

在一个实施例中,典型认证程序包括获取物理指纹数据,例如,在由访问人使用的连接到应用服务器的客户终端上使用光学或压力或传导或电容或声学或弹性或摄影技术,然后将该数据发送(优选地,以加密格式)到独立的指纹认证服务器。指纹认证服务器使用认证软件将获取的指纹数据与指纹文件进行比较,该文件包括用户的指纹注册数据,并且如果数据是匹配的,那么认证服务器发送生效指令到应用服务器。In one embodiment, a typical authentication procedure involves acquiring physical fingerprint data, for example, using optical or pressure or conductive or capacitive or acoustic or elastic or photographic techniques on a client terminal used by the visitor connected to the application server, and then applying the The data is sent (preferably, in encrypted format) to a separate fingerprint authentication server. The fingerprint authentication server uses the authentication software to compare the acquired fingerprint data with the fingerprint file, which includes the user's fingerprint registration data, and if the data is matched, the authentication server sends a validating instruction to the application server.

在另一个实施例中,用户访问指纹认证服务器的安全网络浏览器,其包括指纹文件,其中所有指纹连同个人数据一起是预注册的,例如姓名、地址、和出生日期。然后用户通过安全协议例如HTTPS格式访问的安全指纹认证服务器向客户终端发送指令以在客户终端处获取用户的指纹。响应于客户终端浏览器所显示的指令,用户将其选定的手指放到指纹传感器上,然后安装在客户终端里的指纹获取软件获取数字指纹,例如具有25微米(micron)至70微米间距分辨率以及12.5平方毫米(mm2)至25平方毫米的面积,并且还具有8位灰度级的象素图像。In another embodiment, the user accesses the fingerprint authentication server's secure web browser, which includes a fingerprint file where all fingerprints are pre-registered along with personal data such as name, address, and date of birth. Then the secure fingerprint authentication server accessed by the user through a secure protocol such as HTTPS sends an instruction to the client terminal to obtain the user's fingerprint at the client terminal. In response to the instructions displayed by the browser of the client terminal, the user puts his selected finger on the fingerprint sensor, and then the fingerprint acquisition software installed in the client terminal acquires a digital fingerprint, for example, with a resolution of 25 microns (micron) to 70 microns rate and an area of 12.5 square millimeters (mm 2 ) to 25 square millimeters, and also has an 8-bit grayscale pixel image.

安全指纹认证服务器接收指纹数据,并连同接收User ID以及互联网IP地址和/或指纹传感器单独编码(MAC地址)和/或cookie(cookie是网络服务器存放到客户终端里的数据,用于网络服务器识别该客户终端)和/或任何唯一码或其他识别特定的个体或者终端的信息(例如,来自客户终端和安全指纹认证服务器之间先前的会话的细节),通过接收以上信息,其使用认证软件将接收的指纹数据与指纹文件进行比较,该文件是预注册的指纹数据以及用户ID,个人信息,例如姓名、地址、出生日期、非法记录、驾驶执照、社会保险号,等等,其可以是细节比较和或是快速傅里叶变换比较。The secure fingerprint authentication server receives the fingerprint data, together with the received User ID and Internet IP address and/or fingerprint sensor code (MAC address) and/or cookie (cookie is the data stored in the client terminal by the web server for web server identification the client terminal) and/or any unique code or other information identifying a particular individual or terminal (e.g. details from previous sessions between the client terminal and the secure fingerprint authentication server), upon receipt of which it uses the authentication software to The fingerprint data received is compared with the fingerprint file, which is the pre-registered fingerprint data along with user ID, personal information such as name, address, date of birth, illegal records, driver's license, social security number, etc., which can be details Compare and or FFT compare.

在认证程序的开始,用于相关应用的网络服务器214从视觉上或者听觉上指示用户将其手指放到指纹获取传感器110上并且敲击其鼠标键或键盘键以从而启动安全处理器114中的指纹获取软件。接着将获取的用户指纹数据通过ISO处理器112和客户终端200的网络浏览器210以加密格式(例如,使用安全RSA加密传输协议HTTPS)发送到指纹认证服务器204的网络服务器220。如果获取的数据成功匹配其数据库226中相应的数据,那么指纹认证服务器204接着将对客户终端200和对应用服务器202确认用户的身份。At the beginning of the authentication procedure, the web server 214 for the relevant application visually or audibly instructs the user to place his finger on the fingerprint capture sensor 110 and to tap his mouse button or keyboard key to thereby initiate the authentication in the security processor 114. Fingerprint acquisition software. Then the acquired user fingerprint data is sent to the web server 220 of the fingerprint authentication server 204 in an encrypted format (for example, using a secure RSA encryption transmission protocol HTTPS) through the ISO processor 112 and the web browser 210 of the client terminal 200 . If the acquired data successfully matches the corresponding data in its database 226 , then the fingerprint authentication server 204 will then confirm the identity of the user to the client terminal 200 and to the application server 202 .

以下将参照图3,描述一个采用了三路认证协议和一次性口令作为哈希(Hash)字符编码序列的典型优选实施例:Below with reference to Fig. 3, describe a typical preferred embodiment that has adopted three-way authentication protocol and one-time password as hash (Hash) character encoding sequence:

·客户终端200的网络浏览器210通过请求访问应用程序216访问相应的应用服务器202的网络接口214。• The web browser 210 of the client terminal 200 accesses the web interface 214 of the corresponding application server 202 by requesting access to the application program 216 .

·应用服务器202的网络接口214以登入(LOG-IN)屏幕信息和访问应用程序216的相关指令作为响应。• The web interface 214 of the application server 202 responds with a LOG-IN screen message and related instructions to access the application 216 .

·客户终端200指示ISO处理器112激活安全处理器114。• The client terminal 200 instructs the ISO processor 112 to activate the security processor 114 .

·ISO处理器112触发安全处理器114。• The ISO processor 112 triggers the security processor 114 .

·安全处理器114等候来自指纹传感器110的指纹数据并且当收到有效数据时,提取指纹数字图案,该图案通过ISO处理器112发送到网络浏览器210。• The security processor 114 waits for fingerprint data from the fingerprint sensor 110 and when valid data is received, extracts the fingerprint digital pattern, which is sent to the web browser 210 via the ISO processor 112 .

·网络浏览器210将指纹提取图案的加密版连同(或与之共同加密)涉及卡100’和读卡器208的相关信息发送到认证服务器204,例如用户ID、客户终端200的IP地址、和/或传感器110的硬布线ID编码(MAC地址)。Web browser 210 sends an encrypted version of the fingerprinting pattern to authentication server 204 along with (or co-encrypting with) relevant information relating to card 100′ and card reader 208, such as the user ID, IP address of client terminal 200, and and/or a hardwired ID code (MAC address) of the sensor 110 .

·认证服务器204的网络接口220,由以上步骤接收指纹提取图案连同来自客户终端200的其它信息一起,将这些信息发送到指纹匹配处理器222。· The network interface 220 of the authentication server 204 receives the fingerprint extraction pattern together with other information from the client terminal 200 through the above steps, and sends these information to the fingerprint matching processor 222 .

·在匹配软件224的控制下,指纹匹配处理器222使用收到的用户ID或者其它的用户特定相关信息,从数据库226检索相应的指纹参考图案并且将指纹获取图案与指纹参考图案进行比较。• Under the control of the matching software 224, the fingerprint matching processor 222 uses the received user ID or other user-specific relevant information to retrieve the corresponding fingerprint reference pattern from the database 226 and compares the fingerprint acquisition pattern with the fingerprint reference pattern.

·将结果(匹配或不匹配)连同对终端200、用户ID卡100’和应用请求216进行验证的相关信息一起存储到访问历史日志中,并且将控制返回给认证服务器网络接口220。• Store the result (match or no match) in the access history log along with information about the authentication of the terminal 200, user ID card 100' and application request 216, and return control to the authentication server web interface 220.

·如果结果为匹配,那么认证服务器网络接口220产生一个形式为询问(challenge)字符序列的一次性密码,其被传输到客户终端200,并且使用询问字符序列作为哈希码,以将相关信息进行加密,其被保存为相应的询问响应,用于可能的将来的参考。If the result is a match, then the authentication server network interface 220 generates a one-time password in the form of a challenge character sequence, which is transmitted to the client terminal 200, and uses the challenge character sequence as a hash code to hash the relevant information Encrypted, which is saved as the corresponding challenge response for possible future reference.

·客户终端200使用收到的询问字符序列作为哈希码,以将先前存储的相关提交信息的未加密拷贝进行加密,然后将其发送到应用服务器202的网络接口214,作为其对应用登入程序的响应的一部分。The client terminal 200 uses the received challenge character sequence as a hash code to encrypt the unencrypted copy of the previously stored relevant submission information, and then send it to the network interface 214 of the application server 202 as its application login procedure part of the response.

·应用服务器202的网络接口214由以上步骤接收经过哈希转换的相关信息,将其发送到应用服务216,该服务将其与来自客户终端的登录(LOG-ON)企图结合,并且,为了确认匹配结果,将收到的相关信息发送,该信息已被客户终端使用由认证服务器提供的询问序列进行哈希转换以作为询问响应。The network interface 214 of the application server 202 receives the relevant information through the hash conversion by the above steps, sends it to the application service 216, and the service combines it with the login (LOG-ON) attempt from the client terminal, and, in order to confirm For the matching result, send the relevant information received, which has been hash converted by the client terminal using the query sequence provided by the authentication server as a query response.

·认证服务器204的网络接口220,由以上步骤接收来自应用服务器的询问响应,将该响应发送到认证处理器222,该处理器将其与先前保存的预期询问响应的参考拷贝进行比较,以决定用户身份是否事实上已被授权。The network interface 220 of the authentication server 204 receives the challenge response from the application server by the above steps, sends the response to the authentication processor 222, which compares it with a previously saved reference copy of the expected challenge response to determine Whether the user identity is in fact authorized.

·由该比较产生的任何授权用户身份信息接着通过认证服务器网络接口220和应用服务器202的确认接口218而返回到应用程序216。• Any authorized user identity information resulting from this comparison is then returned to the application 216 via the authentication server web interface 220 and the validation interface 218 of the application server 202 .

·确认接口218通过认证以确认在初始登录企图时建立的用户身份已经生效。Confirmation interface 218 authenticates to confirm that the user identity established at the initial login attempt is valid.

·一旦用户身份被确认,认证(应用)程序216则通过应用服务器202的网络接口214进行与客户终端200的网络浏览器210直接通信。• Once the user's identity is confirmed, the authentication (application) program 216 communicates directly with the web browser 210 of the client terminal 200 through the network interface 214 of the application server 202 .

图6示出了可选认证程序,其中所有的匹配通过安全CPU 114在图4的ISO兼容卡上执行,并且没有采用外部认证服务器204。图6的左边示出了由应用服务器202执行的功能,而右边示出了由ISO智能卡100执行的功能。Figure 6 shows an alternative authentication procedure where all matching is performed on the ISO compliant card of Figure 4 by the secure CPU 114 and no external authentication server 204 is employed. The left side of FIG. 6 shows the functions performed by the application server 202 , while the right side shows the functions performed by the ISO smart card 100 .

当将智能卡100插入读卡器208时,复位信号RST从读卡器发送到ISO CPU(START方框502)和指纹CPU 114(指纹验证方框504),并且该两部件从读卡器208接收电源VCC。然后ISO CPU响应以ATR(Answer-to-Reset复位应答)消息并如有必要则发出PPS(Protocol and parameters Selection协议与参数选择)(方框506)。同时,指纹CPU进入等待状态以接收指纹数据,以及当从传感器110收到数据时,就执行认证程序(方框504)。When the smart card 100 is inserted into the card reader 208, the reset signal RST is sent from the card reader to the ISO CPU (START block 502) and the fingerprint CPU 114 (fingerprint verification block 504), and the two parts receive from the card reader 208 Power supply VCC. Then the ISO CPU responds with an ATR (Answer-to-Reset reset response) message and if necessary, sends a PPS (Protocol and parameters Selection protocol and parameter selection) (block 506). Meanwhile, the fingerprint CPU enters a wait state to receive fingerprint data, and when data is received from the sensor 110, executes an authentication procedure (block 504).

当初始请求命令被应用216发送到ISO CPU 112(方框508)时,ISO CPU向安全CPU询问(方框510)认证状态。如果响应为肯定,那么ISO CPU通过运行请求命令以响应应用(方框512)。否则(来自安全CPU 114的不管是错误信息还是没有响应)其不对请求命令做任何响应,而是等待新的第一请求(方框508b)。When the initial request command is sent to the ISO CPU 112 (block 508) by the application 216, the ISO CPU queries (block 510) the security CPU for the authentication status. If the response is positive, the ISO CPU responds to the application by running the request command (block 512). Otherwise (whether it is an error message or no response from the safety CPU 114) it does not do any response to the request command, but waits for a new first request (block 508b).

假定指纹被验证并且第一响应被及时收到且其被应用216确定是响应信号(方框514),那么请求/响应程序将将一直持续(方框516、518、520)到超出预定验证时限,在此期间不从该应用接收请求(方框522),或者该应用不能接收预期响应(方框524)。Assuming the fingerprint is verified and the first response is received in time and determined to be a response signal by the application 216 (block 514), the request/response procedure will continue (blocks 516, 518, 520) until the predetermined verification time limit is exceeded , during which no requests are received from the application (block 522), or the application cannot receive the expected response (block 524).

图7类似于图6的流程图,但是修改为采用了图5的典型生物验证卡。图7的最左边示出了由应用服务器202执行的功能,下一列对应于读卡器208,再下一列描绘了ISO触点108,又下一列示出了由安全CPU 114执行的功能,而最右边则示出了由无变更ISO智能卡112执行的功能。FIG. 7 is similar to the flowchart of FIG. 6 but modified to employ the exemplary biometric authentication card of FIG. 5 . The far left of Figure 7 shows the functions performed by the application server 202, the next column corresponds to the card reader 208, the next column depicts the ISO contacts 108, the next column shows the functions performed by the security CPU 114, and The function performed by the unchanged ISO smart card 112 is shown on the far right.

·当将智能卡插入读卡器时或者应用软件开始运行读卡器设备时,将复位信号550从读卡器208发送到安全CPU 114。• A reset signal 550 is sent from the card reader 208 to the security CPU 114 when the smart card is inserted into the card reader or when the application software starts running the card reader device.

·安全CPU收到复位信号550之后不久,其发送相应的复位信号552到ISO CPU 112。同时安全CPU等待来自指纹传感器的指纹数据。• Shortly after the safety CPU receives the reset signal 550, it sends a corresponding reset signal 552 to the ISO CPU 112. At the same time, the security CPU waits for the fingerprint data from the fingerprint sensor.

·由以上步骤收到复位信号552,ISO CPU产生ATR(Answer-to-Reset)响应554并此后如有必要则发出PPS(Protocol and parameters Selection)。Receive reset signal 552 by the above steps, ISO CPU generates ATR (Answer-to-Reset) response 554 and then sends PPS (Protocol and parameters Selection) if necessary.

·安全CPU 114一旦从ISO CPU收到ATR(Answer-to-Reset),就立即将其,包括任何相关的PPS命令,传输到读卡器(方框556)。• Once the security CPU 114 receives the ATR (Answer-to-Reset) from the ISO CPU, it immediately transmits it, including any associated PPS commands, to the reader (block 556).

·同时,如果安全CPU收到指纹数据,那么其将执行前面描述的认证程序。在认证检测结果为PASS的情况下,该通过状态将维持一定的时间周期。如果结果为FAIL,那么安全CPU 114就等候新的指纹数据。• At the same time, if the security CPU receives the fingerprint data, it will execute the authentication procedure described above. In the case that the authentication test result is PASS, the passing state will be maintained for a certain period of time. If the result is FAIL, then the secure CPU 114 waits for new fingerprint data.

·由以上步骤运行该应用,将命令请求558发送到安全CPU,只有在安全CPU仍然处于前面描述的PASS状态时或最后的正确响应具有多数据位组时,该安全CPU才将命令请求560发送到ISO CPU并还将其正确响应562发送到读卡器(检测方框564)。Run the application by the above steps, send the command request 558 to the safety CPU, only when the safety CPU is still in the PASS state described above or when the last correct response has a multi-byte group, the safety CPU will send the command request 560 to the ISO CPU and also sends its correct response 562 to the reader (check box 564).

·否则(No分支566)指纹CPU产生伪请求(dummy request,虚拟请求)568并将其发送到ISO CPU并还将该结果ERR响应570发送到读卡器216,从而在请求中的序列号与响应中的序列号之间保持正确同步。Otherwise (No branch 566) the fingerprint CPU generates a dummy request (dummy request, virtual request) 568 and sends it to the ISO CPU and also sends the result ERR response 570 to the card reader 216, so that the serial number in the request and The sequence numbers in the responses are properly synchronized.

加密和保密Encryption and Confidentiality

在通过任何外部网络进行传输之前,优选地,将任何敏感数据和/或认证结果都进行加密,可采用DES、或Two Fish加密。加密密钥可以基于指纹获取或存储数据、用户ID编码、传感器的唯一分配编码、存储器地址、存储器里邻近的数据、其它功能上相关的数据、先前的会话(事务处理)、IP地址、终端编码、或者指定的口令。可选地,敏感数据可以使用安全HTTPS协议以通过互联网发送。Before transmission through any external network, preferably, any sensitive data and/or authentication results are encrypted, and DES, or Two Fish encryption can be used. Encryption keys can capture or store data based on fingerprints, user ID codes, uniquely assigned codes for sensors, memory addresses, nearby data in memory, other functionally relevant data, previous sessions (transactions), IP addresses, terminal codes , or the specified password. Optionally, sensitive data can be sent over the Internet using the secure HTTPS protocol.

为了提供更强的安全性,可以将虚拟个人网关,例如硬件DES加密和解密,插入安全指纹认证服务器与网络连接之间,以及相应的应用服务器与网络连接之间。通过这样来使用这些虚拟网关或者虚拟专用网络(“VPN”),将敏感数据通过附加的加密层进行附加保护,例如DES 128(通常用于VPN)和RSA(被HTTPS采用)。In order to provide stronger security, a virtual personal gateway, such as hardware DES encryption and decryption, can be inserted between the secure fingerprint authentication server and the network connection, and between the corresponding application server and the network connection. By using these virtual gateways, or virtual private networks ("VPNs"), sensitive data is additionally protected by additional layers of encryption, such as DES 128 (commonly used for VPNs) and RSA (used by HTTPS).

为了特别安全的应用,所有的通信可以用附加的保密层来包围。特别地,较低层中的报文头可以在较高层中进行加密。For particularly secure applications, all communications can be surrounded by an additional layer of security. In particular, headers in lower layers can be encrypted in higher layers.

无线通信Wireless communication

其它实施例可以包括用于既接触(ISO 7816)操作又无线(ISO1443A或B)操作的双重接口,并且优选地,安装有多接口电源单元,其允许在全部在一张卡上的ISO 7816接触、ISO 1443A、ISO1443B、ISO 15693和HID传统无线系统(在其它的之间)之间互用。可选地,卡可包括用于其它无线通信技术的备用件,例如蓝牙(短距离)或者蜂窝(中距离)或者微波(长距离)。Other embodiments may include dual interfaces for both contact (ISO 7816) operation and wireless (ISO1443A or B) operation, and preferably, install a multi-interface power supply unit which allows ISO 7816 contact all on one card , ISO 1443A, ISO1443B, ISO 15693 and HID legacy wireless systems (among others) are interoperable. Optionally, the card may include spares for other wireless communication technologies, such as Bluetooth (short range) or cellular (medium range) or microwave (long range).

接下来参照图8,其示出了具有可无线或者借助于电接插件连接到本地终端的卡上生物验证的智能卡。其大部分结构和构造相似于前面描述的图1的实施例,并且同样的标号(可能以单引号加以区分)标示相似的元件。特别地,ISO CPU 112虽然显示在不同的位置(在触点108下面,而不是一侧),但是有如前所述的相似功能。Reference is next made to Figure 8 which shows a smart card with on-card biometric authentication which can be connected to a local terminal either wirelessly or by means of an electrical connector. Much of its structure and construction is similar to the previously described embodiment of Figure 1, and like reference numerals (possibly differentiated by single quotation marks) designate like elements. In particular, the ISO CPU 112, although shown in a different location (below the contacts 108, rather than to the side), has similar functions as previously described.

ISO天线132包括通常设置在卡100的周边的两个环状天线,并且向ISO CPU 112提供ISO兼容无线接口,用于使数据和功率相似于有线电接口108所提供的数据和功率。另外,安全天线134(在所述例子中,内置天线132且只由一个环状天线构成)通过DC-DC功率调节器120向安全CPU 114提供独立的电源。因为除了通过ISOCPU 112没有用于无线数据的直接连接,所以存储在安全CPU 114内的敏感数据不被该无线接口破坏。可选地,如前所述的关于对外部读卡器和外部网络只有有线连接的实施例,两个处理器的功能可以被合并,或者外部接口可以是通过安全CPU 114而不是通过ISOCPU 112,其中必须将适当的无线安全措施结合到该变体构造中。The ISO antenna 132 comprises two loop antennas typically disposed on the perimeter of the card 100 and provides an ISO compatible wireless interface to the ISO CPU 112 for data and power similar to that provided by the wired electrical interface 108. In addition, the security antenna 134 (in the example, the built-in antenna 132 and consists of only one loop antenna) provides independent power to the security CPU 114 through the DC-DC power regulator 120. Since there is no direct connection for wireless data other than through the ISO CPU 112, sensitive data stored within the security CPU 114 is not corrupted by this wireless interface. Alternatively, the functions of the two processors can be combined, or the external interface can be through the security CPU 114 instead of through the ISOCPU 112, as previously described with respect to the embodiment with only a wired connection to the external card reader and the external network, Appropriate wireless security measures must be incorporated into this variant configuration.

图9是图8所示的卡的截面图。注意到大多数所述元件包含在芯区126中,只有触点108延伸物穿过上保护层122。传感器110的操作面通过上层122中的上窗口和PCB(印刷电路板)134中的下窗口以可访问,该PCB 134被布置在上层122和中心层126之间,其提供各种电子元件之间必需的电连接,以及围绕传感器110有效区域的环绕的静电放电接地连接。FIG. 9 is a cross-sectional view of the card shown in FIG. 8 . Note that most of the components described are contained within the core region 126 , with only the contact 108 extensions passing through the upper protective layer 122 . The operating surface of the sensor 110 is accessible through an upper window in the upper layer 122 and a lower window in a PCB (printed circuit board) 134, which is arranged between the upper layer 122 and the center layer 126, which provides a connection between the various electronic components. necessary electrical connections between them, and a surrounding ESD ground connection around the active area of the sensor 110.

下层124和磁条128仍是可见的。The lower layer 124 and magnetic strip 128 are still visible.

指纹传感器fingerprint sensor

图10是传感器110的典型示意电路图,其中传感器单元402阵列400排列为行404和列406。如上所述,每个单元402包括激活门410和变换器412。指纹由手指上皮肤的凸部和凹部形成。当这些凸部之中的一个触及阵列400内单元402的附近时,每个传感器单元的变换器412经历一个机械的和/或电的变化,其实际上产生了基于传感器表面上的由指尖上凸部和凹部引起的微压变化的指纹数字图像。注意到尽管每个变换器412被描述为单个可变电容器,但是有各种类型的变换器可以响应人类皮肤的这些凸部之中的一个的出现。在压力传感器压电薄膜变换器的特别实例中,该薄膜在单元的附近变形并且产生存储在连接到该单元的电容器中的电荷。电容器上的电压是由压电材料的变形形成的机械应力的函数,其进而是在单元上是凸部还是凹部的函数。当来自相关列驱动414的信号将该单元的门410达到ON时以及当相关行驱动416被接地时,电压出现在行的输出线路418上,并且在输出驱动420中转换成8位数字信号。为了最大化地探测压电材料的变形,压电电气材料可以在弹性材料上形成,例如聚酰亚胺或者聚酰亚胺压电电气材料即可。其它典型的可以用类似的阵列组织实现的模拟变换器技术包括可变电阻和可变电容器。可选地,每个单元可以包括简单的数字开关,其仅仅提供单比特信息;在此情况下,信息的附加的位可以由在同一区上提供多个单元或者由以更高的频率抽样每个单元来产生。该可选实施例避免了对A/D转换器的需要。FIG. 10 is a typical schematic circuit diagram of a sensor 110 with an array 400 of sensor cells 402 arranged in rows 404 and columns 406 . Each cell 402 includes an activation gate 410 and a converter 412 as described above. Fingerprints are formed by the bumps and valleys of the skin on the fingers. When one of these bumps touches the vicinity of a cell 402 within the array 400, the transducer 412 of each sensor cell undergoes a mechanical and/or electrical change that in effect produces Digital image of a fingerprint with micro-pressure changes caused by bumps and valleys. Note that although each transducer 412 is described as a single variable capacitor, there are various types of transducers that can respond to the appearance of one of these bumps of human skin. In the particular example of a piezoelectric membrane transducer of a pressure sensor, the membrane deforms in the vicinity of the cell and generates an electric charge which is stored in a capacitor connected to the cell. The voltage across the capacitor is a function of the mechanical stress created by the deformation of the piezoelectric material, which in turn is a function of whether there is a protrusion or a recess on the cell. When the signal from the associated column driver 414 turns ON the gate 410 of the cell and when the associated row driver 416 is grounded, a voltage appears on the row's output line 418 and is converted in output driver 420 to an 8-bit digital signal. In order to maximize the detection of the deformation of the piezoelectric material, the piezoelectric electrical material can be formed on an elastic material, such as polyimide or a polyimide piezoelectric electrical material. Other typical analog converter technologies that can be implemented with a similar array organization include variable resistors and variable capacitors. Alternatively, each cell may comprise a simple digital switch that provides only a single bit of information; in this case, additional bits of information may be provided by providing multiple cells on the same field or by sampling each cell at a higher frequency. unit to generate. This alternative embodiment avoids the need for an A/D converter.

在典型实施例中,传感器只有0.33毫米厚并且足够坚固以嵌入到智能卡中并且不受静电、元件或者用户皮肤状态(湿、干、热、冷)的影响。传感器110通常的装置单元尺寸是25微米至70微米并且通常的间距是25微米至70微米。典型传感器具有12.5平方毫米至25平方毫米的面积以及8位多级灵敏度。该传感器可以由TFT(薄膜晶体管)和压感电容器阵列制成,例如由薄膜压电材料形成,例如钛钡氧化物或者锶钡氧化物,并且包括上电极,其覆盖并且保护整个传感区域。如果采用机械应力,那么将产生相应的电荷并且存储在薄膜压电电容器中。可选地,基于压力的传感器可制成TFT(薄膜晶体管)连同薄膜电容器,以及压感电容器的阵列,例如由压力传导材料片形成,例如碳化纤维分散橡胶片,金属(例如铜或锡或银),电镀的碳化纤维或纸底基玻璃纤维或金属,分散弹性材料(例如硅树脂)以及覆盖整个传感区的上电极片。In a typical embodiment, the sensor is only 0.33 mm thick and is robust enough to be embedded in a smart card and is not affected by static electricity, elements, or the state of the user's skin (wet, dry, hot, cold). Sensor 110 typically has a device cell size of 25 microns to 70 microns and a typical pitch of 25 microns to 70 microns. Typical sensors have an area of 12.5 mm2 to 25 mm2 and 8-bit multilevel sensitivity. The sensor may be made of an array of TFTs (thin film transistors) and piezo-sensitive capacitors, for example formed of a thin-film piezoelectric material, such as titanium barium oxide or strontium barium oxide, and includes an upper electrode that covers and protects the entire sensing area. If mechanical stress is applied, a corresponding charge is generated and stored in the thin-film piezoelectric capacitor. Alternatively, pressure based sensors can be fabricated as TFT (Thin Film Transistor) together with thin film capacitors, and arrays of piezo-sensitive capacitors, for example formed from sheets of pressure-conducting material, such as carbon fiber dispersed rubber sheets, metals such as copper or tin or silver ), plated carbon fiber or paper base glass fiber or metal, dispersed elastic material (such as silicone), and an upper electrode sheet covering the entire sensing area.

指纹传感器元件402特别规定的行和列驱动416、414输出电数据到输出电路420,从而将表示用户指纹的物理输入转换为模拟电数据。然后输出电路420中的A/D转换器将该模拟电信号转换为数字电信号。每个薄膜晶体管选择性地将共享的行间互连转换为其相关的电容器上的电压,这样每个电容器上的电压可以被读取并且因此每个单元的变形可以被测量。优选地,薄膜晶体管的整个列被同时转换,从而在一个选定列中的多个单元(例如8个)可以在不同的行间互连上被并行读取。多个门如行和列间的互连减少了互连的数量,而从相同列的不同行并行读取多个单元则减少了整个阵列的读取时间时,。来自传感器的输出电压可以由差动放大器放大。可以将该放大器的输出采样和保持用于A/D转换器。The specified row and column drivers 416, 414 of the fingerprint sensor element 402 output electrical data to the output circuit 420, thereby converting the physical input representing the user's fingerprint into analog electrical data. The A/D converter in the output circuit 420 then converts the analog electrical signal into a digital electrical signal. Each thin film transistor selectively converts the shared interrow interconnect to a voltage on its associated capacitor so that the voltage on each capacitor can be read and thus the deformation of each cell can be measured. Preferably, an entire column of thin film transistors is switched simultaneously so that multiple cells (eg 8) in a selected column can be read in parallel on different inter-row interconnects. Multiple gates such as row and column interconnects reduce the number of interconnects, while reading multiple cells in parallel from different rows of the same column reduces the overall array read time. The output voltage from the sensor can be amplified by a differential amplifier. The output of this amplifier can be sampled and held for an A/D converter.

基片可以是玻璃(例如非碱性玻璃)、不锈钢、铝、陶瓷(例如氧化铝)、纸、玻璃钢,但优选是晶体硅薄板。薄膜半导体材料可以是无定形硅、多晶硅、金刚石、或者任何其它半导体薄膜。压电材料可以是压电陶瓷,例如铅-锆酸盐-钛酸盐(lead-zirconate-titanate,PZT)薄膜,优选地,厚度范围为0.1至50.0微米,或聚合物压电聚酰亚胺薄膜材料。互连材料可以是:钛/镍/铜、铝、铬/镍/金、钛/镍/金、铝/金、钨/铜、钨/金、钨/金。The substrate can be glass (eg non-alkaline glass), stainless steel, aluminum, ceramic (eg alumina), paper, fiberglass, but is preferably a thin plate of crystalline silicon. The thin film semiconductor material can be amorphous silicon, polycrystalline silicon, diamond, or any other semiconductor thin film. The piezoelectric material can be a piezoelectric ceramic, such as lead-zirconate-titanate (PZT) film, preferably with a thickness in the range of 0.1 to 50.0 μm, or a polymer piezoelectric polyimide film material. Interconnect material can be: titanium/nickel/copper, aluminum, chromium/nickel/gold, titanium/nickel/gold, aluminum/gold, tungsten/copper, tungsten/gold, tungsten/gold.

图11示出了形成在晶体硅的薄基卡上的传感器的载体组合。晶体硅具有极好的电气性质并且有利于将传感器阵列与所需驱动和输出电路集成,然而在相对大而薄的硅薄板受到局部表面压力时将会弯曲和断裂。图示的载体提供了比同样整体厚度的硅片更结实的结构。Figure 11 shows a carrier assembly for a sensor formed on a thin base card of crystalline silicon. Crystalline silicon has excellent electrical properties and facilitates the integration of sensor arrays with the required drive and output circuitry, however relatively large and thin silicon sheets will bend and break when subjected to localized surface pressure. The illustrated carrier provides a more robust structure than a silicon wafer of the same overall thickness.

如图所示,单片硅430大约0.1毫米厚,并且由相同厚度的玻璃钢框432围绕,其被安装在也是玻璃钢结构的垫板434上并且约0.05毫米厚。框432和垫板434可以很容易地使用传统的印刷电路板(PCB)技术来构造。特别地,垫板434的上和下表面由被玻璃钢芯分隔的薄铜层436所覆盖。框432包括多个在其外部边缘的焊盘440,用于连接到安全处理器114。薄硅片430用环氧树脂粘合到框432和板434,并且有效区由在围绕着受保护的上电极446的硅430的暴露的外边缘部444上的传统的布线连接442,电连接到框430中各自的电路。As shown, the monolithic silicon 430 is approximately 0.1 mm thick and is surrounded by a fiberglass frame 432 of the same thickness, which is mounted on a backing plate 434, also of fiberglass construction, and approximately 0.05 mm thick. Frame 432 and backing plate 434 can be readily constructed using conventional printed circuit board (PCB) techniques. In particular, the upper and lower surfaces of backing plate 434 are covered by a thin copper layer 436 separated by a fiberglass core. Box 432 includes a plurality of pads 440 on its outer edges for connection to security processor 114 . A thin silicon chip 430 is epoxy bonded to the frame 432 and plate 434, and the active area is electrically connected by conventional wiring connections 442 on the exposed outer edge portion 444 of the silicon 430 surrounding a protected upper electrode 446. to the respective circuitry in block 430 .

匹配算法matching algorithm

对于处理能力有限并仅试图与单一参考样本做简单的1∶1匹配的本地卡上处理,指纹匹配软件可以是基于两个图案的细节的相对简单的比较。例如,指纹的灰度图像可以被减小到两个值,白和黑,并且三维凸部被转换成二维细线(矢量)。因而,该方法的准确性还受到以下问题:模糊、粘连、失真、线段部分缺失和其它的影响。尽管细节方法理论上正确率较低,但其需要较少的计算资源并且提供与许多现有数据库兼容的可能性。For local on-card processing that has limited processing power and only attempts to do a simple 1:1 match with a single reference sample, the fingerprint matching software can be based on a relatively simple comparison of the details of the two patterns. For example, a grayscale image of a fingerprint can be reduced to two values, white and black, and the three-dimensional convexities converted into two-dimensional thin lines (vectors). Therefore, the accuracy of this method is also affected by the following problems: blurring, sticking, distortion, missing line segments and others. Although the minutiae method is theoretically less accurate, it requires less computational resources and offers the possibility of being compatible with many existing databases.

对于在具有更强处理能力的远程认证服务器上进行处理,可以要求更高的准确分辨率,例如“POC”(Phase Only Correlation仅相位对比)匹配算法。POC是基于整个图像的宏匹配的验证算法。相反地,POC匹配大范围的结构信息-从细节到总图像。因此,POC能够提供加强的准确度来避免噪声,例如粘连和部分缺失。理论上,POC方法不受来自位置移动和亮度差异的不利影响,并且快速(对于脱机匹配约为0.1秒)和高准确度。例如,POC软件可以利用二维快速傅立叶变换(“2DFFT”)来执行两个指纹图案的空间频率比较。2DFFT将表示指纹的物理二维分布的数字化数据阵列转换为频率空间,换句话说,将空间分布反转换,该处越高的密度图案具有越高的空间频率。旋转变换可用于对频率空间图案匹配进行匹配。因为不被指纹记录图案中的普通缺陷误导,POC将认为这些缺陷为噪音而细节分析将这些缺陷作为有意义的数据进行解释,所以POC图案匹配与细节向量匹配相比有更多的优点。For processing on a remote authentication server with stronger processing power, higher accurate resolution may be required, such as "POC" (Phase Only Correlation only phase comparison) matching algorithm. POC is a verification algorithm based on macro-matching of the entire image. In contrast, POC matches a large range of structural information - from details to the total image. Therefore, POC can provide enhanced accuracy to avoid noise, such as sticking and part missing. Theoretically, the POC method is not adversely affected by position shifts and brightness differences, and is fast (approximately 0.1 seconds for offline matching) and highly accurate. For example, POC software may utilize a two-dimensional fast Fourier transform ("2DFFT") to perform a spatial frequency comparison of two fingerprint patterns. 2DFFT transforms the digitized data array representing the physical two-dimensional distribution of the fingerprint into frequency space, in other words, inversely transforms the spatial distribution, where higher density patterns have higher spatial frequencies. Rotational transforms can be used to match frequency-space pattern matching. POC pattern matching has more advantages than minutiae vector matching because it is not misled by common defects in fingerprint recording patterns, which POC will consider as noise and minutiae analysis interprets these defects as meaningful data.

对于特别苛刻的应用,混合方法将可比其它任何单独的方法提供更高的准确度和安全性。例如,细节方法可以用在获取点上,而POC方法可以用在远程服务器上。作为另一个例子,匹配程序可以分析细节和空间关系以产生考虑了两种结果的结合的分数。For particularly demanding applications, the hybrid method will provide greater accuracy and safety than any other method alone. For example, the minutiae method can be used on a point of acquisition, while the POC method can be used on a remote server. As another example, a matching program can analyze details and spatial relationships to produce a score that takes into account the combination of both outcomes.

应用application

前面描述的技术提供了用于多样的应用,商用的和政府的,高水平的安全性。根据各种应用的要求,多种安全应用可以共存并在相同的卡上和/或相同的认证服务器上操作。在一个实施例中,单张卡可以包括多至24项独立的且安全的应用。例如,该技术将许可/拒绝访问(物理的和/或逻辑的),识别人员的精确位置和/或运动和/或监视列出的名单,而且同时还运行其它安全应用,各应用相互间完全地且安全地隔离。The techniques described above provide a high level of security for a variety of applications, commercial and government. Multiple security applications can co-exist and operate on the same card and/or the same authentication server, depending on the requirements of the various applications. In one embodiment, a single card may contain up to 24 separate and secure applications. For example, the technology will grant/deny access (physical and/or logical), identify the precise location and/or movement of persons and/or monitor listed lists, while also running other security applications, each fully interconnected with each other ground and safely isolated.

当前可以预期的应用如下:The currently expected applications are as follows:

·机场ID/通行·Airport ID/Pass

·大厦保安· Building security

·旅馆房间通行和记帐· Hotel room access and billing

·医院·Hospital

·在线游戏·online game

·下载娱乐·Download entertainment

·出生证明·birth certificate

·计算机访问·Computer access

·驾驶执照-TWIC·Driving License-TWIC

·电子钱包·electronic wallet

·紧急医学信息·Emergency medical information

·炸药执照·Explosives license

·政府和军用设施通行·Access to government and military facilities

·HAZMAT(危险物)许可证· HAZMAT (dangerous substance) permit

·医疗保险和福利卡·Medical insurance and welfare card

·停车场入口·parking entrance

·护照·passport

·航空执照· Aviation license

·港口ID/通行·Port ID/Pass

·保险证明·Certificate of insurance

·社会保险卡·Social insurance card

·旅行信用卡·Travel credit card

·签证或者进/出通行证·Visa or entry/exit permit

·投票注册卡·Voting registration card

·福利和粮票印花卡· Welfare and Food Stamp Cards

对于许多的这些应用,优选地,卡的卡上存储器还提供各种私人信息的安全存储,其只有当注册的持卡人证明了其身份和授权该访问时才可进行访问。这些私人信息的实例有:For many of these applications, preferably, the card's on-card memory also provides secure storage of various private information, which is only accessible when the registered cardholder proves his identity and authorizes such access. Examples of such personal information are:

·管理信息,例如姓名、地址、出生日期、出生地点、国籍、宗教、组织关系、社会保险号码、驾驶执照号码、护照号码、和移民信息例如签证类型、签证期限、国籍等。Management information such as name, address, date of birth, place of birth, nationality, religion, organizational affiliation, social insurance number, driver's license number, passport number, and immigration information such as visa type, visa period, nationality, etc.

·财务信息,例如电子钱包、VISA(VISA信用卡),MasterCard(万事达信用卡),American Express(美国运通信用卡)等信用卡信息,银行信息,例如银行名称、银行存款余额、转帐信息、IRS(美国国税局)号码、破产记录、转帐信息等。Financial information, such as electronic wallet, VISA (VISA credit card), MasterCard (MasterCard credit card), American Express (American Express credit card) and other credit card information, bank information, such as bank name, bank deposit balance, transfer information, IRS (Internal Revenue Service of the United States) ) number, bankruptcy records, transfer information, etc.

·体征和健康信息,例如:识别个人的生物信息,例如身高、体重、指纹、虹膜、视网膜、手尺寸、骨结构、声音、DNA;血型;医学诊断检测结果;病史;药物;保险信息;对一定刺激的心理和生理反应等。Physical signs and health information, such as: biological information that identifies an individual, such as height, weight, fingerprints, iris, retina, hand size, bone structure, voice, DNA; blood type; medical diagnostic test results; medical history; medication; insurance information; Certainly stimulated psychological and physiological responses.

·事件信息,例如犯罪记录、重罪、轻罪、违法。• Event information, such as criminal records, felonies, misdemeanors, violations.

·应急信息,例如墓地、亲属和其它联系信息、律师信息、宗教信息。• Emergency information such as burial sites, next of kin and other contact information, attorney information, religious information.

·教育、工作历史,包括学校、学位、就职过的与FDD有关的公司。·Education and work history, including school, degree, and FDD-related companies.

·数据访问历史(存储了进卡和出卡的访问历史数据)。·Data access history (storing access history data of card input and card output).

·ID相关信息,例如指纹图案、指纹处理图案、指纹图案的结果。• ID-related information such as fingerprint patterns, fingerprint processing patterns, results of fingerprint patterns.

·口令,例如永久口令、暂时口令、和/或一次性口令。• Passwords, such as permanent passwords, temporary passwords, and/or one-time passwords.

·加密密钥,例如公开密钥、个人密钥、和/或一次性密钥。• Encryption keys, such as public keys, private keys, and/or one-time keys.

接下来描述典型的卡注册系统。A typical card registration system is described next.

申请人:填写申请表并且将其提交,优选地,包括照片和指纹。对于大部分申请人,检查其文件附件并简单地在一个或多个政府和商业数据库中查对提交的信息就足以建立个人的真实身份。Applicant: Fill out the application form and submit it, preferably including a photo and fingerprints. For most applicants, examining their file attachments and simply checking the submitted information against one or more government and commercial databases is sufficient to establish an individual's true identity.

在其身份被识别后,申请人进入签发站,此处由发卡人将认为必要的任何信息载入卡中。申请人将其手指放在卡上的传感器上。一旦指纹符合要求地置于传感器上并且被载入卡中,就将使卡上的突出受到电冲击,其烧断某些保险丝,以阻止任何人再次写入卡的该一定区域。然后,将该小突出切断/剪断(就像带有脐带的卡)。在该点处,卡只能通过ISO接触读卡器或者ISO无线系统进行读或者写。After they have been identified, the applicant proceeds to the issuing station, where any information the issuer deems necessary is loaded onto the card. The applicant places their finger on the sensor on the card. Once the fingerprint is satisfactorily placed on the sensor and loaded into the card, a protrusion on the card is subjected to an electrical shock which blows some fuses to prevent anyone from writing to that certain area of the card again. Then, cut/snip that little protrusion (like a card with an umbilical cord). At this point, the card can only be read or written to via the ISO contact card reader or the ISO wireless system.

在网络认证服务器的情况中,卡上所载同样数据的一些或者全部也是以加密形式传输到远程服务器,可以补充附加的通常不存储在卡上但是可能需要用于高安全性应用的数据。In the case of a network authentication server, some or all of the same data carried on the card is also transmitted in encrypted form to the remote server, supplementing additional data not normally stored on the card but which may be required for high security applications.

Claims (28)

1.一种智能身份识别卡,包括:1. A smart identification card, comprising: 卡上存储器,用于储存参考数据;On-card memory for storing reference data; 卡上传感器,用于捕获现场生物数据;On-card sensors to capture live biometric data; 卡上微处理器,用于在预定阈值内将所捕获的生物数据和相应的存储的参考数据进行比较,且仅当在预定阈值内匹配时才产生验证消息,以及an on-card microprocessor for comparing the captured biometric data with corresponding stored reference data within a predetermined threshold and generating a verification message only if there is a match within the predetermined threshold, and 用于将所述验证消息发送到外部网络的装置。means for sending said verification message to an external network. 2.根据权利要求1所述的身份识别卡,其中,所述验证消息至少包括来自所存储的参考数据的摘录。2. An identification card according to claim 1, wherein the verification message comprises at least an excerpt from the stored reference data. 3.根据权利要求2所述的身份识别卡,其中,所述验证消息至少包括来自所捕获的生物数据的摘录。3. The identification card of claim 2, wherein the authentication message includes at least an excerpt from the captured biometric data. 4.根据权利要求3所述的身份识别卡,其中,所述验证消息被传输到远程认证系统用于附加的验证。4. The identification card of claim 3, wherein the verification message is transmitted to a remote authentication system for additional verification. 5.根据权利要求4所述的身份识别卡,其中,所述远程认证系统包括与所述本地存储的参考数据不同的远程存储的参考数据。5. The identification card of claim 4, wherein the remote authentication system includes remotely stored reference data that is different from the locally stored reference data. 6.根据权利要求4所述的身份识别卡,其中,所述卡上微处理器使用与所述远程认证系统不同的匹配算法。6. The identification card of claim 4, wherein the on-card microprocessor uses a different matching algorithm than the remote authentication system. 7.根据权利要求2所述的身份识别卡,其中,所述整个匹配程序由所述卡上处理器执行并且不将所捕获的生物数据发送到所述网络。7. The identification card of claim 2, wherein the entire matching procedure is performed by the on-card processor and no captured biometric data is sent to the network. 8.根据权利要求2所述的身份识别卡,其中,存储在所述卡上存储器里的原始捕获的生物数据以及任何其它“私有”信息对于任何外部程序都是不可用的。8. The identification card of claim 2, wherein the raw captured biometric data and any other "private" information stored in the on-card memory are not available to any external program. 9.根据权利要求2所述的身份识别卡,其中,所述卡是ISO兼容智能卡。9. The identification card of claim 2, wherein the card is an ISO compliant smart card. 10.根据权利要求9所述的身份识别卡,还包括ISO智能卡处理器。10. The identification card of claim 9, further comprising an ISO smart card processor. 11.根据权利要求10所述的身份识别卡,其中,用于储存和处理所述受保护的生物数据的所述安全处理器被防火墙从功能上与所述ISO智能卡处理器隔离。11. The identification card of claim 10, wherein the secure processor for storing and processing the protected biometric data is functionally isolated from the ISO smart card processor by a firewall. 12.根据权利要求10所述的身份识别卡,其中,进出所述安全处理器的所有外部数据均通过所述ISO智能卡处理器。12. The identification card of claim 10, wherein all external data to and from the security processor passes through the ISO smart card processor. 13.根据权利要求10所述的身份识别卡,其中,进出所述ISO智能卡处理器的所有外部数据均通过所述安全处理器。13. The identification card of claim 10, wherein all external data to and from the ISO smart card processor passes through the secure processor. 14.根据权利要求10所述的身份识别卡,其中,所述安全处理器具有:第一连接,用于在载入程序期间载入数据;以及第二连接,连接到外部网络。14. The identification card of claim 10, wherein the security processor has: a first connection for loading data during the loading procedure; and a second connection for connecting to an external network. 15.根据权利要求14所述的身份识别卡,其中,使所述第一连接在所述载入程序完成之后永久禁用。15. The identification card of claim 14, wherein the first connection is made permanently disabled after completion of the loading procedure. 16.根据权利要求10所述的身份识别卡,其中,用于存储和处理所述受保护的生物数据的所述安全处理器被防火墙从功能上与所述ISO智能卡处理器隔离。16. The identification card of claim 10, wherein the secure processor for storing and processing the protected biometric data is functionally isolated from the ISO smart card processor by a firewall. 17.根据权利要求10所述的身份识别卡,其中:17. The identification card of claim 10, wherein: 所述卡包括上磁条区域和下浮雕区域;The card includes an upper magnetic stripe area and a lower embossed area; 所述生物传感器是指纹传感器;以及said biosensor is a fingerprint sensor; and 所述安全处理器、所述ISO智能卡处理器和所述指纹传感器均位于在所述上磁条区域和所述下浮雕区域之间的中间区域。The security processor, the ISO smart card processor and the fingerprint sensor are located in an intermediate area between the upper magnetic stripe area and the lower embossed area. 18.根据权利要求2所述的身份识别卡,其中,所述生物数据包括指纹数据并且所述传感器是用于从放在所述传感器上的用户的手指获取数据的指纹传感器。18. The identification card of claim 2, wherein the biometric data includes fingerprint data and the sensor is a fingerprint sensor for acquiring data from a user's finger placed on the sensor. 19.根据权利要求18所述的身份识别卡,其中,当所述用户将其手指放到所述指纹传感器上方时,提供实时反馈,从而有助于所述手指在所述传感器上方进行最佳放置。19. The identification card of claim 18, wherein when the user places his finger over the fingerprint sensor, real-time feedback is provided to facilitate optimal positioning of the finger over the sensor. place. 20.根据权利要求18所述的身份识别卡,其中,所述匹配程序采用混合匹配算法,所述混合匹配算法考虑了所捕获的生物数据中的细节和全部空间关系。20. The identification card of claim 18, wherein the matching procedure employs a hybrid matching algorithm that takes into account details and overall spatial relationships in the captured biometric data. 21.根据权利要求18所述的身份识别卡,其中,所述指纹传感器包括通过垫板支承的晶体硅片。21. The identification card of claim 18, wherein the fingerprint sensor comprises a crystalline silicon chip supported by a backing plate. 22.根据权利要求21所述的身份识别卡,其中,所述垫板包括夹在两个金属层之间的玻璃环氧树脂层。22. The identification card of claim 21, wherein the backing plate comprises a glass epoxy layer sandwiched between two metal layers. 23.根据权利要求18所述的身份识别卡,其中,所述垫板由围绕所述硅片的载体框加固。23. The identification card of claim 18, wherein the backing plate is reinforced by a carrier frame surrounding the silicon chip. 24.根据权利要求1所述的身份识别卡,其中,所述卡还包括用于将所述卡的使用限定于预定位置的装置。24. The identification card of claim 1, wherein said card further comprises means for restricting use of said card to predetermined locations. 25.根据权利要求1所述的身份识别卡,其中,所捕获的生物数据中的至少一部分和所述参考数据被传输到独立的认证服务器,用于在任何授权在线访问用于处理涉及此用户的安全金融交易的应用服务器之前对用户身份进行安全验证。25. The identification card of claim 1, wherein at least a portion of the captured biometric data and said reference data are transmitted to a separate authentication server for use in any authorized online access for processing involving the user Security verification of user identity is performed before the application server of the secure financial transaction. 26.根据权利要求25所述的身份识别卡,其中,响应于涉及在所述认证服务器上产生肯定匹配的特定应用服务器上的特定登录企图的匹配请求,执行安全三路认证协议,其中将询问字符序列从所述认证服务器发送到所述身份识别卡,然后所述身份识别卡使用所述询问字符序列和所述匹配请求产生询问响应,然后将其发送到所述应用服务器,然后所述应用服务器将所述询问响应发送到所述认证服务器,然后所述认证服务器确认所述询问响应是否有效。26. An identification card as claimed in claim 25, wherein in response to a match request involving a particular login attempt on a particular application server that yields a positive match on said authentication server, a secure three-way authentication protocol is performed wherein a query The character sequence is sent from the authentication server to the identification card, and then the identification card uses the challenge character sequence and the matching request to generate a challenge response, which is then sent to the application server, and the application The server sends the challenge response to the authentication server, and then the authentication server confirms whether the challenge response is valid. 27.根据权利要求1所述的身份识别卡,其中,所述卡的所述输出用于获得进入安全区域的物理通道。27. The identification card of claim 1, wherein said output of said card is used to gain physical access to a secure area. 28.根据权利要求27所述的身份识别卡,其中,成功和不成功访问企图的记录都被保存在所述卡中。28. The identification card of claim 27, wherein a record of both successful and unsuccessful access attempts is maintained on the card.
CNB038250098A 2002-09-10 2003-09-10 Secure Biometric Authentication Expired - Fee Related CN100437635C (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US40971602P 2002-09-10 2002-09-10
US60/409,716 2002-09-10
US60/409,715 2002-09-10
US60/429,919 2002-11-27
US60/433,254 2002-12-13
US60/484,692 2003-07-03

Publications (2)

Publication Number Publication Date
CN1695163A true CN1695163A (en) 2005-11-09
CN100437635C CN100437635C (en) 2008-11-26

Family

ID=35353502

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB038250098A Expired - Fee Related CN100437635C (en) 2002-09-10 2003-09-10 Secure Biometric Authentication

Country Status (10)

Country Link
CN (1) CN100437635C (en)
AR (1) AR041226A1 (en)
LT (1) LT5344B (en)
MY (1) MY161401A (en)
PA (1) PA8581901A1 (en)
PE (1) PE20040351A1 (en)
TN (1) TNSN05068A1 (en)
TW (1) TWI366795B (en)
UY (1) UY27970A1 (en)
ZA (1) ZA200502663B (en)

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MD4012B2 (en) * 2002-09-10 2010-01-31 Ivi Smart Technologies, Inc Identification card
CN101626296B (en) * 2009-05-27 2012-04-18 飞天诚信科技股份有限公司 Method for improving input information security and biological information acquisition equipment
CN101616416B (en) * 2009-07-24 2012-08-29 中兴通讯股份有限公司 Method and equipment for authenticating smart card of communication terminal
CN102831335A (en) * 2011-06-16 2012-12-19 中国科学院数据与通信保护研究教育中心 Safety protecting method and safety protecting system of Windows operating system
CN103733230A (en) * 2011-08-02 2014-04-16 康宁股份有限公司 Biometric-enabled smart card
CN103930893A (en) * 2012-07-13 2014-07-16 Befs有限公司 Portable storage device using fingerprint recognition and method for controlling same
CN103955733A (en) * 2014-04-22 2014-07-30 中国工商银行股份有限公司 Electronic identity card chip card, card reader and electronic identity card verification system and method
CN105069436A (en) * 2015-08-14 2015-11-18 广东欧珀移动通信有限公司 Control method and system based on fingerprint identification, fingerprint identification module
GB2529214A (en) * 2014-08-14 2016-02-17 Soloprotect Ltd An identity card holder and system
CN105493103A (en) * 2013-09-26 2016-04-13 英特尔公司 Biometric sensors for personal devices
CN106663216A (en) * 2014-07-29 2017-05-10 联邦印刷有限公司 Document with sensor means
CN106682477A (en) * 2017-01-18 2017-05-17 西京学院 Authentication method based on human body solid characteristics
CN107066862A (en) * 2007-09-24 2017-08-18 苹果公司 Embedded authentication systems in electronic equipment
US9819676B2 (en) 2012-06-29 2017-11-14 Apple Inc. Biometric capture for unauthorized user identification
US9832189B2 (en) 2012-06-29 2017-11-28 Apple Inc. Automatic association of authentication credentials with biometrics
US9959539B2 (en) 2012-06-29 2018-05-01 Apple Inc. Continual authorization for secured functions
CN108701246A (en) * 2016-03-02 2018-10-23 维普公司 Fingerprint can authorization device
US10212158B2 (en) 2012-06-29 2019-02-19 Apple Inc. Automatic association of authentication credentials with biometrics
US10331866B2 (en) 2013-09-06 2019-06-25 Apple Inc. User verification for changing a setting of an electronic device
CN110582770A (en) * 2017-09-06 2019-12-17 谷歌有限责任公司 Environmental Condition Verification and User Authentication in Safety Coprocessors
CN110692056A (en) * 2017-05-30 2020-01-14 维普公司 Smart card and method for controlling a smart card
US10735412B2 (en) 2014-01-31 2020-08-04 Apple Inc. Use of a biometric image for authorization
CN113378630A (en) * 2015-02-04 2021-09-10 艾瑞迪尔通信有限公司 Local user authentication using neuro and neuro-mechanical fingerprints
CN113632103A (en) * 2019-04-01 2021-11-09 安富莱控股私人有限公司 Improved card with fingerprint biological identification technology
CN115661991A (en) * 2021-09-26 2023-01-31 青岛亿联信息科技股份有限公司 Face recognition passing linkage gateway system
US11619991B2 (en) 2018-09-28 2023-04-04 Apple Inc. Device control using gaze information
US11676373B2 (en) 2008-01-03 2023-06-13 Apple Inc. Personal computing device control using face detection and recognition
US11676188B2 (en) 2013-09-09 2023-06-13 Apple Inc. Methods of authenticating a user
US11755712B2 (en) 2011-09-29 2023-09-12 Apple Inc. Authentication with secondary approver
US11765163B2 (en) 2017-09-09 2023-09-19 Apple Inc. Implementation of biometric authentication
US11768575B2 (en) 2013-09-09 2023-09-26 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US11809784B2 (en) 2018-09-28 2023-11-07 Apple Inc. Audio assisted enrollment
US11836725B2 (en) 2014-05-29 2023-12-05 Apple Inc. User interface for payments
US11928200B2 (en) 2018-06-03 2024-03-12 Apple Inc. Implementation of biometric authentication
US12079458B2 (en) 2016-09-23 2024-09-03 Apple Inc. Image data for enhanced user interactions
US12099586B2 (en) 2021-01-25 2024-09-24 Apple Inc. Implementation of biometric authentication
US12216754B2 (en) 2021-05-10 2025-02-04 Apple Inc. User interfaces for authenticating to perform secure operations
US12262111B2 (en) 2011-06-05 2025-03-25 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US12462005B2 (en) 2017-09-09 2025-11-04 Apple Inc. Implementation of biometric authentication

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9400914B2 (en) 2014-10-24 2016-07-26 Egis Technology Inc. Method and electronic device for generating fingerprint enrollment data
JP6753713B2 (en) 2016-07-15 2020-09-09 株式会社東芝 IC module, IC card, and collation device
ZA201802775B (en) * 2018-01-22 2019-01-30 Ratshephe Wright Makhene Ezekiel A card and identity verification system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6029868A (en) 1983-07-29 1985-02-15 Toshiba Corp Individual identification system
GB2244164A (en) * 1990-05-18 1991-11-20 Philips Electronic Associated Fingerprint sensing
US5907627A (en) * 1995-11-06 1999-05-25 Dew Engineering And Development Limited Contact imaging device
US5995630A (en) * 1996-03-07 1999-11-30 Dew Engineering And Development Limited Biometric input with encryption
US5978495A (en) * 1996-07-17 1999-11-02 Intelnet Inc. Method and apparatus for accurate determination of the identity of human beings
DE29821644U1 (en) * 1998-12-04 1999-02-18 Stocko Metallwarenfab Henkels Authentication system for PC cards
AU729157B1 (en) * 1999-08-02 2001-01-25 Ming-Shiang Shen Integrated circuit card with fingerprint verification capability
US6325285B1 (en) * 1999-11-12 2001-12-04 At&T Corp. Smart card with integrated fingerprint reader
GB0009609D0 (en) * 2000-04-18 2000-06-07 Glaxo Group Ltd Therapeutic compositions
AU2001283400A1 (en) * 2000-08-17 2002-02-25 Authentec, Inc. Integrated circuit package including opening exposing portion of an ic

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MD4012B2 (en) * 2002-09-10 2010-01-31 Ivi Smart Technologies, Inc Identification card
CN107066862A (en) * 2007-09-24 2017-08-18 苹果公司 Embedded authentication systems in electronic equipment
US11676373B2 (en) 2008-01-03 2023-06-13 Apple Inc. Personal computing device control using face detection and recognition
US12406490B2 (en) 2008-01-03 2025-09-02 Apple Inc. Personal computing device control using face detection and recognition
CN101626296B (en) * 2009-05-27 2012-04-18 飞天诚信科技股份有限公司 Method for improving input information security and biological information acquisition equipment
CN101616416B (en) * 2009-07-24 2012-08-29 中兴通讯股份有限公司 Method and equipment for authenticating smart card of communication terminal
US12262111B2 (en) 2011-06-05 2025-03-25 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
CN102831335A (en) * 2011-06-16 2012-12-19 中国科学院数据与通信保护研究教育中心 Safety protecting method and safety protecting system of Windows operating system
CN102831335B (en) * 2011-06-16 2015-08-05 中国科学院数据与通信保护研究教育中心 A kind of method for security protection of Windows operating system and system
CN103733230B (en) * 2011-08-02 2016-10-26 康宁股份有限公司 Enable biometric smart card
CN103733230A (en) * 2011-08-02 2014-04-16 康宁股份有限公司 Biometric-enabled smart card
US11755712B2 (en) 2011-09-29 2023-09-12 Apple Inc. Authentication with secondary approver
US9832189B2 (en) 2012-06-29 2017-11-28 Apple Inc. Automatic association of authentication credentials with biometrics
US9819676B2 (en) 2012-06-29 2017-11-14 Apple Inc. Biometric capture for unauthorized user identification
US9959539B2 (en) 2012-06-29 2018-05-01 Apple Inc. Continual authorization for secured functions
US10212158B2 (en) 2012-06-29 2019-02-19 Apple Inc. Automatic association of authentication credentials with biometrics
CN103930893A (en) * 2012-07-13 2014-07-16 Befs有限公司 Portable storage device using fingerprint recognition and method for controlling same
US10331866B2 (en) 2013-09-06 2019-06-25 Apple Inc. User verification for changing a setting of an electronic device
US11768575B2 (en) 2013-09-09 2023-09-26 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US12314527B2 (en) 2013-09-09 2025-05-27 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US11676188B2 (en) 2013-09-09 2023-06-13 Apple Inc. Methods of authenticating a user
CN105493103A (en) * 2013-09-26 2016-04-13 英特尔公司 Biometric sensors for personal devices
US10735412B2 (en) 2014-01-31 2020-08-04 Apple Inc. Use of a biometric image for authorization
CN103955733B (en) * 2014-04-22 2017-02-15 中国工商银行股份有限公司 Electronic identity card chip card, card reader and electronic identity card verification system and method
CN103955733A (en) * 2014-04-22 2014-07-30 中国工商银行股份有限公司 Electronic identity card chip card, card reader and electronic identity card verification system and method
US11836725B2 (en) 2014-05-29 2023-12-05 Apple Inc. User interface for payments
CN106663216A (en) * 2014-07-29 2017-05-10 联邦印刷有限公司 Document with sensor means
US10515299B2 (en) 2014-07-29 2019-12-24 Bundesdruckerei Gmbh Document with sensor means
GB2529214B (en) * 2014-08-14 2016-10-19 Soloprotect Ltd An identity card holder and system
GB2529214A (en) * 2014-08-14 2016-02-17 Soloprotect Ltd An identity card holder and system
CN113378630A (en) * 2015-02-04 2021-09-10 艾瑞迪尔通信有限公司 Local user authentication using neuro and neuro-mechanical fingerprints
CN105069436A (en) * 2015-08-14 2015-11-18 广东欧珀移动通信有限公司 Control method and system based on fingerprint identification, fingerprint identification module
CN108701246A (en) * 2016-03-02 2018-10-23 维普公司 Fingerprint can authorization device
US12079458B2 (en) 2016-09-23 2024-09-03 Apple Inc. Image data for enhanced user interactions
CN106682477A (en) * 2017-01-18 2017-05-17 西京学院 Authentication method based on human body solid characteristics
CN106682477B (en) * 2017-01-18 2023-09-19 西京学院 Authentication method based on solid-state characteristics of the human body
CN110692056A (en) * 2017-05-30 2020-01-14 维普公司 Smart card and method for controlling a smart card
CN110582770A (en) * 2017-09-06 2019-12-17 谷歌有限责任公司 Environmental Condition Verification and User Authentication in Safety Coprocessors
US10740494B2 (en) 2017-09-06 2020-08-11 Google Llc Central and delegate security processors for a computing device
TWI681318B (en) * 2017-09-06 2020-01-01 美商谷歌有限責任公司 Mobile apparatus and method performed by apparatus
US11765163B2 (en) 2017-09-09 2023-09-19 Apple Inc. Implementation of biometric authentication
US12462005B2 (en) 2017-09-09 2025-11-04 Apple Inc. Implementation of biometric authentication
US12189748B2 (en) 2018-06-03 2025-01-07 Apple Inc. Implementation of biometric authentication
US11928200B2 (en) 2018-06-03 2024-03-12 Apple Inc. Implementation of biometric authentication
US11619991B2 (en) 2018-09-28 2023-04-04 Apple Inc. Device control using gaze information
US12124770B2 (en) 2018-09-28 2024-10-22 Apple Inc. Audio assisted enrollment
US12105874B2 (en) 2018-09-28 2024-10-01 Apple Inc. Device control using gaze information
US11809784B2 (en) 2018-09-28 2023-11-07 Apple Inc. Audio assisted enrollment
CN113632103A (en) * 2019-04-01 2021-11-09 安富莱控股私人有限公司 Improved card with fingerprint biological identification technology
US12099586B2 (en) 2021-01-25 2024-09-24 Apple Inc. Implementation of biometric authentication
US12216754B2 (en) 2021-05-10 2025-02-04 Apple Inc. User interfaces for authenticating to perform secure operations
CN115661991A (en) * 2021-09-26 2023-01-31 青岛亿联信息科技股份有限公司 Face recognition passing linkage gateway system

Also Published As

Publication number Publication date
TNSN05068A1 (en) 2007-05-14
CN100437635C (en) 2008-11-26
MY161401A (en) 2017-04-14
LT2005035A (en) 2006-01-25
LT5344B (en) 2006-06-27
TWI366795B (en) 2012-06-21
ZA200502663B (en) 2006-08-30
TW200411572A (en) 2004-07-01
UY27970A1 (en) 2003-12-31
PA8581901A1 (en) 2004-05-21
AR041226A1 (en) 2005-05-11
PE20040351A1 (en) 2004-06-17

Similar Documents

Publication Publication Date Title
CN1695163A (en) Secure Biometric Authentication
JP4673065B2 (en) Secret biometric testing of identity
JP5659246B2 (en) Protected personal data processing and management system
US8918900B2 (en) Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport
US11521720B2 (en) User medical record transport using mobile identification credential
US20220138298A1 (en) Device and systems for strong identity and strong authentication
JP2005508037A (en) Method and system for establishing identity trust
US12500885B2 (en) Systems and methods for authentication and validation based on user credential and biometric data
RU2339081C2 (en) Intellectual identification card
ES2336983B1 (en) SECURITY BIOMETRIC IDENTITY VERIFICATION.
US20240005719A1 (en) Distributed biometric identity system enrollment with live confirmation
WO2024263035A1 (en) A computer implemented method for generating and storing a digital user id associated with a user and use thereof for authenticating a person
LT5403B (en) Secure biometric verification of identity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081126

Termination date: 20110910