WO2009153846A1 - Authentication system, registration device, and authentication device - Google Patents
Authentication system, registration device, and authentication device Download PDFInfo
- Publication number
- WO2009153846A1 WO2009153846A1 PCT/JP2008/060948 JP2008060948W WO2009153846A1 WO 2009153846 A1 WO2009153846 A1 WO 2009153846A1 JP 2008060948 W JP2008060948 W JP 2008060948W WO 2009153846 A1 WO2009153846 A1 WO 2009153846A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- secret information
- authentication
- nth
- information
- fragments
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Definitions
- the present invention relates to an authentication system, a registration device, and an authentication device, and more particularly to an authentication system, a registration device, and an authentication device that enable biometric authentication without leaking biometric information.
- biometric authentication that performs authentication based on user biometric information has been used as a simple and highly secure user authentication method.
- a method of previously registering user biometric information for authentication is known.
- Japanese Patent Application Laid-Open No. 5-290149 discloses a system for preventing the outflow of biometric information in biometric authentication of such a method.
- biometric information is encrypted and registered in a storage device, and this registration information is decrypted and verified with biometric information during authentication.
- the encrypted biometric information may be decrypted by a decryption technique such as a brute force attack. For this reason, the above-described method cannot completely prevent leakage of biometric information.
- the present invention has been made to solve the above-described problems, and an object thereof is to prevent leakage of user biometric information in biometric authentication.
- the first invention is an authentication system capable of selectively selecting, as an operation mode, a registration mode for registering biometric information and an authentication mode for authenticating biometric information.
- Biometric information reading means for reading biometric information
- feature quantity extracting means for extracting feature quantities from the byte metrics information
- secret information generating means for generating secret information in the case of the registration mode
- the registration In the case of the mode, an encryption key generating means for generating an encryption key from the feature quantity extracted by the feature quantity extracting means, and in the case of the registration mode, the secret information is encrypted with the encryption key
- Encryption means for generating encrypted secret information, and storing the secret information and the encrypted secret information in the case of the registration mode Certificate information storage means
- decryption key generation means for generating a composite key from the feature quantity extracted by the feature quantity extraction means in the authentication mode, and the composite key in the authentication mode.
- Decrypting means for decrypting the encrypted secret information to generate composite secret information
- comparing means for comparing the secret information with the decrypte
- the second invention is a registration device, comprising biometric information reading means for reading biometric information, feature quantity extracting means for extracting feature quantities from the byte metrics information, and secret information.
- Secret information generating means for generating, encryption key generating means for generating an encryption key from the feature quantity, encryption means for generating the encrypted secret information by encrypting the secret information with the encryption key, It is characterized by providing.
- a third invention is an authentication apparatus, which is an authentication information fetching unit for fetching secret information and encrypted secret information, a biometric information reading unit for reading biometric information, and the byte metrics.
- a feature amount extracting means for extracting a feature amount from the information; a decryption key generating means for generating a decryption key from the feature amount; and decrypting the encrypted secret information with the composite key to obtain the composite secret information It comprises a decryption means to be generated, and a comparison means for comparing the secret information with the decryption secret information.
- Embodiment 1 of the present invention relates to an authentication system that authenticates a user based on the user's biometric information.
- the authentication system according to the first embodiment can prevent the user's biometric information from leaking outside the system.
- summary of the process in the system are demonstrated.
- FIG. 1 An outline of the authentication system according to the first embodiment is shown in FIG.
- the authentication system includes a registration terminal 10, an authentication information storage device 12, and an authentication terminal 14.
- the registration terminal 10 is connected to the authentication information storage device 12 through a dedicated line 16 and can communicate with the authentication information storage device 12.
- the authentication information storage device 12 is connected to the authentication terminal 14 via a dedicated line 16 and can communicate with the authentication terminal 14.
- summary of each terminal mentioned above and an apparatus is demonstrated below.
- the registration terminal 10 includes a biometric information reading unit 18, a feature amount extraction unit 20, an encryption unit 22, and a numerical string generation unit 24.
- the biometric information reading unit 18 reads the biometric information of the system user.
- the biometric information reading unit 18 is connected to the feature amount extraction unit 20.
- the feature amount extraction unit 20 extracts a feature amount from the read biometric information.
- the feature quantity extraction unit 20 is connected to the encryption unit 22.
- the numerical sequence generator 24 generates a numerical sequence 28.
- the numerical string generation unit 24 is also connected to the encryption unit 22.
- the encryption unit 22 encrypts the numerical sequence 28 generated by the numerical sequence generation unit 24 with the feature amount extracted by the feature amount extraction unit 20 to generate an encrypted numerical sequence 30.
- the registration terminal 10 transmits the numerical value sequence 28 and the encrypted numerical value sequence 30 to the authentication information storage device 12.
- the authentication information storage device 12 receives the numerical value sequence 28 and the encrypted numerical value sequence 30 transmitted from the registration terminal 10 as described above. Then, the authentication information storage device 12 stores the numerical value sequence 28 and the encrypted numerical value sequence 30 as the personal authentication information 32. The authentication information storage device 12 transmits the stored personal authentication information 32 to the authentication terminal 14.
- the authentication terminal 14 includes a biometric information reading unit 34, a feature amount extraction unit 36, a decoding unit 38, and a comparison unit 40.
- a biometric information reading unit 34 reads biometric information of the system user.
- the biometric information reading unit 34 is connected to the feature amount extraction unit 36.
- the feature quantity extraction unit 36 extracts a feature quantity from the read biometric information.
- the feature quantity extraction unit 36 is connected to a decoding unit 38.
- the authentication terminal 14 receives the personal authentication information 32 transmitted from the authentication information storage device 12 as described above.
- the decryption unit 38 decrypts the encrypted numerical sequence 30 in the personal authentication information 32 using the feature amount extracted by the feature amount extraction unit 36 to generate a decrypted numerical sequence.
- the decryption unit 38 is connected to the comparison unit 40.
- the comparison unit 40 compares the composite numeric value sequence generated by the decryption unit 38 with the original numeric value sequence 28 in the personal authentication information 32.
- FIG. 2 is a flowchart for explaining the processing flow of the authentication system according to the first embodiment.
- FIG. 2 shows the flow of processing in the above-described registration terminal 10, authentication information storage device 12, and authentication terminal 14, and the relationship between these processes. Below, the flow of these processes and the relationship between processes are demonstrated.
- the user registers in advance information used for verification at the time of authentication.
- the user inputs his / her biometric information via the biometric information reading unit 18 of the registration terminal 10 (step S101).
- the feature quantity extraction unit 20 extracts the feature quantity from the biometric information input in step S101 (step S102).
- the biometric information reading unit 18 is a fingerprint scanner
- the biometric information reading unit 18 reads a fingerprint image
- the feature amount extraction unit 20 extracts information on feature points of the fingerprint image.
- the numerical sequence 28 is generated by the numerical sequence generator 24 (step S103).
- the registration terminal transmits the set of the numerical value sequence 28 generated in step S103 and the encrypted numerical value sequence 30 generated in step S104 to the authentication information storage device 12 as personal authentication information 32 (step S105). . Then, the personal authentication information 32 transmitted from the registration terminal 10 is stored in the authentication information storage device 12 (step S106).
- step S107 his / her biometric information is input via the biometric information reading unit 34 of the authentication terminal 14 (step S107).
- step S108 the feature quantity extraction unit 36 extracts the feature quantity from the biometric information input in step S107 by the same method as in step S102 (step S108).
- step S109 the authentication information storage device 12 transmits the personal authentication information 32 to the authentication terminal 14 (step S110).
- the decryption unit 38 of the authentication terminal 14 decrypts the encrypted numerical sequence 30 included in the personal authentication information 32 transmitted in step S110 by the feature amount extracted in step S108, and decrypts the decrypted value.
- a numerical string is generated (step S111).
- the comparison unit 40 compares the numerical value sequence 28 included in the personal authentication information 32 transmitted in step S110 with the composite numerical value sequence generated in step S111 (step S112).
- the encrypted numerical sequence 30 is obtained by encrypting the numerical sequence 28 that is one of the comparison targets with the feature amount extracted in step S102.
- the composite numeric value sequence that is the other comparison target is obtained by decrypting the encrypted numeric value sequence 30 with the feature amount extracted in step S108. Therefore, when the numerical sequence 28 to be compared and the composite numerical sequence match, the feature amount extracted in step S102 matches the feature amount extracted in step S108. That is, the biometric information input to the registration terminal by the user in step S101 coincides with the biometric information input to the authentication terminal by the user in step S107, and it is determined that the user is valid. . On the other hand, if the numerical sequence 28 to be compared does not match the composite numerical sequence, it is determined that the user is not valid.
- the personal authentication information 32 includes only a numerical sequence 28 that is not related to biometric information and an encrypted numerical sequence 30 obtained by encrypting the numerical sequence 28.
- the information registered in the authentication system according to the first embodiment includes only the numerical value sequence 28 that is not related to the user's biometric information and the encrypted numerical value sequence 30 obtained by encrypting the information. is there. Therefore, even if the registration information of this authentication system is leaked, the user's biometric information is not leaked.
- a dedicated line 16 is used as a communication line between each terminal and device.
- the communication line between each terminal and apparatus in the first embodiment is not limited to the dedicated line 16.
- the communication line between each of these terminals and devices may be either a signal line or a public telephone line network, whether wired or wireless. Further, communication between these terminals and devices may be performed by an IP network such as the Internet constructed on a communication line.
- the authentication system according to the first embodiment includes a registration terminal 10 and an authentication terminal 14 separately.
- the authentication system according to the first embodiment is not limited to this.
- the registration terminal 10 and the authentication terminal 14 may be a single terminal. In this case, one biometric information reading unit and feature amount extraction unit can be used in common during registration and authentication.
- the above-described modifications can be applied to the other embodiments described below.
- the authentication information storage device 12 is provided separately from the registration terminal 10 and the authentication terminal 14.
- the authentication system according to the first embodiment is not limited to this.
- the authentication information storage device 12 may be combined with the registration terminal 10 and the authentication terminal 14 as one device.
- the above-described registration terminal 10 and authentication terminal 14 may be combined with the authentication information storage device 12 to form one device.
- the above-described modifications can be applied to the other embodiments described below.
- the numerical sequence 28 generated by the numerical sequence generation unit 24 may use a different numerical sequence for each user, or a fixed numerical sequence.
- the numerical value sequence generation unit 24 may generate the numerical value sequence 28 at random, or may generate it based on a certain calculation formula.
- FIG. The second embodiment of the present invention relates to an authentication system that authenticates a user based on the user's biometric information.
- the authentication system according to the second embodiment can stably authenticate a user even when an error such as noise mixing occurs in biometric information read at the time of authentication.
- summary of the process in the system are demonstrated.
- FIG. 3 An outline of the authentication system according to the second embodiment is shown in FIG. As shown in FIG. 3, this authentication system includes a registration terminal 46, an authentication information storage device 48, and an authentication terminal 50, as in the first embodiment.
- the registration terminal 46 is connected to the authentication information storage device 48 through a dedicated line 52 and can communicate with the authentication information storage device 48.
- the authentication information storage device 48 is connected to the authentication terminal 50 through a dedicated line 52 and can communicate with the authentication terminal 50.
- summary of each terminal mentioned above and an apparatus is demonstrated below.
- the registration terminal 46 includes a biometrics information reading unit 54, a feature amount extraction unit 56, a feature amount division unit 58, a numerical sequence generation unit 60, a numerical sequence division unit 62, and a numerical sequence fragment encryption unit 64.
- the biometric information reading unit 54 reads the biometric information of the system user.
- the biometric information reading unit 54 is connected to the feature amount extraction unit 56.
- the feature amount extraction unit 56 extracts feature amounts from the read biometric information.
- the feature quantity extraction unit 56 is connected to the feature quantity division unit 58.
- the feature amount dividing unit 58 divides the above-described feature amount to generate the first to Nth feature amount fragments (N is an integer equal to or greater than 2; the same applies hereinafter).
- the feature amount dividing unit 58 is connected to the numerical value string fragment encrypting unit 64.
- the numerical sequence generator 60 generates a numerical sequence 68.
- the numerical sequence generator 60 is connected to the numerical sequence divider 62.
- the numerical value string dividing unit 62 divides the numerical value string 68 using a so-called secret sharing method (details will be described in [Authentication Method of Authentication System of Second Embodiment], which will be described later), and the above-described feature value fragment.
- the first to Nth numerical value string fragments of the same number as are generated.
- the feature amount dividing unit 58 and the numerical sequence dividing unit 62 are connected to the numerical sequence fragment encrypting unit 64.
- the numerical sequence fragment encryption unit 64 encrypts the numerical sequence fragments in the same order with the first to Nth feature amount fragments, and the first to Nth encrypted numerical sequence fragments 70 are obtained. Generate. Then, the registration terminal 46 transmits the above-described numerical sequence 68 and the first to Nth encrypted numerical sequence fragments 70 to the authentication information storage device 48.
- the authentication information storage device 48 receives the numerical value sequence 68 and the first to Nth encrypted numerical value value fragments 70 transmitted from the registration terminal 46 as described above. Then, the authentication information storage device 48 stores the numerical value sequence 68 and the encrypted numerical value sequence fragment 70 as the personal authentication information 72. Further, the authentication information storage device 48 transmits the stored personal authentication information 72 to the authentication terminal 50.
- the authentication terminal 50 includes a biometric information reading unit 74, a feature amount extraction unit 76, a feature amount division unit 78, a numerical sequence fragment decoding unit 80, a numerical sequence restoration unit 82, and a comparison unit 84.
- the biometric information reading unit 74 reads the biometric information of the system user.
- the biometric information reading unit 74 is connected to the feature amount extraction unit 76.
- the feature amount extraction unit 76 extracts feature amounts from the read biometric information.
- the feature quantity extraction unit 76 is connected to the feature quantity division unit 78.
- the feature amount dividing unit 78 divides the feature amount to generate No. 1 to N-th feature amount fragments.
- the feature amount dividing unit 78 is connected to the numerical sequence fragment decoding unit 80.
- the authentication terminal 50 receives the personal authentication information 72 transmitted from the authentication information storage device 48 as described above. Then, the numerical sequence fragment decrypting unit 80 decrypts the encrypted numerical sequence fragments 70 in the same order in the personal authentication information 72 by using the 1st to Nth feature amount fragments, respectively. Nth decrypted numerical sequence fragment is generated.
- the numerical sequence fragment decoding unit 80 is connected to the numerical sequence restoration unit 82.
- the numerical value sequence restoration unit 82 tries to restore the original numeric value sequence 68 from the first to Nth decoded numeric value sequence fragments, and generates a restored numeric value sequence.
- the numerical value string restoration unit 82 is connected to the comparison unit 84.
- the comparison unit 84 compares the restored numeric value sequence with the original numeric value sequence 68 in the personal authentication information 72.
- the numerical value sequence 68 is divided into the first to Nth numerical value sequence fragments using the secret sharing method. Then, the first to Nth numerical sequence fragments are encrypted with the feature amount fragments in the same order obtained from the biometric information input at the registration terminal, and an encrypted numerical sequence fragment 70 is generated. As the personal authentication information, a numerical value string 68 and first to Nth encrypted numerical value string fragments 70 are accumulated.
- the secret sharing method when N pieces are generated by dividing certain information into N pieces, the information can be correctly restored from a specified number of pieces less than N of the N pieces. This is a technique for dividing the information. Therefore, since the numerical sequence 68 according to this authentication system is divided by the secret sharing method, the numerical sequence 68 is correctly restored from a specified number of numerical sequence fragments that is less than N.
- the numerical sequence fragment decrypting unit 80 of this authentication system when the specified number of the first to Nth encrypted numerical sequence fragments 70 is decrypted as before, it is equal to the numerical sequence fragment. A specified number of decrypted numerical sequence fragments are obtained. For this reason, from the above, the restored numeric sequence restored from the decrypted numeric sequence fragment in the numeric sequence restoring unit 82 matches the original numeric sequence 68, and the authenticated user is valid. Determined. On the other hand, as described above, the designated number of the encrypted numerical value sequence fragments 70 is decrypted as before to be equal to or more than the designated number of the first to Nth feature amount fragments input at the authentication terminal. Means that it matches the feature value fragment input at the registration terminal. As for the above, if the identity within a certain error range can be confirmed between the biometric information read at the time of authentication and the biometric information read at the time of registration, the user who performed the authentication is valid. It means that it can be judged.
- the authentication method using the secret sharing method as described above is applied.
- stable authentication is performed even when an error such as noise mixing occurs in biometric information read at the time of authentication.
- FIG. 4 is a flowchart for explaining the processing flow of the authentication system according to the second embodiment.
- FIG. 4 shows the processing flow of the registration terminal 46, the authentication information storage device 48, and the authentication terminal 50 described above, and the relationship between these processes. Below, the flow of these processes and the relationship between processes are demonstrated.
- the user registers in advance information used for verification at the time of authentication.
- the user inputs his / her biometric information via the biometric information reading unit 54 of the registration terminal 46 (step S101).
- the feature quantity extraction unit 56 extracts the feature quantity from the biometric information input in step S101 (step S102).
- the biometric information reading unit 54 is a fingerprint scanner
- the biometric information reading unit 54 reads a fingerprint image
- the feature amount extraction unit 56 extracts information on feature points of the fingerprint image.
- the feature quantity dividing unit 58 divides the feature quantity extracted in step S102, and the first to Nth feature quantity fragments are generated (step S103).
- the numerical sequence 68 is generated by the numerical sequence generator 60 (step S104).
- the numerical value string dividing unit 62 divides the numerical value string 68 generated in step S10 4 using a so-called secret sharing method, and generates the first to Nth numerical value string fragments (step S105).
- the numerical sequence fragment encryption unit 64 the numerical sequence fragments in the same order generated in step S105 are encrypted by the first to Nth feature amount fragments generated in step S103, respectively.
- the 1st to Nth encrypted numerical value string fragments 70 are generated (step S106).
- the registration terminal accumulates the authentication information as the personal authentication information 72 by combining the numerical sequence 68 generated in step S103 and the first to Nth encrypted numerical sequence fragments 70 generated in step S106. It transmits to the apparatus 48 (step S107). Then, the personal authentication information 72 transmitted from the registration terminal 46 is stored in the authentication information storage device 48 (step S108).
- the user's own biometric information is input via the biometric information reading unit 74 of the authentication terminal 50 (step S109).
- the feature amount extraction unit 76 extracts feature amounts from the biometric information input in step S109 by the same method as in step S102 (step S110).
- the feature amount dividing unit 78 divides the feature amount extracted in step S110 by the same method as in step S103, and generates the first to Nth feature amount fragments (step S111).
- the authentication terminal 50 requests the authentication information storage device 48 to transmit the personal authentication information 72 to the authentication terminal 50 (step S112).
- the authentication information storage device 48 transmits the personal authentication information 72 to the authentication terminal 50 (step S113). Then, in the numerical value string fragment decrypting unit 80 of the authentication terminal 50, each of the first to Nth feature amount fragments generated in step S111 is included in the personal authentication information 72 transmitted in step S113. The encrypted numerical value sequence fragments 70 in the same order are decrypted, and the first to Nth decrypted numerical value sequences are generated (step S114). Next, the numerical sequence restoration unit 82 tries to restore the original numeric sequence 68 from the first to Nth decoded numeric sequence fragments generated in step S114, and a restored numeric sequence is generated (step S1). S115). Next, the comparison unit 84 compares the numerical value sequence 68 included in the personal authentication information 72 transmitted in step S110 with the restored numerical value sequence generated in step S111 (step S116).
- the numerical sequence 68 matches the restored numerical sequence, as described in [Authentication Method of Authentication System of Second Embodiment], the first to Nth decrypted numerical sequence fragments Of these, the specified number or more matches the original numeric string fragment.
- the specified number or more of the first to Nth feature amount fragments generated in step S103 matches the feature amount fragments generated in step S111. Therefore, it is determined that the biometric information input to the registration terminal by the user in step S101 and the biometric information input to the authentication terminal by the user in authentication in step S109 are the same in consideration of errors. Thereby, it is determined that the user who has performed authentication is valid.
- the personal authentication information 72 includes only a numerical sequence 68 that is not related to the biometric information and an encrypted numerical sequence fragment 70 that is encrypted after being divided.
- the secret sharing method is used, and if a part of the decrypted numerical sequence fragment matches the original numerical sequence fragment, the decrypted numerical sequence fragment is converted into the original. It is possible to generate a restored numeric sequence that is restored to the original numeric sequence. Then, the user is authenticated based on whether or not the restored numerical sequence matches the original numerical sequence. For this reason, stable authentication can be performed even when an error such as noise mixing occurs in biometric information read at the time of authentication.
- the numerical value sequence division unit 62 divides the numerical value sequence 68 using the secret sharing method.
- the secret sharing method is not necessarily used. A method of simply dividing the numerical sequence 68 into numerical sequence fragments having the same number of digits may be employed. Even in this case, authentication can be performed by comparing the decrypted numerical sequence fragment with the numerical sequence fragment obtained by simply dividing the original numerical sequence 68 into the same number of digits.
- An authentication system that enables biometric authentication without leaking biometric information can be used.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
An authentication system comprises a biometrics information reading means for reading biometrics information, a feature quantity extracting means for extracting a feature quantity from the biometrics information, a secret information generating means for generating secret information, an encryption key generating means for generating an encryption key from the feature quantity extracted by the feature quantity extracting means, an encrypting means for encrypting the secret information with the encryption key to generate encrypted secret information, an authentication information storing means for storing the secret information and the encrypted secret information, a decryption key setting means for generating a decryption key from the feature quantity extracted by the feature quantity extracting means, a decrypting means for decrypting the encrypted secret information with the decryption key to generate decrypted secret information, and a comparing means for comparing the secret information and the decrypted secret information.
Description
本発明は認証システム、登録装置および認証装置に係り、バイオメトリクス情報が漏洩しないバイオメトリクス認証を可能とする認証システム、登録装置および認証装置に関する。
The present invention relates to an authentication system, a registration device, and an authentication device, and more particularly to an authentication system, a registration device, and an authentication device that enable biometric authentication without leaking biometric information.
従来、簡便で安全性の高い利用者認証方法として、利用者のバイオメトリクス情報により認証をおこなうバイオメトリクス認証が利用されている。このバイオメトリクス認証においては、認証のために利用者のバイオメトリクス情報をあらかじめ登録する方法が知られている。日本特開平5-290149号公報に、このような方法のバイオメトリクス認証において、バイオメトリクス情報の流出を防ぐシステムが開示されている。このシステムでは、バイオメトリクス情報を暗号化した上で記憶装置に登録し、認証時にこの登録情報を復号化してバイオメトリクス情報と照合する方法がとられている。
Conventionally, biometric authentication that performs authentication based on user biometric information has been used as a simple and highly secure user authentication method. In this biometric authentication, a method of previously registering user biometric information for authentication is known. Japanese Patent Application Laid-Open No. 5-290149 discloses a system for preventing the outflow of biometric information in biometric authentication of such a method. In this system, biometric information is encrypted and registered in a storage device, and this registration information is decrypted and verified with biometric information during authentication.
上述した方法では、記憶装置に登録された情報が漏洩した場合でも、暗号化されたバイオメトリクス情報のみが漏洩することとなる。しかし、暗号化されたバイオメトリクス情報は、例えば総当り攻撃などの暗号解読手法により解読される可能性がある。このため、上述した方法は、バイオメトリクス情報の漏洩を完全に阻止できるものではない。
In the above-described method, even when information registered in the storage device leaks, only the encrypted biometric information leaks. However, the encrypted biometric information may be decrypted by a decryption technique such as a brute force attack. For this reason, the above-described method cannot completely prevent leakage of biometric information.
本発明は、上述のような課題を解消するためになされたもので、バイオメトリクス認証において利用者のバイオメトリクス情報の漏洩を防止することを目的とする。
The present invention has been made to solve the above-described problems, and an object thereof is to prevent leakage of user biometric information in biometric authentication.
第1の発明は、上記の目的を達成するため、動作モードとして、バイオメトリクス情報の登録を行う登録モードと、バイオメトリクス情報の認証を行う認証モードとを択一的に選択可能な認証システムであって、バイオメトリクス情報を読み取るバイオメトリクス情報読み取り手段と、前記バイトメトリクス情報から特徴量を抽出する特徴量抽出手段と、前記登録モードの場合に、秘密情報を生成する秘密情報生成手段と、前記登録モードの場合に、前記特徴量抽出手段で抽出された特徴量から暗号化キーを生成する暗号化キー生成手段と、前記登録モードの場合に、前記暗号化キーにより前記秘密情報を暗号化して、暗号化秘密情報を生成する暗号化手段と、前記登録モードの場合に、前記秘密情報と、前記暗号化秘密情報とを記憶する認証情報記憶手段と、前記認証モードの場合に、前記特徴量抽出手段で抽出された特徴量から複合化キーを生成する復号化キー生成手段と、前記認証モードの場合に、前記複合化キーにより前記暗号化秘密情報を復号化して、複合化秘密情報を生成する復号化手段と、前記認証モードの場合に、前記秘密情報と、前記復号化秘密情報とを比較する比較手段と、を備えることを特徴とするものである。
In order to achieve the above object, the first invention is an authentication system capable of selectively selecting, as an operation mode, a registration mode for registering biometric information and an authentication mode for authenticating biometric information. Biometric information reading means for reading biometric information, feature quantity extracting means for extracting feature quantities from the byte metrics information, secret information generating means for generating secret information in the case of the registration mode, and the registration In the case of the mode, an encryption key generating means for generating an encryption key from the feature quantity extracted by the feature quantity extracting means, and in the case of the registration mode, the secret information is encrypted with the encryption key, Encryption means for generating encrypted secret information, and storing the secret information and the encrypted secret information in the case of the registration mode Certificate information storage means, decryption key generation means for generating a composite key from the feature quantity extracted by the feature quantity extraction means in the authentication mode, and the composite key in the authentication mode. Decrypting means for decrypting the encrypted secret information to generate composite secret information, and comparing means for comparing the secret information with the decrypted secret information in the authentication mode. It is characterized by.
第2の発明は、上記の目的を達成するため、登録装置であって、バイオメトリクス情報を読み取るバイオメトリクス情報読み取り手段と、前記バイトメトリクス情報から特徴量を抽出する特徴量抽出手段と、秘密情報を生成する秘密情報生成手段と、前記特徴量から暗号化キーを生成する暗号化キー生成手段と、前記暗号化キーにより前記秘密情報を暗号化して、暗号化秘密情報を生成する暗号化手段と、を備えることを特徴とするものである。
In order to achieve the above object, the second invention is a registration device, comprising biometric information reading means for reading biometric information, feature quantity extracting means for extracting feature quantities from the byte metrics information, and secret information. Secret information generating means for generating, encryption key generating means for generating an encryption key from the feature quantity, encryption means for generating the encrypted secret information by encrypting the secret information with the encryption key, It is characterized by providing.
第3の発明は、上記の目的を達成するため、認証装置であって、秘密情報と暗号化秘密情報を、取り込む認証情報取り込み手段と、バイオメトリクス情報を読み取るバイオメトリクス情報読み取り手段と、前記バイトメトリクス情報から特徴量を抽出する特徴量抽出手段と、前記特徴量から複合化キーを生成する復号化キー生成手段と、前記複合化キーにより前記暗号化秘密情報を復号化して、複合化秘密情報を生成する復号化手段と、前記秘密情報と、前記復号化秘密情報とを比較する比較手段と、を備えることを特徴とするものである。
In order to achieve the above object, a third invention is an authentication apparatus, which is an authentication information fetching unit for fetching secret information and encrypted secret information, a biometric information reading unit for reading biometric information, and the byte metrics. A feature amount extracting means for extracting a feature amount from the information; a decryption key generating means for generating a decryption key from the feature amount; and decrypting the encrypted secret information with the composite key to obtain the composite secret information It comprises a decryption means to be generated, and a comparison means for comparing the secret information with the decryption secret information.
本発明により、バイオメトリクス認証において利用者のバイオメトリクス情報が漏洩することを防止できる。
According to the present invention, it is possible to prevent leakage of user biometric information in biometric authentication.
10;46 登録端末
12;48 認証情報蓄積装置
14;50 認証端末
16;52 専用線
18;54,34;74 バイオメトリクス情報読み取り部
20;56,36;76 特徴量抽出部
22 暗号化部
24;60 数値列生成部
28;68 数値列
30 暗号化数値列
32;72 個人認証情報
38 復号化部
40;84 比較部
58;78 特徴量分割部
62 数値列分割部
64 数値列断片暗号化部
70 暗号化数値列断片
80 数値列断片復号化部
82 数値列復元部 10; 46Registration terminal 12; 48 Authentication information storage device 14; 50 Authentication terminal 16; 52 Dedicated line 18; 54, 34; 74 Biometric information reading unit 20; 56, 36; 76 Feature quantity extraction unit 22 Encryption unit 24 60 Numerical value sequence generation unit 28; 68 Numerical value sequence 30 Encrypted numerical value sequence 32; 72 Personal authentication information 38 Decoding unit 40; 84 Comparison unit 58; 78 Feature quantity division unit 62 Numerical value sequence division unit 64 Numerical value sequence fragment encryption unit 70 Encrypted Numeric Sequence Fragment 80 Numeric Sequence Fragment Decoding Unit 82 Numeric Sequence Restoration
12;48 認証情報蓄積装置
14;50 認証端末
16;52 専用線
18;54,34;74 バイオメトリクス情報読み取り部
20;56,36;76 特徴量抽出部
22 暗号化部
24;60 数値列生成部
28;68 数値列
30 暗号化数値列
32;72 個人認証情報
38 復号化部
40;84 比較部
58;78 特徴量分割部
62 数値列分割部
64 数値列断片暗号化部
70 暗号化数値列断片
80 数値列断片復号化部
82 数値列復元部 10; 46
以下に、本発明に係る実施の形態を図面にもとづいて詳細に説明する。なお、この実施の形態により本発明が限定されるものではない。
Embodiments according to the present invention will be described below in detail with reference to the drawings. In addition, this invention is not limited by this embodiment.
実施の形態1.
本発明の実施の形態1は、利用者のバイオメトリクス情報により、利用者の認証を行う認証システムに関する。この実施の形態1に係る認証システムは、利用者のバイオメトリクス情報がそのシステムの外部に漏洩することを防止できるものである。下記に、この実施の形態1に係る認証システムの概要および、そのシステムにおける処理の概要について説明する。 Embodiment 1 FIG.
Embodiment 1 of the present invention relates to an authentication system that authenticates a user based on the user's biometric information. The authentication system according to the first embodiment can prevent the user's biometric information from leaking outside the system. Below, the outline | summary of the authentication system which concerns on this Embodiment 1, and the outline | summary of the process in the system are demonstrated.
本発明の実施の形態1は、利用者のバイオメトリクス情報により、利用者の認証を行う認証システムに関する。この実施の形態1に係る認証システムは、利用者のバイオメトリクス情報がそのシステムの外部に漏洩することを防止できるものである。下記に、この実施の形態1に係る認証システムの概要および、そのシステムにおける処理の概要について説明する。 Embodiment 1 FIG.
Embodiment 1 of the present invention relates to an authentication system that authenticates a user based on the user's biometric information. The authentication system according to the first embodiment can prevent the user's biometric information from leaking outside the system. Below, the outline | summary of the authentication system which concerns on this Embodiment 1, and the outline | summary of the process in the system are demonstrated.
[実施の形態1の認証システムの概要]
この実施の形態1に係る認証システムの概要を図1に示す。図1に示すように、この認証システムは、登録端末10、認証情報蓄積装置12および認証端末14を備える。登録端末10は専用線16により認証情報蓄積装置12に接続し、認証情報蓄積装置12との通信が可能である。認証情報蓄積装置12は専用線16により認証端末14に接続し、認証端末14との通信が可能である。下記に上述した各端末、装置の概要を説明する。 [Outline of Authentication System of Embodiment 1]
An outline of the authentication system according to the first embodiment is shown in FIG. As shown in FIG. 1, the authentication system includes aregistration terminal 10, an authentication information storage device 12, and an authentication terminal 14. The registration terminal 10 is connected to the authentication information storage device 12 through a dedicated line 16 and can communicate with the authentication information storage device 12. The authentication information storage device 12 is connected to the authentication terminal 14 via a dedicated line 16 and can communicate with the authentication terminal 14. The outline | summary of each terminal mentioned above and an apparatus is demonstrated below.
この実施の形態1に係る認証システムの概要を図1に示す。図1に示すように、この認証システムは、登録端末10、認証情報蓄積装置12および認証端末14を備える。登録端末10は専用線16により認証情報蓄積装置12に接続し、認証情報蓄積装置12との通信が可能である。認証情報蓄積装置12は専用線16により認証端末14に接続し、認証端末14との通信が可能である。下記に上述した各端末、装置の概要を説明する。 [Outline of Authentication System of Embodiment 1]
An outline of the authentication system according to the first embodiment is shown in FIG. As shown in FIG. 1, the authentication system includes a
まず、登録端末10は、バイオメトリクス情報読み取り部18、特徴量抽出部20、暗号化部22および数値列生成部24を備える。登録端末10において、バイオメトリクス情報読み取り部18はシステム利用者のバイオメトリクス情報の読み取りをおこなう。バイオメトリクス情報読み取り部18は特徴量抽出部20と接続している。特徴量抽出部20は読み取られたバイオメトリクス情報から特徴量を抽出する。特徴量抽出部20は暗号化部22と接続している。一方、数値列生成部24は数値列28を生成する。数値列生成部24も暗号化部22に接続している。暗号化部22は、特徴量抽出部20で抽出された特徴量により数値列生成部24で生成された数値列28を暗号化して暗号化数値列30を生成する。そして、登録端末10は、数値列28および暗号化数値列30を認証情報蓄積装置12に送信する
First, the registration terminal 10 includes a biometric information reading unit 18, a feature amount extraction unit 20, an encryption unit 22, and a numerical string generation unit 24. In the registration terminal 10, the biometric information reading unit 18 reads the biometric information of the system user. The biometric information reading unit 18 is connected to the feature amount extraction unit 20. The feature amount extraction unit 20 extracts a feature amount from the read biometric information. The feature quantity extraction unit 20 is connected to the encryption unit 22. On the other hand, the numerical sequence generator 24 generates a numerical sequence 28. The numerical string generation unit 24 is also connected to the encryption unit 22. The encryption unit 22 encrypts the numerical sequence 28 generated by the numerical sequence generation unit 24 with the feature amount extracted by the feature amount extraction unit 20 to generate an encrypted numerical sequence 30. Then, the registration terminal 10 transmits the numerical value sequence 28 and the encrypted numerical value sequence 30 to the authentication information storage device 12.
認証情報蓄積装置12は、上述したように登録端末10から送信された数値列28および暗号化数値列30を受信する。そして、認証情報蓄積装置12は、それらの数値列28および暗号化数値列30を個人認証情報32として蓄積する。また、認証情報蓄積装置12は、蓄積された個人認証情報32を、認証端末14に送信する。
The authentication information storage device 12 receives the numerical value sequence 28 and the encrypted numerical value sequence 30 transmitted from the registration terminal 10 as described above. Then, the authentication information storage device 12 stores the numerical value sequence 28 and the encrypted numerical value sequence 30 as the personal authentication information 32. The authentication information storage device 12 transmits the stored personal authentication information 32 to the authentication terminal 14.
認証端末14は、バイオメトリクス情報読み取り部34、特徴量抽出部36、復号化部38および比較部40を備える。認証端末14において、バイオメトリクス情報読み取り部34はシステム利用者のバイオメトリクス情報の読み取りをおこなう。バイオメトリクス情報読み取り部34は特徴量抽出部36と接続している。特徴量抽出部36は読み取られたバイオメトリクス情報から特徴量を抽出する。特徴量抽出部36は復号化部38と接続している。また、認証端末14は、上述したように認証情報蓄積装置12から送信された個人認証情報32を受信する。そして、復号化部38は、特徴量抽出部36で抽出された特徴量により個人認証情報32内の暗号化数値列30を復号化して復号化数値列を生成する。復号化部38は比較部40と接続している。比較部40は、復号化部38で生成された複合化数値列と、個人認証情報32内の元の数値列28の比較をおこなう。
The authentication terminal 14 includes a biometric information reading unit 34, a feature amount extraction unit 36, a decoding unit 38, and a comparison unit 40. In the authentication terminal 14, a biometric information reading unit 34 reads biometric information of the system user. The biometric information reading unit 34 is connected to the feature amount extraction unit 36. The feature quantity extraction unit 36 extracts a feature quantity from the read biometric information. The feature quantity extraction unit 36 is connected to a decoding unit 38. Further, the authentication terminal 14 receives the personal authentication information 32 transmitted from the authentication information storage device 12 as described above. Then, the decryption unit 38 decrypts the encrypted numerical sequence 30 in the personal authentication information 32 using the feature amount extracted by the feature amount extraction unit 36 to generate a decrypted numerical sequence. The decryption unit 38 is connected to the comparison unit 40. The comparison unit 40 compares the composite numeric value sequence generated by the decryption unit 38 with the original numeric value sequence 28 in the personal authentication information 32.
[実施の形態1の認証システムの処理の概要]
続いて、この実施の形態1に係る認証システムの処理の概要について以下に説明する。図2は、この実施の形態1に係る認証システムの処理の流れを説明するためのフローチャートである。図2には、上述した登録端末10、認証情報蓄積装置12および認証端末14における処理の流れと、それら処理間の関係が示されている。下記に、それらの処理の流れ、処理間の関係について説明する。 [Outline of Processing of Authentication System of Embodiment 1]
Next, an outline of processing of the authentication system according to the first embodiment will be described below. FIG. 2 is a flowchart for explaining the processing flow of the authentication system according to the first embodiment. FIG. 2 shows the flow of processing in the above-describedregistration terminal 10, authentication information storage device 12, and authentication terminal 14, and the relationship between these processes. Below, the flow of these processes and the relationship between processes are demonstrated.
続いて、この実施の形態1に係る認証システムの処理の概要について以下に説明する。図2は、この実施の形態1に係る認証システムの処理の流れを説明するためのフローチャートである。図2には、上述した登録端末10、認証情報蓄積装置12および認証端末14における処理の流れと、それら処理間の関係が示されている。下記に、それらの処理の流れ、処理間の関係について説明する。 [Outline of Processing of Authentication System of Embodiment 1]
Next, an outline of processing of the authentication system according to the first embodiment will be described below. FIG. 2 is a flowchart for explaining the processing flow of the authentication system according to the first embodiment. FIG. 2 shows the flow of processing in the above-described
この実施の形態1に係る認証システムでは、利用者が、あらかじめ認証時の照合で使用される情報を登録する。この場合、まず、利用者は登録端末10のバイオメトリクス情報読み取り部18を介して自身のバイオメトリクス情報を入力する(ステップS101)。次に、特徴量抽出部20により、ステップS101で入力されたバイオメトリクス情報から特徴量が抽出される(ステップS102)。この際、例えばバイオメトリクス情報読み取り部18が指紋スキャナである場合には、バイオメトリクス情報読み取り部18で指紋画像が読み取られ、特徴量抽出部20では指紋画像の特徴点の情報が抽出される。次に、数値列生成部24により数値列28が生成される(ステップS103)。次に、暗号化部22において、ステップS103で生成された数値列28が、ステップS102で抽出された特徴量により暗号化され、暗号化数値列30が生成される(ステップS104)。次に、登録端末は、ステップS103で生成された数値列28と、ステップS104で生成された暗号化数値列30の組を、個人認証情報32として認証情報蓄積装置12に送信する(ステップS105)。そして、登録端末10から送信された個人認証情報32は、認証情報蓄積装置12に蓄積される(ステップS106)。
In the authentication system according to the first embodiment, the user registers in advance information used for verification at the time of authentication. In this case, first, the user inputs his / her biometric information via the biometric information reading unit 18 of the registration terminal 10 (step S101). Next, the feature quantity extraction unit 20 extracts the feature quantity from the biometric information input in step S101 (step S102). At this time, for example, when the biometric information reading unit 18 is a fingerprint scanner, the biometric information reading unit 18 reads a fingerprint image, and the feature amount extraction unit 20 extracts information on feature points of the fingerprint image. Next, the numerical sequence 28 is generated by the numerical sequence generator 24 (step S103). Next, in the encryption unit 22, the numerical value sequence 28 generated in step S103 is encrypted with the feature amount extracted in step S102, and an encrypted numerical value sequence 30 is generated (step S104). Next, the registration terminal transmits the set of the numerical value sequence 28 generated in step S103 and the encrypted numerical value sequence 30 generated in step S104 to the authentication information storage device 12 as personal authentication information 32 (step S105). . Then, the personal authentication information 32 transmitted from the registration terminal 10 is stored in the authentication information storage device 12 (step S106).
続いて、利用者が認証をおこなう場合の処理の流れを図2において説明する。利用者が認証をおこなう場合、まず、認証端末14のバイオメトリクス情報読み取り部34を介して自身のバイオメトリクス情報を入力する(ステップS107)。次に、特徴量抽出部36により、ステップS107で入力されたバイオメトリクス情報から、ステップS102と同様の方法で特徴量が抽出される(ステップS108)。次に、認証端末14は、認証情報蓄積装置12に対して個人認証情報32を認証端末14に送信するように要求する(ステップS109)。この要求に基づいて、認証情報蓄積装置12が個人認証情報32を認証端末14に送信する(ステップS110)。そして、次に、認証端末14の復号化部38において、ステップS108で抽出された特徴量により、ステップS110で送信された個人認証情報32に含まれる暗号化数値列30が復号化され、復号化数値列が生成される(ステップS111)。次に、比較部40において、ステップS110で送信された個人認証情報32に含まれる数値列28と、ステップS111で生成された複合化数値列の比較がおこなわれる(ステップS112)。
Next, the flow of processing when the user performs authentication will be described with reference to FIG. When the user performs authentication, first, his / her biometric information is input via the biometric information reading unit 34 of the authentication terminal 14 (step S107). Next, the feature quantity extraction unit 36 extracts the feature quantity from the biometric information input in step S107 by the same method as in step S102 (step S108). Next, the authentication terminal 14 requests the authentication information storage device 12 to transmit the personal authentication information 32 to the authentication terminal 14 (step S109). Based on this request, the authentication information storage device 12 transmits the personal authentication information 32 to the authentication terminal 14 (step S110). Then, the decryption unit 38 of the authentication terminal 14 decrypts the encrypted numerical sequence 30 included in the personal authentication information 32 transmitted in step S110 by the feature amount extracted in step S108, and decrypts the decrypted value. A numerical string is generated (step S111). Next, the comparison unit 40 compares the numerical value sequence 28 included in the personal authentication information 32 transmitted in step S110 with the composite numerical value sequence generated in step S111 (step S112).
この比較において、比較対象の一方である数値列28がステップS102で抽出された特徴量により暗号化されたものが、暗号化数値列30である。そして、比較対象の他方である複合化数値列は、この暗号化数値列30がステップS108で抽出された特徴量により復号化されたものである。従って、比較対象である数値列28と複合化数値列が一致する場合には、ステップS102で抽出された特徴量とステップS108で抽出された特徴量が一致することになる。つまり、ステップS101において利用者が登録端末に入力したバイオメトリクス情報と、ステップS107において利用者が認証時に認証端末に入力したバイオメトリクス情報が一致することなり、利用者が正当であると判定される。逆に、比較対象である数値列28と複合化数値列が不一致となる場合には、利用者が正当でないと判定される。
In this comparison, the encrypted numerical sequence 30 is obtained by encrypting the numerical sequence 28 that is one of the comparison targets with the feature amount extracted in step S102. The composite numeric value sequence that is the other comparison target is obtained by decrypting the encrypted numeric value sequence 30 with the feature amount extracted in step S108. Therefore, when the numerical sequence 28 to be compared and the composite numerical sequence match, the feature amount extracted in step S102 matches the feature amount extracted in step S108. That is, the biometric information input to the registration terminal by the user in step S101 coincides with the biometric information input to the authentication terminal by the user in step S107, and it is determined that the user is valid. . On the other hand, if the numerical sequence 28 to be compared does not match the composite numerical sequence, it is determined that the user is not valid.
この認証システムにおいては、以上の処理により、利用者の認証が実現する。なお、以上の処理において認証システムに蓄積される情報は、ステップS106において蓄積される個人認証情報32のみである。そして、個人認証情報32はバイオメトリクス情報とは無関連の数値列28および、それが暗号化された暗号化数値列30のみである。
In this authentication system, user authentication is realized by the above processing. Note that the information stored in the authentication system in the above processing is only the personal authentication information 32 stored in step S106. The personal authentication information 32 includes only a numerical sequence 28 that is not related to biometric information and an encrypted numerical sequence 30 obtained by encrypting the numerical sequence 28.
[実施の形態1の効果]
以上のように、この実施の形態1に係る認証システムにおいて登録される情報は、利用者のバイオメトリクス情報とは無関連の数値列28および、それが暗号化された暗号化数値列30のみである。従って、この認証システムの登録情報が漏洩した場合であっても、利用者のバイオメトリクス情報が漏洩することはない。 [Effect of Embodiment 1]
As described above, the information registered in the authentication system according to the first embodiment includes only thenumerical value sequence 28 that is not related to the user's biometric information and the encrypted numerical value sequence 30 obtained by encrypting the information. is there. Therefore, even if the registration information of this authentication system is leaked, the user's biometric information is not leaked.
以上のように、この実施の形態1に係る認証システムにおいて登録される情報は、利用者のバイオメトリクス情報とは無関連の数値列28および、それが暗号化された暗号化数値列30のみである。従って、この認証システムの登録情報が漏洩した場合であっても、利用者のバイオメトリクス情報が漏洩することはない。 [Effect of Embodiment 1]
As described above, the information registered in the authentication system according to the first embodiment includes only the
[実施の形態1の変形例]
この実施の形態1に係る認証システムにおいては、各端末、装置間の通信回線として専用線16が使用されている。この実施の形態1における各端末、装置間の通信回線は、専用線16に限定されるものではない。それら各端末、装置間の通信回線は、有線か無線かを問わず、信号線、公衆の電話回線網のいずれであってもよい。また、それら各端末、装置間の通信は、通信回線上に構築されたインターネット等のIP網によりおこなわれるものとしてもよい。なお、上記の変形は以下の他の実施の形態においても適用できる。 [Modification of Embodiment 1]
In the authentication system according to the first embodiment, adedicated line 16 is used as a communication line between each terminal and device. The communication line between each terminal and apparatus in the first embodiment is not limited to the dedicated line 16. The communication line between each of these terminals and devices may be either a signal line or a public telephone line network, whether wired or wireless. Further, communication between these terminals and devices may be performed by an IP network such as the Internet constructed on a communication line. The above-described modifications can be applied to the other embodiments described below.
この実施の形態1に係る認証システムにおいては、各端末、装置間の通信回線として専用線16が使用されている。この実施の形態1における各端末、装置間の通信回線は、専用線16に限定されるものではない。それら各端末、装置間の通信回線は、有線か無線かを問わず、信号線、公衆の電話回線網のいずれであってもよい。また、それら各端末、装置間の通信は、通信回線上に構築されたインターネット等のIP網によりおこなわれるものとしてもよい。なお、上記の変形は以下の他の実施の形態においても適用できる。 [Modification of Embodiment 1]
In the authentication system according to the first embodiment, a
この実施の形態1に係る認証システムは、登録端末10、認証端末14を別々に備えるものである。この実施の形態1に係る認証システムはこれに限定されない。登録端末10および認証端末14を一つの端末とするものでも構わない。この場合には、一つのバイオメトリクス情報読み取り部および特徴量抽出部を、登録時および認証時において共通して利用できることとなる。なお、上記の変形は以下の他の実施の形態においても適用できる。
The authentication system according to the first embodiment includes a registration terminal 10 and an authentication terminal 14 separately. The authentication system according to the first embodiment is not limited to this. The registration terminal 10 and the authentication terminal 14 may be a single terminal. In this case, one biometric information reading unit and feature amount extraction unit can be used in common during registration and authentication. The above-described modifications can be applied to the other embodiments described below.
この実施の形態1に係る認証システムでは、認証情報蓄積装置12を、登録端末10、認証端末14とは別々に設けた。この実施の形態1に係る認証システムはこれに限定されない。認証情報蓄積装置12を、登録端末10や認証端末14と一緒にして、一つの装置としてよい。あるいは、上述した登録端末10および認証端末14を一つの端末としたものと、認証情報蓄積装置12を一緒にして一つの装置としてもよい。なお、上記の変形は以下の他の実施の形態においても適用できる。
In the authentication system according to the first embodiment, the authentication information storage device 12 is provided separately from the registration terminal 10 and the authentication terminal 14. The authentication system according to the first embodiment is not limited to this. The authentication information storage device 12 may be combined with the registration terminal 10 and the authentication terminal 14 as one device. Alternatively, the above-described registration terminal 10 and authentication terminal 14 may be combined with the authentication information storage device 12 to form one device. The above-described modifications can be applied to the other embodiments described below.
この実施の形態1の認証システムにおいては、数値列生成部24で生成される数値列28は利用者ごとに異なる数値列を用いてもよいし、一定の数値列を用いても構わない。また、数値列生成部24で数値列28をランダムに生成することにしても、一定の計算式に基づいて生成することにしてもよい。なお、上記の変形は以下の他の実施の形態においても適用できる。
In the authentication system according to the first embodiment, the numerical sequence 28 generated by the numerical sequence generation unit 24 may use a different numerical sequence for each user, or a fixed numerical sequence. In addition, the numerical value sequence generation unit 24 may generate the numerical value sequence 28 at random, or may generate it based on a certain calculation formula. The above-described modifications can be applied to the other embodiments described below.
実施の形態2.
本発明の実施の形態2は、利用者のバイオメトリクス情報により、利用者の認証を行う認証システムに関する。この実施の形態2に係る認証システムは、認証時に読み取られるバイオメトリクス情報にノイズ混入などの誤差が生じた場合でも安定的に利用者の認証を行うことができるものである。下記に、この実施の形態2に係る認証システムの概要および認証方法、そのシステムにおける処理の概要について説明する。 Embodiment 2. FIG.
The second embodiment of the present invention relates to an authentication system that authenticates a user based on the user's biometric information. The authentication system according to the second embodiment can stably authenticate a user even when an error such as noise mixing occurs in biometric information read at the time of authentication. Below, the outline | summary of the authentication system which concerns on this Embodiment 2, an authentication method, and the outline | summary of the process in the system are demonstrated.
本発明の実施の形態2は、利用者のバイオメトリクス情報により、利用者の認証を行う認証システムに関する。この実施の形態2に係る認証システムは、認証時に読み取られるバイオメトリクス情報にノイズ混入などの誤差が生じた場合でも安定的に利用者の認証を行うことができるものである。下記に、この実施の形態2に係る認証システムの概要および認証方法、そのシステムにおける処理の概要について説明する。 Embodiment 2. FIG.
The second embodiment of the present invention relates to an authentication system that authenticates a user based on the user's biometric information. The authentication system according to the second embodiment can stably authenticate a user even when an error such as noise mixing occurs in biometric information read at the time of authentication. Below, the outline | summary of the authentication system which concerns on this Embodiment 2, an authentication method, and the outline | summary of the process in the system are demonstrated.
[実施の形態2の認証システムの概要]
この実施の形態2に係る認証システムの概要を図3に示す。図3に示すように、この認証システムは、実施の形態1と同様に、登録端末46、認証情報蓄積装置48および認証端末50を備える。登録端末46は専用線52により認証情報蓄積装置48に接続し、認証情報蓄積装置48との通信が可能である。認証情報蓄積装置48は専用線52により認証端末50に接続し、認証端末50との通信が可能である。下記に上述した各端末、装置の概要を説明する。 [Outline of Authentication System of Embodiment 2]
An outline of the authentication system according to the second embodiment is shown in FIG. As shown in FIG. 3, this authentication system includes aregistration terminal 46, an authentication information storage device 48, and an authentication terminal 50, as in the first embodiment. The registration terminal 46 is connected to the authentication information storage device 48 through a dedicated line 52 and can communicate with the authentication information storage device 48. The authentication information storage device 48 is connected to the authentication terminal 50 through a dedicated line 52 and can communicate with the authentication terminal 50. The outline | summary of each terminal mentioned above and an apparatus is demonstrated below.
この実施の形態2に係る認証システムの概要を図3に示す。図3に示すように、この認証システムは、実施の形態1と同様に、登録端末46、認証情報蓄積装置48および認証端末50を備える。登録端末46は専用線52により認証情報蓄積装置48に接続し、認証情報蓄積装置48との通信が可能である。認証情報蓄積装置48は専用線52により認証端末50に接続し、認証端末50との通信が可能である。下記に上述した各端末、装置の概要を説明する。 [Outline of Authentication System of Embodiment 2]
An outline of the authentication system according to the second embodiment is shown in FIG. As shown in FIG. 3, this authentication system includes a
まず、登録端末46は、バイオメトリクス情報読み取り部54、特徴量抽出部56、特徴量分割部58、数値列生成部60、数値列分割部62および数値列断片暗号化部64を備える。登録端末46において、バイオメトリクス情報読み取り部54はシステム利用者のバイオメトリクス情報の読み取りをおこなう。バイオメトリクス情報読み取り部54は特徴量抽出部56と接続している。特徴量抽出部56は読み取られたバイオメトリクス情報から特徴量を抽出する。特徴量抽出部56は特徴量分割部58と接続している。特徴量分割部58は、上述の特徴量を分割して、第1番から第N番(Nは2以上の整数。以下同じ。)の特徴量断片を生成する。特徴量分割部58は数値列断片暗号化部64と接続している。一方、数値列生成部60は数値列68を生成する。数値列生成部60は数値列分割部62と接続している。数値列分割部62は、この数値列68をいわゆる秘密分散法(詳細については、後述の[実施の形態2の認証システムの認証方法]で説明。)を用いて分割して前述の特徴量断片と同数の第1番から第N番の数値列断片を生成する。さらに、特徴量分割部58および数値列分割部62は、数値列断片暗号化部64に接続している。そして、数値列断片暗号化部64は、第1番から第N番の特徴量断片それぞれで同一順番の数値列断片を暗号化して、第1番から第N番の暗号化数値列断片70を生成する。そして、登録端末46は、上述の数値列68および第1番から第N番の暗号化数値列断片70を認証情報蓄積装置48に送信する。
First, the registration terminal 46 includes a biometrics information reading unit 54, a feature amount extraction unit 56, a feature amount division unit 58, a numerical sequence generation unit 60, a numerical sequence division unit 62, and a numerical sequence fragment encryption unit 64. In the registration terminal 46, the biometric information reading unit 54 reads the biometric information of the system user. The biometric information reading unit 54 is connected to the feature amount extraction unit 56. The feature amount extraction unit 56 extracts feature amounts from the read biometric information. The feature quantity extraction unit 56 is connected to the feature quantity division unit 58. The feature amount dividing unit 58 divides the above-described feature amount to generate the first to Nth feature amount fragments (N is an integer equal to or greater than 2; the same applies hereinafter). The feature amount dividing unit 58 is connected to the numerical value string fragment encrypting unit 64. On the other hand, the numerical sequence generator 60 generates a numerical sequence 68. The numerical sequence generator 60 is connected to the numerical sequence divider 62. The numerical value string dividing unit 62 divides the numerical value string 68 using a so-called secret sharing method (details will be described in [Authentication Method of Authentication System of Second Embodiment], which will be described later), and the above-described feature value fragment. The first to Nth numerical value string fragments of the same number as are generated. Further, the feature amount dividing unit 58 and the numerical sequence dividing unit 62 are connected to the numerical sequence fragment encrypting unit 64. Then, the numerical sequence fragment encryption unit 64 encrypts the numerical sequence fragments in the same order with the first to Nth feature amount fragments, and the first to Nth encrypted numerical sequence fragments 70 are obtained. Generate. Then, the registration terminal 46 transmits the above-described numerical sequence 68 and the first to Nth encrypted numerical sequence fragments 70 to the authentication information storage device 48.
認証情報蓄積装置48は、上述したように登録端末46から送信された数値列68および第1番から第N番の暗号化数値列断片70を受信する。そして、認証情報蓄積装置48は、それらの数値列68および暗号化数値列断片70を個人認証情報72として蓄積する。また、認証情報蓄積装置48は、蓄積された個人認証情報72を、認証端末50に送信する。
The authentication information storage device 48 receives the numerical value sequence 68 and the first to Nth encrypted numerical value value fragments 70 transmitted from the registration terminal 46 as described above. Then, the authentication information storage device 48 stores the numerical value sequence 68 and the encrypted numerical value sequence fragment 70 as the personal authentication information 72. Further, the authentication information storage device 48 transmits the stored personal authentication information 72 to the authentication terminal 50.
認証端末50は、バイオメトリクス情報読み取り部74、特徴量抽出部76、特徴量分割部78、数値列断片復号化部80、数値列復元部82および比較部84を備える。認証端末50において、バイオメトリクス情報読み取り部74はシステム利用者のバイオメトリクス情報の読み取りをおこなう。バイオメトリクス情報読み取り部74は特徴量抽出部76と接続している。特徴量抽出部76は読み取られたバイオメトリクス情報から特徴量を抽出する。特徴量抽出部76は特徴量分割部78と接続している。特徴量分割部78は、この特徴量を分割して、第1番から第N番の特徴量断片を生成する。特徴量分割部78は、数値列断片復号化部80と接続している。また、認証端末50は、上述したように認証情報蓄積装置48から送信された個人認証情報72を受信する。そして、数値列断片復号化部80は、第1番から第N番の特徴量断片それぞれにより、個人認証情報72内の同一順番の暗号化数値列断片70を復号化して、第1番から第N番の復号化数値列断片を生成する。数値列断片復号化部80は数値列復元部82と接続している。数値列復元部82は、この第1番から第N番の復号化数値列断片から元の数値列68の復元を試み、復元数値列を生成する。数値列復元部82は比較部84と接続している。比較部84は、復元数値列と、個人認証情報72内の元の数値列68の比較をおこなう。
The authentication terminal 50 includes a biometric information reading unit 74, a feature amount extraction unit 76, a feature amount division unit 78, a numerical sequence fragment decoding unit 80, a numerical sequence restoration unit 82, and a comparison unit 84. In the authentication terminal 50, the biometric information reading unit 74 reads the biometric information of the system user. The biometric information reading unit 74 is connected to the feature amount extraction unit 76. The feature amount extraction unit 76 extracts feature amounts from the read biometric information. The feature quantity extraction unit 76 is connected to the feature quantity division unit 78. The feature amount dividing unit 78 divides the feature amount to generate No. 1 to N-th feature amount fragments. The feature amount dividing unit 78 is connected to the numerical sequence fragment decoding unit 80. Further, the authentication terminal 50 receives the personal authentication information 72 transmitted from the authentication information storage device 48 as described above. Then, the numerical sequence fragment decrypting unit 80 decrypts the encrypted numerical sequence fragments 70 in the same order in the personal authentication information 72 by using the 1st to Nth feature amount fragments, respectively. Nth decrypted numerical sequence fragment is generated. The numerical sequence fragment decoding unit 80 is connected to the numerical sequence restoration unit 82. The numerical value sequence restoration unit 82 tries to restore the original numeric value sequence 68 from the first to Nth decoded numeric value sequence fragments, and generates a restored numeric value sequence. The numerical value string restoration unit 82 is connected to the comparison unit 84. The comparison unit 84 compares the restored numeric value sequence with the original numeric value sequence 68 in the personal authentication information 72.
[実施の形態2の認証システムの認証方法]
以下に、この実施の形態2に係る認証システムの認証方法について具体的に説明する。上述したように、この認証システムにおいては、数値列68が秘密分散法を用いて第1番から第N番の数値列断片に分割される。そして、これら第1番から第N番の数値列断片が、登録端末で入力されたバイオメトリクス情報から得た同一順番の特徴量断片で暗号化され暗号化数値列断片70が生成される。個人認証情報としては、数値列68および第1番から第N番の暗号化数値列断片70が蓄積される。 [Authentication Method of Authentication System of Embodiment 2]
The authentication method of the authentication system according to the second embodiment will be specifically described below. As described above, in this authentication system, thenumerical value sequence 68 is divided into the first to Nth numerical value sequence fragments using the secret sharing method. Then, the first to Nth numerical sequence fragments are encrypted with the feature amount fragments in the same order obtained from the biometric information input at the registration terminal, and an encrypted numerical sequence fragment 70 is generated. As the personal authentication information, a numerical value string 68 and first to Nth encrypted numerical value string fragments 70 are accumulated.
以下に、この実施の形態2に係る認証システムの認証方法について具体的に説明する。上述したように、この認証システムにおいては、数値列68が秘密分散法を用いて第1番から第N番の数値列断片に分割される。そして、これら第1番から第N番の数値列断片が、登録端末で入力されたバイオメトリクス情報から得た同一順番の特徴量断片で暗号化され暗号化数値列断片70が生成される。個人認証情報としては、数値列68および第1番から第N番の暗号化数値列断片70が蓄積される。 [Authentication Method of Authentication System of Embodiment 2]
The authentication method of the authentication system according to the second embodiment will be specifically described below. As described above, in this authentication system, the
秘密分散法とは、ある情報をN個に分割してN個の断片を生成する場合にそのN個の断片のうちのN個に満たない指定数の断片からその情報を正しく復元できるようにその情報を分割する手法である。従って、この認証システムに係る数値列68は秘密分散法で分割されるため、数値列68はN個に満たない指定数の数値列断片から正しく復元されることとなる。
In the secret sharing method, when N pieces are generated by dividing certain information into N pieces, the information can be correctly restored from a specified number of pieces less than N of the N pieces. This is a technique for dividing the information. Therefore, since the numerical sequence 68 according to this authentication system is divided by the secret sharing method, the numerical sequence 68 is correctly restored from a specified number of numerical sequence fragments that is less than N.
この認証システムの数値列断片復号化部80において、上述の第1番から第N番の暗号化数値列断片70のうち指定数が元通りに復号化された場合には、数値列断片と等しい復号化数値列断片が指定数得られる。このため、上述のことから、数値列復元部82において復号化数値列断片から復元される復元数値列が元の数値列68と一致することになり、認証をおこなった利用者が正当であると判定される。一方で、上述のように暗号化数値列断片70のうち指定数が元通りに復号化されることは、認証端末で入力した第1番から第N番の特徴量断片のうちの指定数以上が、登録端末で入力した特徴量断片と一致することを意味する。以上のことは、認証時に読み取られたバイオメトリクス情報と登録時に読み取られたバイオメトリクス情報との間で、一定の誤差範囲での同一性が確認できれば、認証をおこなった利用者が正当であると判断できることを意味する。
In the numerical sequence fragment decrypting unit 80 of this authentication system, when the specified number of the first to Nth encrypted numerical sequence fragments 70 is decrypted as before, it is equal to the numerical sequence fragment. A specified number of decrypted numerical sequence fragments are obtained. For this reason, from the above, the restored numeric sequence restored from the decrypted numeric sequence fragment in the numeric sequence restoring unit 82 matches the original numeric sequence 68, and the authenticated user is valid. Determined. On the other hand, as described above, the designated number of the encrypted numerical value sequence fragments 70 is decrypted as before to be equal to or more than the designated number of the first to Nth feature amount fragments input at the authentication terminal. Means that it matches the feature value fragment input at the registration terminal. As for the above, if the identity within a certain error range can be confirmed between the biometric information read at the time of authentication and the biometric information read at the time of registration, the user who performed the authentication is valid. It means that it can be judged.
この実施の形態2に係る認証システムにおいては、以上のような秘密分散法を用いた認証方法が適用される。これにより、認証時に読み取られるバイオメトリクス情報にノイズ混入などの誤差が生じた場合でも安定的な認証がおこなわれる。
In the authentication system according to the second embodiment, the authentication method using the secret sharing method as described above is applied. As a result, stable authentication is performed even when an error such as noise mixing occurs in biometric information read at the time of authentication.
[実施の形態2の認証システムの処理の概要]
続いて、この実施の形態2に係る認証システムの処理の概要について以下に説明する。図4は、この実施の形態2に係る認証システムの処理の流れを説明するためのフローチャートである。図4には、上述した登録端末46、認証情報蓄積装置48および認証端末50の処理の流れと、それら処理間の関係が示されている。下記に、それらの処理の流れ、処理間の関係について説明する。 [Outline of Processing of Authentication System of Embodiment 2]
Next, an outline of processing of the authentication system according to the second embodiment will be described below. FIG. 4 is a flowchart for explaining the processing flow of the authentication system according to the second embodiment. FIG. 4 shows the processing flow of theregistration terminal 46, the authentication information storage device 48, and the authentication terminal 50 described above, and the relationship between these processes. Below, the flow of these processes and the relationship between processes are demonstrated.
続いて、この実施の形態2に係る認証システムの処理の概要について以下に説明する。図4は、この実施の形態2に係る認証システムの処理の流れを説明するためのフローチャートである。図4には、上述した登録端末46、認証情報蓄積装置48および認証端末50の処理の流れと、それら処理間の関係が示されている。下記に、それらの処理の流れ、処理間の関係について説明する。 [Outline of Processing of Authentication System of Embodiment 2]
Next, an outline of processing of the authentication system according to the second embodiment will be described below. FIG. 4 is a flowchart for explaining the processing flow of the authentication system according to the second embodiment. FIG. 4 shows the processing flow of the
この実施の形態2に係る認証システムでは、利用者が、あらかじめ認証時の照合で使用される情報を登録する。この場合、まず、利用者は登録端末46のバイオメトリクス情報読み取り部54を介して自身のバイオメトリクス情報を入力する(ステップS101)。次に、特徴量抽出部56により、ステップS101で入力されたバイオメトリクス情報から特徴量が抽出される(ステップS102)。この際、例えばバイオメトリクス情報読み取り部54が指紋スキャナである場合には、バイオメトリクス情報読み取り部54で指紋画像が読み取られ、特徴量抽出部56では指紋画像の特徴点の情報が抽出される。次に、特徴量分割部58により、ステップS102で抽出された特徴量が分割され、第1番から第N番の特徴量断片が生成される(ステップS103)。次に、数値列生成部60により数値列68が生成される(ステップS104)。次に、数値列分割部62により、ステップS104で生成された数値列68がいわゆる秘密分散法を用いて分割され、第1番から第N番の数値列断片が生成される(ステップS105)。次に、数値列断片暗号化部64において、ステップS103で生成された第1番から第N番の特徴量断片それぞれにより、ステップS105で生成された同一順番の数値列断片が暗号化され、第1番から第N番の暗号化数値列断片70が生成される(ステップS106)。次に、登録端末は、ステップS103で生成された数値列68と、ステップS106で生成された第1番から第N番の暗号化数値列断片70の組を、個人認証情報72として認証情報蓄積装置48に送信する(ステップS107)。そして、登録端末46から送信された個人認証情報72は、認証情報蓄積装置48に蓄積される(ステップS108)。
In the authentication system according to the second embodiment, the user registers in advance information used for verification at the time of authentication. In this case, first, the user inputs his / her biometric information via the biometric information reading unit 54 of the registration terminal 46 (step S101). Next, the feature quantity extraction unit 56 extracts the feature quantity from the biometric information input in step S101 (step S102). At this time, for example, when the biometric information reading unit 54 is a fingerprint scanner, the biometric information reading unit 54 reads a fingerprint image, and the feature amount extraction unit 56 extracts information on feature points of the fingerprint image. Next, the feature quantity dividing unit 58 divides the feature quantity extracted in step S102, and the first to Nth feature quantity fragments are generated (step S103). Next, the numerical sequence 68 is generated by the numerical sequence generator 60 (step S104). Next, the numerical value string dividing unit 62 divides the numerical value string 68 generated in step S10 4 using a so-called secret sharing method, and generates the first to Nth numerical value string fragments (step S105). Next, in the numerical sequence fragment encryption unit 64, the numerical sequence fragments in the same order generated in step S105 are encrypted by the first to Nth feature amount fragments generated in step S103, respectively. The 1st to Nth encrypted numerical value string fragments 70 are generated (step S106). Next, the registration terminal accumulates the authentication information as the personal authentication information 72 by combining the numerical sequence 68 generated in step S103 and the first to Nth encrypted numerical sequence fragments 70 generated in step S106. It transmits to the apparatus 48 (step S107). Then, the personal authentication information 72 transmitted from the registration terminal 46 is stored in the authentication information storage device 48 (step S108).
続いて、利用者が認証をおこなう場合の処理の流れを図4において説明する。利用者が認証をおこなう場合、まず、認証端末50のバイオメトリクス情報読み取り部74を介して自身のバイオメトリクス情報を入力する(ステップS109)。次に、特徴量抽出部76により、ステップS109で入力されたバイオメトリクス情報から、ステップS102と同様の方法で特徴量が抽出される(ステップS110)。次に、特徴量分割部78により、ステップS110で抽出された特徴量がステップS103と同様の方法で分割され、第1番から第N番の特徴量断片が生成される(ステップS111)。次に、認証端末50は、認証情報蓄積装置48に対して個人認証情報72を認証端末50に送信するように要求する(ステップS112)。この要求に基づいて、認証情報蓄積装置48が個人認証情報72を認証端末50に送信する(ステップS113)。そして、次に、認証端末50の数値列断片復号化部80において、ステップS111で生成された第1番から第N番の特徴量断片それぞれにより、ステップS113で送信された個人認証情報72に含まれる同一順番の暗号化数値列断片70が復号化され、第1番から第N番の復号化数値列が生成される(ステップS114)。次に、数値列復元部82において、ステップS114で生成された第1番から第N番の復号化数値列断片から元の数値列68の復元が試みられ、復元数値列が生成される(ステップS115)。次に、比較部84において、ステップS110で送信された個人認証情報72に含まれる数値列68と、ステップS111で生成された復元数値列の比較がおこなわれる(ステップS116)。
Next, the flow of processing when the user performs authentication will be described with reference to FIG. When the user performs authentication, first, the user's own biometric information is input via the biometric information reading unit 74 of the authentication terminal 50 (step S109). Next, the feature amount extraction unit 76 extracts feature amounts from the biometric information input in step S109 by the same method as in step S102 (step S110). Next, the feature amount dividing unit 78 divides the feature amount extracted in step S110 by the same method as in step S103, and generates the first to Nth feature amount fragments (step S111). Next, the authentication terminal 50 requests the authentication information storage device 48 to transmit the personal authentication information 72 to the authentication terminal 50 (step S112). Based on this request, the authentication information storage device 48 transmits the personal authentication information 72 to the authentication terminal 50 (step S113). Then, in the numerical value string fragment decrypting unit 80 of the authentication terminal 50, each of the first to Nth feature amount fragments generated in step S111 is included in the personal authentication information 72 transmitted in step S113. The encrypted numerical value sequence fragments 70 in the same order are decrypted, and the first to Nth decrypted numerical value sequences are generated (step S114). Next, the numerical sequence restoration unit 82 tries to restore the original numeric sequence 68 from the first to Nth decoded numeric sequence fragments generated in step S114, and a restored numeric sequence is generated (step S1). S115). Next, the comparison unit 84 compares the numerical value sequence 68 included in the personal authentication information 72 transmitted in step S110 with the restored numerical value sequence generated in step S111 (step S116).
この比較において、数値列68と復元数値列が一致する場合には、[実施の形態2の認証システムの認証方法]において説明したように、第1番から第N番の復号化数値列断片のうち指定数以上が、元の数値列断片と一致することとなる。これは、ステップS103で生成された第1番から第N番の特徴量断片の指定数以上が、ステップS111で生成された特徴量断片と一致することを意味する。従って、ステップS101において利用者が登録端末に入力したバイオメトリクス情報と、ステップS109において利用者が認証時に認証端末に入力したバイオメトリクス情報が、誤差を考慮した上で同一であると判定される。これにより、認証をおこなった利用者が正当であると判定される。逆に、数値列68と復元数値列が一致しない場合は、利用者が登録端末に入力したバイオメトリクス情報と、利用者が認証時に認証端末に入力したバイオメトリクス情報が、誤差を考慮したとしても一致しないと判定される。これにより、認証をおこなった利用者が正当でないと判定される。
In this comparison, if the numerical sequence 68 matches the restored numerical sequence, as described in [Authentication Method of Authentication System of Second Embodiment], the first to Nth decrypted numerical sequence fragments Of these, the specified number or more matches the original numeric string fragment. This means that the specified number or more of the first to Nth feature amount fragments generated in step S103 matches the feature amount fragments generated in step S111. Therefore, it is determined that the biometric information input to the registration terminal by the user in step S101 and the biometric information input to the authentication terminal by the user in authentication in step S109 are the same in consideration of errors. Thereby, it is determined that the user who has performed authentication is valid. On the contrary, if the numerical value sequence 68 and the restored numerical value sequence do not match, even if the biometric information input by the user to the registration terminal and the biometric information input by the user to the authentication terminal at the time of authentication take account of errors, It is determined that they do not match. As a result, it is determined that the user who has performed authentication is not valid.
この認証システムにおいては、以上の処理により、利用者の認証が実現する。なお、以上の処理において認証システムに蓄積される情報は、ステップS108において蓄積される個人認証情報72のみである。そして、個人認証情報72はバイオメトリクス情報とは無関連の数値列68および、それが分割された後に暗号化された暗号化数値列断片70のみである。
In this authentication system, user authentication is realized by the above processing. Note that the information stored in the authentication system in the above processing is only the personal authentication information 72 stored in step S108. The personal authentication information 72 includes only a numerical sequence 68 that is not related to the biometric information and an encrypted numerical sequence fragment 70 that is encrypted after being divided.
[実施の形態2の効果]
以上のように、この実施の形態2に係る認証システムにおいては、バイオメトリクス情報から抽出された特徴量を分割した第1番から第N番の特徴量断片のうち一部が、登録された当該特徴量断片と一致しているかどうかにより利用者の認証を行っている。このため、認証時に読み取られるバイオメトリクス情報にノイズ混入など誤差が生じた場合でも安定的な認証をおこなうことができる。 [Effect of Embodiment 2]
As described above, in the authentication system according to the second embodiment, a part of the first to Nth feature amount fragments obtained by dividing the feature amount extracted from the biometric information is registered. Users are authenticated based on whether they match the feature fragment. For this reason, stable authentication can be performed even when an error such as noise mixing occurs in biometric information read at the time of authentication.
以上のように、この実施の形態2に係る認証システムにおいては、バイオメトリクス情報から抽出された特徴量を分割した第1番から第N番の特徴量断片のうち一部が、登録された当該特徴量断片と一致しているかどうかにより利用者の認証を行っている。このため、認証時に読み取られるバイオメトリクス情報にノイズ混入など誤差が生じた場合でも安定的な認証をおこなうことができる。 [Effect of Embodiment 2]
As described above, in the authentication system according to the second embodiment, a part of the first to Nth feature amount fragments obtained by dividing the feature amount extracted from the biometric information is registered. Users are authenticated based on whether they match the feature fragment. For this reason, stable authentication can be performed even when an error such as noise mixing occurs in biometric information read at the time of authentication.
さらに、この実施の形態2に係る認証システムにおいては、秘密分散法が用いられ、復号化数値列断片のうち一部が元の数値列断片と一致していれば、復号化数値列断片から元の数値列を元通りに復元した復元数値列を生成できる。そして、復元数値列が元の数値列と一致しているかどうかにより、利用者の認証を行っている。このため、認証時に読み取られるバイオメトリクス情報にノイズ混入など誤差が生じた場合でも安定的な認証をおこなうことができる。
Further, in the authentication system according to the second embodiment, the secret sharing method is used, and if a part of the decrypted numerical sequence fragment matches the original numerical sequence fragment, the decrypted numerical sequence fragment is converted into the original. It is possible to generate a restored numeric sequence that is restored to the original numeric sequence. Then, the user is authenticated based on whether or not the restored numerical sequence matches the original numerical sequence. For this reason, stable authentication can be performed even when an error such as noise mixing occurs in biometric information read at the time of authentication.
[実施の形態2の変形例]
この実施の形態2に係る認証システムにおいては、数値列分割部62における数値列68の分割が秘密分散法を用いておこなわれている。この実施の形態2に係る認証システムにおいては、必ずしも秘密分散法を用いなくてもよい。数値列68を単純に同一桁数の数値列断片に分割する方法をとっても構わない。この場合においても、復号化数値列断片と、元の数値列68を単純に同一桁数に分割した数値列断片とを比較することにより認証は可能となる。 [Modification of Embodiment 2]
In the authentication system according to the second embodiment, the numerical valuesequence division unit 62 divides the numerical value sequence 68 using the secret sharing method. In the authentication system according to the second embodiment, the secret sharing method is not necessarily used. A method of simply dividing the numerical sequence 68 into numerical sequence fragments having the same number of digits may be employed. Even in this case, authentication can be performed by comparing the decrypted numerical sequence fragment with the numerical sequence fragment obtained by simply dividing the original numerical sequence 68 into the same number of digits.
この実施の形態2に係る認証システムにおいては、数値列分割部62における数値列68の分割が秘密分散法を用いておこなわれている。この実施の形態2に係る認証システムにおいては、必ずしも秘密分散法を用いなくてもよい。数値列68を単純に同一桁数の数値列断片に分割する方法をとっても構わない。この場合においても、復号化数値列断片と、元の数値列68を単純に同一桁数に分割した数値列断片とを比較することにより認証は可能となる。 [Modification of Embodiment 2]
In the authentication system according to the second embodiment, the numerical value
バイオメトリクス情報が漏洩しないバイオメトリクス認証を可能とする認証システムを利用できる。
An authentication system that enables biometric authentication without leaking biometric information can be used.
Claims (12)
- 動作モードとして、バイオメトリクス情報の登録を行う登録モードと、バイオメトリクス情報の認証を行う認証モードとを択一的に選択可能な認証システムであって、
バイオメトリクス情報を読み取るバイオメトリクス情報読み取り手段と、
前記バイトメトリクス情報から特徴量を抽出する特徴量抽出手段と、
前記登録モードの場合に、秘密情報を生成する秘密情報生成手段と、
前記登録モードの場合に、前記特徴量抽出手段で抽出された特徴量から暗号化キーを生成する暗号化キー生成手段と、
前記登録モードの場合に、前記暗号化キーにより前記秘密情報を暗号化して、暗号化秘密情報を生成する暗号化手段と、
前記登録モードの場合に、前記秘密情報と、前記暗号化秘密情報とを記憶する認証情報記憶手段と、
前記認証モードの場合に、前記特徴量抽出手段で抽出された特徴量から複合化キーを生成する復号化キー生成手段と、
前記認証モードの場合に、前記複合化キーにより前記暗号化秘密情報を復号化して、複合化秘密情報を生成する復号化手段と、
前記認証モードの場合に、前記秘密情報と、前記復号化秘密情報とを比較する比較手段と、
を備えることを特徴とする認証システム。 As an operation mode, an authentication system capable of selectively selecting a registration mode for registering biometric information and an authentication mode for authenticating biometric information,
Biometric information reading means for reading biometric information;
Feature quantity extraction means for extracting feature quantities from the byte metrics information;
Secret information generating means for generating secret information in the case of the registration mode;
An encryption key generating means for generating an encryption key from the feature quantity extracted by the feature quantity extracting means in the case of the registration mode;
Encryption means for encrypting the secret information with the encryption key and generating encrypted secret information in the case of the registration mode;
Authentication information storage means for storing the secret information and the encrypted secret information in the case of the registration mode;
Decryption key generation means for generating a composite key from the feature quantity extracted by the feature quantity extraction means in the case of the authentication mode;
Decrypting means for decrypting the encrypted secret information with the decryption key to generate decrypted secret information in the authentication mode;
Comparison means for comparing the secret information with the decrypted secret information in the authentication mode;
An authentication system comprising: - 前記暗号化キー生成手段が、前記特徴量抽出手段で抽出された特徴量を前記暗号化キーとするものであり、
前記複合化キー生成手段が、前記特徴量抽出手段で抽出された特徴量を前記復号化キーとするものであることを特徴とする請求項1記載の認証システム。 The encryption key generation means uses the feature amount extracted by the feature amount extraction means as the encryption key;
The authentication system according to claim 1, wherein the composite key generation unit uses the feature amount extracted by the feature amount extraction unit as the decryption key. - 前記特徴量抽出手段で抽出された特徴量を分割して第1番目から第N番目(Nは2以上の整数)の特徴量断片を生成する特徴量分割手段と、
前記登録モードの場合に、前記秘密情報を分割して第1番目から前記第N番目の秘密情報断片を生成する秘密情報分割手段と、
を備え、
前記暗号化キー生成手段が、前記特徴量分割手段で生成された第1番目から前記第N番目の特徴量断片それぞれを同じ順番の断片暗号化キーとして設定し、第1番目から前記第N番目の当該断片暗号化キーを前記暗号化キーとするものであり、
前記暗号化手段が、第1番目から前記第N番目の前記断片暗号化キーそれぞれにより同じ順番の前記秘密情報断片を暗号化して、前記暗号化秘密情報として第1番目から前記第N番目の暗号化秘密情報断片を生成するものであり、
前記認証情報記憶手段が、前記暗号化秘密情報として第1番目から前記第N番目の前記暗号化秘密情報断片を記憶するものであり、
前記複合化キー生成手段が、前記特徴量分割手段で生成された第1番目から前記第N番目の特徴量断片それぞれを同じ順番の断片復号化キーとして設定し、第1番目から前記第N番目の当該断片復号化キーを前記復号化キーとするものであり、
前記復号化手段が、第1番目から前記第N番目の前記断片復号化キーそれぞれにより同じ順番の前記暗号化秘密情報断片を復号化して、前記復号化秘密情報として第1番目から前記第N番目の復号化秘密情報断片を生成するものであり、
前記比較手段が、前記秘密情報と、第1番目から前記第N番目の前記復号化秘密情報断片とを比較するものであることを特徴とする請求項1記載の認証システム。 Feature amount dividing means for dividing the feature amount extracted by the feature amount extracting means to generate first to Nth (N is an integer of 2 or more) feature amount fragments;
Secret information dividing means for dividing the secret information to generate the first to Nth secret information fragments in the case of the registration mode;
With
The encryption key generating means sets each of the first to Nth feature amount fragments generated by the feature amount dividing means as a fragment encryption key in the same order, and from the first to the Nth The fragment encryption key is used as the encryption key,
The encryption means encrypts the secret information fragments in the same order with each of the first to Nth fragment encryption keys, and uses the first to Nth ciphers as the encrypted secret information. A secret information fragment,
The authentication information storage means stores the first to Nth encrypted secret information fragments as the encrypted secret information;
The composite key generation means sets each of the first to Nth feature amount fragments generated by the feature amount dividing means as a fragment decryption key in the same order, and from the first to the Nth The fragment decryption key is used as the decryption key,
The decryption means decrypts the encrypted secret information fragments in the same order using the first to the Nth fragment decryption keys, and the first to the Nth as the decryption secret information. To generate a decryption secret information fragment of
2. The authentication system according to claim 1, wherein the comparing means compares the secret information with the first to Nth decrypted secret information fragments. - 前記秘密情報分割手段が、第1番目から前記第N番目の前記秘密情報断片のうち前記N個未満の前記秘密情報断片から前記秘密情報を復元できるように、前記秘密情報断片を生成するものであり、
前記比較手段が、
第1番目から前記第N番目の前記復号化秘密情報断片から前記秘密情報を復元して復元秘密情報を生成する秘密情報復元手段を備え、
前記秘密情報と、前記復元秘密情報とを比較するものであることを特徴とする請求項3記載の認証システム。 The secret information dividing means generates the secret information fragment so that the secret information can be restored from less than the N secret information fragments among the first to Nth secret information fragments. Yes,
The comparing means is
Secret information restoring means for restoring the secret information from the first to the Nth decrypted secret information fragment to generate restored secret information,
The authentication system according to claim 3, wherein the secret information is compared with the restored secret information. - バイオメトリクス情報を読み取るバイオメトリクス情報読み取り手段と、
前記バイトメトリクス情報から特徴量を抽出する特徴量抽出手段と、
秘密情報を生成する秘密情報生成手段と、
前記特徴量から暗号化キーを生成する暗号化キー生成手段と、
前記暗号化キーにより前記秘密情報を暗号化して、暗号化秘密情報を生成する暗号化手段と、
を備えることを特徴とする登録装置。 Biometric information reading means for reading biometric information;
Feature quantity extraction means for extracting feature quantities from the byte metrics information;
Secret information generating means for generating secret information;
Encryption key generation means for generating an encryption key from the feature amount;
Encryption means for encrypting the secret information with the encryption key to generate encrypted secret information;
A registration device comprising: - 前記暗号化キー生成手段が、前記特徴量を前記暗号化キーとするものであることを特徴とする請求項5記載の登録装置。 6. The registration apparatus according to claim 5, wherein the encryption key generation means uses the feature amount as the encryption key.
- 前記特徴量を分割して第1番目から第N番目(Nは2以上の整数)の特徴量断片を生成する特徴量分割手段と、
前記秘密情報を分割して第1番目から前記第N番目の秘密情報断片を生成する秘密情報分割手段と、
を備え、
前記暗号化キー生成手段が、第1番目から前記第N番目の前記特徴量断片それぞれを同じ順番の断片暗号化キーとして設定し、第1番目から前記第N番目の当該断片暗号化キーを前記暗号化キーとするものであり、
前記暗号化手段が、第1番目から前記第N番目の前記断片暗号化キーそれぞれにより同じ順番の前記秘密情報断片を暗号化して、前記暗号化秘密情報として第1番目から前記第N番目の暗号化秘密情報断片を生成するものであることを特徴とする請求項5記載の登録装置。 Feature quantity dividing means for dividing the feature quantity to generate first to Nth (N is an integer of 2 or more) feature quantity fragments;
Secret information dividing means for dividing the secret information to generate the first to Nth secret information fragments;
With
The encryption key generation means sets each of the first to Nth feature amount fragments as a fragment encryption key in the same order, and sets the first to Nth fragment encryption keys as the fragment encryption keys. An encryption key,
The encryption means encrypts the secret information fragments in the same order with each of the first to Nth fragment encryption keys, and uses the first to Nth ciphers as the encrypted secret information. 6. The registration apparatus according to claim 5, wherein the registration secret information fragment is generated. - 前記秘密情報分割手段が、第1番目から前記第N番目の前記秘密情報断片のうち前記N個未満の前記秘密情報断片から前記秘密情報を復元できるように、前記秘密情報断片を生成するものであることを特徴とする請求項7記載の登録装置。 The secret information dividing means generates the secret information fragment so that the secret information can be restored from less than the N secret information fragments among the first to Nth secret information fragments. The registration apparatus according to claim 7, wherein the registration apparatus is provided.
- 秘密情報と暗号化秘密情報を、取り込む認証情報取り込み手段と、
バイオメトリクス情報を読み取るバイオメトリクス情報読み取り手段と、
前記バイトメトリクス情報から特徴量を抽出する特徴量抽出手段と、
前記特徴量から複合化キーを生成する復号化キー生成手段と、
前記複合化キーにより前記暗号化秘密情報を復号化して、複合化秘密情報を生成する復号化手段と、
前記秘密情報と、前記復号化秘密情報とを比較する比較手段と、
を備えることを特徴とする認証装置。 Authentication information fetching means for fetching secret information and encrypted secret information;
Biometric information reading means for reading biometric information;
Feature quantity extraction means for extracting feature quantities from the byte metrics information;
Decryption key generation means for generating a composite key from the feature quantity;
Decrypting means for decrypting the encrypted secret information with the decryption key to generate decrypted secret information;
A comparing means for comparing the secret information with the decrypted secret information;
An authentication device comprising: - 前記複合化キー生成手段が、前記特徴量を前記復号化キーとするものであることを特徴とする請求項9記載の認証装置。 10. The authentication apparatus according to claim 9, wherein the decryption key generation unit uses the feature amount as the decryption key.
- 前記暗号化秘密情報が、第1番目から第N番目(Nは2以上の整数)の暗号化秘密情報断片を含むものであり、
前記特徴量を分割して第1番目から前記第N番目の特徴量断片を生成する特徴量分割手段を備え、
前記複合化キー生成手段が、第1番目から前記第N番目の前記特徴量断片それぞれを同じ順番の断片復号化キーとして設定し、第1番目から前記第N番目の当該断片復号化キーを前記復号化キーとするものであり、
前記復号化手段が、第1番目から前記第N番目の前記断片復号化キーそれぞれにより同じ順番の前記暗号化秘密情報断片を復号化して、前記復号化秘密情報として第1番目から前記第N番目の復号化秘密情報断片を生成するものであり、
前記比較手段が、前記秘密情報と、第1番目から前記第N番目の前記復号化秘密情報断片とを比較するものであることを特徴とする請求項9記載の認証装置。 The encrypted secret information includes first to Nth (N is an integer of 2 or more) encrypted secret information fragments,
Feature amount dividing means for dividing the feature amount to generate the first to Nth feature amount fragments;
The composite key generation means sets each of the first to Nth feature amount fragments as a fragment decryption key in the same order, and the first to Nth fragment decryption keys are set as the fragment decryption keys. A decryption key,
The decryption means decrypts the encrypted secret information fragments in the same order using the first to the Nth fragment decryption keys, respectively, and uses the first to the Nth as the decryption secret information. To generate a decryption secret information fragment of
10. The authentication apparatus according to claim 9, wherein the comparing means compares the secret information with the first to Nth decrypted secret information fragments. - 前記比較手段が、
第1番目から前記第N番目の前記復号化秘密情報断片から前記秘密情報を復元して復元秘密情報を生成する秘密情報復元手段を備え、
前記秘密情報と、前記復元秘密情報とを比較するものであることを特徴とする請求項11記載の認証装置。 The comparing means is
Secret information restoring means for restoring the secret information from the first to the Nth decrypted secret information fragment to generate restored secret information,
The authentication apparatus according to claim 11, wherein the secret information is compared with the restored secret information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2008/060948 WO2009153846A1 (en) | 2008-06-16 | 2008-06-16 | Authentication system, registration device, and authentication device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2008/060948 WO2009153846A1 (en) | 2008-06-16 | 2008-06-16 | Authentication system, registration device, and authentication device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009153846A1 true WO2009153846A1 (en) | 2009-12-23 |
Family
ID=41433777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2008/060948 WO2009153846A1 (en) | 2008-06-16 | 2008-06-16 | Authentication system, registration device, and authentication device |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2009153846A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2017092960A (en) * | 2015-11-03 | 2017-05-25 | ▲れい▼達科技股▲ふん▼有限公司Leadot Innovation, Inc. | Data encryption system by using security key |
JP2020052605A (en) * | 2018-09-26 | 2020-04-02 | 株式会社日立製作所 | Authentication system and authentication method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006270697A (en) * | 2005-03-25 | 2006-10-05 | Hitachi Ltd | Encryption key generation based on biological information and personal authentication system based on biological information |
JP2008090547A (en) * | 2006-09-29 | 2008-04-17 | Toshiba Corp | User authentication method, user side authentication device, and program |
-
2008
- 2008-06-16 WO PCT/JP2008/060948 patent/WO2009153846A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006270697A (en) * | 2005-03-25 | 2006-10-05 | Hitachi Ltd | Encryption key generation based on biological information and personal authentication system based on biological information |
JP2008090547A (en) * | 2006-09-29 | 2008-04-17 | Toshiba Corp | User authentication method, user side authentication device, and program |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2017092960A (en) * | 2015-11-03 | 2017-05-25 | ▲れい▼達科技股▲ふん▼有限公司Leadot Innovation, Inc. | Data encryption system by using security key |
US10484340B2 (en) | 2015-11-03 | 2019-11-19 | Leadot Innovation, Inc. | Data encryption system by using a security key |
JP2020052605A (en) * | 2018-09-26 | 2020-04-02 | 株式会社日立製作所 | Authentication system and authentication method |
JP7015767B2 (en) | 2018-09-26 | 2022-02-03 | 株式会社日立製作所 | Authentication system and authentication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9887989B2 (en) | Protecting passwords and biometrics against back-end security breaches | |
JP4617763B2 (en) | Device authentication system, device authentication server, terminal device, device authentication method, and device authentication program | |
US8775794B2 (en) | System and method for end to end encryption | |
US8130961B2 (en) | Method and system for client-server mutual authentication using event-based OTP | |
CN109076090B (en) | Updating biometric data templates | |
US20110126022A1 (en) | Method for generating an advanced electronic signature for an electronic document | |
US20030204732A1 (en) | System and method for storage and retrieval of a cryptographic secret from a plurality of network enabled clients | |
JP2008090547A (en) | User authentication method, user side authentication device, and program | |
WO2009155813A1 (en) | Method for storing encrypted data in client and system thereof | |
EP3398289B1 (en) | A method, system and apparatus using forward-secure cryptography for passcode verification | |
CN111401901B (en) | Authentication method and device of biological payment device, computer device and storage medium | |
JP2008526078A (en) | Method and apparatus for key generation and authentication approval | |
JPH1032570A (en) | Electronic signature system | |
JP2002208925A (en) | Qualification authentication method using variable authentication information | |
KR20100114321A (en) | Digital content transaction-breakdown the method thereof | |
JP4840575B2 (en) | Terminal device, certificate issuing device, certificate issuing system, certificate acquisition method and certificate issuing method | |
EP3185504A1 (en) | Security management system for securing a communication between a remote server and an electronic device | |
US9876774B2 (en) | Communication security system and method | |
TW200803392A (en) | Method, device, server arrangement, system and computer program products for securely storing data in a portable device | |
WO2009153846A1 (en) | Authentication system, registration device, and authentication device | |
KR100986980B1 (en) | Biometric authentication method, client and server | |
JP2006126891A (en) | Biological information registration method, information providing system using biological information, terminal and server | |
CN118036097B (en) | Consumable anti-counterfeiting authentication implementation method based on PUF | |
JP2001036522A (en) | Method for authenticating qualification using variable authentication information | |
KR20180069425A (en) | method of biometrics using session key and user terminal and the verification server performing the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08777236 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08777236 Country of ref document: EP Kind code of ref document: A1 |