WO2010003849A1 - Procédé et dispositif d'amélioration de systèmes d'identification biométrique - Google Patents
Procédé et dispositif d'amélioration de systèmes d'identification biométrique Download PDFInfo
- Publication number
- WO2010003849A1 WO2010003849A1 PCT/EP2009/058210 EP2009058210W WO2010003849A1 WO 2010003849 A1 WO2010003849 A1 WO 2010003849A1 EP 2009058210 W EP2009058210 W EP 2009058210W WO 2010003849 A1 WO2010003849 A1 WO 2010003849A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- person
- task
- biometric data
- recognition
- determining
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
Definitions
- the present invention relates to a method and a device for identifying a person, in which biometric data of the person to be identified are detected, wherein the person to be identified must carry out a recognition action on the basis of which the biometric data used for identification are determined.
- Biometric methods are increasingly used to identify people, for example when accessing security areas or when logging into a data processing system such as a personal computer PC.
- the reason for this is that the widespread password as a means of identification and access control has a variety of security vulnerabilities and on the other hand is uncomfortable for the user, because he is supposed to change the password very often for security reasons, but on the other hand, problems arise with the memory , As a result, users either rely on consistent, insecure passwords or have difficulty identifying access.
- Biometric identification systems have the advantage over here of being much safer because access to the biometric data, i. the ability to copy them is much more difficult than with a password, which is easy to use if there is insufficient secrecy.
- biometric identification systems are more comfortable for the user since they automatically carry the biometric properties with them without any effort, so that they do not have to remember a password.
- a corresponding method or a corresponding device should continue to be simple to set up and to use, so that the advantages of the biometric method with regard to a high level of comfort for the user are maintained.
- the present invention is based on the recognition that the use of an already used record or signal set for unauthorized access or for a false identification of a person (replay attack) already effectively can be avoided if the biometric method at least two, preferably are based on multiple recognition actions, so that in particular by chance one of the two or more recognition actions for the appropriate access control can be selected.
- a detection action for a biometric method may be to detect a human body part, such as a fingerprint or an eye. Since the human usually has two eyes, there is the possibility of using either the left or the right eye in the detection via the eye. When fingerprint recognition, the ten different fingers can use Find. Since human body parts are usually not 100% identical, it can also be seen which body part is actually used.
- the identification system is now designed such that the recognition action is predetermined by the system and is selected from a plurality, that is to say at least two recognition actions, there is a certain probability that in an attempt to avoid identification with stored data, an incorrect recognition action will occur previously recorded without permission, is used so that the delusion attempt can be detected.
- a real, living person life recognition
- Such a security function could only be overcome if all possible recognition actions were available as a record for the deception maneuver.
- a corresponding safety function can also be used very well, for example, in the biometric method of tipper recognition, in which the recognition of the person to be identified on the operation of a keyboard or a keypad or the like is carried out by analyzing the typing behavior.
- the inventive system for identifying a person can specify a specific text for typing on a keyboard or a specific sequence of keys, so that the system can already see whether simple comparison of whether the correct keys or correct key sequence has been pressed Actual acts of recognition have been made for the current access, or whether attempts have been made to gain unauthorized access to previously recorded recognition acts or to pretend a false identity.
- a corresponding biometric identification system can also be improved by the fact that the corresponding identification system provides an additional task for the solution by the person to be identified, the task being designed in such a way that it is tuned to human capabilities, ie that the task of a Can be solved much faster than by a machine or a computing device, or that it can actually only be solved by one person.
- additional tasks may include recognizing structures in an image and rendering the recognized structure and / or answering a question about the structure to be recognized.
- the system may display an image comprising a structure of a sequence of numbers and / or letters, wherein the numbers and / or letters may be arranged in arbitrary orientations.
- a display device such as a monitor
- the system may display an image comprising a structure of a sequence of numbers and / or letters, wherein the numbers and / or letters may be arranged in arbitrary orientations.
- the solution of the additional task may be required that the solution of the additional task must at least be started or completed within a specific time requirement, the time requirement being oriented to an average person. If this time requirement is exceeded, the system determines this and aborts the identification with a negative result, because it can not be a human user, but the possibility of an attempt to make an unauthorized identification based on an automated detection.
- the additional security features can be integrated into the actual recognition by inputting a key operation.
- the selection of a specific text to be entered already be associated with the display of an image in which the text is easy to recognize only for a human, so that this additional task for the recognition of a structure is already integrated.
- the time component ie the check whether the beginning until the user starts typing the string or the conclusion until the user has typed in the correct string, within a predetermined period of time, so that all the additional security features of the Present invention, namely specification of a specific recognition action of a plurality of recognition actions (input of a particular text or a typing sequence), solving an additional task (reading the text or typing sequence to be typed from a non-machine readable image) and time control in the biometric method by means of Tipperken-. tion can be realized in a simple manner.
- Figure 1 is a view of a data processing system with which the inventive method can be performed, and which is configured to a corresponding device according to the invention
- Figure 2 is an illustration of a structure in an image that may be used in the present invention.
- Figure 3 is an illustration of another structure in an image for use with the present invention.
- biometric methods can be used which are based on the recognition of a body part, for example the eyes or the fingerprints, or in which by means of an input into a direction by the person to be identified biometric data can be detected.
- This may be, for example, a voice recognition in which the user has to speak a certain or arbitrary sentence, so that the frequencies, frequency sequences and the like can be determined from the detected sounds and sounds so as to determine the identity of a user.
- Another possibility is to capture the typing behavior of the user when operating a keyboard. This can be done, for example, by the user entering any desired text or code or the like in a keyboard.
- a keyboard is here to be understood very broadly, so that it can be a common keyboard of a personal computer PC or a truncated numeric keypad for access control or a keypad for entering a key sequence in the manner of a Morse code.
- the keys of a corresponding keyboard can also be configured in a variety of ways. These may be conventional push-button computer keyboard keys, touch-sensitive keypads of a surface such as a screen, or the like.
- FIG. 1 shows a normal personal computer PC 1 with a screen 2 as an output device and a conventional keyboard 3 as an input device.
- a personal computer system may be configured as an identification device according to the present invention, so that a method for identifying a person according to the present invention proceeds thereon.
- the biometric method is based on the tipper identification, as already described in various documents.
- the present invention is not limited to biometric data acquisition by means of tipper identification, nor to the embodiment of a tipper identification identification described in the above-cited PCT application.
- the identification of a user of the PC 1 can be done, for example, in such a way that the user is prompted when starting the system to enter a specific or arbitrary text via the keyboard 3.
- a data processing program for identifying the user is stored, which runs accordingly and controls the identification process.
- the data processing program forms a detection device which detects values and / or electrical signals, which are triggered by the actuation of the keyboard 3, from sensors and the keyboard 3 and evaluates them such that information about the typing behavior is generated by a user corresponding evaluation unit, which is also realized for the most part by the data processing program to be compared with stored biometric data of a person to be identified, so that the identity of the user can be determined with a corresponding match.
- the corresponding software-equipped PC 1 further realizes a module for determining the authenticity of the biometric data according to the present invention, in order to rule out that fake biometric data are used which in a previous identification z. B. have been detected and stored by spyware or the like and are now linden in the stored form automatically for access to the PC system use.
- the module for determining the genuineness of the biometric data is provided with a task generator which generates an additional task, which would like to have access to the PC system 1 from the person to be identified or the user, preferably within one for a human usual time frame must be solved.
- This task is designed in such a way that a machine or an automated system can not solve such a task at all or only with a considerably higher expenditure of time.
- CAPTCHA Computer Automated Public Turing Test to keep Computers and Humans apart (full automatic public Turing test to distinguish computers and humans)
- Such tests include, for example, the recognition of a letter and / or number sequence, wherein the letters and / or numbers are arranged in any orientation, in particular against a background that makes the automatic pattern recognition for a machine or a computer extremely difficult.
- structures such as simple objects can be displayed in a manner that also makes it difficult for an automatic recognition system to recognize the corresponding object.
- This can be done, for example, that the object consists of a plurality of same-colored or differently colored areas, the background is also composed of similarly shaped or similar colored areas, so that for a trained human eye, the object is very quickly recognizable while a automatic recognition system must perform a lengthy pattern matching, if any pattern recognition is possible.
- FIGS. 2 and 3 Examples of this are shown in FIGS. 2 and 3, in which an image with a letter number sequence AB 12 is provided in FIG. 2 against a background with further lines and the like, wherein the letters and numbers are provided in different orientations.
- the letter-number sequence of the image 4 can be displayed on the monitor 2, the user then having to enter the corresponding letter or digit sequence in an input mask 5 via the keyboard 3.
- FIG. 3 shows a further variant of such a task matched to human capabilities, in which a simple structure, such as the table 6, has to be recognized against a background with a large number of similar surfaces 7.
- the time component can be designed such that a correct input, that is to say the solution of the additional task, must take place within a specific time frame. Additionally or alternatively, this can also be designed so that at least with the input, z. B. the password, must be started.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EA201071382A EA201071382A1 (ru) | 2008-07-08 | 2009-06-30 | Способ и устройство для улучшения биометрических систем идентификации |
JP2011517089A JP2011527475A (ja) | 2008-07-08 | 2009-06-30 | 生体識別システムを改善する方法および装置 |
CN2009801265581A CN102089766A (zh) | 2008-07-08 | 2009-06-30 | 用于改进生物特征识别系统的方法和设备 |
US13/002,893 US20110304429A1 (en) | 2008-07-08 | 2009-06-30 | Method and apparatus for improving biometric identification systems |
EP09780040A EP2300955A1 (fr) | 2008-07-08 | 2009-06-30 | Procédé et dispositif d'amélioration de systèmes d'identification biométrique |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102008040258.3 | 2008-07-08 | ||
DE200810040258 DE102008040258A1 (de) | 2008-07-08 | 2008-07-08 | Verfahren und Vorrichtung zur Verbesserung biometrischer Identifizierungssysteme |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010003849A1 true WO2010003849A1 (fr) | 2010-01-14 |
Family
ID=41165610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2009/058210 WO2010003849A1 (fr) | 2008-07-08 | 2009-06-30 | Procédé et dispositif d'amélioration de systèmes d'identification biométrique |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP2300955A1 (fr) |
JP (1) | JP2011527475A (fr) |
CN (1) | CN102089766A (fr) |
DE (1) | DE102008040258A1 (fr) |
EA (1) | EA201071382A1 (fr) |
WO (1) | WO2010003849A1 (fr) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9104854B2 (en) * | 2011-08-17 | 2015-08-11 | Qualcomm Incorporated | Method and apparatus using a CAPTCHA having visual information related to the CAPTCHA's source |
DE102011120779B4 (de) | 2011-12-09 | 2022-02-17 | Volkswagen Aktiengesellschaft | Verfahren sowie Steuermittel und System zur manuellen Einschaltung einer Hochvoltspannung für ein Fahrzeug |
EP3159820B1 (fr) | 2014-06-19 | 2025-01-22 | Nec Corporation | Dispositif d'authentification, système d'authentification, procédé d'authentification et support de mémoire programme |
US10199564B2 (en) * | 2015-02-04 | 2019-02-05 | Sumitomo Chemical Company, Limited | Method for manufacturing niobate-system ferroelectric thin-film device |
JP7034808B2 (ja) * | 2018-04-03 | 2022-03-14 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | 情報処理方法、情報処理装置及び情報処理システム |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999042992A1 (fr) * | 1998-02-24 | 1999-08-26 | Holoubek Michael J | Procede et appareil de reconnaissance vocale aleatoire |
EP1199623A2 (fr) * | 2000-10-17 | 2002-04-24 | Siemens Aktiengesellschaft | Procédé et système pour l'identification d'un utilisateur |
US20070143624A1 (en) * | 2005-12-15 | 2007-06-21 | Microsoft Corporation | Client-side captcha ceremony for user verification |
US20070241861A1 (en) * | 2006-04-18 | 2007-10-18 | Venkatanna Kumar B | Methods and systems for secured access to devices and systems |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19631484C1 (de) | 1996-08-03 | 1998-03-05 | Dieter Bartmann | Verfahren zur Verifizierung der Identität eines Benutzers einer mit einer Tastatur zur Erzeugung alphanumerischer Zeichen zu bedienenden Datenverarbeitungsanlage |
US7149899B2 (en) * | 2002-04-25 | 2006-12-12 | Intertrust Technologies Corp. | Establishing a secure channel with a human user |
WO2007060654A2 (fr) * | 2005-11-23 | 2007-05-31 | Daniel Farb | Methodes de stockage et de securite logicielle et commerciale, dispositifs et applications associes |
US7552467B2 (en) * | 2006-04-24 | 2009-06-23 | Jeffrey Dean Lindsay | Security systems for protecting an asset |
CN101455026A (zh) * | 2006-05-24 | 2009-06-10 | 维杜普有限责任公司 | 图形图像鉴定和安全性系统 |
-
2008
- 2008-07-08 DE DE200810040258 patent/DE102008040258A1/de not_active Withdrawn
-
2009
- 2009-06-30 CN CN2009801265581A patent/CN102089766A/zh active Pending
- 2009-06-30 EP EP09780040A patent/EP2300955A1/fr not_active Withdrawn
- 2009-06-30 EA EA201071382A patent/EA201071382A1/ru unknown
- 2009-06-30 JP JP2011517089A patent/JP2011527475A/ja not_active Withdrawn
- 2009-06-30 WO PCT/EP2009/058210 patent/WO2010003849A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999042992A1 (fr) * | 1998-02-24 | 1999-08-26 | Holoubek Michael J | Procede et appareil de reconnaissance vocale aleatoire |
EP1199623A2 (fr) * | 2000-10-17 | 2002-04-24 | Siemens Aktiengesellschaft | Procédé et système pour l'identification d'un utilisateur |
US20070143624A1 (en) * | 2005-12-15 | 2007-06-21 | Microsoft Corporation | Client-side captcha ceremony for user verification |
US20070241861A1 (en) * | 2006-04-18 | 2007-10-18 | Venkatanna Kumar B | Methods and systems for secured access to devices and systems |
Non-Patent Citations (3)
Title |
---|
AHN VON L ET AL: "Telling humans and computers apart automatically", COMMUNICATIONS OF THE ASSOCIATION FOR COMPUTING MACHINERY, ACM, NEW YORK, NY, US, vol. 47, no. 2, 1 February 2004 (2004-02-01), pages 57 - 60, XP002442307, ISSN: 0001-0782 * |
BENNY PINKAS, TOMAS SANDER: "Securing passwords against dictionary attacks", PROCEEDINGS OF THE 9TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2002, pages 161 - 170, XP007910368 * |
TAEKYOUNG KWON ET AL: "Knowledge-Based User Authentication Associated with Biometrics", UNIVERSAL ACESS IN HUMAN COMPUTER INTERACTION. COPING WITH DIVERSITY; [LECTURE NOTES IN COMPUTER SCIENCE], SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, vol. 4554, 22 July 2007 (2007-07-22), pages 414 - 419, XP019063284, ISBN: 978-3-540-73278-5 * |
Also Published As
Publication number | Publication date |
---|---|
EA201071382A1 (ru) | 2011-08-30 |
EP2300955A1 (fr) | 2011-03-30 |
DE102008040258A1 (de) | 2010-01-14 |
CN102089766A (zh) | 2011-06-08 |
JP2011527475A (ja) | 2011-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE10249801B3 (de) | Verfahren zum Ausführen einer gesicherten elektronischen Transaktion unter Verwendung eines tragbaren Datenträgers | |
DE60220284T2 (de) | Fingerabdrucknarbenerkennungsverfahren und -vorrichtung | |
AT507759A1 (de) | Anforderungsbasiertes personenidentifikationsverfahren | |
WO2008090188A2 (fr) | Procédé et dispositif de production d'un document-texte et/ou d'un document-image signé | |
EP1199623A2 (fr) | Procédé et système pour l'identification d'un utilisateur | |
WO1998006020A2 (fr) | Procede pour verifier l'identite de l'utilisateur d'un ordinateur comportant un clavier generant des caracteres alphanumeriques | |
WO2010003849A1 (fr) | Procédé et dispositif d'amélioration de systèmes d'identification biométrique | |
DE102009059077A1 (de) | Externe Vorrichtung mit mindestens einem Speicher | |
DE60218344T2 (de) | Benutzeridentifikationsverfahren | |
DE10203926A1 (de) | Datenträger mit mindestens einem Speicherelement | |
EP3963485B1 (fr) | Authentification d'un utilisateur | |
DE102016113499A1 (de) | Authentifizierungsverfahren zur Authentifizierung eines Benutzers eines Endgeräts | |
WO2019072341A1 (fr) | Procédé et système de commande de l'accès à une fonction liée à une authentification | |
DE19904440C2 (de) | Verfahren zur Verifizierung der Identität einer Person | |
WO2011039371A1 (fr) | Comparaison croisée des comportements de frappe, pour l'authentification et/ou l'identification d'une personne | |
DE102016107250A1 (de) | Verfahren, Einrichtung und Computerprogramm zur Multi-Faktor-Authentifizierung und/oder -Identifizierung von Benutzern | |
WO2018011437A1 (fr) | Authentification et identification automatisées d'un utilisateur d'une installation de traitement de données à l'aide de caractéristiques de reconnaissance dynamiques et biométriques de frappe | |
DE102024125787A1 (de) | Benutzerauthentifizierung | |
EP1151417A1 (fr) | Dispositif de detection et d'evaluation de donnees ou de signaux et procede de controle d'identite ou d'autorisation d'une personne | |
WO2011054718A1 (fr) | Procédé et dispositif permettant d'éviter des manoeuvres frauduleuses dans des systèmes d'authentification et/ou d'identification à l'aide du comportement de frappe au clavier | |
DE102020111285A1 (de) | Verfahren zur Überprüfung einer Zutrittsberechtigung | |
DE102020007075A1 (de) | Verfahren zur Authentifizierung einer Person in einem Fahrzeug | |
EP3905079A1 (fr) | Procédé et agencement de détection d'une utilisation abusive d'un ordinateur doté d'un écran tactile | |
US20110304429A1 (en) | Method and apparatus for improving biometric identification systems | |
DE102014116145A1 (de) | System und Verfahren zur Benutzerauthentifizierung mittels Transformation digitalisierter biometrischer Merkmale |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980126558.1 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09780040 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2011517089 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 201071382 Country of ref document: EA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009780040 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13002893 Country of ref document: US |