CN1154960C - Arrangement for determining and evaluating data or signals and method for verifying identify or authorisation of person - Google Patents

Arrangement for determining and evaluating data or signals and method for verifying identify or authorisation of person Download PDF

Info

Publication number
CN1154960C
CN1154960C CNB008035717A CN00803571A CN1154960C CN 1154960 C CN1154960 C CN 1154960C CN B008035717 A CNB008035717 A CN B008035717A CN 00803571 A CN00803571 A CN 00803571A CN 1154960 C CN1154960 C CN 1154960C
Authority
CN
China
Prior art keywords
data
input
signal
scrambled
described device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB008035717A
Other languages
Chinese (zh)
Other versions
CN1377492A (en
Inventor
M����ķ˹
M·布罗姆巴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Publication of CN1377492A publication Critical patent/CN1377492A/en
Application granted granted Critical
Publication of CN1154960C publication Critical patent/CN1154960C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Secret or person-related data is secured against attacks of third parties when the identity or authorisation of a person is verified. Verification of said data takes places within a secured area. Externally inputted data is encrypted by a code when the verification result is positive, whereby said code is stored within the secured area. The encrypted input data is outputted. The identity or authorisation can then be verified by decrypting.

Description

Measure and analyze device and identifier's the identity or the method for mandate of data or signal
Technical field
The present invention relates to a kind of device and identifier's the identity or method of mandate of measuring and analyzing data or signal
Background technology
Along with constantly widening of information technology system, identifier's the identity or the method for mandate seem more and more important.Such known method all has a common ground, and the physiognomy of authorizing is to discern by a kind of information or feature for information technology system, and described information has only this people to know, and described feature be this people distinctive, unique with constant.
People's the characteristics such as biological characteristics such as finger mark pattern, iris pattern and similar characteristics are its uniqueness and unchangeability.Therefore, can discern everyone from biological characteristic easily by information technology system.Only otherwise expose key word, this secret key word also can be people's special characteristic.For this reason, biological characteristic and key word can be applicable to above-mentioned purpose well.
Modern biological discrimination method at first is with as raw data by special sensor determination people's biological characteristic.From these raw data, extract original feature again by particular algorithm.Compare by the fixed reference feature array that will deposit and current feature then and realize differentiating or identification.
Obviously, the reliability of described method depends primarily on feature array and the key word that illegal person can not obtain described raw data, extraction.But in today known system, this requirement is unappeasable, satisfies inadequately in other words.
Summary of the invention
The present invention based on task be to improve this situation.This task solves by the device of following mensuration and analysis data or signal, perhaps solves by following identifier's the identity or the method for mandate.
According to of the present inventionly be used to measure and analyze data or signal, in particular for the device of identifier's identity or mandate etc., have following feature:
A) be used for the equipment of determination data or signal;
B) be used for the data of the described mensuration of check in described device or the equipment of signal;
C) be used in described device, carrying out the equipment of scrambled to importing data; Wherein
D) be to realize to the check of described determination data or signal by comparing with the reference data in the memory device that is stored in described device with these data or signal or from the characteristic of its derivation, and wherein
E) come described input data are carried out scrambled by the key within the storer that is stored in described device, and wherein
F) be equiped with a kind of equipment that is used to transmit the input data that described scrambled crosses, and wherein
G) the input data crossed of described scrambled do not contain about the data measured or the information of signal.
According to the identifier's of the present invention identity or the method for mandate, have following steps:
A) install secret data of input by this people to a kind of, or measure this people's individual characteristic feature, especially biological characteristic by described device by sensing equipment;
B) data of the described input of check or the sensing data of described mensuration in described device;
C) if this assay for certainly, is then carried out scrambled to the input data in described device;
D) be to realize to the check of the sensing data of the data of described input or mensuration by comparing with the reference data in the memory device that is stored in described device with these data or by the characteristic of its derivation;
E) come described input data are carried out scrambled by the key within the storer that is stored in described device, and the input data crossed of described scrambled do not contain about by the data of user's input or about the information of the sensing data measured.
Therefore; idea behind the present invention is; people's characteristic is not sent to external system; but measure these data or signal by the device that the donor had; by described device this device is carried out scrambled from the input data that external system obtains then; like this, described external system is not to discern his mandate from the donor's of need protection feature, but discerns from the correct scrambled of described input data.At this, the scrambled of Feature Recognition and input data is preferably to carry out in preventing device unauthorized access, as safe as a house.The characteristic that can prevent a people is effectively abused thus.
Description of drawings
Also tell about the present invention with reference to the accompanying drawings by preferred embodiment below.
Fig. 1 shows the structure of the preferred embodiment of the invention briefly, and has illustrated the flow process of the inventive method simultaneously.
Embodiment
The present invention is used to measure and analyze data or signal, includes in particular for the device of identifier's identity or mandate etc.: the equipment (DE) that is used for determination data (D) or signal (S); Be used to check the data in described device, measured or the equipment (DV) of signal; And the equipment (KE) that is used for the input data (ED) in the described device are carried out scrambled.
The equipment of described determination data or signal can be the simple keyboard of computing machine or communication terminal or other mini-plant.Certainly,, also can adopt a kind of image input media, for example can have the pressure sensing input face of underlying display etc. for replacing this keyboard.This input equipment is particularly suitable for measuring key word or signature.
But the equipment that is used for determination data or signal also can be microphone, or video camera or fingerprint sensor.Especially the miscellaneous equipment that is used for measuring people's biological characteristic also can be infered.Data of being measured or signal can comprise literal, numeral, person's handwriting, relevant sound sample, voice word or sentence or the like, and they are suitable for differentiating or identifier's mandate.Can directly or in extraction characteristic (MD) check these data or signal by inspection machine (DV) afterwards.According to the present invention, this inspection machine is positioned within the described device.Therefore, described data that need check or signal or the characteristic extracted from their can not be left described device when check.
For this reason, if the user occupies the infringement that this device also can be got rid of illegal person separately at least, then he just can guarantee that its data are not abused.If check is carried out successfully (affirming), the data and the signal that is to say described mensuration indicate input by the authorized user execution from the meaning of checking, and then import the input data (ED) of described device from the outside and just carry out scrambled by scrambled equipment (KE) in this device.
At this moment, external system just can be tested to this correct scrambled of importing data, identifier's identity or its mandate thus.To this, only need read the input data that described encrypted coding crosses and test.This people's characteristic is positioned within the described device, has therefore prevented to be abused.
Identifier's data can utilize various method to realize in described device.On the one hand, directly from the data or signal measured, or when from the characteristic of its extraction, calculating needed key to input data encryption coding.Another kind of possibility is, described characteristic is input in a kind of discrimination function, directly draws assay by this disconnected other function with the form that is/denys judgement.On the contrary, the simplest is that the reference data (RD) of will be stored in described data, signal or the characteristic storer (SE1) with described device compares.But two kinds of methods that the front is told about have individual advantage, and the data that need protect itself are not stored in the described device exactly, have therefore prevented abuse better.
If directly do not calculate described key (K) in described device, it is more favourable so it being stored in the storer (SE2) of this device.Another kind of possibility is that adopt the algorithm of a kind of " fixedly connected " to carry out scrambled, wherein said key implicitly is hidden among the structure of circuit.But it is higher that the shortcoming of this method is a manufacturing expense.This key of clearly storing is positioned at and is stored in case of necessity near the reference data within the described device, individual special parameters, otherwise this device is general device.
Yet, except being applicable to symmetric key of the present invention in principle, can also adopt asymmetric key right especially.In this case, described key (K) be donor individual, the also promptly secret key that keeps.On the contrary, the input data that adopt disclosed key in the external information system of identifier's identity or mandate scrambled to be crossed are decrypted.
Especially, at random or pseudorandom character string, Serial No. or symbol sebolic addressing be fit to be used as the input data (ED), the correct scrambled of these sequences can be tested easily by the checking system of outside, and in fact they can not be by invador's prophesy or conjecture.And the recovery time of this symbol sebolic addressing can be sufficiently long, also promptly is actually endless.

Claims (4)

1. be used to measure and analyze the device of data or signal, have following feature:
A) be used for the equipment (DE) of determination data (D) or signal (S);
B) be used for the data of the described mensuration of check in described device or the equipment (DV) of signal;
C) be used in described device, carrying out the equipment (KE) of scrambled to importing data (ED); Wherein
D) be to realize to the check of described determination data or signal by comparing with the reference data (RD) in the memory device (SE1) that is stored in described device with these data or signal or from the characteristic (MD) of its derivation, and wherein
E) come described input data (ED) are carried out scrambled by the key (K) within the storer that is stored in described device (SE2), and wherein
F) be equiped with a kind of equipment (MT) that is used to transmit the input data (ED) that described scrambled crosses, and wherein
G) the input data (ED) crossed of described scrambled do not contain about the data (D) measured or the information of signal (S).
2. device as claimed in claim 1, wherein this device is used to identifier's identity or mandate.
3. the method for identifier's identity or mandate has following steps:
A) install secret data of input by this people to a kind of, or measure this people's individual characteristic feature by described device by sensing equipment;
B) data (D) of the described input of check or the sensing data of described mensuration in described device;
C) if this assay for certainly, is then carried out scrambled to input data (ED) in described device;
D) be to realize to the check of the data (D) of described input or the sensing data measured by comparing with the reference data in the memory device that is stored in described device with these data or by the characteristic of its derivation;
E) come described input data (ED) are carried out scrambled by the key (K) within the storer that is stored in described device (SE2), and the input data (ED) crossed of described scrambled do not contain about by the data of user's input or about the information of the sensing data measured.
4. method as claimed in claim 3, wherein said individual characteristic feature are this people's biological characteristics.
CNB008035717A 1999-02-08 2000-02-01 Arrangement for determining and evaluating data or signals and method for verifying identify or authorisation of person Expired - Lifetime CN1154960C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19905033.3 1999-02-08
DE19905033 1999-02-08

Publications (2)

Publication Number Publication Date
CN1377492A CN1377492A (en) 2002-10-30
CN1154960C true CN1154960C (en) 2004-06-23

Family

ID=7896762

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB008035717A Expired - Lifetime CN1154960C (en) 1999-02-08 2000-02-01 Arrangement for determining and evaluating data or signals and method for verifying identify or authorisation of person

Country Status (4)

Country Link
EP (1) EP1151417A1 (en)
CN (1) CN1154960C (en)
HU (1) HUP0201309A2 (en)
WO (1) WO2000048133A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2003240355B2 (en) * 2003-06-24 2009-07-09 T-Cos Solutions Gmbh Work time recording system and method for recording work time
CN101926675B (en) 2009-10-30 2012-08-08 华为技术有限公司 Method, device and system for remotely acquiring physical detection data of user

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
DE3412663A1 (en) * 1984-04-04 1985-10-17 Siemens AG, 1000 Berlin und 8000 München CHIP CARD SYSTEM
US5657388A (en) * 1993-05-25 1997-08-12 Security Dynamics Technologies, Inc. Method and apparatus for utilizing a token for resource access
US5280527A (en) * 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
US5680460A (en) * 1994-09-07 1997-10-21 Mytec Technologies, Inc. Biometric controlled key generation
US6213391B1 (en) * 1997-09-10 2001-04-10 William H. Lewis Portable system for personal identification based upon distinctive characteristics of the user

Also Published As

Publication number Publication date
HUP0201309A2 (en) 2002-09-28
CN1377492A (en) 2002-10-30
WO2000048133A1 (en) 2000-08-17
EP1151417A1 (en) 2001-11-07

Similar Documents

Publication Publication Date Title
US6901154B2 (en) Method of detecting authorised biometric information sensor
CA2333864C (en) Biometric identification method and system
Ratha et al. An analysis of minutiae matching strength
Ratha et al. Biometrics break-ins and band-aids
US20030021452A1 (en) Fingerprint scar recognition method and apparatus
US6084977A (en) Method of protecting a computer system from record-playback breaches of security
Dong et al. Effects of watermarking on iris recognition performance
Matsumoto Gummy and conductive silicone rubber fingers importance of vulnerability analysis
CN1393823A (en) Apparatus and method for auxiliary recognizing of human biological character
Kant et al. Biometrics security using steganography
CN1154960C (en) Arrangement for determining and evaluating data or signals and method for verifying identify or authorisation of person
Latha et al. A study on attacks and security against fingerprint template database
US7724923B2 (en) Removable swipe-imaging device and method for identifying same
Patil et al. ATM Transaction Using Biometric Fingerprint Technology
CN100483297C (en) Device and method for securing and monitoring protected data
Butt et al. Privacy protection of biometric templates
CN103177219A (en) Medical biochemical detection report critical data tamper-proofing method
Zibran Biometric authentication: The security issues
USRE41198E1 (en) Method of detecting authorised biometric information sensor
Challita et al. Biometric authentication for intrusion detection systems
Abdullayeva et al. Analysis of security vulnerabilities in biometric systems
JP2004515014A (en) Method and apparatus for determining an error rate for a biometric device
Ye et al. A data hiding method for improving the self-security of iris recognition
GB2435533A (en) Integrated systems for simultaneous mutual authentication of a database and a user
Khandelwal Multitier biometric template security using cryptographic salts and personal image identification

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20040623