GB2402791A - User identification using two or more sources of biometric data in combination with a user entered code - Google Patents
User identification using two or more sources of biometric data in combination with a user entered code Download PDFInfo
- Publication number
- GB2402791A GB2402791A GB0313261A GB0313261A GB2402791A GB 2402791 A GB2402791 A GB 2402791A GB 0313261 A GB0313261 A GB 0313261A GB 0313261 A GB0313261 A GB 0313261A GB 2402791 A GB2402791 A GB 2402791A
- Authority
- GB
- United Kingdom
- Prior art keywords
- code
- user
- biometric data
- sources
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/25—Fusion techniques
- G06F18/254—Fusion techniques of classification results, e.g. of results related to same input data
- G06F18/256—Fusion techniques of classification results, e.g. of results related to same input data of results relating to different input data, e.g. multimodal recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Data Mining & Analysis (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Collating Specific Patterns (AREA)
Abstract
The method for providing security identification of a user includes receiving two or more sources of user biometric data and at least one code. The sources of biometric data are then integrated according to the received code in order to derive integrated security data. This data is then then compared with stored data held on a database in order to identify the user. The sources of biometric data may be, fingerprint, DNA coding, iris patterns, face patterns, voice pattern etc, the code may be entered through a keyboard or spoken.
Description
240279 1 A Method Of Providing Security Identification Of A User And A
Semiconductor Chip For Effecting The Method The present invention relates to a method of providing security identification of a user and a semiconductor chip for effecting the method.
Security identification of a user is becoming more and more important in many applications including in the banking sector, premises access and personal property such mobile phones and computers. Many of the security systems include biometric data.
Biometric data includes all forms of physical identification. For example, biometric data may include, but not exclusively, fingerprints, iris patterns, voice patterns, facial features, DNA coding, blood type, ear prints, et cetera. Thus, biometric data often enhances the level of security since such features are very unique to the user but this also adds to the complexity.
The biometric data is used often in the form of a visual image. In any case, a database is used which includes as many users as possible with their respective biometric feature. The database is then interrogated to ascertain the identification of the user using the biometric data as an input.
Tighter security systems include more than one source of biometric data. However, each source of biometric data is used to access a separate database relating to that biometric feature. The databases are thus separate and the user verification is effected independently of each source of biometric data. A description of such a system can be found on pages 193 to 194 in the book "The Eternity Code" by Eoin Colfer, ISBN number 0-670- 91352-9.
Any further tightening of security would involve several sources of biometric data and the associated databases. However, the inventor has identified that significantly enhanced security can be provided without increasing the number of sources of biometric data greatly.
Thus, the present invention is directed towards a method of providing security identification of a user and a semiconductor chip for effecting the method.
The present invention relates to a method of providing security identification of a user comprising at least two sources of biometric data relating to the user and at least one code, said method comprising; receiving said biometric data and said code; integrating said sources of biometric data according to the code to derive integrated security data; and interrogating a database including a plurality of integrated security data with user identification to determine the identity of the user.
The present invention also relates to a semiconductor chip arranged to effect the method according to the attached claims.
Embodiments of the present invention will now be described by way of further example only and with reference to the accompanying drawings, in which: Figure 1 relates to a schematic diagram of the method according to the present invention; and Figure 2 illustrates a schematic diagram of a semiconductor chip embodying the method according to the present invention.
Figure 1 comprises a schematic diagram of the method of providing security identification of a user according to the present invention. In Figure 1 there are a plurality of sources of biometric data 2(1), 2(2)... 2(X). Each source of biometric data may relate to one of the known types of biometric data discussed above. Each source of biometric data is input to an image integration unit 4. In the preferred embodiment of the present invention, only two sources of biometric data are used.
The method also involves the use of a code 6. In the preferred embodiment, the code comprises non-biometric data. The code may comprise a sequence of numbers or letters or indeed an alphanumeric sequence.
Image integration unit 4 integrates the sources of biometric data using the code. The image integration unit may integrate the sources of biometric data in a number of different ways including scrambling, multiplexing or multiplying the biometric data, or if the form of a visual image, then enlarging or diminishing the size of the visual image of the biometric data.
Having integrated the sources of biometric data, the image integration unit forms an integrated security data for use in verifying the identity of the user. An image database 8 comprises the identity of a number of users together with the respective integrated security data. Image integration unit 4 thus interrogates the image database 8 to identify the identity of the user.
The present invention thus provides a method of providing security identification of a user which significantly increases the level of security by integrating the sources of biometric data to provide a single integrated security data. Thus, a hacker would need to be able to provide not only the different sources of biometric data but also know the integration method used by the image integration unit 4 and the code 6.
In the preferred embodiment, the first source of biometric data 2(1) comprises fingerprint images. The second source of biometric data 2(2) comprises the speech pattern of a user. The code 6 comprises an alphanumeric sequence. A user thus says the alphanumeric code whilst having his or her fingerprint image captured by a sensor. An automatic speech recognition system not only analyses the voice pattern of the user but also determines the code being said by the user. The fingerprint image as the first source of biometric data 2(1) and the voice pattern as the second source of biometric data 2(2) are integrated by the image integration unit 4 using the code 6 recognised by the automatic speech recognition system.
The integrated security data thus formed by the image integration unit 4 is used to interrogate image database 8. If the integrated security data is found in the image database 8, then the identity of the user is revealed.
A second embodiment of the present invention uses the iris pattern of the user as the first biometric data source 2(1). Fingerprints comprise the second biometric data source 2(2).
A third biometric data source 2(3) comprises the geometry of the hand of the user. Finally, the code 6 comprises the typing speed of the user. Thus, in the second embodiment, the code comprises a further source of biometric data.
In this second embodiment, a user is asked to type a sequence into an input means.
The typing speed is recorded. The typing speed is mapped to a respective code 6. The code 6 can be used by the image interrogation unit 4 to integrate the first, second and third sources of biometric data. In the second embodiment, the code 6 is used as a multiplication factor.
Thus, the fingerprint image, iris pattern and hand geometry image are overlaid and multiplied by the multiplication factor using the code 6. Again, the integrated security data produced by the image integration unit 4 is used to interrogate the image database 8 to identify the user.
The present invention is directed towards the use of integrating biometric data using a code rather that the method of integrating per se. However, two examples of typical integration are given below: Example 1: [multiply / add] A Non-biometric code, 101, is multiplied with each source of biometric data to form a new biometric image, and subsequently both new biometric images are added together to form the integrated security data.
Source of biometric data 1 X Non biometric code = Image 1 100011 1 1 X 101 = 1011001011 Source of biometric data 2 X Non biometric code = Image 2 10101010 X 101 = 1101010010 Image 1 + Image 2 = Integrated security data 1011001011 1 101010010 = 1 1000011 101 Example 2:[interleave / divide] The biometric data sources are interleaved, and the non-biometric code is used as the interleave factor.
Biometric Data source l (i.e. iris pattern) 010 010 B1 Biometric Data Stream 2 (DNA Code) 111100001 B2 Biometric Data Stream 3 (ear print) ono loo oo1 B3 Non- biometric code 011 (decimal = 3) Based on the non-biometric code, every 3 bits from each biometric data source is interleaved. Thus, the Interleaved image comprises: 111000 010 100 100 010 001 001
A A A A A A A A A
B1 B2 B3 B1 B2 B3 B1 B2 B3 Finally the interleaved image is divided by 011 to get the integrated security data, namely: As discussed in the embodiments given above, the present invention provides a significantly enhanced security method of identifying a user. The present invention is particularly advantageous in that only a single image database 8 is required. Moreover, the present invention may utilise current existing technology and so does not add significantly to any increase in cost compared to the increase in security. The present invention is particularly advantageous in that the security identification method can be customised in a large number of ways. Finally, since two or more sources of biometric data are integrated, the accuracy of the source of biometric data need not be as accurate as when relying upon the biometric data independently. This is because the sources of biometric data when integrated form a more distinct integrated security data. Hence, less complex implementation to capture the biometric data can be used and yet still provide a strong and robust system of security identification.
The method of providing security identification of a user as discussed above can be implemented in not only hardware but also software on a semiconductor chip. Thus, Figure 1 can also be used to illustrate not only the functions of a semiconductor chip whereby the method is provided in software but also Figure l can be used to describe the semiconductor chip with hardware features. Figure 2 illustrates a schematic diagram of a semiconductor chip in more detail. A finger print sensor 10 provides one source of the biometric data 2(1). A controller 12 provides control signals to the finger print sensor and receives fingerprint data.
A microphone 14 provides a second source of biometric data 2(2). An analogue to digital converter 16 converts the speech patterns received from the microphone into digital signals.
The fingerprint data and speech pattern data are each provided to a microprocessor 18. A keypad 20 is used for input of the code 6. Finally a memory 22 is provided for the image database 8.
The microprocessor 18 may be assisted by a hardware accelerator 22 to assist with the speech recognition and image integration. Otherwise, the microprocessor receives the first and second sources of biometric data from the fingerprint sensor 10 via the controller 12 and the microphone 14 via the A/D converter 16 and the code input to the keypad 20 and applies the integration according to the requisite method. The integrated security data is compared with that stored in the memory 8 to determine the identity of the user if found therein.
In a preferred embodiment of the semiconductor chip, the finger print sensor 12,microprocessor 18, A/D converter 16 are all provided on the semiconductor chip with suitable connections to the fingerprint sensor 10, keypad 20, microphone 14 and memory 8.
When the semiconductor chip is provided on a mobile telephone, for example, the existing keypad and microphone can be used and an additional fingerprint sensor provided. The existing memory can also be used or alternatively an additional memory provided with enhanced encryption security.
Such a semiconductor chip can be used in a number of applications including mobile phones, computers, smart cards, set top boxes, automatic teller machines. In addition, a semiconductor chip can be used to capture the biometric data. For example, a semiconductor chip could include means for speech recognition and/or fingerprint sensing.
The aforegoing description has been given by way of example only and it will be appreciated by a person skilled in the art that modifications can be made without departing from the scope of the present invention.
Claims (12)
- CLAIMS: 1. A method of providing security identification of a usercomprising at least two sources of biometric data relating to the user and at least one code, said method comprising: receiving said biometric data and said code; integrating said sources of biometric data according to the code to derive integrated security data; and interrogating a database including a plurality of integrated security data with user identification to determine the identify of the user.
- 2. A method as claimed in claim 1, in which said code comprises nonbiometric data.
- 3. A method as claimed in claim 1 or 2, in which said integrated security data comprises a visual Image.
- 4. A method as claimed in claim 3, in which said integrated security data includes multiplying said visual image according to the code.
- 5. A method as claimed in any one of claims 1 to 3, in which said integrating comprising multiplexing.
- 6. A method as claimed in any one of claims 1 to 5, in which said biometric data includes fingerprints, iris patterns, speech patterns, hand geometry, DNA coding, blood types or facial patterns.
- 7. A method as claimed in any one of claims 1 to 6, in which said code comprises a predetermined alphanumeric sequence.
- 8. A method as claimed in claim 7, in which one of the biometric sources comprises voice patterns and said code is input orally by said user.
- 9. A method as claimed in any one of claims I to 6, further comprising supplying said user with a sequence; inputting said sequence whilst recording a characteristic of the input; and using said characteristic to derive said code.
- 10. A method as claimed in claim 9, in which said characteristic comprises a speed of typing the sequence on an input means.
- 11. A method as claimed in claim 9, in which said characteristic comprises a speed of speaking the sequence.
- 12. A semiconductor chip arranged to effect the method as claimed in any one of claims 1 to 1 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0313261A GB2402791B (en) | 2003-06-09 | 2003-06-09 | A method of providing security identification of a user and a semiconductor chip for effecting the method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0313261A GB2402791B (en) | 2003-06-09 | 2003-06-09 | A method of providing security identification of a user and a semiconductor chip for effecting the method |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0313261D0 GB0313261D0 (en) | 2003-07-16 |
GB2402791A true GB2402791A (en) | 2004-12-15 |
GB2402791B GB2402791B (en) | 2006-07-12 |
Family
ID=27589725
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0313261A Expired - Fee Related GB2402791B (en) | 2003-06-09 | 2003-06-09 | A method of providing security identification of a user and a semiconductor chip for effecting the method |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2402791B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007113888A1 (en) * | 2006-03-31 | 2007-10-11 | Universita' Degli Studi Di Milano | Method for generating and verifying security information obtained by means of biometric readings |
WO2008030166A1 (en) * | 2006-09-07 | 2008-03-13 | Innitor Biosystems Ab | A method, an apparatus and a computer program product within fingerprint matching |
CN101233459B (en) * | 2005-03-17 | 2011-01-26 | 成像器件系统股份有限公司 | Multimodal biometric analysis |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
GB2346239A (en) * | 1999-01-26 | 2000-08-02 | Ibm | Card security and Web sites |
US6317834B1 (en) * | 1999-01-29 | 2001-11-13 | International Business Machines Corporation | Biometric authentication system with encrypted models |
US20020059521A1 (en) * | 2000-10-17 | 2002-05-16 | Siemens Aktiengesellschaft | Method and system for identifying a user |
WO2002054341A1 (en) * | 2001-01-08 | 2002-07-11 | Stefaan De Schrijver, Incorporated | Commersign: systems and methods for secure electronic business transactions |
-
2003
- 2003-06-09 GB GB0313261A patent/GB2402791B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
GB2346239A (en) * | 1999-01-26 | 2000-08-02 | Ibm | Card security and Web sites |
US6317834B1 (en) * | 1999-01-29 | 2001-11-13 | International Business Machines Corporation | Biometric authentication system with encrypted models |
US20020059521A1 (en) * | 2000-10-17 | 2002-05-16 | Siemens Aktiengesellschaft | Method and system for identifying a user |
WO2002054341A1 (en) * | 2001-01-08 | 2002-07-11 | Stefaan De Schrijver, Incorporated | Commersign: systems and methods for secure electronic business transactions |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101233459B (en) * | 2005-03-17 | 2011-01-26 | 成像器件系统股份有限公司 | Multimodal biometric analysis |
WO2007113888A1 (en) * | 2006-03-31 | 2007-10-11 | Universita' Degli Studi Di Milano | Method for generating and verifying security information obtained by means of biometric readings |
WO2008030166A1 (en) * | 2006-09-07 | 2008-03-13 | Innitor Biosystems Ab | A method, an apparatus and a computer program product within fingerprint matching |
US8929617B2 (en) | 2006-09-07 | 2015-01-06 | Steria Biometrics Ab | Method for identifying an unknown fingerprint by generating a numeric representation through interleaving digits |
US8971595B2 (en) | 2006-09-07 | 2015-03-03 | Steria As | Method for generating interleaving digits to match fingerprints |
US8971596B2 (en) | 2006-09-07 | 2015-03-03 | Steria As | Method for identifying fingerprints through numeric representation |
Also Published As
Publication number | Publication date |
---|---|
GB0313261D0 (en) | 2003-07-16 |
GB2402791B (en) | 2006-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6580814B1 (en) | System and method for compressing biometric models | |
EP1239403B1 (en) | Method and system for identity verification using multiple simultaneously scanned biometric images | |
US4621334A (en) | Personal identification apparatus | |
US6700998B1 (en) | Iris registration unit | |
US7689006B2 (en) | Biometric convolution using multiple biometrics | |
US6389397B1 (en) | User identification system using improved voice print identification processing | |
JP2000148985A (en) | Personal authentication system | |
EP1423821A1 (en) | Method and apparatus for checking a person's identity, where a system of coordinates, constant to the fingerprint, is the reference | |
US6382516B1 (en) | Security system including a portable secure medium having a microphone therein | |
US20050111709A1 (en) | Identification system | |
US20040151353A1 (en) | Identification system | |
CN105975838A (en) | Secure chip, biological feature identification method and biological feature template registration method | |
KR100787114B1 (en) | Method of transforming biometric data and verification system thereof | |
WO1998025227A1 (en) | Biometric security encryption system | |
GB2402791A (en) | User identification using two or more sources of biometric data in combination with a user entered code | |
CN1174328C (en) | Personal identification verification method | |
EP3430568A1 (en) | Method and system for evaluating fingerprint templates | |
Scheidat et al. | Biometric hashing for handwriting: entropy-based feature selection and semantic fusion | |
JP2003323412A (en) | Personal authentication method and device, and client server-type personal authentication system | |
JPH0358174A (en) | Personal identification system for window terminal user | |
JPH10261083A (en) | Device and method for identifying individual | |
Krawczyk | User authentication using on-line signature and speech | |
Kümmel et al. | Biometric Hash algorithm for dynamic handwriting embedded on a Java card | |
JP2002304230A (en) | Person authentication system, and input device | |
You et al. | Signature systems on smart card with keys generated by fingerprint |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20170609 |