JP5662157B2 - テンプレート保護システムにおける分類閾値の規定 - Google Patents
テンプレート保護システムにおける分類閾値の規定 Download PDFInfo
- Publication number
- JP5662157B2 JP5662157B2 JP2010539021A JP2010539021A JP5662157B2 JP 5662157 B2 JP5662157 B2 JP 5662157B2 JP 2010539021 A JP2010539021 A JP 2010539021A JP 2010539021 A JP2010539021 A JP 2010539021A JP 5662157 B2 JP5662157 B2 JP 5662157B2
- Authority
- JP
- Japan
- Prior art keywords
- property set
- authentication
- physical object
- control value
- biometric
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Biodiversity & Conservation Biology (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Multimedia (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP07123836.4 | 2007-12-20 | ||
| EP07123836 | 2007-12-20 | ||
| PCT/IB2008/055388 WO2009081338A2 (en) | 2007-12-20 | 2008-12-17 | Defining classification thresholds in template protection systems |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2011523725A JP2011523725A (ja) | 2011-08-18 |
| JP2011523725A5 JP2011523725A5 (enExample) | 2012-02-09 |
| JP5662157B2 true JP5662157B2 (ja) | 2015-01-28 |
Family
ID=40801634
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2010539021A Expired - Fee Related JP5662157B2 (ja) | 2007-12-20 | 2008-12-17 | テンプレート保護システムにおける分類閾値の規定 |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US8412950B2 (enExample) |
| EP (1) | EP2225696A2 (enExample) |
| JP (1) | JP5662157B2 (enExample) |
| KR (1) | KR101527711B1 (enExample) |
| CN (1) | CN101903891B (enExample) |
| TW (1) | TWI479427B (enExample) |
| WO (1) | WO2009081338A2 (enExample) |
Families Citing this family (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8848905B1 (en) * | 2010-07-28 | 2014-09-30 | Sandia Corporation | Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting |
| JP5770026B2 (ja) * | 2011-06-20 | 2015-08-26 | ルネサスエレクトロニクス株式会社 | 半導体装置 |
| JP5839659B2 (ja) * | 2011-06-20 | 2016-01-06 | ルネサスエレクトロニクス株式会社 | 半導体装置 |
| DE102012213040B4 (de) * | 2012-07-25 | 2014-03-20 | Infineon Technologies Ag | Decoder für physikalisch nicht klonbare Funktionen mittels Schwellendekodierung und entsprechendes Verfahren |
| US20140075570A1 (en) * | 2012-09-13 | 2014-03-13 | Chao-Ling Hsu | Method, electronic device, and machine readable storage medium for protecting information security |
| EP2933945A4 (en) | 2012-12-14 | 2016-08-03 | Nec Corp | SYSTEM, METHOD AND PROGRAM FOR MATCHING BITS CHAIN MATCHING |
| US8965066B1 (en) * | 2013-09-16 | 2015-02-24 | Eye Verify LLC | Biometric template security and key generation |
| US9503266B2 (en) * | 2014-05-25 | 2016-11-22 | Fujitsu Limited | Relational encryption |
| JP6789222B2 (ja) * | 2014-10-13 | 2020-11-25 | イントリンシツク・イー・デー・ベー・ベー | 物理的複製不可能関数を備える暗号デバイス |
| FR3027753B1 (fr) | 2014-10-28 | 2021-07-09 | Morpho | Procede d'authentification d'un utilisateur detenant un certificat biometrique |
| JP6468823B2 (ja) * | 2014-12-02 | 2019-02-13 | 三星電子株式会社Samsung Electronics Co.,Ltd. | 生体識別システムおよび電子機器 |
| US9501664B1 (en) | 2014-12-15 | 2016-11-22 | Sandia Corporation | Method, apparatus and system to compensate for drift by physically unclonable function circuitry |
| JP6418033B2 (ja) * | 2015-03-30 | 2018-11-07 | オムロン株式会社 | 個人識別装置、識別閾値設定方法、およびプログラム |
| US9722774B2 (en) | 2015-04-29 | 2017-08-01 | Samsung Electronics Co., Ltd. | Non-leaky helper data: extracting unique cryptographic key from noisy F-PUF fingerprint |
| JP6488954B2 (ja) * | 2015-09-11 | 2019-03-27 | 富士通株式会社 | 暗号データ処理方法、暗号データ処理システム、暗号データ処理装置および暗号データ処理プログラム |
| US10936708B2 (en) * | 2018-10-01 | 2021-03-02 | International Business Machines Corporation | Biometric data protection |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4010A (en) * | 1845-04-22 | Island | ||
| US7015A (en) * | 1850-01-15 | Dampeb fob | ||
| JPH09134430A (ja) * | 1995-11-08 | 1997-05-20 | Oki Electric Ind Co Ltd | アイリスデータ照合システム |
| US6160903A (en) * | 1998-04-24 | 2000-12-12 | Dew Engineering And Development Limited | Method of providing secure user access |
| CN1144158C (zh) * | 2000-09-25 | 2004-03-31 | 王介生 | 人体生物特征识别方法 |
| JP3967914B2 (ja) * | 2001-12-14 | 2007-08-29 | 富士通株式会社 | バイオメトリクス認証システム及び方法 |
| US20040107398A1 (en) * | 2002-07-02 | 2004-06-03 | Johnson Ian Robert | Error detection in received data transmissions |
| JP2007500910A (ja) | 2003-05-21 | 2007-01-18 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 物理オブジェクトを認証する方法及びシステム |
| KR100602526B1 (ko) * | 2004-01-31 | 2006-08-22 | 뷰웨이 주식회사 | 가변 임계치를 이용한 실시간 홍채패턴 검증 방법 |
| JP4140582B2 (ja) * | 2004-08-19 | 2008-08-27 | ソニー株式会社 | 認証装置および認証方法 |
| EP1847959B1 (en) * | 2005-01-21 | 2013-11-27 | NEC Corporation | Threshold determining device, method and program, and person identifying system |
| EP1891608A2 (en) * | 2005-06-01 | 2008-02-27 | Koninklijke Philips Electronics N.V. | Shaping classification boundaries in template protection systems |
| WO2006129240A2 (en) * | 2005-06-01 | 2006-12-07 | Koninklijke Philips Electronics N.V. | Compensating for acquisition noise in helper data systems |
| US7545962B2 (en) * | 2005-12-22 | 2009-06-09 | Daon Holdings Limited | Biometric authentication system |
-
2008
- 2008-12-17 US US12/808,579 patent/US8412950B2/en not_active Expired - Fee Related
- 2008-12-17 CN CN200880121632.6A patent/CN101903891B/zh not_active Expired - Fee Related
- 2008-12-17 WO PCT/IB2008/055388 patent/WO2009081338A2/en not_active Ceased
- 2008-12-17 EP EP08863977A patent/EP2225696A2/en active Pending
- 2008-12-17 TW TW097149191A patent/TWI479427B/zh not_active IP Right Cessation
- 2008-12-17 JP JP2010539021A patent/JP5662157B2/ja not_active Expired - Fee Related
- 2008-12-17 KR KR1020107016042A patent/KR101527711B1/ko not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| US20100306550A1 (en) | 2010-12-02 |
| TWI479427B (zh) | 2015-04-01 |
| WO2009081338A3 (en) | 2009-09-24 |
| KR20100099730A (ko) | 2010-09-13 |
| TW200937310A (en) | 2009-09-01 |
| US8412950B2 (en) | 2013-04-02 |
| WO2009081338A2 (en) | 2009-07-02 |
| JP2011523725A (ja) | 2011-08-18 |
| KR101527711B1 (ko) | 2015-06-11 |
| CN101903891B (zh) | 2014-12-17 |
| EP2225696A2 (en) | 2010-09-08 |
| CN101903891A (zh) | 2010-12-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5662157B2 (ja) | テンプレート保護システムにおける分類閾値の規定 | |
| Li et al. | A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion | |
| US20070180261A1 (en) | Biometric template protection and feature handling | |
| Panchal et al. | Biometric-based cryptography for digital content protection without any key storage | |
| EP1815637A1 (en) | Securely computing a similarity measure | |
| Martinian et al. | Secure biometrics via syndromes | |
| JP2006166433A (ja) | バイオメトリックパラメータをデータベースに安全に記憶するための方法及びシステム、並びに、バイオメトリックパラメータをデータベースに安全に記憶してユーザを認証するための方法 | |
| Kuznetsov et al. | Deep learning-based biometric cryptographic key generation with post-quantum security | |
| Itkis et al. | Iris biometric security challenges and possible solutions: For your eyes only? using the iris as a key | |
| Nair et al. | An approach to improve the match-on-card fingerprint authentication system security | |
| Martínez et al. | Secure crypto-biometric system for cloud computing | |
| US8122260B2 (en) | Shaping classification boundaries in template protection systems | |
| Soltane et al. | A review regarding the biometrics cryptography challenging design and strategies | |
| Ziauddin et al. | Robust iris verification for key management | |
| Zhou et al. | Measuring privacy and security of iris fuzzy commitment | |
| Kaur et al. | Secure fingerprint fuzzy vault using hadamard transformation to defy correlation attack | |
| Fouad et al. | A fuzzy vault implementation for securing revocable iris templates | |
| Meenakshi et al. | Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications | |
| Velciu et al. | Methods of reducing bio-cryptographic algorithms computational complexity | |
| Al-Assam et al. | Multi-factor challenge/response approach for remote biometric authentication | |
| Yasuda et al. | Biometric key‐binding using lattice masking | |
| López-García et al. | Post-Quantum Authentication Framework Based on Iris Recognition and Homomorphic Encryption | |
| Meenakshi et al. | Secure and revocable multibiometric templates using fuzzy vault for fingerprint and iris | |
| Ahmed et al. | Security of Biometrics Using Multimodal Approach | |
| Ramalho | Secure Palmprint Verification System |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20111214 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20111214 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20130530 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20130627 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20130925 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20131002 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20140401 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140630 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20141106 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20141204 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 5662157 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| LAPS | Cancellation because of no payment of annual fees |