|
RussianPatents.com
|
Method and device for determining authenticity of system user |
||||||||||||||||||||||
IPC classes for russian patent Method and device for determining authenticity of system user (RU 2371763):
|
FIELD: information technologies. SUBSTANCE: method and device for determining authenticity of the system user is based on comparing coordinates of peculiar features of papillary patterns of fingers at double finger touch of the receiving scanner surface. During the first registration there obtained are pictures of at least two fingerprints, and during the second registration there obtained is the picture of at least one fingerprint, at that, the second registration is performed upon "request-answer" protocol command. Authenticity is considered confirmed in case of non-linear dependence of coordinate offsets of peculiar features of the first and the second pictures. Device for implementing the method consists of a scanner, picture processing unit, database, comparing unit, protocol forming unit connected to the scanner, and comparing unit. Protocol forming unit display panel is located on the scanner front surface. EFFECT: ensuring high accuracy of authenticity and excluding the access of occasional persons to the protected system. 3 cl, 3 dwg
The invention relates to a method and apparatus for determining the authenticity of a user (or user group) of the protected system and can be used to prevent access to the system of unregistered persons, or persons intending to commit illegal actions in respect of the protected system. By system we mean a communication channel with the Bank, facility, office of public authorities... the Method is based on the comparison of fingerprints (or hands) of the user of the protected system with data stored in a database of electronic images of fingerprints or their models, for example in the form of coordinates (or coordinates and vectors) features of papillary lines. Known analogue of the invention, such as method and device for verification transaction (application WO 9618169 A1, IPC 7 G06K 9/00, priority from 01.12.1995,), which consists in the following. Through the device of "live" scanner (hereinafter referred to as scanner) get the fingerprint of the person conducting the transaction, after which convert the received fingerprint in the electronic image and remember it. Then the stored electronic image is compared with the electronic image corresponding to the fingerprint image of the person conducting the transaction. The transaction is permitted only when the electronic image is a fingerprint of a person, conducting the transaction, mainly corresponds to the stored fingerprint image of an individual who is authorized to conduct the transaction. In case of discrepancy between the image resolution on the transaction is not given. The disadvantage of this method is that it does not allow to distinguish the dummy coated with a papillary relief pattern from a live finger client and, in the absence of additional visual control, in the protected system can penetrate the attacker. Also known a method and a device for verifying the identity of the person, where the coordinate system of the device, the constant for fingerprint, is a control (application US 2004/0175023 A1, IPC G06K 9/00, publ. 09.09.2004 year). This invention is based on the idea of using a fingerprint in a permanent system of coordinates in such a way as to make possible the comparison of private attributes (features) of papillary pattern in a continuous coordinate system while checking the identity of the person. The disadvantage of this method is that it is not possible to distinguish the fake from the real (live) finger client. Also known a method of restricting access to the protected system described in the patent of Russian Federation №2289845, IPC G06F 21/20, G06F 21/06, publ. 20.12.2006, How is that getting a first fingerprint image of the user the system I, identify the user's identity by comparing the first image with a set of images from the database system, first determine the coordinates of the features of the first image in the coordinate system located on the receiving surface of the scanner, and put the first coordinates of the features in the database system, then get a second (repeated) the fingerprint image of the user in the same coordinate system, determine the second coordinates of the features of the second image, and enter the second coordinates of the features in the database system. Then determine the difference between the first and second coordinates for the same features of the first and second images, and in case of equality in difference to zero take a negative decision to admit a user to the system, and when zero is a positive decision. In comparison with the known technical solutions, this method provides a higher degree of system protection, but it also does not allow to distinguish the fake from the real one finger of the user of the system. Quite the same model with offset or with some rotation (relative to the coordinate system of the scanner) to enter into the system, and it identifies the attacker as a user and passes it to the system. This is the disadvantage of this method. Closest to izobreteny what is the method and the device, described in the patent of the Russian Federation No. 2216114 "Method, device, SIM card and system for determining the authenticity of a user or group of users, IPC NM 1/675, publ. 10.11.2003, the Method includes the entry and temporary storage of video data on the physical characteristics (fingerprints, eyes, voice, and so on) of the user (users group) at the entry point in the network (system), processing said information, resulting produce certain signs as biometric codes, storing biometric codes in tables biometric server and on the SIM card of the user, and at least one code in one table assign the appropriate user, the user input the SIM card containing at least one personal biometric code to the communication terminal, write, and temporary storage of the current video information at least one physical characteristic of the user by the image sensor, processing the temporarily stored current video information about the user in the result set and temporarily retain at least one specific characteristic as a biometric code, the determination of authenticity by comparing at least one current biometric user code with at least one stored biometric code,and when a positive comparison, the authenticity is confirmed, negative comparison authenticity is unconfirmed. This method is chosen as a prototype. The method is implemented using mobile devices for telephony, which contains the interface for placing the SIM card and the image sensor, memory means for storing biometric codes, processing tools for the establishment of specific characteristics, and means for comparing these certain characteristics with stored biometric codes. For the communication terminal uses a SIM card, a memory which stores at least one biometric code to determine the authenticity of a user. This device is selected as a prototype. The disadvantage of this method and device, it performs is the fact that they are vulnerable to imitation, i.e. there is the possibility of penetration into the system the attacker via the communication terminal. In addition, as a result of loss or theft of the SIM card, it contains information about biometric codes can be decoded by experts in the mercenary purposes. The problem solved by the present invention is to increase the degree of system protection and communication devices from accessing the system of unregistered persons. This is achieved by the fact that in the known method, based on the comparison of fingerprint images according to the of the invention: - when you first sign images are at least two fingerprints of the user, and when the second registration receive an image of at least one fingerprint, the same with one finger (or the same with fingerprints, if several) when you first register; the second registered fingerprint of the user of the system is done according to the command Protocol "challenge-response"; in the coordinate system of the scanner determine the direction and magnitude of displacement of the coordinates of the same features of the first and second images of the same fingerprint; in the case of the nonlinear dependence of the direction and magnitude of displacement of the coordinates of the same features of the authenticity of the user is considered confirmed, and in the case of a linear dependence of the authenticity of the user is considered unconfirmed. To solve the problem in the device for determining the authenticity of a user of the protected system containing electrically connected the scanner to register papillary pattern, the block image processing, database Comparer additionally contains a block formation Protocol "challenge - response", is electrically associated with the unit of comparison and a scanner, and a display panel command processing unit Protocol from Agena on the front panel of the scanner. Preferably, the device for determining the authenticity of a user of the protected system runs in a single package. The invention is illustrated in the drawings. Figure 1 shows the block diagram of a device that implements the inventive method. Figure 2 (a and b) shows the possible magnitude and direction of displacement of the coordinates of the same features of papillary pattern for identical fingerprints. A device for determining the authenticity of a user of the system contains (variant) the scanner 1 to the receptor surface 2 which follow the 3 fingers. In the device processing unit 4 converts images black and white picture of papillary lines of the fingers 3 in the electronic image, segmenting a single image to image individual fingerprints, if more than one, determines the coordinates of the features for each of papillary pattern of the finger (the end of papillary lines, split or merge lines) in the coordinate system of the scanner. The coordinate system of the scanner is on the receiving surface 2 of the scanner 1. The device contains a database 5 (memory), which stores previously registered electronic images of fingerprints of users and their models (in the form of coordinates of the features vectors of features...) and the active image, the floor is aimie during registration at the time of a user accessing the protected system. In addition, the device includes a Comparer 6, in which the comparison is stored in the database 5 images with an active image of the fingerprint, such as coordinates and vectors of features, the power generation Protocol "challenge - response" 7 forming teams for the user, for example, in the form of text that can fit on the display panel, for example, a miniature screen 8, located on the front (facing the viewer) panel of the scanner 1. Comparison of fingerprint images or the corresponding coordinates and/or vectors of the features described in the book: "Davide Maltoni, Dario Maio, Anil K. Jain. Handbook of Fingerprint Recognition. Springer-Verlag New York, 2003. pp.131-170". Blocks 1, 4, 5, 6 and 7 of the claimed device interconnected electrical connections 9 and can be made in a single body, including in the form of a mobile device (figure 1 case not shown). The implementation of the method using the device is as follows. Using the scanner 1 receives the first image of the at least two fingerprints of a user of the system (for example, four fingers of one hand, excluding the thumb). For convenience, the fingers can be numbered sequentially, starting with the thumb, i.e. in the specific example applied to the fingers from the 2nd to the 5th. The electrical signal from the scanner 1 to tie the 9 is transmitted to the processing unit 4, convert black and white drawings papillary patterns fingers in electronic images, which are then entered into the database 5. One electronic image may be segmented into multiple electronic images, if it contains images of several fingers. Then when you first sign up (when the first image) in the database 5 may be listed several individual images one finger each. The identity of the user identified by comparing the results of the first registration of four fingers with the existing database 5 the set of images in the unit of comparison 6. Identification methods are described in the same book and can be implemented as self-images, and the results of their computer processing. If the identification is found that the identity of the user registered in the system, then perform the subsequent steps of the method, otherwise, the system issues a denial of access. It should be noted here that when the user identification is not yet known, was applied to the scanner living finger or dummy. After identification of the user in the processing unit 4 in the coordinate system of the scanner first determine the coordinates of the features of the first (initial registration) images of fingers and put them into the database 5. Then with the help of block 7 in the Protocol call - reply to" form a team, for example, the phrase "Attach to the scanner 2nd and 3rd fingers"or "Attach to the scanner of the 3rd and 5th fingers, or other combination of one to three fingers and this phrase is displayed to the user on the display panel 8, which is located on the front panel of the scanner 1. The user applies the specified his fingers to the receptive surface 2 scanner 1 (second register), resulting in a second image of the fingerprint of the user, process it in unit 4, segments the image into images of individual fingers, if necessary, determine the second coordinates of features for the second finger image or for each finger separately in the coordinate system of the scanner 1, and enter the second coordinates in the database 5. The luminescence (audio message) command block 7 formation Protocol "challenge - response" is necessary to protect the system from hackers and intruders, who somehow took the fingerprints of real users. Registering the image, the system identifies the attacker as a real user and "miss" him to commit to them for further action. The presence of unit 7 makes it difficult for the attacker, since it is a priori not known which of the fingers need to put the scanner in the second register. Later in the coordinate system of the scanner determine the direction and magnitude of displacement of the coordinates of the same features of the first and second images of the same finger and in case of their non-linear dependence of the authenticity of the user is considered confirmed, and in the case of linear dependence is unconfirmed. The sameness of the fingers can be verified by comparison of the fingers, for example, after image segmentation of multiple fingers on images of individual fingers. The sequence of method completed. The following should be noted. The fake finger made on its surface relief pattern of papillary lines is usually made from rubber. When the application of the model to the receptive surface of the scanner to get an image on the basis of which define the characteristics of papillary pattern. In a double application of the model to the scanner and the subsequent combining of the received images of the same features may not match due to displacement and deformation of the model. If the shift dummy is formed in a natural way, the deformation is manifested by differences in the direction of pressing of the model. However, as studies have shown, the direction and magnitude of displacement of the coordinates of the features for the model are almost linear dependence. It shows AESA is the direction and magnitude of displacements of the features of papillary pattern of dummy equal. For a living finger, the skin of which has a greater elasticity, a zone-inhomogeneous elasticity, the direction and magnitude of displacement of the coordinates of the features of papillary pattern with double application of the finger to the receptive surface of the scanner with the following combination of images is clearly non-linear. Coordinate shift characteristics are significantly different or direction, or magnitude, and usually one and the other together. This fact is known. For rubber dummy (figa) on the example of two points of features shows the direction and displacement of their movements in a double latch finger to the receptive surface of the scanner. One feature from point a moves to point A1, and the other from point To point B1. For dummy takes place ravnopravnosti point displacements, and the approximate equality of displacements. It is estimated by the values of the arguments and modules of the vectors A-A1 and b-B1 formed by the coordinates of the same features. For dummy finger characteristic linear dependence of directions and displacements of points. For live finger (fig.2b) are significantly different as the direction of movement of the coordinates of the features, and the magnitude of their displacement, especially in obestochivanija, close to the periphery of the fingerprint. The vectors A-A1 and b-B1 characterized by a noticeable difference between the values of the arguments and modules, i.e. the observed nonlinear dependence of the directions and/or displacements of points. The applicant developed a criterion for evaluating the nonlinearity of the directions and/or displacements of the features of papillary pattern, allowing you to confidently distinguish the fake finger from a live finger. If you do not consciously apply extra effort to sameness touch your finger to the receptive surface of the scanner, the nonlinear dependence of the directions and magnitudes of displacements confidently observed. Thus, the proposed applicant's method and apparatus for determining the authenticity of a user of the system can significantly improve the security of the system against the ingress of attackers and with a high degree of certainty to authenticate identity. Furthermore, the method allows to detect the presence of dummy fingers, which currently nullify the protection special protective systems. It should be noted that the proposed method is based on fingerprinting, although some modifications instead of papillary patterns can be used and other biometrics, such as iris, voice, face, and other Important advantage of the proposed method which is also the that "key" to the protected system (fingers) is always with the user in contrast to the SIM card, which can be stolen or lost. According to the applicant, the proposed solution has novelty, distinctive signs, industrial applicability, not obvious from the prior art and may be protected by a patent for an invention. 1. The method of determining the authenticity of a user of the system, namely, that at the entry point into the system using a scanner to register the first image of a fingerprint of at least two fingers of a user of the system, identify the user's identity by comparing the first image with a set of images from the database system, the coordinate system of the scanner first determine the coordinates of the features of papillary pattern of the first image and store them in the database system registering a second image of a fingerprint of at least one finger of a user of the system, in the coordinate system of the scanner determine the second coordinate features of papillary pattern of the second image and store them in a database system the second check is done according to the command generated by the Protocol "challenge - response", then in the coordinate system of the scanner determine the direction and magnitude of displacement of the coordinates is the same person who values the first and second images of the same finger of the user of the system and in case of the nonlinear dependence of the fields and/or values of the displacements of the authenticity of the user is considered confirmed, and in the case of a linear dependence of the fields and/or values of the displacements of the authenticity of the user is considered unconfirmed. 2. A device for determining the authenticity of a user of the system containing electrically connected the scanner to register papillary pattern, the block image processing, database Comparer, characterized in that the device further comprises a unit for generating Protocol "challenge - response", is electrically associated with the unit of comparison and a scanner, and a display panel of the command block for the formation of the Protocol is located on the front panel of the scanner. 3. A device for determining the authenticity of a user of the system according to claim 2, characterized in that its constituent blocks are made in a single package.
|
|||||||||||||||||||||
| © 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |