GB2402791A - User identification using two or more sources of biometric data in combination with a user entered code - Google Patents

User identification using two or more sources of biometric data in combination with a user entered code Download PDF

Info

Publication number
GB2402791A
GB2402791A GB0313261A GB0313261A GB2402791A GB 2402791 A GB2402791 A GB 2402791A GB 0313261 A GB0313261 A GB 0313261A GB 0313261 A GB0313261 A GB 0313261A GB 2402791 A GB2402791 A GB 2402791A
Authority
GB
United Kingdom
Prior art keywords
code
user
biometric data
sources
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0313261A
Other versions
GB0313261D0 (en
GB2402791B (en
Inventor
Premalasen Rajalingham
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Seiko Epson Corp
Original Assignee
Seiko Epson Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Seiko Epson Corp filed Critical Seiko Epson Corp
Priority to GB0313261A priority Critical patent/GB2402791B/en
Publication of GB0313261D0 publication Critical patent/GB0313261D0/en
Publication of GB2402791A publication Critical patent/GB2402791A/en
Application granted granted Critical
Publication of GB2402791B publication Critical patent/GB2402791B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/254Fusion techniques of classification results, e.g. of results related to same input data
    • G06F18/256Fusion techniques of classification results, e.g. of results related to same input data of results relating to different input data, e.g. multimodal recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The method for providing security identification of a user includes receiving two or more sources of user biometric data and at least one code. The sources of biometric data are then integrated according to the received code in order to derive integrated security data. This data is then then compared with stored data held on a database in order to identify the user. The sources of biometric data may be, fingerprint, DNA coding, iris patterns, face patterns, voice pattern etc, the code may be entered through a keyboard or spoken.

Description

240279 1 A Method Of Providing Security Identification Of A User And A
Semiconductor Chip For Effecting The Method The present invention relates to a method of providing security identification of a user and a semiconductor chip for effecting the method.
Security identification of a user is becoming more and more important in many applications including in the banking sector, premises access and personal property such mobile phones and computers. Many of the security systems include biometric data.
Biometric data includes all forms of physical identification. For example, biometric data may include, but not exclusively, fingerprints, iris patterns, voice patterns, facial features, DNA coding, blood type, ear prints, et cetera. Thus, biometric data often enhances the level of security since such features are very unique to the user but this also adds to the complexity.
The biometric data is used often in the form of a visual image. In any case, a database is used which includes as many users as possible with their respective biometric feature. The database is then interrogated to ascertain the identification of the user using the biometric data as an input.
Tighter security systems include more than one source of biometric data. However, each source of biometric data is used to access a separate database relating to that biometric feature. The databases are thus separate and the user verification is effected independently of each source of biometric data. A description of such a system can be found on pages 193 to 194 in the book "The Eternity Code" by Eoin Colfer, ISBN number 0-670- 91352-9.
Any further tightening of security would involve several sources of biometric data and the associated databases. However, the inventor has identified that significantly enhanced security can be provided without increasing the number of sources of biometric data greatly.
Thus, the present invention is directed towards a method of providing security identification of a user and a semiconductor chip for effecting the method.
The present invention relates to a method of providing security identification of a user comprising at least two sources of biometric data relating to the user and at least one code, said method comprising; receiving said biometric data and said code; integrating said sources of biometric data according to the code to derive integrated security data; and interrogating a database including a plurality of integrated security data with user identification to determine the identity of the user.
The present invention also relates to a semiconductor chip arranged to effect the method according to the attached claims.
Embodiments of the present invention will now be described by way of further example only and with reference to the accompanying drawings, in which: Figure 1 relates to a schematic diagram of the method according to the present invention; and Figure 2 illustrates a schematic diagram of a semiconductor chip embodying the method according to the present invention.
Figure 1 comprises a schematic diagram of the method of providing security identification of a user according to the present invention. In Figure 1 there are a plurality of sources of biometric data 2(1), 2(2)... 2(X). Each source of biometric data may relate to one of the known types of biometric data discussed above. Each source of biometric data is input to an image integration unit 4. In the preferred embodiment of the present invention, only two sources of biometric data are used.
The method also involves the use of a code 6. In the preferred embodiment, the code comprises non-biometric data. The code may comprise a sequence of numbers or letters or indeed an alphanumeric sequence.
Image integration unit 4 integrates the sources of biometric data using the code. The image integration unit may integrate the sources of biometric data in a number of different ways including scrambling, multiplexing or multiplying the biometric data, or if the form of a visual image, then enlarging or diminishing the size of the visual image of the biometric data.
Having integrated the sources of biometric data, the image integration unit forms an integrated security data for use in verifying the identity of the user. An image database 8 comprises the identity of a number of users together with the respective integrated security data. Image integration unit 4 thus interrogates the image database 8 to identify the identity of the user.
The present invention thus provides a method of providing security identification of a user which significantly increases the level of security by integrating the sources of biometric data to provide a single integrated security data. Thus, a hacker would need to be able to provide not only the different sources of biometric data but also know the integration method used by the image integration unit 4 and the code 6.
In the preferred embodiment, the first source of biometric data 2(1) comprises fingerprint images. The second source of biometric data 2(2) comprises the speech pattern of a user. The code 6 comprises an alphanumeric sequence. A user thus says the alphanumeric code whilst having his or her fingerprint image captured by a sensor. An automatic speech recognition system not only analyses the voice pattern of the user but also determines the code being said by the user. The fingerprint image as the first source of biometric data 2(1) and the voice pattern as the second source of biometric data 2(2) are integrated by the image integration unit 4 using the code 6 recognised by the automatic speech recognition system.
The integrated security data thus formed by the image integration unit 4 is used to interrogate image database 8. If the integrated security data is found in the image database 8, then the identity of the user is revealed.
A second embodiment of the present invention uses the iris pattern of the user as the first biometric data source 2(1). Fingerprints comprise the second biometric data source 2(2).
A third biometric data source 2(3) comprises the geometry of the hand of the user. Finally, the code 6 comprises the typing speed of the user. Thus, in the second embodiment, the code comprises a further source of biometric data.
In this second embodiment, a user is asked to type a sequence into an input means.
The typing speed is recorded. The typing speed is mapped to a respective code 6. The code 6 can be used by the image interrogation unit 4 to integrate the first, second and third sources of biometric data. In the second embodiment, the code 6 is used as a multiplication factor.
Thus, the fingerprint image, iris pattern and hand geometry image are overlaid and multiplied by the multiplication factor using the code 6. Again, the integrated security data produced by the image integration unit 4 is used to interrogate the image database 8 to identify the user.
The present invention is directed towards the use of integrating biometric data using a code rather that the method of integrating per se. However, two examples of typical integration are given below: Example 1: [multiply / add] A Non-biometric code, 101, is multiplied with each source of biometric data to form a new biometric image, and subsequently both new biometric images are added together to form the integrated security data.
Source of biometric data 1 X Non biometric code = Image 1 100011 1 1 X 101 = 1011001011 Source of biometric data 2 X Non biometric code = Image 2 10101010 X 101 = 1101010010 Image 1 + Image 2 = Integrated security data 1011001011 1 101010010 = 1 1000011 101 Example 2:[interleave / divide] The biometric data sources are interleaved, and the non-biometric code is used as the interleave factor.
Biometric Data source l (i.e. iris pattern) 010 010 B1 Biometric Data Stream 2 (DNA Code) 111100001 B2 Biometric Data Stream 3 (ear print) ono loo oo1 B3 Non- biometric code 011 (decimal = 3) Based on the non-biometric code, every 3 bits from each biometric data source is interleaved. Thus, the Interleaved image comprises: 111000 010 100 100 010 001 001
A A A A A A A A A
B1 B2 B3 B1 B2 B3 B1 B2 B3 Finally the interleaved image is divided by 011 to get the integrated security data, namely: As discussed in the embodiments given above, the present invention provides a significantly enhanced security method of identifying a user. The present invention is particularly advantageous in that only a single image database 8 is required. Moreover, the present invention may utilise current existing technology and so does not add significantly to any increase in cost compared to the increase in security. The present invention is particularly advantageous in that the security identification method can be customised in a large number of ways. Finally, since two or more sources of biometric data are integrated, the accuracy of the source of biometric data need not be as accurate as when relying upon the biometric data independently. This is because the sources of biometric data when integrated form a more distinct integrated security data. Hence, less complex implementation to capture the biometric data can be used and yet still provide a strong and robust system of security identification.
The method of providing security identification of a user as discussed above can be implemented in not only hardware but also software on a semiconductor chip. Thus, Figure 1 can also be used to illustrate not only the functions of a semiconductor chip whereby the method is provided in software but also Figure l can be used to describe the semiconductor chip with hardware features. Figure 2 illustrates a schematic diagram of a semiconductor chip in more detail. A finger print sensor 10 provides one source of the biometric data 2(1). A controller 12 provides control signals to the finger print sensor and receives fingerprint data.
A microphone 14 provides a second source of biometric data 2(2). An analogue to digital converter 16 converts the speech patterns received from the microphone into digital signals.
The fingerprint data and speech pattern data are each provided to a microprocessor 18. A keypad 20 is used for input of the code 6. Finally a memory 22 is provided for the image database 8.
The microprocessor 18 may be assisted by a hardware accelerator 22 to assist with the speech recognition and image integration. Otherwise, the microprocessor receives the first and second sources of biometric data from the fingerprint sensor 10 via the controller 12 and the microphone 14 via the A/D converter 16 and the code input to the keypad 20 and applies the integration according to the requisite method. The integrated security data is compared with that stored in the memory 8 to determine the identity of the user if found therein.
In a preferred embodiment of the semiconductor chip, the finger print sensor 12,microprocessor 18, A/D converter 16 are all provided on the semiconductor chip with suitable connections to the fingerprint sensor 10, keypad 20, microphone 14 and memory 8.
When the semiconductor chip is provided on a mobile telephone, for example, the existing keypad and microphone can be used and an additional fingerprint sensor provided. The existing memory can also be used or alternatively an additional memory provided with enhanced encryption security.
Such a semiconductor chip can be used in a number of applications including mobile phones, computers, smart cards, set top boxes, automatic teller machines. In addition, a semiconductor chip can be used to capture the biometric data. For example, a semiconductor chip could include means for speech recognition and/or fingerprint sensing.
The aforegoing description has been given by way of example only and it will be appreciated by a person skilled in the art that modifications can be made without departing from the scope of the present invention.

Claims (12)

  1. CLAIMS: 1. A method of providing security identification of a user
    comprising at least two sources of biometric data relating to the user and at least one code, said method comprising: receiving said biometric data and said code; integrating said sources of biometric data according to the code to derive integrated security data; and interrogating a database including a plurality of integrated security data with user identification to determine the identify of the user.
  2. 2. A method as claimed in claim 1, in which said code comprises nonbiometric data.
  3. 3. A method as claimed in claim 1 or 2, in which said integrated security data comprises a visual Image.
  4. 4. A method as claimed in claim 3, in which said integrated security data includes multiplying said visual image according to the code.
  5. 5. A method as claimed in any one of claims 1 to 3, in which said integrating comprising multiplexing.
  6. 6. A method as claimed in any one of claims 1 to 5, in which said biometric data includes fingerprints, iris patterns, speech patterns, hand geometry, DNA coding, blood types or facial patterns.
  7. 7. A method as claimed in any one of claims 1 to 6, in which said code comprises a predetermined alphanumeric sequence.
  8. 8. A method as claimed in claim 7, in which one of the biometric sources comprises voice patterns and said code is input orally by said user.
  9. 9. A method as claimed in any one of claims I to 6, further comprising supplying said user with a sequence; inputting said sequence whilst recording a characteristic of the input; and using said characteristic to derive said code.
  10. 10. A method as claimed in claim 9, in which said characteristic comprises a speed of typing the sequence on an input means.
  11. 11. A method as claimed in claim 9, in which said characteristic comprises a speed of speaking the sequence.
  12. 12. A semiconductor chip arranged to effect the method as claimed in any one of claims 1 to 1 1.
GB0313261A 2003-06-09 2003-06-09 A method of providing security identification of a user and a semiconductor chip for effecting the method Expired - Fee Related GB2402791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0313261A GB2402791B (en) 2003-06-09 2003-06-09 A method of providing security identification of a user and a semiconductor chip for effecting the method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0313261A GB2402791B (en) 2003-06-09 2003-06-09 A method of providing security identification of a user and a semiconductor chip for effecting the method

Publications (3)

Publication Number Publication Date
GB0313261D0 GB0313261D0 (en) 2003-07-16
GB2402791A true GB2402791A (en) 2004-12-15
GB2402791B GB2402791B (en) 2006-07-12

Family

ID=27589725

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0313261A Expired - Fee Related GB2402791B (en) 2003-06-09 2003-06-09 A method of providing security identification of a user and a semiconductor chip for effecting the method

Country Status (1)

Country Link
GB (1) GB2402791B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007113888A1 (en) * 2006-03-31 2007-10-11 Universita' Degli Studi Di Milano Method for generating and verifying security information obtained by means of biometric readings
WO2008030166A1 (en) * 2006-09-07 2008-03-13 Innitor Biosystems Ab A method, an apparatus and a computer program product within fingerprint matching
CN101233459B (en) * 2005-03-17 2011-01-26 成像器件系统股份有限公司 Multimodal biometric analysis

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4993068A (en) * 1989-11-27 1991-02-12 Motorola, Inc. Unforgeable personal identification system
GB2346239A (en) * 1999-01-26 2000-08-02 Ibm Card security and Web sites
US6317834B1 (en) * 1999-01-29 2001-11-13 International Business Machines Corporation Biometric authentication system with encrypted models
US20020059521A1 (en) * 2000-10-17 2002-05-16 Siemens Aktiengesellschaft Method and system for identifying a user
WO2002054341A1 (en) * 2001-01-08 2002-07-11 Stefaan De Schrijver, Incorporated Commersign: systems and methods for secure electronic business transactions

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4993068A (en) * 1989-11-27 1991-02-12 Motorola, Inc. Unforgeable personal identification system
GB2346239A (en) * 1999-01-26 2000-08-02 Ibm Card security and Web sites
US6317834B1 (en) * 1999-01-29 2001-11-13 International Business Machines Corporation Biometric authentication system with encrypted models
US20020059521A1 (en) * 2000-10-17 2002-05-16 Siemens Aktiengesellschaft Method and system for identifying a user
WO2002054341A1 (en) * 2001-01-08 2002-07-11 Stefaan De Schrijver, Incorporated Commersign: systems and methods for secure electronic business transactions

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101233459B (en) * 2005-03-17 2011-01-26 成像器件系统股份有限公司 Multimodal biometric analysis
WO2007113888A1 (en) * 2006-03-31 2007-10-11 Universita' Degli Studi Di Milano Method for generating and verifying security information obtained by means of biometric readings
WO2008030166A1 (en) * 2006-09-07 2008-03-13 Innitor Biosystems Ab A method, an apparatus and a computer program product within fingerprint matching
US8929617B2 (en) 2006-09-07 2015-01-06 Steria Biometrics Ab Method for identifying an unknown fingerprint by generating a numeric representation through interleaving digits
US8971595B2 (en) 2006-09-07 2015-03-03 Steria As Method for generating interleaving digits to match fingerprints
US8971596B2 (en) 2006-09-07 2015-03-03 Steria As Method for identifying fingerprints through numeric representation

Also Published As

Publication number Publication date
GB0313261D0 (en) 2003-07-16
GB2402791B (en) 2006-07-12

Similar Documents

Publication Publication Date Title
US6580814B1 (en) System and method for compressing biometric models
EP1239403B1 (en) Method and system for identity verification using multiple simultaneously scanned biometric images
US4621334A (en) Personal identification apparatus
US6700998B1 (en) Iris registration unit
US7689006B2 (en) Biometric convolution using multiple biometrics
US6389397B1 (en) User identification system using improved voice print identification processing
JP2000148985A (en) Personal authentication system
EP1423821A1 (en) Method and apparatus for checking a person's identity, where a system of coordinates, constant to the fingerprint, is the reference
US6382516B1 (en) Security system including a portable secure medium having a microphone therein
US20050111709A1 (en) Identification system
US20040151353A1 (en) Identification system
CN105975838A (en) Secure chip, biological feature identification method and biological feature template registration method
KR100787114B1 (en) Method of transforming biometric data and verification system thereof
WO1998025227A1 (en) Biometric security encryption system
GB2402791A (en) User identification using two or more sources of biometric data in combination with a user entered code
CN1174328C (en) Personal identification verification method
EP3430568A1 (en) Method and system for evaluating fingerprint templates
Scheidat et al. Biometric hashing for handwriting: entropy-based feature selection and semantic fusion
JP2003323412A (en) Personal authentication method and device, and client server-type personal authentication system
JPH0358174A (en) Personal identification system for window terminal user
JPH10261083A (en) Device and method for identifying individual
Krawczyk User authentication using on-line signature and speech
Kümmel et al. Biometric Hash algorithm for dynamic handwriting embedded on a Java card
JP2002304230A (en) Person authentication system, and input device
You et al. Signature systems on smart card with keys generated by fingerprint

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20170609