|Publication number||USRE41198 E1|
|Application number||US 11/809,902|
|Publication date||Apr 6, 2010|
|Filing date||May 31, 2007|
|Priority date||Apr 16, 1997|
|Publication number||11809902, 809902, US RE41198 E1, US RE41198E1, US-E1-RE41198, USRE41198 E1, USRE41198E1|
|Inventors||Christopher S. Dunn|
|Original Assignee||Dunn Christopher S|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (6), Referenced by (2), Classifications (18), Legal Events (1)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This is a continuation-in-part of U.S. patent application Ser. No. 08/838,197 filed on Apr. 16, 1997, now abandoned.
This invention relates generally to biometric identification systems and more particularly relates to a method of identifying a biometric data sensor.
Computer security is fast becoming an important issue. With the proliferation of computers and computer networks into all aspects of business and daily life—financial, medical, education, government, and communications—the concern over secure file access is growing. Using passwords is a common method of providing security. Password protection and/or combination type locks are employed for computer network security, automatic teller machines, telephone banking, calling cards, telephone answering services, houses, and safes. These systems generally require the knowledge of an entry code that has been selected by a user or has been configured in advance.
Pre-set codes are often forgotten as users have no reliable method of remembering them. Writing down the codes and storing them in close proximity to an access control device (i.e. a combination lock) results in a secure access control system with a very insecure code. Alternatively, the nuisance of trying several code variations renders the access control system more of a problem than a solution.
Password systems are known to suffer from other disadvantages. Usually, passwords are specified by a user. Most users, being unsophisticated users of security systems, choose passwords, which are relatively insecure. As such, many password systems are easily accessed through a simple trial and error process.
A security access system that provides substantially secure access and does not require a password or access code is a biometric identification system. A biometric identification system accepts unique biometric information from a user and identifies the user by matching the information against information belonging to registered users of the system. One such biometric identification system is a fingerprint recognition system.
In a fingerprint input transducer or sensor, the finger under investigation is usually pressed against a flat surface, such as a side of a glass plate; the ridge and valley pattern of the finger tip is sensed by a sensing means such as an interrogating light beam. In order to capture an image of a fingerprint, a system is prompted through user entry that a fingertip is in place for image capture. This is impractical as it likely requires the use of two hands. Another method of identifying fingerprints is to capture images continuously and to analyse each image to determine the presence of biometric information such as a fingerprint. This method requires significant processing image transfer times and is therefore, not suited to many applications.
The use of a biometric imaging device with a personal computer is considered inevitable. Unfortunately, a device specifically designed to gain access to a system secured through biometric information is plausible. Such a device connects to a personal computer in a same fashion as a contact imaging device but does not require provision of biometric information. Some forms of infiltrating biometric systems include a record-play back attack wherein biometric information is intercepted, recorded, and then played back at a later time; repeat pattern sending, wherein patterns are sent to the biometric identification system until an authorisation occurs; etc. It would be advantageous to restrict the use of third party contact imaging systems with a security identification system in order to improve security.
Various optical devices are known which employ prisms upon which a finger whose print is to be identified is placed. The prism has a first surface upon which a finger is placed, a second surface disposed at an acute angle to the first surface through which the fingerprint is viewed and a third illumination surface through which light is directed into the prism. In some cases, the illumination surface is at an acute angle to the first surface, as seen for example, in U.S. Pat. Nos. 5,187,482 and 5,187,748. In other cases, the illumination surface is parallel to the first surface, as seen for example, in U.S. Pat. Nos. 5,109,427 and 5,233,404. Fingerprint identification devices of this nature are generally used to control the building-access or information-access of individuals to buildings, rooms, and devices such as computer terminals.
U.S. Pat. No. 4,353,056 in the name of Tsikos issued Oct. 5, 1982, discloses an alternative kind of fingerprint sensor that uses a capacitive sensing approach. The described sensor has a two dimensional, row and column, array of capacitors, each comprising a pair of spaced electrodes, carried in a sensing member and covered by an insulating film. The sensors rely upon deformation to the sensing member caused by a finger being placed thereon so as to vary locally the spacing between capacitor electrodes, according to the ridge/trough pattern of the fingerprint, and hence, the capacitance of the capacitors. In one arrangement, the capacitors of each column are connected in series with the columns of capacitors connected in parallel and a voltage is applied across the columns. In another arrangement, a voltage is applied to each individual capacitor in the array. Sensing in the respective two arrangements is accomplished by detecting the change of voltage distribution in the series connected capacitors or by measuring the voltage values of the individual capacitances resulting from local deformation. To achieve this, an individual connection is required from the detection circuit to each capacitor.
Before the advent of computers and imaging devices, research was conducted into fingerprint characterisation and identification. Today, much of the research focus in biometrics has been directed toward improving the input transducer and the quality of the biometric input data. Fingerprint characterization is well known and can involve many aspects of fingerprint analysis. The analysis of fingerprints is discussed in the following references, which are hereby incorporated by reference:
In the art of digital communications, error detection and correction is of significant concern. A common method of detecting errors is a checksum. A checksum is determined according to an algorithm and requires processing of all data transmitted. The checksum is then transmitted with the data. At a receiving system, the data is processed analogously and the result is compared with the checksum. When a same value results, the data is considered reliable.
In the art of communications, much research has been performed into reliability and efficiency of specific checksums. Commonly, a standard checksum is selected for a communication network and the same checksum is employed throughout the network. Obviously, for a checksum system to function, all senders and receivers use a same algorithm. Further, as the only concern is communications reliability, a checksum algorithm, once determined to function reliably, is not changed.
It is an object of this invention to provide a method of identifying an authorised biometric sensor.
It is a further object of the invention to provide a method of identifying a sensor used to capture biometric information.
It is a further object of the invention to provide a method of authenticating a biometric information sensor for use with a computer.
In accordance with the invention there is provided a method of identifying a biometric information sensor comprising the steps of: providing biometric information to the biometric sensor; digitising at least some of the biometric information to provide biometric data samples having locations; determining at least a value in a deterministic fashion in dependence upon biometric data samples at some locations; encoding the at least a value within the biometric data for provision to a computer; and, providing the biometric data samples comprising the encoded data to the computer.
In accordance with the invention there is provided a method of identifying a biometric information sensor comprising the steps of: providing biometric information to the biometric information sensor; digitising at least some biometric information to provide biometric data samples having locations; providing a first signal from a computer indicative of a method of determining and encoding at least a value; determining at least a value in dependence upon the method indicated by the first signal; encoding the at least a value in dependence upon the method indicated by the first signal; providing a second signal comprising the biometric data samples comprising the encoded data to the computer.
In an embodiment the method of identifying a biometric information sensor comprises receiving the second signal from the biometric input sensor at the computer; decoding the second signal to determine encoded data; and, comparing at least a second value determined by the computer to the at least a value from the encoded data.
It is an advantage of the present invention that an authorised biometric sensor and biometric data provided from such a sensor are identifiable.
An exemplary embodiment of the invention will now be described in conjunction with the attached drawings, in which:
The invention is described with respect to fingerprint registration. The method of this invention is applicable to other biometric information as is evident to those of skill in the art.
The light source 1 is in the form of a multi-light emitting diode (LED) array, although other conventional light sources are also known. A suitable LED array is one of the type described in U.S. Pat. No. 5,210,588 comprising a number of high intensity ultra-luminescence chips, which provides a light intensity of about three (3) times that of common LEDs. The disclosure of U.S. Pat. No. 5,210,588 is incorporated herein by reference.
The image sensor circuit typically converts an image captured by the CCD into an analogue signal for provision to a display device. This supports standards for video such as PAL or NTSC. Unfortunately, the use of a typical image capture apparatus or circuit requires further hardware in the form of a frame grabber to operate with a computer.
In order to breach security of a computer provided with a device according to
Encoding of data within images is possible through several methods described with reference to
Alternatively, as shown in
Returning to the flow diagram of
When the encoded information is transmitted without replacing or overwriting any biometric data, the encoded information is ‘stripped’ out of the biometric data. When the encoded information is inserted within and in place of some biometric data, the encoded information need not be removed. Of course when desirable, the biometric information within the biometric data is overwritten with predetermined values or other values.
Encoding is explained by way of examples below. A 3 by 3 array of pixel values is shown as an example of an embodiment according to the invention.
The values are masked with 0xFE—effectively zeroing the lowest order bit—and then summed to provide a value of 0x60. Starting with the first byte, the lowest order bit of each pixel value is replaced with a bit from the value 0x60. The resulting array is:
As is evident from a review of the above arrays, the data has remained substantially the same. For a high contrast image such as a fingerprint, the addition or subtraction of 1 from a plurality of pixels, is known to have a nominal effect. The array is then framed and transmitted to a computer where the value 0x60 is extracted from the array. The array values are then masked with 0xFE and a value is determined. Since the value of 0x60 matches the extracted value, the frame is from an authorised sensor.
Another array of pixel values is shown for better understanding of value determination and encoding.
The biometric information sensor selects a known method of encoding the data. The method is identified by a method number, in this example 0xC3. Using a single byte to identify methods of encoding allows for up to 256 different methods of encoding to be used. The first byte of the biometric data is replaced with the method identification. When the method identified as 0xC3 is a same method as discussed in the previous example, the encoded array appears as follows:
It is of note that the first byte was not used in determining the value as the value of 0xC3 overwrites that byte and it is unavailable to the computer. Also, the encoding begins after the byte 0xC3 when up to 256 encoding methods are employed. When 128 or fewer encoding methods are supported, the first byte may also be encoded with a single low order bit.
When the computer receives the encoded biometric data, a predetermined byte in the form of the first byte is extracted and a determination is made as to the encoding method employed. In accordance with the encoding method used, information is decoded and biometric information and the value are used to verify that the biometric information sensor is authorised.
Of course, security is enhanced significantly by requiring the computer to select the encoding scheme and transmit an identification thereof to the biometric information sensor before encoding commences. Such a system substantially secures against record playback attack. For example, a 12 bit code provided to a biometric sensor is then used in selecting an encoding method, determining a first byte, and determining an encoded value. The number of variations of a 12 bit code are 4096. A record playback system would require a considerable effort. Adjusting the code provided to the biometric sensor to, for example, 12 bytes renders a probability of such an attack being successful, even less probable.
In a further embodiment, the value is encrypted. Encryption is performed in dependence upon public and private keys as well as based on pseudo random and random numbers. For large systems or security driven systems, a private key is stored within each biometric information sensor. The private keys are all the same. Alternatively, they are different. The computer is provided with decryption keys associated with the private keys that are either identical thereto or public key equivalents of the private keys. The use of public and private keys for encryption is well known.
Some encryption algorithms require random numbers. It is generally known that computers provide pseudo random numbers due to some level of predictability. White noise, however, is considered to be truly random. Since transducers inherently are effected by noise, the noise portion of the transducer signal is used to generate a random number for use in encryption. The noise present in the biometric information signal is treated as random noise and used to determine random values for use with an encryption algorithm.
In operation, a biometric information sensor is calibrated and an ambient light level is established. The calibration is preformed at the beginning of each day. Alternatively, the calibration is performed at predetermined intervals throughout each day. Each cell in the charge coupled device receives approximately equivalent diffused light. At least some cells are selected for random number generation. The cells are selected randomly. Alternatively, the cells are selected based on statistical results determinative of random values. Further alternatively, the cells are selected based on a pattern of cell selections.
The selected cells (as well as all other cells) receive light diffused by the diffusing cover 20. The cells also receive backscattered light in the form of noise. The noise is sufficient to effect the induced charge in at least some cells, thereby introducing noise into the CCD signal. The non-noise portion of the signal is filtered out for at least the cells selected and the remaining noise is evaluated. noise values above a predetermined value are defined as a “1” bit while those values below a predetermined value are defined as “0” bits. Alternatively, the noise is quantized into a 2 bit, 3 bit, . . . , n bit value. Alternatively, the noise is not quantized and is used to generate analogue random values.
During fingerprint sensing, a plurality of successive frames or data groups are compared to determine a noise component therein and the noise component is used to determine a substantially random value. Alternatively, lowest order bits are analysed to determine those most likely to fluctuate over time. These bits are then sampled and used to determine substantially random values.
Persons of skill in the art, would be able to test for randomness. One such series of tests is set out in Knuth, Donald E. The Art of Computer Programming Seminumerical Algorithms Vol. 2, Addison Wesley, 1969 on pages 1-155. The analysis of the random nature of the values generated is a straightforward test requiring mere experimentation and verification.
Alternatively, a unique ID stored in memory of a card interfaced with the biometric sensor is provided to the sensor, as shown in FIG. 10. The unique ID is then used, for example, as a parameter in the algorithm for determining a value and encoding the value according to a known method for authenticating the biometric input sensor as originating from a trusted source.
Further alternatively, the steps of determining a value and encoding the value according to known methods are at least partially performed using the processor 18 of the smart card 14, as shown in FIG. 11. Furthermore, data indicative of an algorithm used for determining the value and encoding the value are at least partially stored in memory 20 of the smart card 14.
As is evident to a person of skill in the art, the embodiments shown above using an interfaced card have been described in connection with the method illustrated in
Providing a unique ID for determining the value or performing at least a portion of the determination of the value using the processor 18 of the smart card 14 further increases security by dividing the authorisation process into two units, the biometric sensor and the smart card making it substantially more difficult to breach security by tampering with the biometric input sensor 10.
Numerous other embodiments may be envisaged without departing from the spirit and scope of the invention.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4819267||Jun 9, 1987||Apr 4, 1989||Thumbscan, Inc.||Solid state key for controlling access to computer systems and to computer software and/or for secure communications|
|US5280527||Apr 14, 1992||Jan 18, 1994||Kamahira Safe Co., Inc.||Biometric token for authorizing access to a host system|
|US5869822||Oct 4, 1996||Feb 9, 1999||Meadows, Ii; Dexter L.||Automated fingerprint identification system|
|US5953415||Mar 25, 1996||Sep 14, 1999||Sun Microsystems, Inc.||Fingerprinting plain text information|
|US5995630||Feb 28, 1997||Nov 30, 1999||Dew Engineering And Development Limited||Biometric input with encryption|
|US6385352||Oct 26, 1994||May 7, 2002||Symbol Technologies, Inc.||System and method for reading and comparing two-dimensional images|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8416058 *||May 18, 2009||Apr 9, 2013||Infineon Technologies Ag||Secure method for biometric verification of a person|
|US20090289761 *||May 18, 2009||Nov 26, 2009||Infineon Technologies Ag||Secure method for biometric verification of a person|
|U.S. Classification||382/115, 340/5.8, 382/232|
|International Classification||G07C9/00, G06F21/00, G06K9/00|
|Cooperative Classification||G06F21/86, G06K9/00013, G06F21/32, G06K9/00577, G07C9/00158, G06F21/83|
|European Classification||G06F21/32, G06F21/83, G06F21/86, G06K9/00R, G06K9/00A1, G07C9/00C2D|