[go: up one dir, main page]

HK1220021B - System and method for biometric authentication with device attestation - Google Patents

System and method for biometric authentication with device attestation Download PDF

Info

Publication number
HK1220021B
HK1220021B HK16108007.6A HK16108007A HK1220021B HK 1220021 B HK1220021 B HK 1220021B HK 16108007 A HK16108007 A HK 16108007A HK 1220021 B HK1220021 B HK 1220021B
Authority
HK
Hong Kong
Prior art keywords
verification
key
biometric
user
score
Prior art date
Application number
HK16108007.6A
Other languages
Chinese (zh)
Other versions
HK1220021A1 (en
Inventor
R.林德曼
Original Assignee
诺克诺克实验公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/066,273 external-priority patent/US9961077B2/en
Application filed by 诺克诺克实验公司 filed Critical 诺克诺克实验公司
Publication of HK1220021A1 publication Critical patent/HK1220021A1/en
Publication of HK1220021B publication Critical patent/HK1220021B/en

Links

Description

使用装置证实进行生物计量验证的系统和方法Systems and methods for biometric authentication using device verification

对优先权的要求Claims for priority

本申请要求2013年5月30日提交的名称为“Combining BiometricAuthentication With Device Attestation”(组合生物计量验证与装置证实)的共同待审的美国临时专利申请No.61/829,081的权益,该专利转让给本非临时专利申请的受让人并且据此以引用方式并入。This application claims the benefit of co-pending U.S. Provisional Patent Application No. 61/829,081, entitled “Combining Biometric Authentication With Device Attestation,” filed May 30, 2013, which is assigned to the assignee of this non-provisional patent application and is hereby incorporated by reference.

技术领域Technical Field

本发明整体涉及数据处理系统的领域。更具体地讲,本发明涉及使用装置证实进行生物计量验证的系统和方法。The present invention relates generally to the field of data processing systems. More particularly, the present invention relates to systems and methods for biometric authentication using device verification.

背景技术Background Art

现有系统已设计用于使用生物计量传感器经由网络提供安全用户验证。例如,专利申请No.2011/0082801(“‘801申请”)描述了一种在网络上进行用户注册和验证的框架,这种框架提供强验证(例如,防御身份窃取和网络钓鱼)、安全交易(例如,防御交易中的“浏览器中的恶意软件”和“中间人”攻击)和客户端验证令牌的登记/管理(例如,指纹读取器、面部识别装置、智能卡、可信平台模块等等)。Existing systems have been designed to provide secure user authentication over a network using biometric sensors. For example, Patent Application No. 2011/0082801 (“the '801 Application”) describes a framework for user registration and authentication over a network that provides strong authentication (e.g., protection against identity theft and phishing), secure transactions (e.g., protection against “in-browser malware” and “man-in-the-middle” attacks during transactions), and registration/management of client authentication tokens (e.g., fingerprint readers, facial recognition devices, smart cards, trusted platform modules, etc.).

生物计量传感器在商用现成计算机系统(诸如和Elite )的本地计算机验证中已使用多年。集成到这些计算机系统的生物计量传感器通常可依赖于计算机系统的完整性,因为便捷性(而非抵抗攻击)是它们的主要目标。另外商业计算机系统通常不够稳固,根本无法抵御物理篡改。因此单独为指纹传感器添加物理保护并没有受到优先考虑。Biometric sensors have been used for years for local computer authentication in commercial off-the-shelf computer systems, such as the Intel Core i7-9000 and Intel Core i7-9000 Elite. Biometric sensors integrated into these systems often rely on the integrity of the computer system, as convenience (not attack resistance) is their primary goal. Furthermore, commercial computer systems are often not robust enough to resist physical tampering. Therefore, adding physical protection to fingerprint sensors alone has not been a priority.

由于生物计量装置已经用于远程验证某些应用程序,因此需要严格的组织方法来保护生物计量系统的完整性。例如,这些生物计量系统通常是封闭的,并且它们到计算机系统的接口只有授权人员和可信人员(例如,确保使用已知可接受的生物计量装置并且该装置不会被篡改的可信个人或团体)才能访问。Because biometric devices are already used for remote authentication of certain applications, a rigorous organizational approach is required to protect the integrity of biometric systems. For example, these biometric systems are typically closed, and their interfaces to computer systems are accessible only to authorized and trusted personnel (e.g., individuals or groups who are trusted to ensure that known acceptable biometric devices are used and that the devices have not been tampered with).

随着云服务被越来越多地采用,发展出了新的生物计量验证使用案例,即对云服务进行基于生物计量的验证。在这种情况下,可将至少生物计量传感器附接到无监督机器上。这种无监督情况有两个后果:With the increasing adoption of cloud services, a new use case for biometric authentication has emerged: biometric-based authentication for cloud services. In this scenario, at least one biometric sensor can be attached to an unsupervised machine. This unsupervised approach has two consequences:

a)由于没有检查系统是否正遭到欺骗的监督方,生物计量装置应具有集成的防欺骗方法(即检测虚假生物计量);以及a) Biometric devices should have integrated anti-spoofing methods (i.e. detection of fake biometrics) as there is no supervisory party to check whether the system is being spoofed; and

b)机器和生物计量装置的完整性不能被假设为由外部方法保护,因此需要有它们自己的屏蔽机制。b) The integrity of machines and biometric devices cannot be assumed to be protected by external means and therefore require their own shielding mechanisms.

研究团体(Murali Mohan Chakka,2011)(Marcialis,2009)(Umut Uludag,AnilK.Jain;密歇根州立大学计算机科学与工程系)很好地识别并解决了(a)的需求。然而,(b)的技术尚未完全开发出来。特别地,对于应用程序要确定它是在与真正的生物计量装置通信还是在与恶意软件通信,目前还没有标准化的技术。另外,对于远程依赖方(诸如云服务)要确定访问服务的请求是正由可信应用程序还是恶意软件发送,目前还不存在可接受的技术。The need for (a) has been well-identified and addressed by the research community (Murali Mohan Chakka, 2011) (Marcialis, 2009) (Umut Uludag, Anil K. Jain; Department of Computer Science and Engineering, Michigan State University). However, the technology for (b) has not yet been fully developed. In particular, there is currently no standardized technique for an application to determine whether it is communicating with an authentic biometric device or malware. Furthermore, there is currently no acceptable technique for a remote relying party (such as a cloud service) to determine whether a request to access the service is being sent by a trusted application or malware.

图1示出了具有生物计量装置100的示例性客户端120。正常运行时,生物计量传感器102从用户读取原始生物计量数据(例如,捕捉用户指纹,记录用户声音,拍摄用户的照片,等等),并且特征提取模块103提取原始生物计量数据的指定特征(例如,注重于指纹的某些区域、某些面部特征等等)。匹配器模块104将所提取的特征133与存储在客户端120上的安全存储装置中的生物计量参考数据110进行比较,并且基于所提取的特征与生物计量参考数据110之间的相似性来生成得分153。生物计量参考数据110通常是登记过程的结果,在登记过程中用户向装置100登记指纹、声音样本、图像或其他生物计量数据。应用程序105可接着使用得分135来确定验证是否成功(例如,得分是否高于某个指定阈值)。FIG1 illustrates an exemplary client 120 having a biometric device 100. During normal operation, the biometric sensor 102 reads raw biometric data from the user (e.g., captures the user's fingerprint, records the user's voice, takes a photo of the user, etc.), and the feature extraction module 103 extracts specified features from the raw biometric data (e.g., focusing on certain areas of the fingerprint, certain facial features, etc.). The matcher module 104 compares the extracted features 133 with biometric reference data 110 stored in secure storage on the client 120 and generates a score 153 based on the similarity between the extracted features and the biometric reference data 110. The biometric reference data 110 is typically the result of an enrollment process, in which the user enrolls a fingerprint, voice sample, image, or other biometric data with the device 100. The application 105 can then use the score 135 to determine whether authentication was successful (e.g., whether the score is above a specified threshold).

攻击者可将生物计量管道内的不同位置130至136作为目标。例如,在130处,攻击者可向生物计量传感器102提交虚假生物计量数据(例如,提交用户声音的录音或用户指纹的照片)。在131处,攻击者可再次向特征提取模块103提交包含先前捕捉的特征的旧信号,或者在132处,可完全重写特征提取功能。在133处,攻击者可篡改提供给匹配器104的特征表示,或者在134处,可重写匹配功能。在136处,攻击者可向匹配器104提供伪造的生物计量参考数据,或者在135处,可向应用程序105提供伪造的得分。因此,如图1所示,生物计量管道内有许多位置容易成为攻击者的目标。An attacker can target various locations within the biometric pipeline, 130 through 136. For example, at 130, an attacker can submit false biometric data to the biometric sensor 102 (e.g., a recording of the user's voice or a photo of the user's fingerprint). At 131, an attacker can resubmit an old signal containing previously captured features to the feature extraction module 103, or at 132, the attacker can completely override the feature extraction functionality. At 133, an attacker can tamper with the feature representation provided to the matcher 104, or at 134, the attacker can override the matching functionality. At 136, an attacker can provide forged biometric reference data to the matcher 104, or at 135, a forged score to the application 105. Thus, as shown in FIG1 , there are many locations within the biometric pipeline that are easily targeted by attackers.

发明内容Summary of the Invention

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

可结合下列附图从以下具体实施方式更好地理解本发明,其中:The present invention may be better understood from the following detailed description in conjunction with the following drawings, in which:

图1示出配备有生物计量装置的示例性客户端。FIG. 1 illustrates an exemplary client equipped with a biometric device.

图2示出使用装置证实进行生物计量验证的系统架构的一个实施例。FIG2 illustrates one embodiment of a system architecture for biometric authentication using device verification.

图3A至C示出事务图,显示了依赖方与生物计量装置上的加密引擎之间的示例性交易。3A-C illustrate transaction diagrams showing exemplary transactions between a relying party and a cryptographic engine on a biometric device.

图4A至B示出安全验证系统架构的两个不同实施例。4A-B illustrate two different embodiments of a secure authentication system architecture.

具体实施方式DETAILED DESCRIPTION

下文描述了用于在客户端-服务器环境中实施使用装置证实的验证框架的设备、方法以及机器可读介质。在整个描述中,出于解释的目的,本文陈述了许多特定细节以便透彻理解本发明。然而,本领域的技术人员将容易明白,可在没有这些特定细节中的一些的情况下实践本发明。在其他情况下,为免模糊本发明的基本原理,已熟知的结构和装置未示出或以框图形式示出。The following describes an apparatus, method, and machine-readable medium for implementing an authentication framework using device authentication in a client-server environment. Throughout the description, for purposes of explanation, numerous specific details are set forth herein to provide a thorough understanding of the present invention. However, those skilled in the art will readily appreciate that the present invention may be practiced without some of these specific details. In other cases, to avoid obscuring the underlying principles of the present invention, well-known structures and devices are not shown or are shown in block diagram form.

下文论述的本发明的实施例涉及具有验证能力(诸如生物计量装置或PIN输入)的客户端装置。这些装置在本文中有时称为“令牌”、“验证装置”或“验证器”。可使用各种不同的生物计量装置,包括但不限于指纹传感器、声音识别硬件/软件(例如,用于识别用户声音的麦克风和相关联软件)、面部识别硬件/软件(例如,用于识别用户面部的相机和相关联软件)、以及光学识别功能(例如,用于扫描用户的视网膜的光学扫描器和相关联软件)。验证能力还可包括非生物计量装置,诸如可信平台模块(TPM)和智能卡。The embodiments of the present invention discussed below relate to client devices with authentication capabilities (such as biometric devices or PIN entry). These devices are sometimes referred to herein as "tokens," "authentication devices," or "authenticators." A variety of different biometric devices can be used, including but not limited to fingerprint sensors, voice recognition hardware/software (e.g., a microphone and associated software for recognizing a user's voice), facial recognition hardware/software (e.g., a camera and associated software for recognizing a user's face), and optical recognition capabilities (e.g., an optical scanner and associated software for scanning a user's retina). Authentication capabilities may also include non-biometric devices, such as Trusted Platform Modules (TPMs) and smart cards.

如上所述,在移动式生物计量的具体实施中,生物计量装置可远离依赖方。如本文所用,术语“远离”意味着生物计量传感器不是其以通信方式耦接到的计算机的安全边界的一部分(例如,生物计量传感器未嵌入到与依赖方计算机相同的物理外壳中)。举例来说,生物计量装置可经由网络(例如,因特网、无线网络链路等)或经由外围输入(诸如USB端口)耦接到依赖方。在这些条件下,依赖方可能无法知道装置是否为得到依赖方授权的装置(例如,提供可接受等级的验证和完整性保护的装置)以及/或者黑客是否已经危及生物计量装置。生物计量装置的置信度取决于装置的特定实施。As described above, in specific implementations of mobile biometrics, the biometric device may be remote from the relying party. As used herein, the term "remote" means that the biometric sensor is not part of the security perimeter of the computer to which it is communicatively coupled (e.g., the biometric sensor is not embedded in the same physical housing as the relying party's computer). For example, the biometric device may be coupled to the relying party via a network (e.g., the Internet, a wireless network link, etc.) or via a peripheral input (such as a USB port). Under these conditions, the relying party may not be able to know whether the device is an authorized device by the relying party (e.g., a device that provides an acceptable level of authentication and integrity protection) and/or whether a hacker has compromised the biometric device. The confidence level of the biometric device depends on the specific implementation of the device.

本发明的一个实施例采用密码证实来向依赖方确保使用的是正确的生物计量装置。生物计量装置可进入密码证实交易,这时依赖方验证生物计量装置具有的传感器类型。具体地讲,具有安全证实密钥存储装置的加密引擎包括在生物计量装置中,以向依赖方提供安全证实。One embodiment of the present invention uses cryptographic authentication to ensure a relying party that the correct biometric device is being used. The biometric device can enter into a cryptographic authentication transaction, during which the relying party verifies the type of sensor the biometric device possesses. Specifically, a cryptographic engine with secure authentication key storage is included in the biometric device to provide secure authentication to the relying party.

图2示出本发明的一个实施例,其包括用于证实验证器200的模型和/或完整性的加密引擎205。具体地讲,如下文详细论述,加密引擎205执行与依赖方207的证实交易,从而证明验证器200的完整性。在该实施例中,依赖方207只有在它还能够对验证器200完整性的证据进行验证的情况下,才会信任匹配器204生成的得分。如图2所示,在一个实施例中,依赖方207可为云服务。然而,本发明的基本原理不限于任何特定类型的依赖方。FIG2 illustrates one embodiment of the present invention, which includes a cryptographic engine 205 for verifying the model and/or integrity of a validator 200. Specifically, as discussed in detail below, cryptographic engine 205 performs a verification transaction with a relying party 207, thereby verifying the integrity of the validator 200. In this embodiment, relying party 207 trusts the score generated by matchmaker 204 only if it can also verify the evidence of the integrity of the validator 200. As shown in FIG2 , in one embodiment, relying party 207 may be a cloud service. However, the underlying principles of the present invention are not limited to any particular type of relying party.

在操作中,加密引擎205有权访问安全密钥存储装置211,该安全密钥存储装置用于存储证实交易期间所使用的证实密钥。例如,该密钥可为生产时存储在验证器200中的私有密钥并且依赖方207可存储对应的公共密钥。然而,本发明的基本原理不限于任何特定不对称或对称的密钥具体实施。In operation, the cryptographic engine 205 has access to a secure key storage 211, which is used to store the authentication key used during authentication transactions. For example, the key may be a private key stored in the authenticator 200 at production time, and the relying party 207 may store the corresponding public key. However, the underlying principles of the present invention are not limited to any particular asymmetric or symmetric key implementation.

在一个实施例中,生物计量装置包括保护证实密钥的附加保护逻辑。响应于检测到某种篡改密钥的企图,保护逻辑会自动擦除密钥。在一个实施例中,安全密钥存储装置211可以是与用于存储生物计量参考数据210的安全存储装置相同的安全存储装置,但本发明的基本原理不限于此具体实施。In one embodiment, the biometric device includes additional protection logic to protect the authentication key. In response to detecting an attempt to tamper with the key, the protection logic automatically erases the key. In one embodiment, secure key storage 211 may be the same secure storage used to store biometric reference data 210, although the underlying principles of the invention are not limited to this specific implementation.

图3a示出本发明的一个实施例中所采用的一系列证实交易。在交易300中,依赖方207生成质询,并且在交易301中将质询发送到应用程序206,在交易302中,应用程序206将质询转发到加密引擎205。在一个实施例中,质询是依赖方207选择的随机数字或随机数。在操作303中,加密引擎205对该质询生成签名,并使用证实密钥生成得分。如本领域的技术人员所理解的那样,生成签名可能涉及使用证实密钥对质询实施散列函数。Figure 3a illustrates a series of authentication transactions employed in one embodiment of the present invention. In transaction 300, relying party 207 generates a challenge and sends the challenge to application 206 in transaction 301. In transaction 302, application 206 forwards the challenge to cryptographic engine 205. In one embodiment, the challenge is a random number or nonce selected by relying party 207. In operation 303, cryptographic engine 205 generates a signature for the challenge and generates a score using the authentication key. As will be appreciated by those skilled in the art, generating the signature may involve applying a hash function to the challenge using the authentication key.

在操作304中,匹配器204生成得分,并且在操作305中,将该得分与用户ID一起提供给加密引擎205。可如先前所述生成得分。例如,生物计量传感器202可从用户读取原始生物计量数据(例如,捕捉用户指纹,记录用户声音,拍摄用户的照片,等等),并且特征提取模块203可提取原始生物计量数据的指定特征(例如,注重于指纹的某些区域、某些面部特征等等)。匹配器模块204将所提取的特征与存储在客户端220上的安全存储装置中的生物计量参考数据210进行比较,并且基于所提取的特征与生物计量参考数据210之间的相似性来生成得分。如前文所述,生物计量参考数据210可以是登记过程的结果,在登记过程中用户向验证器200登记指纹、声音样本、图像或其他生物计量数据。应用程序206或依赖方207可接着使用该得分来确定验证是否成功(例如,得分是否高于具体交易所需的某个阈值)。In operation 304, the matcher 204 generates a score and, in operation 305, provides the score along with the user ID to the encryption engine 205. The score can be generated as previously described. For example, the biometric sensor 202 can read raw biometric data from the user (e.g., capture the user's fingerprint, record the user's voice, take a photo of the user, etc.), and the feature extraction module 203 can extract specified features from the raw biometric data (e.g., focusing on certain areas of the fingerprint, certain facial features, etc.). The matcher module 204 compares the extracted features with the biometric reference data 210 stored in the secure storage device on the client 220 and generates a score based on the similarity between the extracted features and the biometric reference data 210. As previously described, the biometric reference data 210 can be the result of an enrollment process in which the user enrolls a fingerprint, voice sample, image, or other biometric data with the authenticator 200. The application 206 or relying party 207 can then use the score to determine whether the authentication was successful (e.g., whether the score is above a certain threshold required for a specific transaction).

操作306中,加密引擎205将组合的签名、用户ID和得分发送到应用程序206,在操作307中,应用程序206将这些转发到依赖方207。依赖方207现在知道了质询(例如,依赖方先前生成的随机数或随机数字)以及加密引擎205提供的签名。操作308中,依赖方使用自己的密钥来验证使用该随机数字的签名,从而验证加密引擎拥有的证实密钥。如上所述,在一个实施例中,依赖方所用的密钥是公共密钥,用于验证使用私有密钥对质询生成的签名。或者,加密引擎和依赖方可使用相同的密钥(即,可使用对称密钥对)。本发明的基本原理不限于任何特定的公共/私有密钥具体实施。加密引擎只需能够对质询生成可由依赖方验证的签名。In operation 306, the encryption engine 205 sends the combined signature, user ID, and score to the application 206, which forwards these to the relying party 207 in operation 307. The relying party 207 now knows the challenge (e.g., the random number or nonce previously generated by the relying party) and the signature provided by the encryption engine 205. In operation 308, the relying party uses its own key to verify the signature using the nonce, thereby verifying the certification key possessed by the encryption engine. As described above, in one embodiment, the key used by the relying party is a public key, which is used to verify the signature generated using the private key to the challenge. Alternatively, the encryption engine and the relying party can use the same key (i.e., a symmetric key pair can be used). The basic principles of the present invention are not limited to any particular public/private key implementation. The encryption engine only needs to be able to generate a signature that can be verified by the relying party to the challenge.

如果为每个生物统计装置分配其唯一的证实密钥,则该密钥可用作唯一识别用户的全局关联句柄。这会在世界一些地区造成隐私问题。例如,于1993年推出的CPUID指令可用来检索CPU的序列号。考虑到隐私问题,此功能后来被移除。If each biometric device is assigned its own unique authentication key, this key can be used as a global association handle to uniquely identify a user. This can cause privacy issues in some parts of the world. For example, the CPUID instruction, introduced in 1993, could be used to retrieve the CPU serial number. Due to privacy concerns, this feature was later removed.

为了解决隐私问题,在一个实施例中,同一个证实密钥可用于多个生物计量装置。例如,某一类型的(例如,使用某一类型的传感器或同一批次生产的)所有指纹传感器可使用同一个共享证实密钥。例如,此共享密钥可识别具有“X型”传感器的特定生物计量装置。因此,在使用共享证实密钥的情况下,无法唯一识别个人用户/装置,从而保护了每个用户的隐私。To address privacy concerns, in one embodiment, the same authentication key can be used across multiple biometric devices. For example, all fingerprint sensors of a certain type (e.g., using a certain sensor type or manufactured in the same batch) can use a single shared authentication key. For example, this shared key can identify a specific biometric device with a "Type X" sensor. Therefore, when using a shared authentication key, individual users/devices cannot be uniquely identified, thereby protecting each user's privacy.

这种配置的一个缺点是,如果潜在的黑客提取了密钥,证实过程将被入侵。为此,可信计算组织(“TCG”)开发了直接匿名证实(DAA),这种加密协议能够在保护用户隐私的同时实现可信平台的远程验证。在一个实施例中,在依赖方207和加密引擎205之间实施DAA,以证实验证器200的完整性。具体地讲,加密引擎205可包括可信平台模块(TPM),并且执行与依赖方207的证实和验证,如,例如,Ernie Brickell等人的“Direct AnonymousAttestation”(直接匿名证实,2004年2月11日)或Liqun Chen等人的“Flexible andScalable Digital Signatures in TPM 2.0”(TPM 2.0中的灵活可扩展数字签名,2013年)中所述。One disadvantage of this configuration is that if a potential hacker extracts the key, the authentication process will be compromised. To this end, the Trusted Computing Group ("TCG") has developed Direct Anonymous Attestation (DAA), a cryptographic protocol that enables remote authentication of trusted platforms while protecting user privacy. In one embodiment, DAA is implemented between the relying party 207 and the encryption engine 205 to verify the integrity of the authenticator 200. Specifically, the encryption engine 205 may include a trusted platform module (TPM) and perform authentication and verification with the relying party 207, as described in, for example, "Direct Anonymous Attestation" by Ernie Brickell et al. (February 11, 2004) or "Flexible and Scalable Digital Signatures in TPM 2.0" by Liqun Chen et al. (2013).

在一个实施例中,使用直接匿名证实,可以两种另选方式准备加密引擎205,然后执行图3a所示的证实。In one embodiment, using direct anonymous authentication, the encryption engine 205 may be prepared in two alternative ways and then perform the authentication shown in FIG. 3a.

在图3b所示的实施例中,DAA发布方370远离生产线371。在生产验证器时,在操作351中,在加密引擎205内生成签注密钥对。或者,在一个实施例中,签注密钥对可与签注密钥证书一起由生产线371注入。该密钥是验证器特有的。这不会导致隐私问题,因为该密钥只使用一次并且仅结合一个依赖方,即DAA发布方。在操作352中,提取签注公共密钥,在操作353中,创建唯一签注密钥证书。在操作354中,将唯一签注密钥证书注入到加密引擎205中。In the embodiment shown in Figure 3b, the DAA issuer 370 is remote from the production line 371. When the validator is produced, in operation 351, an endorsement key pair is generated within the encryption engine 205. Alternatively, in one embodiment, the endorsement key pair can be injected by the production line 371 along with the endorsement key certificate. The key is unique to the validator. This does not cause privacy issues because the key is only used once and is only bound to one relying party, namely the DAA issuer. In operation 352, the endorsement public key is extracted, and in operation 353, a unique endorsement key certificate is created. In operation 354, the unique endorsement key certificate is injected into the encryption engine 205.

在一个实施例中,签注证书使用一次,即结合DAA发布方370来针对在356处执行的“DAA-加入”操作进行自我验证。在“DAA-加入”操作期间,生成DAA密钥对,并且将DAA“证书”从DAA发布方发送到加密引擎。In one embodiment, the endorsement certificate is used once, namely in conjunction with the DAA issuer 370 to authenticate itself for the "DAA-Join" operation performed at 356. During the "DAA-Join" operation, a DAA key pair is generated and a DAA "certificate" is sent from the DAA issuer to the cryptographic engine.

在图3c所示的实施例中,DAA发布方380直接耦接到生产线。在该实施例中,可由DAA发布方(作为生产线的一部分)执行“DAA-加入”操作375。该实施例中不需要另外的签注密钥和证书。In the embodiment shown in Figure 3c, the DAA issuer 380 is directly coupled to the production line. In this embodiment, the DAA issuer (as part of the production line) can perform the "DAA-join" operation 375. No additional endorsement keys and certificates are required in this embodiment.

不管使用DAA实施哪个实施例,加密引擎205都将使用“DAA-签署”操作来代替图3a的步骤303中的常规签名。Regardless of which embodiment is implemented using DAA, the cryptographic engine 205 will use a "DAA-sign" operation instead of the conventional signing in step 303 of FIG. 3a.

示例性系统架构Exemplary system architecture

图4A至B示出包括用于验证用户的客户端侧组件和服务器侧组件的系统架构的两个实施例。图4A所示的实施例使用基于浏览器插件的架构来与网站通信,而图4B所示的实施例不需要浏览器。本文所述的使用加密引擎来通过装置证实进行生物计量验证的各种技术可在这些系统构架中的任一者上实施。例如,图4A至B所示的验证装置410至412及其相关联接口402可包括图2所示的生物计量传感器202、特征提取模块203、匹配器204以及加密引擎205。图2所示的生物计量参考数据210可与图4A至B所示的安全存储装置420一起实施。尽管安全存储装置420被示出为在验证装置410至412的安全周界之外,但在一个实施例中,每个验证装置410至412可具有其自己的集成安全存储装置。或者,每个验证装置410至412可以密码保护生物计量参考数据记录(例如,使用对称密钥包裹这些数据记录以使得存储装置420安全)。Figures 4A to B illustrate two embodiments of a system architecture including client-side components and server-side components for verifying a user. The embodiment shown in Figure 4A uses a browser plug-in-based architecture to communicate with a website, while the embodiment shown in Figure 4B does not require a browser. The various techniques described herein for using an encryption engine to perform biometric verification through device verification can be implemented on any of these system architectures. For example, the verification devices 410 to 412 and their associated interfaces 402 shown in Figures 4A to B may include the biometric sensor 202, feature extraction module 203, matcher 204, and encryption engine 205 shown in Figure 2. The biometric reference data 210 shown in Figure 2 can be implemented together with the secure storage device 420 shown in Figures 4A to B. Although the secure storage device 420 is shown as being outside the secure perimeter of the verification devices 410 to 412, in one embodiment, each verification device 410 to 412 may have its own integrated secure storage device. Alternatively, each verification device 410 to 412 can password-protect biometric reference data records (e.g., using a symmetric key to wrap these data records to make the storage device 420 secure).

图2所示的应用程序206可以是图4B所示的应用程序454和/或安全交易服务401。在浏览器具体实施中,应用程序206可以是图4A所示的浏览器404/安全交易插件405和/或安全交易服务401。依赖方207可以是图4A至B所示的安全企业或Web目的地430。然而,应该指出的是,图2所示的实施例自成一体,并且可使用除图4A至B所示的那些之外的硬件与软件的逻辑布置来实施。Application 206 shown in FIG2 may be application 454 and/or secure transaction service 401 shown in FIG4B. In a browser implementation, application 206 may be browser 404/secure transaction plug-in 405 and/or secure transaction service 401 shown in FIG4A. Relying party 207 may be secure enterprise or web destination 430 shown in FIG4A-B. However, it should be noted that the embodiment shown in FIG2 is self-contained and may be implemented using logical arrangements of hardware and software other than those shown in FIG4A-B.

首先转到图4A,图示实施例包括配备有一个或多个验证装置410至412的客户端400,这些验证装置用于登记和验证最终用户。如上所述,验证装置410至412可包括生物计量装置,诸如指纹传感器、声音识别硬件/软件(例如,用于识别用户声音的麦克风和相关联软件)、面部识别硬件/软件(例如,用于识别用户面部的相机和相关联软件)、以及光学识别功能(例如,用于扫描用户的视网膜的光学扫描器和相关联软件);以及非生物计量装置,诸如可信平台模块(TPM)和智能卡。Turning first to Figure 4A, the illustrated embodiment includes a client 400 equipped with one or more authentication devices 410 to 412 for enrolling and authenticating an end user. As described above, the authentication devices 410 to 412 may include biometric devices such as fingerprint sensors, voice recognition hardware/software (e.g., a microphone and associated software for recognizing a user's voice), facial recognition hardware/software (e.g., a camera and associated software for recognizing a user's face), and optical recognition capabilities (e.g., an optical scanner and associated software for scanning a user's retina); as well as non-biometric devices such as a Trusted Platform Module (TPM) and a smart card.

验证装置410至412通过由安全交易服务401暴露的接口402(例如,应用程序编程接口或API)以通信方式耦接到客户端。安全交易服务401是用于经由网络与一个或多个安全交易服务器432至433通信以及用于与在web浏览器404的环境内执行的安全交易插件405介接的安全应用程序。如图所示,接口402还可提供对客户端400上的安全存储装置420的安全访问,该安全存储装置420存储与每个验证装置410至412相关的信息,诸如装置识别代码、用户识别代码、用户登记数据(例如,所扫描的指纹或其他生物计量数据),以及用于执行本文所述的安全验证技术的密钥。例如,如下文详细论述,唯一密钥可被存储到每个验证装置中并且在经由网络(诸如因特网)与服务器430通信时使用。Authentication devices 410 to 412 are communicatively coupled to the client via an interface 402 (e.g., an application programming interface or API) exposed by a secure transaction service 401. The secure transaction service 401 is a secure application for communicating with one or more secure transaction servers 432 to 433 via a network and for interfacing with a secure transaction plug-in 405 executed within the environment of a web browser 404. As shown, the interface 402 may also provide secure access to a secure storage device 420 on the client 400, which stores information related to each authentication device 410 to 412, such as a device identification code, a user identification code, user registration data (e.g., a scanned fingerprint or other biometric data), and keys for performing the secure authentication techniques described herein. For example, as discussed in detail below, a unique key may be stored in each authentication device and used when communicating with the server 430 via a network (such as the Internet).

如下文论述,安全交易插件405支持某些类型的网络交易,诸如与网站431或其他服务器的HTTP或HTTPS交易。在一个实施例中,响应于由安全企业或Web目的地430内的网络服务器431(下文中有时简称为“服务器430”)插入到网页HTML代码中的特定HTML标签来启动安全交易插件。响应于检测到此类标签,安全交易插件405可将交易转发到安全交易服务401以进行处理。另外,对于某些类型的事务(例如,诸如安全密钥交换),安全交易服务401可开启与当地交易服务器432(即,与网站位于同一地点)或异地交易服务器433的直接通信信道。As discussed below, secure transaction plugin 405 supports certain types of network transactions, such as HTTP or HTTPS transactions with a website 431 or other server. In one embodiment, the secure transaction plugin is activated in response to a specific HTML tag inserted into the HTML code of a web page by a network server 431 (sometimes referred to hereinafter as "server 430") within a secure enterprise or web destination 430. In response to detecting such a tag, secure transaction plugin 405 may forward the transaction to secure transaction service 401 for processing. In addition, for certain types of transactions (e.g., such as secure key exchange), secure transaction service 401 may open a direct communication channel with a local transaction server 432 (i.e., co-located with the website) or an off-site transaction server 433.

安全交易服务器432至433耦接到安全交易数据库440以存储用户数据、验证装置数据、密钥以及支持下文所述的安全验证交易所需要的其他安全信息。然而,应该指出的是,本发明的基本原理不需要分离图4A所示的安全企业或web目的地430内的逻辑组件。例如,网站431和安全交易服务器432至433可在单个物理服务器或单独物理服务器内实施。此外,网站431和交易服务器432至433可在一个或多个服务器上所执行的集成软件模块内实施以执行下文所述的功能。Secure transaction servers 432-433 are coupled to a secure transaction database 440 to store user data, authentication device data, cryptographic keys, and other security information required to support secure authentication transactions as described below. However, it should be noted that the underlying principles of the present invention do not require the separation of logical components within the secure enterprise or web destination 430 shown in FIG4A. For example, website 431 and secure transaction servers 432-433 may be implemented within a single physical server or separate physical servers. Furthermore, website 431 and transaction servers 432-433 may be implemented within integrated software modules executed on one or more servers to perform the functions described below.

如上所述,本发明的基本原理不限于图4A所示的基于浏览器的架构。图4B示出替代性具体实施,其中独立应用程序454利用由安全交易服务401提供的功能来经由网络验证用户。在一个实施例中,应用程序454被设计为建立与一个或多个网络服务451的通信会话,这些网络服务依赖于安全交易服务器432至433来执行下文详细描述的用户/客户端验证技术。As mentioned above, the underlying principles of the present invention are not limited to the browser-based architecture shown in FIG4A . FIG4B illustrates an alternative implementation in which a standalone application 454 utilizes functionality provided by secure transaction service 401 to authenticate users via the network. In one embodiment, application 454 is designed to establish a communication session with one or more network services 451, which rely on secure transaction servers 432-433 to perform the user/client authentication techniques described in detail below.

在图4A至图4B所示的任一个实施例中,安全交易服务器432至433可生成密钥,这些密钥接着被安全地传输到安全交易服务401并存储到安全存储装置420内的验证装置中。另外,安全交易服务器432至433管理服务器侧上的安全交易数据库420。4A-4B , the secure transaction servers 432-433 may generate keys that are then securely transmitted to the secure transaction service 401 and stored in a verification device within the secure storage 420. Additionally, the secure transaction servers 432-433 manage the secure transaction database 420 on the server side.

本发明的实施例可包括如上文陈述的各种步骤。这些步骤可体现为致使通用处理器或专用处理器执行某些步骤的机器可执行指令。或者,这些步骤可由包含用于执行这些步骤的硬连线逻辑的特定硬件组件执行,或由编程的计算机组件和定制硬件组件的任何组合执行。Embodiments of the present invention may include the various steps set forth above. These steps may be embodied as machine-executable instructions that cause a general-purpose processor or a special-purpose processor to perform certain steps. Alternatively, these steps may be performed by specific hardware components that contain hard-wired logic for performing these steps, or by any combination of programmed computer components and custom hardware components.

本发明的元件还可被提供为用于存储机器可执行程序代码的机器可读介质。机器可读介质可包括但不限于软盘、光盘、CD-ROM和磁光盘、ROM、RAM、EPROM、EEPROM、磁卡或光卡、或者适合于存储电子程序代码的其他类型的介质/机器可读介质。Element of the present invention can also be provided as machine-readable medium for storing machine executable program code.Machine-readable medium can include but is not limited to floppy disk, optical disk, CD-ROM and magneto-optical disk, ROM, RAM, EPROM, EEPROM, magnetic card or optical card or other types of medium/machine-readable medium that are suitable for storing electronic program code.

在整个前述描述中,出于解释的目的,陈述了许多特定细节以便透彻理解本发明。然而,本领域的技术人员将容易明白,可在没有这些特定细节中的一些的情况下实践本发明。例如,本领域的技术人员将容易明白,本文所述的功能模块和方法可被实施为软件、硬件或其任何组合。此外,虽然本文在移动计算环境的情形内描述本发明的一些实施例,但本发明的基本原理不限于移动计算具体实施。在一些实施例中,可使用几乎任何类型的客户端或对等数据处理装置,包括(例如)台式计算机或工作站计算机。因此,应依据所附权利要求书确定本发明的范围和精神。Throughout the foregoing description, for the purpose of explanation, many specific details have been set forth in order to provide a thorough understanding of the present invention. However, it will be readily apparent to those skilled in the art that the present invention may be practiced without some of these specific details. For example, it will be readily apparent to those skilled in the art that the functional modules and methods described herein may be implemented as software, hardware, or any combination thereof. Furthermore, although some embodiments of the present invention are described herein in the context of a mobile computing environment, the underlying principles of the present invention are not limited to mobile computing implementations. In some embodiments, virtually any type of client or peer data processing device may be used, including, for example, a desktop computer or a workstation computer. Therefore, the scope and spirit of the present invention should be determined based on the appended claims.

Claims (21)

1.一种用于远程证实验证器完整性的设备,所述设备包括:1. An apparatus for remotely verifying the integrity of a verifier, the apparatus comprising: 验证器,所述验证器从用户读取生物计量验证数据并基于与生物计量参考数据的比较确定是否成功验证所述用户,从所述比较生成得分;以及A validator that reads biometric validation data from a user and determines whether the user has been successfully validated based on a comparison with biometric reference data, generating a score from the comparison; and 加密引擎,所述加密引擎执行以下操作:The encryption engine performs the following operations: 接收来自依赖方的质询,所述质询包括随机生成的随机数,Receive a challenge from the dependent party, the challenge including a randomly generated random number. 使用证实密钥签署所述质询和所述得分,以生成证实签名,其中在生成签注密钥证书之后、使用生产线、具体针对所述依赖方来建立所述证实密钥,The challenge and the score are signed using a verification key to generate a verification signature, wherein the verification key is established using a production line, specifically for the dependent party, after the signature key certificate is generated. 其中所述生产线从签注密钥对提取公共签注密钥,以生成所述签注密钥证书并将所述签注密钥证书返回给所述加密引擎,并且其中所述签注密钥证书对应于所述证实密钥,以及The production line extracts a public signature key from the signature key pair to generate the signature key certificate and returns the signature key certificate to the encryption engine, wherein the signature key certificate corresponds to the verification key, and 将用户识别符ID、所述得分以及所述证实签名发送到所述依赖方,其中所述依赖方使用对应于所述签注密钥证书的密钥来验证所述证实签名是有效的,并且其中所述得分被用于确定所述用户的所述验证是否成功。The user identifier ID, the score, and the verification signature are sent to the dependent party, wherein the dependent party uses a key corresponding to the signature key certificate to verify that the verification signature is valid, and wherein the score is used to determine whether the user's verification was successful. 2.根据权利要求1所述的设备,其中所述加密引擎集成在所述验证器内。2. The device according to claim 1, wherein the encryption engine is integrated within the verifier. 3.根据权利要求1所述的设备,其中所述证实密钥为私有密钥,并且所述依赖方的所述密钥为与所述私有密钥相关联的公共密钥。3. The device of claim 1, wherein the verification key is a private key, and the key of the dependent party is a public key associated with the private key. 4.根据权利要求1所述的设备,其中证实所述验证器的所述完整性包括在所述加密引擎和所述依赖方之间实施一系列直接匿名证实DAA交易。4. The device of claim 1, wherein verifying the integrity of the verifier comprises implementing a series of Direct Anonymous Verification (DAA) transactions between the cryptographic engine and the dependent party. 5.根据权利要求4所述的设备,其中所述DAA交易包括“DAA-签署”交易和“DAA-验证”交易。5. The device of claim 4, wherein the DAA transaction includes a "DAA-sign" transaction and a "DAA-verify" transaction. 6.根据权利要求1所述的设备,还包括:6. The device according to claim 1, further comprising: 保护逻辑,所述保护逻辑在检测到所述加密引擎的加密数据被篡改时擦除所述加密数据。The protection logic erases the encrypted data when it detects that the encrypted data of the encryption engine has been tampered with. 7.根据权利要求1所述的设备,其中所述验证器包括:7. The device of claim 1, wherein the verifier comprises: 生物计量传感器,所述生物计量传感器从所述用户读取所述生物计量验证数据;A biometric sensor that reads the biometric verification data from the user; 特征提取模块,所述特征提取模块提取具有某些特征的所述生物计量验证数据的指定部分;A feature extraction module that extracts a specified portion of the biometric verification data that has certain features; 匹配器,所述匹配器将所述生物计量验证数据的所述指定部分与生物计量参考数据比较,并基于所述比较响应性地生成所述得分,所述得分表明所述生物计量验证数据的所述指定部分与所述生物计量参考数据之间的相似程度。A matcher compares a specified portion of the biometric validation data with biometric reference data and generates a score based on the comparison, the score indicating the degree of similarity between the specified portion of the biometric validation data and the biometric reference data. 8.一种用于远程证实验证器完整性的方法,所述方法包括:8. A method for remotely verifying the integrity of a verifier, the method comprising: 从用户读取生物计量验证数据并基于与生物计量参考数据的比较确定是否成功验证所述用户,其中所述读取和确定操作由验证器执行,从所述比较生成得分,其中所述读取和确定操作由验证器执行;以及The process involves reading biometric validation data from a user and determining whether the user has been successfully validated based on a comparison with biometric reference data, wherein the reading and determination operations are performed by a validator, and generating a score from the comparison, wherein the reading and determination operations are performed by the validator; and 保护与依赖方的通信;以及Protecting communication with dependents; and 执行与所述依赖方的证实交易以向所述依赖方证实所述验证器的完整性,所述验证包括:Execute a confirmation transaction with the dependent party to confirm the integrity of the validator to the dependent party, the confirmation including: 接收来自所述依赖方的质询,所述质询包括随机生成的随机数,Receive a challenge from the dependent party, the challenge including a randomly generated random number. 使用证实密钥签署所述质询和所述得分,以生成证实签名,其中在生成签注密钥证书之后、使用生产线、具体针对所述依赖方来建立所述证实密钥,The challenge and the score are signed using a verification key to generate a verification signature, wherein the verification key is established using a production line, specifically for the dependent party, after the signature key certificate is generated. 其中所述生产线从签注密钥对提取公共签注密钥,以生成和返回用于签署所述质询和所述得分的所述签注密钥证书,并且其中所述签注密钥证书对应于所述证实密钥,以及The production line extracts a public signature key from the signature key pair to generate and return the signature key certificate for signing the challenge and the score, and the signature key certificate corresponds to the verification key. 将用户识别符ID、所述得分以及所述证实签名发送到所述依赖方,其中所述依赖方使用对应于所述签注密钥证书的密钥来验证所述证实签名是有效的,并且其中所述得分被用于确定所述用户的所述验证是否成功。The user identifier ID, the score, and the verification signature are sent to the dependent party, wherein the dependent party uses a key corresponding to the signature key certificate to verify that the verification signature is valid, and wherein the score is used to determine whether the user's verification was successful. 9.根据权利要求8所述的方法,其中执行所述证实交易的加密引擎被集成在验证器内,所述验证器从所述用户读取所述生物计量验证数据并基于与所述生物计量参考数据的比较确定是否成功验证所述用户。9. The method of claim 8, wherein the cryptographic engine executing the verification transaction is integrated within a validator, the validator reading the biometric verification data from the user and determining whether the user has been successfully verified based on a comparison with the biometric reference data. 10.根据权利要求8所述的方法,其中所述证实密钥为私有密钥,并且所述依赖方的所述密钥为与所述私有密钥相关联的公共密钥。10. The method of claim 8, wherein the verification key is a private key, and the key of the dependent party is a public key associated with the private key. 11.根据权利要求8所述的方法,其中证实所述验证器的所述完整性包括在加密引擎和所述依赖方之间实施一系列直接匿名证实DAA交易。11. The method of claim 8, wherein verifying the integrity of the verifier comprises implementing a series of Direct Anonymous Verification (DAA) transactions between the cryptographic engine and the dependent party. 12.根据权利要求11所述的方法,其中所述DAA交易包括“DAA-签署”交易和“DAA-验证”交易。12. The method of claim 11, wherein the DAA transaction includes a “DAA-signing” transaction and a “DAA-verification” transaction. 13.根据权利要求8所述的方法,还包括:13. The method of claim 8, further comprising: 在检测到加密数据被篡改时擦除所述加密数据。The encrypted data is erased when it is detected that the encrypted data has been tampered with. 14.根据权利要求8所述的方法,其中确定是否成功验证所述用户还包括:14. The method of claim 8, wherein determining whether the user has been successfully verified further comprises: 从所述用户读取所述生物计量验证数据;Read the biometric verification data from the user; 提取具有某些特征的所述生物计量验证数据的指定部分;Extract a specified portion of the biometric validation data that has certain characteristics; 将所述生物计量验证数据的所述指定部分与生物计量参考数据比较,并基于所述比较响应性地生成所述得分,所述得分表明所述生物计量验证数据的所述指定部分与所述生物计量参考数据之间的相似程度。The specified portion of the biometric validation data is compared with biometric reference data, and a score is generated responsively based on the comparison, the score indicating the degree of similarity between the specified portion of the biometric validation data and the biometric reference data. 15.一种存储有程序代码的机器可读介质,所述程序代码,当被机器执行时,使得所述机器执行以下操作:15. A machine-readable medium storing program code, which, when executed by a machine, causes the machine to perform the following operations: 从用户读取生物计量验证数据并基于与生物计量参考数据的比较确定是否成功验证所述用户,从所述比较生成得分,其中所述读取和确定操作由验证器执行;以及保护与依赖方的通信;以及The system reads biometric validation data from the user and determines whether the user has been successfully validated based on a comparison with biometric reference data, generating a score from the comparison, wherein the reading and determination operations are performed by the validator; and protects communication with dependent parties; and 执行与所述依赖方的证实交易以向所述依赖方证实所述验证器的完整性,所述证实包括:Execute a confirmation transaction with the dependent party to confirm the integrity of the validator to the dependent party, the confirmation including: 接收来自所述依赖方的质询,所述质询包括随机生成的随机数,Receive a challenge from the dependent party, the challenge including a randomly generated random number. 使用证实密钥签署所述质询和所述得分,以生成证实签名,其中在生成签注密钥证书之后、使用生产线、具体针对所述依赖方来建立所述证实密钥,The challenge and the score are signed using a verification key to generate a verification signature, wherein the verification key is established using a production line, specifically for the dependent party, after the signature key certificate is generated. 其中所述生产线从签注密钥对提取公共签注密钥,以生成和返回用于签署所述质询和所述得分的所述签注密钥证书,并且其中所述签注密钥证书对应于所述证实密钥,以及The production line extracts a public signature key from the signature key pair to generate and return the signature key certificate for signing the challenge and the score, and the signature key certificate corresponds to the verification key. 将用户识别符ID、所述得分以及所述证实签名发送到所述依赖方,其中所述依赖方使用对应于所述签注密钥证书的密钥来验证所述证实签名是有效的,并且其中所述得分被用于确定所述用户的所述验证是否成功。The user identifier ID, the score, and the verification signature are sent to the dependent party, wherein the dependent party uses a key corresponding to the signature key certificate to verify that the verification signature is valid, and wherein the score is used to determine whether the user's verification was successful. 16.根据权利要求15所述的机器可读介质,其中执行所述证实交易的加密引擎集成在验证器内,所述验证器从所述用户读取所述生物计量验证数据并基于与所述生物计量参考数据的比较确定是否成功验证所述用户。16. The machine-readable medium of claim 15, wherein the cryptographic engine executing the verification transaction is integrated within a validator, the validator reading the biometric verification data from the user and determining whether the user has been successfully verified based on a comparison with the biometric reference data. 17.根据权利要求15所述的机器可读介质,其中所述证实密钥为私有密钥,并且所述依赖方的所述密钥为与所述私有密钥相关联的公共密钥。17. The machine-readable medium of claim 15, wherein the verification key is a private key, and the key of the dependent party is a public key associated with the private key. 18.根据权利要求15所述的机器可读介质,其中证实所述验证器的所述完整性包括在加密引擎和所述依赖方之间实施一系列直接匿名证实DAA交易。18. The machine-readable medium of claim 15, wherein verifying the integrity of the verifier comprises implementing a series of Direct Anonymous Verification (DAA) transactions between the cryptographic engine and the dependent party. 19.根据权利要求18所述的机器可读介质,其中所述DAA交易包括“DAA-签署”交易和“DAA-验证”交易。19. The machine-readable medium of claim 18, wherein the DAA transaction includes a “DAA-signing” transaction and a “DAA-verifying” transaction. 20.根据权利要求15所述的机器可读介质,所述操作还包括:20. The machine-readable medium of claim 15, further comprising: 在检测到加密数据被篡改时擦除所述加密数据。The encrypted data is erased when it is detected that the encrypted data has been tampered with. 21.根据权利要求15所述的机器可读介质,其中确定是否成功验证所述用户还包括:21. The machine-readable medium of claim 15, wherein determining whether the user has been successfully authenticated further comprises: 从所述用户读取所述生物计量验证数据;Read the biometric verification data from the user; 提取具有某些特征的所述生物计量验证数据的指定部分;Extract a specified portion of the biometric validation data that has certain characteristics; 将所述生物计量验证数据的所述指定部分与生物计量参考数据比较,并基于所述比较响应性地生成所述得分,所述得分表明所述生物计量验证数据的所述指定部分与所述生物计量参考数据之间的相似程度。The specified portion of the biometric validation data is compared with biometric reference data, and a score is generated responsively based on the comparison, the score indicating the degree of similarity between the specified portion of the biometric validation data and the biometric reference data.
HK16108007.6A 2013-05-30 2014-05-27 System and method for biometric authentication with device attestation HK1220021B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201361829081P 2013-05-30 2013-05-30
US61/829,081 2013-05-30
US14/066,273 2013-10-29
US14/066,273 US9961077B2 (en) 2013-05-30 2013-10-29 System and method for biometric authentication with device attestation
PCT/US2014/039627 WO2014193858A1 (en) 2013-05-30 2014-05-27 System and method for biometric authentication with device attestation

Publications (2)

Publication Number Publication Date
HK1220021A1 HK1220021A1 (en) 2017-04-21
HK1220021B true HK1220021B (en) 2019-09-13

Family

ID=

Similar Documents

Publication Publication Date Title
CN105264537B (en) Use device confirms the system and method for carrying out biometric verification
US9673981B1 (en) Verification of authenticity and responsiveness of biometric evidence and/or other evidence
CN106464673B (en) Enhanced security for authenticating device registration
US9544308B2 (en) Compliant authentication based on dynamically-updated credentials
US9832023B2 (en) Verification of authenticity and responsiveness of biometric evidence and/or other evidence
KR102358546B1 (en) System and method for authenticating a client to a device
CN106575401B (en) System and method for performing validation using data analysis
Alaswad et al. Vulnerabilities of biometric authentication threats and countermeasures
EP2513834B1 (en) System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method
US20230262057A1 (en) Systems and methods for authenticating users within a computing or access control environment
WO2004012383A1 (en) Trusted biometric device
US20220078020A1 (en) Biometric acquisition system and method
CN114830092A (en) System and method for protecting against malicious program code injection
Stokkenes et al. Biometric authentication protocols on smartphones: An overview
US9413533B1 (en) System and method for authorizing a new authenticator
HK1220021B (en) System and method for biometric authentication with device attestation
JP2006350683A (en) Person authentication device
Wu Biometrics authentication system on open network and security analysis
WO2013066928A2 (en) Verification of authenticity and responsiveness of biometric evidence and/or other evidence
KR20120041088A (en) Method for secure binding and integrity ensurance of identity reference and biometric reference in a separated database environment
HK1234909B (en) Enhanced security for registration of authentication devices
HK1236663B (en) System and method for performing authentication using data analytics
HK1231647A1 (en) System and method for carrying strong authentication events over different channels
HK1236268B (en) System and method for authenticating a client to a device