专利摘要:
Method for authenticating a user (1) by means of a terminal (2) comprising acquisition means (3) capable of performing a biometric acquisition, comprising the following steps: presentation by means of acquisition (3) by the user (1) of an organ (4) to be checked by biometric comparison (8), and triggering by the user (1) of a biometric acquisition in order to obtain an acquisition data item (5), biometric comparison (8) of the biometric acquisition (5) with a pre-recorded reference datum (6), the user (1) being authenticated if the biometric comparison (8) is positive and not authenticated otherwise, the method further comprising the following steps: providing the user (1) with indicative means (7) of a first angle (X), application by the user (1) of a corrective rotation at a second angle (Y) of such in order to match acquisition data (5) of said second angle (Y), and in that in the biometric comparison step (8) the reference datum (6) is associated with the first angle (X), the biometric comparison (8) being positive if the second angle (Y) is substantially equal to the first angle (X) . Device capable of implementing such a method.
公开号:FR3028980A1
申请号:FR1402618
申请日:2014-11-20
公开日:2016-05-27
发明作者:Cedric Barreau;Bruno Javary
申请人:Oberthur Technologies SA;
IPC主号:
专利说明:

[0001] The present invention relates to a device for authenticating a user.
[0002] In the technical field of personal authentication, it is known to use a biometric authentication method. Such a method verifies, by analyzing a representation of an organ, that a user is an authorized person. Many organs are candidates in that they are specific to a person. Thus such an organ can be the finger, the eye, the palm, the face, & c. A biometric authentication method, in a known manner, performs, during a first preliminary and preparatory phase, typically performed only once, a first acquisition of the organ, from a person whose identity is certain. , and extracts a representation which one names reference data. This reference data is stored, advantageously securely, on a memory medium, preferably a secure element associated with said person. In a second operational phase, repeated as often as necessary, a user, who claims to be said person, attempts to authenticate. The biometric authentication method performs a second acquisition of the organ, from the user, and extracts a representation that is called acquisition data. The biometric authentication method then performs a biometric comparison to determine whether the acquisition data and the reference data are two representations of the same organ. If this comparison is positive, the user is authenticated and is considered to be the person. The problem that can arise, and that the invention proposes to solve, is that an "intermediary" or "man in the middle" ("man in the middle" in English) intercepts and copies a piece of data of acquisition or a of its representations during an operational phase, typically by intercepting a communication between the acquisition means performing the biometric acquisition and a comparator performing the biometric comparison, and then submitting this acquisition data, bypassing the step acquisition on the organ, in an attempt to improperly obtain a positive authentication. It is desirable to modify the biometric authentication method so that such a scenario is defeated. For this, the principle of the invention is to introduce at least one diversity, in order to create at least one variation from one authentication to another and thus avoid a simple replay, by submitting previously stolen information, and therefore identical, unduly leads to positive authentication.
[0003] The basis of this diversity is to introduce a rotation of an angle varying randomly from one authentication to another. This angle is indicated to the user, who takes this into account and introduces it when performing the biometric acquisition and obtaining the acquisition data. The biometric comparator knows this angle and can suppress its influence during the biometric comparison. It is thus possible to perform a biometric authentication method, with at least the same level of security, for which the acquisition data varies, depending on said angle, from one authentication to another. The subject of the invention is a method of authenticating a user by means of a terminal comprising acquisition means capable of performing a biometric acquisition, comprising the following steps: presentation by means of acquisition by the user of an organ to be controlled by biometric comparison, and triggering by the user of a biometric acquisition in order to obtain acquisition data, biometric comparison of the acquisition data with a pre-recorded reference data, the user being authenticated if the biometric comparison is positive and not authenticated otherwise, the method further comprising the following steps: providing the user with a means indicative of a first angle, application by the user of a corrective rotation according to a second angle so as to match an acquisition data of said second angle, and in that in the biometric comparison step the reference datum is accompanied by the first angle, the biometric comparison being positive if the second angle is substantially equal to the first angle. According to another characteristic, the first angle is non-zero.
[0004] According to another characteristic, the first angle is substantially equal to the second angle according to an angular tolerance at least equal to the tolerance of the biometric comparison and at most equal to a tolerance equal to 90 °, preferably equal to 15 °, and even more preferentially 15 equal to the tolerance of the biometric comparison. According to another characteristic, an acquisition datum or a datum datum is accompanied by an angle in that it is accompanied by said angle or by being obtained after applying a rotation of a datum. angle. According to another characteristic, the indicative means is visual and is rotated from the first angle. According to another characteristic, the visual indicative means is scrambled so as to oppose an interpretation by an automaton, by a captcha type processing. According to another characteristic, the corrective rotation is applied to the organ. According to another characteristic, the corrective rotation 30 is applied to the acquisition means. According to another characteristic, the corrective rotation is applied to the terminal. According to another characteristic, the acquisition means is rotatable relative to the terminal.
[0005] According to another characteristic, the method further comprises: prior communication to the user of a secret means necessary to determine the second angle. According to another characteristic, the secret means is a function, and in the biometric comparison step the reference datum is accompanied by the image of the first angle by said function. According to another characteristic, the function adds a third angle, preferably a multiple of 45 °. According to another characteristic, the indicative means comprises several visual indicative means, each visual indicative means being indicative of a different first angle and each visual indicative means being associated with a different marker, the secret means is information, such as a category of markers, allowing the user to determine a particular mark, and in the biometric comparison step the biometric reference data is matched with the first angle associated with said particular mark. According to another characteristic, the first angle is produced by a random generator, preferably provided by a secure element. The invention further relates to an authentication device 20 comprising means for implementing such a method. According to another characteristic, the acquisition means is rotatable relative to the terminal and able to measure the angle of said rotation.
[0006] Other features, details and advantages of the invention will emerge more clearly from the detailed description given below as an indication in connection with drawings in which: FIG. 1 shows a schematic diagram of the principle of the invention FIG. 2 illustrates the principle of an indicative means comprising several first angles. A method of authenticating a user 1 uses a terminal 2 in a known manner. This terminal 2 may be a ticket dispenser, a computer kiosk, a personal computer or, advantageously, a portable device such as a smartphone or the like. Said terminal 2 comprises an acquisition means 3 capable of performing a biometric acquisition 5. Said acquisition means 3 is thus a specific sensor capable of performing a biometric acquisition, such as a plate fingerprint sensor or 5 to slip, or a dedicated iridial or retinal impression sensor, or a generic sensor such as a camera, a camera or a microphone for acquisition of a voice sample. A generic sensor for a visual representation of an organ can advantageously reuse an existing sensor on the terminal 2: the webcam of a personal computer or the camera present on a smartphone. By means of this terminal 2, it is possible to carry out an authentication method comprising the following successive steps. According to a first step, often initiator of the method, the user 1 presents to the acquisition means 3 an organ 4 object of the biometric control. Depending on the type of control, assumed known to the user 1, the user 1 presents his finger, his eye, etc. The user 1 triggers the realization by the terminal 2 of a biometric acquisition, realizing an acquisition and a treatment of said organ 4 presented. Said triggering can advantageously be automatic and initiated by the sole detection of the presence of the organ 4 in the field of perception of the acquisition means 3. The result of the acquisition by the acquisition means 3 of a representation of the organ 4 and its possible treatment by the terminal 2 produces a representation of the organ 4 that is called acquisition data 5.
[0007] Thus in the illustrative case of a fingerprint, retinal or iridial it is achieved an acquisition of an image of the finger or the eye, or more precisely the retina or the iris. Conventional processing consists in extracting from this image characteristic elements, each with their own position and still called minutiae, which are sufficient to perform a biometric comparison. These minutiae are much less heavy in quantity of information and advantageously require less memory for to be stored.
[0008] In a second step, a biometric comparison 8 is made between the acquisition data 5 that has just been obtained from a user 1 and a pre-recorded reference data 6 from a person. The reference datum 6 has been previously produced, advantageously in a context where the identity of the person is certain. The reference datum 6 is obtained, for example, according to a method of acquisition and processing similar to that used and described previously for the acquisition datum 5. A biometric comparison 8 is, in known manner, able to determine with a good certainty, if the member 4 represented by the acquisition data 5 is the same organ as that represented by the reference data 6 and 15 thus to determine if the user 1 is the person he claims to be . The biometric comparison 8 thus renders a binary result: YES the acquisition data item 5 corresponds to the reference datum 6 and the user 1 can be considered to be the person and be authenticated, or the acquisition data item 5 does not correspond not to reference data 6 and user 1 can not be authenticated as the person. As illustrated in Figure 1, the invention completes this method by adding the following steps. According to a first additional step, which is necessarily a preliminary step, the method provides the user 1 with means indicative of a first angle X. In a second step, the user 1, when obtaining the acquisition data 5, applies corrective rotation at a second angle Y such that the acquisition data 5 is matched with said second angle Y. In addition, the method modifies the biometric comparison step 8 so that the reference datum 6 is accompanied by first angle X, that which has just been provided to the user 1 via the indicative means 7 and that the biometric comparison 8 is positive if the second angle Y is substantially equal to the first angle X. Thus, if the user 1 is the person and applies a corrective rotation of a second angle Y substantially equal to the first angle X, known to the user by the indicative means 7, a biometric comparison 8 will make a result p ositif. If for any reason, for example linked to an attempted fraud, the user 1 is not able to take knowledge of the first angle X and / or to apply a corrective rotation at an angle substantially equal to the first angle X, a negative comparison will be obtained. In order not to trivially reduce the interest of the authentication method, the first angle X is advantageously non-zero. It is necessary to define what is meant by substantially equal, for the first angle X and the second angle Y. A certain tolerance is advantageous in that it makes it possible to accommodate unavoidable handling errors. Thus, when the second angle Y is introduced by the user 1, errors of assessment of the user 1 are possible. In addition, a biometric comparator 8, by its mode of operation, has a certain tolerance. The method according to the invention, reusing such a biometric comparator 8 can not claim a lesser tolerance. Also the tolerance of the biometric comparison 8 is a lower limit of the tolerance of the authentication method. An algorithm conventionally used to compare minutiae extracted from a fingerprint, retinal or iridial has a tolerance typically equal to 15 °. Such a tolerance is largely sufficient to mask manipulation and / or appreciation errors as previously mentioned. For the upper limit of the tolerance, it should not be too big at the risk of losing any discriminating value of the process. Also the maximum tolerance is advantageously reduced to at least 90 °. The lower this tolerance, the more selective the authentication process. Thus, the maximum tolerance is preferably equal to 15 ° and still more preferably to the minimum tolerance, ie the tolerance of the biometric comparison 8. If, according to the prior art, the biometric comparison 8 is performed between an acquisition data item 5 and a reference datum 6 both obtained at the same angle, on the contrary the biometric comparison 8 according to the invention is performed between an acquisition data 5 with a second angle Y and a reference datum 6 with a first angle X. It is verified during the biometric comparison 8 that the first angle X and the second angle Y 10 correspond and that the biometric acquisition data 5 and the reference datum 6 correspond. The introduction of at least a first angle X provided and that the user 1 should return in the form of a corrective rotation of a second angle Y, is intended to complicate the task of a fraudster. According to the embodiments, it appears that the task of an authorized user 1 is advantageously not or little complicated by the method. It has been seen that the reference datum 6 has an angle X and that the corrective rotation is intended to match the acquisition datum 5 by an angle Y. This assortment may take several forms. According to a first embodiment, an acquisition data item 5, or a biometric reference datum item 6, is associated with an angle X, Y in that it is accompanied by said angle X, Y. In this case, the biometric comparator 8 receives as input an acquisition data item 5 made in a conventional manner, as in the prior art, a second angle Y, indicated by the user 1, a first angle X communicated by the method and a reference data 30 6, produced in a conventional manner, as in the prior art. The biometric comparison 8 independently compares on the one hand the acquisition data 5 with the reference datum 6 as in the prior art and on the other hand the first angle X and the second angle Y. The result of the biometric comparison 8 is a logical AND between the two previous independent comparisons. According to another embodiment, realizing a more intimate marriage with the angle, an acquisition datum 5, a reference datum 6 respectively, is associated with an angle X, Y in that it is obtained after applying a rotation of an angle X, Y to the organ 4 to be checked by biometric comparison or to its representation. According to this mode, where the angle X, Y is embedded in the acquisition data item 5, respectively the reference datum 6, the biometric comparison 8 receives an acquisition data 5 "turned" by a second angle Y and compares it with a reference datum 6 "turned" by a first angle X.
[0009] According to another composite embodiment, the biometric comparison 8 receives one of the data, among the acquisition datum 5 or the reference datum 6, "rotated" by one angle, and the other datum accompanied by an angle nested.
[0010] According to the embodiment, the rotation of an angle X, Y can be applied at different stages. According to a first mode, the rotation can be applied during the acquisition of the member 4 by a relative rotation of the member 4 relative to the sensor 3, the acquisition being performed with a member 4 rotated. According to another mode, the rotation can be applied once the acquisition is made, by applying by calculation, a rotation to the representation of the member 4. Thus, in the case of an image sensor, the image of the organ can be rotated by application of a rotation algorithm. According to yet another mode, the rotation can be applied once the processing of this representation has been performed. Thus in the illustrative case of a minutia extraction processing with their positions, the positions of the minutiae of a rotated representation can be obtained by applying a rotation to the minutiae extracted from a straight representation. These different modes can be combined. Thus the acquisition data 5 can be rotated in one mode and the reference datum 6 can be rotated in another, different or identical mode. The first angle X must be provided to the user 1 so that the latter determines the second angle Y. This supply can be made by any means. Also the indicative means 7 of the first angle X can be very varied. Advantageously, such indicative means 7 is provided on a reproduction means of the terminal 2: loudspeaker, screen or equivalent.
[0011] Thus, according to one embodiment, the indicative means 7 may comprise a sound message, for example produced by a speech synthesizer, indicating a value of the first angle X. According to another embodiment, the indicative means 7 may be visual and can include a digital display 10 of a value of the first angle X. The visual and sound modes can still be combined: some of the information is provided by the sound modality, while another part of the information is provided by the visual modality. Thus, for example, the value of the angle X may be indicated by a sound message, while the unit (degree, turn, etc.) is displayed visually. According to another embodiment, the indicative means 7 may be visual and may appear analogically the first angle X, for example by means of a sector represented by two segments. According to yet another embodiment, the indicative means 7 is a visual indicative means turned from the first angle X. Such visual indicative means may be a photograph, a drawing or a text. In order that the rotation can be seen by a user 1, the visual indicative means advantageously has a reference orientation with respect to which the angle X can be figured. For example, a car design, seen from the side, whose line passing through the two wheels indicates a horizontal reference. Similarly, a photo of a lamppost that is expected to have its axis vertical. Such a symbol may be or include a word or line of text, as shown in FIG. 1, whose base line, usually horizontal, provides a reference. According to one embodiment, the visual indication means is scrambled by a "captcha" type processing 9. This is particularly useful in view of the problem that one wishes to solve, namely to prevent a partially or totally automatic replay. A "captcha" type of treatment comprises additional superimposed elements 9 intended to scramble a visual indicative means of an indicative means 7.
[0012] These additional elements 9 are designed to oppose an interpretation by an automaton, by luring a recognition algorithm, while being easily sorted by a human being. Thus access to the first angle X is complicated, or even made impossible, for a fraudster using a recognition software, while the inconvenience remains minimal for a human user 1 seeing said graphical visual indicative means. It has been previously seen that user 1 matches acquisition data 5 by a second angle Y by means of a corrective rotation. This corrective rotation, intended to indicate to the terminal 2 a second angle Y can take different forms. According to a first embodiment, the second angle Y is indicated to the terminal 2 and to the method by any input means. Thus the user 1 can use a keyboard to type a value of the angle Y, or with two keys "+" and "-" enter a graph or a sector indicative of the value of the angle Y. The user 1 can still use a pointing device such as a mouse or a touch screen to select a value of the angle Y. The user 1 can still have a potentiometer, real or virtual, to provide a value of the angle Y. A means for user 1 to match a second angle Y to an acquisition data item 5 is to perform a relative corrective rotation applied to said acquisition data at an angle equal to the second angle Y For this, several possibilities are offered. According to a first embodiment, the corrective rotation is applied to the member 4. In this mode, the user 1 turns the organ 4 during its presentation to the acquisition means 3 during the biometric acquisition to realize the acquisition data 5. Thus the acquisition means 3 remains stationary and the user 1 turns, 3028980 12 along an axis of rotation substantially perpendicular to the plane of the acquisition means 3, his finger in the case of a fingerprint , or its head in the case of a retinal, iridial or facial imprint, for presenting the finger, the eye or the face to the sensor 3, rotated by an angle Y. According to another embodiment, alternative or complementary of the above, the corrective rotation is applied to the acquisition means 3. In this mode, the user 1 turns the acquisition means 3 before presenting the member 4 in the usual way, that is, not turned, by means of acquisition 3 to achieve acquisition data 5 Thus the member 4 remains stationary and the user 1 rotates, according to an axis of rotation substantially perpendicular to the plane of the acquisition means 3, the acquisition means 3 of an angle Y. According to yet another embodiment of realization, the corrective rotation is applied to the terminal 2 in full. This embodiment can be envisaged in all cases, and more particularly when the terminal 2 is a portable terminal 20, for example an ordiphone. It should be noted that according to the configuration of the terminal 2, the acquisition means 3 can be secured to the terminal 2 and the application of a rotation to the terminal 2 is a means of applying this same rotation to the acquisition means 3 , and thus overlaps some embodiments of the preceding embodiments (rotation of the acquisition means 3). The corrective rotation, whether applied to the member 4, to the acquisition means 3 or to the terminal 2, enables the user 1, owner of said member 4, to enter a second angle Y. note that the angle of the corrective rotation may be equal to a second angle Y or, according to a contrary convention between user 1 and method, equal to the opposite of the second angle Y, or to the choice equal to the angle Y or at its opposite.
[0013] Some of the embodiments of the corrective rotation have the effect of simultaneously applying a rotation to the indicative means 7. This is the case for a rotation of the terminal 2, when the indicative means 7 is visual and is displayed on a screen. display means integral with the terminal 2. This is still the case for a rotation of the member 4, when the latter is the eye / iris / retina or the face, and a rotation of the member 4 causes a According to a particularly advantageous embodiment, in the embodiments also rotating the indicative means 7, the second angle Y of the corrective rotation 10 is advantageously such that it is possible to rotate the user's eye. that it "rightens" the indicative means 7 in a reference orientation. Thus the task of the user 1 is greatly simplified, in that it applies a corrective rotation, by turning its eye 4 or the terminal 2, and in doing so turns the indicative means 7, 15 until placing the latter in a reference orientation that cancels the first angle X. In this embodiment, the user 1 does not have to measure or know a value of the first angle X, but performs, analogically, a corrective rotation, of the 4 or the terminal 2, up to 20 see the indicative means 7 in its reference orientation, corresponding to a first angle X zero. In doing so, user 1 "copies" analogically the first angle X in the second angle Y of the corrective rotation. It has been previously seen that the acquisition means 3 can be fixed in rotation to the terminal 2. According to an alternative embodiment, the acquisition means 3 is rotatable relative to the terminal 2. Such an embodiment can for example, to be used as follows: the user 1 turns the terminal 2 by a second angle Y, as before so as to straighten the indicative means 7. The acquisition means 3 is then rotated, manually or automatically, by an angle opposite the second angle Y, so that the acquisition means 3 returns to its initial orientation, corresponding to the initial orientation or reference of the terminal 2. Such a procedure is advantageous for some biometric sensors, which work better in a unique reference orientation. This is the case, for example, of a sliding fingerprint sensor 3028980. Such a known sensor comprises a line image sensor on which a finger must be slid, substantially perpendicular to said line. Both the operation of such a sensor, and the drive of a user 1 to its use, are significantly improved when the line is in a constant orientation, typically horizontal. In such an embodiment, the terminal 2 or the acquisition means 3 advantageously comprises an angular sensor 10 capable of measuring the angle at which the acquisition means 3 is rotated relative to the terminal 2. This angular sensor, which measures here an angle equal to the opposite of the second angle Y allows the process to know this second angle Y and thus match the acquisition data 5 of this second angle Y. The acquisition in this case is performed "right" and the angle Y is provided with acquisition data 5, without nesting. It has been seen how an additional angle can be used to enhance the security of an authentication process. The security of such a method can be further enhanced by the use of a secret means, pre-shared between the method and the user 1. The secret means is previously communicated to the user 1, and is necessary for the user. determine the second angle Y. This communication, like a PIN code, is advantageously secure, in order to be sure to address the person. A fraudster has little or no means of knowing this secret means and thus the determination of the second angle Y is still complicated for a fraudster. The purpose of the secret means is to allow the user 1 to modify the second angle Y in a predictable manner and thus verifiable by the method. Several examples will be described of such a secret means.
[0014] According to a first embodiment, the secret means is a function F. This function F is known from the method and has been previously communicated to the user 1. In the biometric comparison step 8, the reference datum 6 is 3028980. with a first angle, image F (X) of the first angle X, by said function F. The user 1 on his side, determines said first angle X via the indicative means 7 and determines a second angle Y by applying the same F function at the first angle X and uses this second angle Y = F (X) when obtaining the acquisition data. Thus the biometric comparison 8 compares an acquisition data 5 with a second angle Y = F (X), with a reference datum 6 with an angle F (X). If the same function F is used on both sides, the compared angles are identical and the comparison is positive. According to one embodiment, the function F adds a third angle Z, according to the formula F (x) = x + Z. In this case the shared secret is the value of the third angle Z.
[0015] The user 1, when applying the corrective rotation, performs a corrective rotation of a second angle Y equal to the angle X + Z. In order for this practice to be simple for the user 1, the third angle Z is advantageously an angle easy to imagine and use, such as a multiple angle of 45 °. Thus, for example, for a third angle Z equal to 180 °, the user 1 applies a rotation of angle X and then applies a half-turn. In the case where the indicative means 7 rotates with the corrective rotation, the corrective rotation 25 is advantageously such that it "straighten" the indicative means 7 so that it ends aligned with its reference orientation, but at the same time. back, upside down. According to another embodiment, more particularly illustrated in FIG. 2, the indicative means 7 comprises several visual indicative means 7a-c, each visual indicative means 7a-c being indicative of a different first angle X, Xa-c and each visual indicative means 7a-c being associated with a different landmark. In this case the secret means 35 is information, such as a category of marks, allowing the user 1 to determine a particular marker, corresponding to the "good" indicative visual means 7a-c.
[0016] 3028980 16 A fraudster is thus in the presence of a variety of visual indicative means 7a-c and thus possible first angles Xac. On the contrary, knowledge of the secret means enables the user 1 to immediately determine the "good" visual indicative means and thus the "good" first angle Xa-c. On the process side, the "good" first angle Xa-c, the first angle X associated with the particular landmark that can be discriminated by the user 1 using the secret means, is known and matches the reference datum. 6 during the biometric comparison step 8. Thus, according to the illustrative example of FIG. 2, an indicative means 7, here displayed on the screen of a terminal 2 shown in three orientations Xa, Xb, Xc, comprises three different visual indicative means 7a, 7b, 7c. Here a boat 7a is turned from a first angle-Xa and appears straightened horizontally after rotation of the terminal 2 by an angle Xa, a house 7b is rotated by a first angle -Xb (here substantially zero) and a 7c car is turned from a 20 first angle -Xc. Thus the indicative means 7 defines three first angles Xa, Xb, Xc, among which a fraudster is struggling to determine the "good". Here the iondiocative visual means serve as landmarks and each angle Xa, Xb, Xc is thus associated with a different landmark 7a, 7b, 7c. Color, or any other visual indication, could also serve as a marker. The user 1 has additional information contained in the secret means allowing him to determine the "good" mark 7a, 7b, 7c and thus the right first angle Xa, Xb, Xc. Thus here the secret means is, for example, the car mark 7c. User 1 then determines the correct first angle Xc associated with the car mark 7c. Advantageously, the secret means more generally comprises a category of reference such as: rolling means. Thus, it is possible to vary the reference object from one authentication to another. In order to secure the process, the first angle X, which is an important component of the security of the process, is advantageously random. For this, the first angle X may advantageously be produced by a random generator. Such random production ensures that the first angle X is known only at the moment when the indicative means 7 is supplied to the user 1, ie at the time of acquisition.
[0017] This advantageously entails that said first angle X can not be known in advance and thus can not be anticipated by a fraudster. A secure element, of the microcircuit type, for example present on a SIM card of a smartphone, on a USB key or a memory card, can advantageously include such a random generator. The term "secure element" refers to a secure microcircuit, known to a person skilled in the art, in the terms "secure element", "secure element", "Secure Element", still abbreviated "SE" or "Embedded Secure Element". abbreviated "ESE". Such a secure element, advantageously the same as that comprising a random generator, advantageously stores the reference datum 6 and carries out the biometric comparison 8. Such a function is known in the field of secure elements and advantageously makes it possible to use a datum of reference 6 to perform a biometric comparison 8 and this without the reference datum 6, leaves the secure element, thus advantageously limiting the risks of disclosure or dissemination of said reference datum 6. The invention also relates to a device , such a terminal 2, adapted to implement such an authentication method.
权利要求:
Claims (15)
[0001]
REVENDICATIONS1. A method of authenticating a user (1) by means of a terminal (2) comprising acquisition means (3) capable of performing a biometric acquisition, comprising the following steps: - presentation by means of acquisition (3 ) by the user (1) of an organ (4) to be checked by biometric comparison (8), and triggering by the user (1) of a biometric acquisition in order to obtain acquisition data (5). biometric comparison (8) of the acquisition data (5) with a pre-recorded reference data item (6), the user (1) being authenticated if the biometric comparison (8) is positive and not authenticated otherwise, characterized in that the method further comprises the steps of: - providing the user (1) with indicative means (7) of a first angle (X), - application by the user (1) of a corrective rotation according to a second angle (Y) so as to match an acquisition datum (5) of the di t is the second angle (Y), and in that in the biometric comparison step (8) the reference datum (6) is associated with the first angle (X), the biometric comparison (8) being positive if the second angle (Y) is substantially equal to the first angle (X).
[0002]
2. The method of claim 1, wherein the first angle (X) is non-zero.
[0003]
3. Method according to any one of claims 1 or 2, wherein the first angle X is substantially equal to the second angle Y in an angular tolerance at least equal to the tolerance of the biometric comparison (8) and at most equal to one tolerance equal to 90 °, preferably equal to 15 °, and even more preferably equal to the tolerance of the biometric comparison (8). 3028980 19
[0004]
4. Method according to any one of claims 1 to 3, wherein an acquisition datum (5), respectively a datum of reference (6), is accompanied by an angle (X, Y) in that it is accompanied by said angle (X, Y) or obtained after applying a rotation of an angle (X, Y).
[0005]
5. Method according to any one of claims 1 to 4, wherein the indicative means (7) is visual and is rotated from the first angle (X).
[0006]
6. The method of claim 5, wherein the visual indicative means is scrambled so as to oppose an interpretation by an automaton, by a "captcha" type of processing.
[0007]
Method according to any one of claims 1 to 6, wherein the corrective rotation is applied to the member (4) and / or to the acquisition means (3) and / or to the terminal (2).
[0008]
8. The method of claim 7, wherein the acquisition means (3) is rotatable relative to the terminal (2). 25
[0009]
9. Method according to any one of claims 1 to 8, further comprising: - prior communication to the user (1) of a secret means necessary to determine the second angle (Y). 30
[0010]
The method according to claim 9, wherein the secret means is a function, and in that in the biometric comparison step (8) the reference data (6) is accompanied by the image of the first angle (X) by said function. 35
[0011]
11. The method of claim 10, wherein the function adds a third angle (Z), preferably multiple of 45 °.
[0012]
12. The method according to claim 9, wherein the indicative means 3028980 (7) comprises several visual indicative means (7a-c), each visual indicative means (7a-c) being indicative of a first angle (X, Xa-c). ) and each visual indicative means (7a-c) being associated with a different landmark, and wherein the secret means is information, such as a category of landmarks, allowing the user (1) to determine a particular landmark and in the biometric comparison step (8), the reference datum (6) is associated with the first angle (X, Xa-c) associated with the particular reference mark.
[0013]
13. A method according to any one of claims 1 to 12, wherein the first angle (X) is produced by a random generator, preferably provided by a secure element.
[0014]
14. Authentication device comprising means for implementing the method according to any one of the preceding claims.
[0015]
15. Device according to claim 14, wherein the acquisition means (3) is rotatable relative to the terminal (2) and able to measure the angle of said rotation.
类似技术:
公开号 | 公开日 | 专利标题
FR3028980A1|2016-05-27|METHOD AND DEVICE FOR AUTHENTICATING A USER
EP2502211B1|2019-01-02|Method and system for automatically checking the authenticity of an identity document
FR2997528A1|2014-05-02|BIOMETRIC IDENTIFICATION
EP2751739B1|2015-03-04|Detection of fraud for access control system of biometric type
EP3522053B1|2021-03-31|Method for authenticating a face
EP1266359B1|2005-02-09|Biometric identification method, portable electronic device and electronic device acquiring biometric data therefor
EP3008703B1|2021-03-31|Biometric identification method
WO2005050419A1|2005-06-02|Method for securing an image of a biometric authentication feature and method for authentication of a user with an image of a biometric authentication feature
FR2867577A1|2005-09-16|User data filling method for web page, involves verifying concordance between identification code of finger print and saved code, and filling user`s account and password relative to address if concordance is established
EP3543966A1|2019-09-25|Data enrolment method for verifying an identity, and method for verifying identity
EP3740903A1|2020-11-25|Method for authenticating a three-dimensional signature
EP1126419B1|2007-10-10|Method and apparatus for secure authentication of a person for access control by means of a captured biometric characteristic
EP3173998A1|2017-05-31|Payment method and device using the method
EP2048592A1|2009-04-15|Biometric authentication method, corresponding authentication system, program and terminal
EP3926499A1|2021-12-22|Method for authenticating a user on a client device
EP3655889B1|2021-03-31|Optical authentication method
FR3071942B1|2019-09-27|COMBINED BIOMETRIC RECOGNITION METHOD AND DEVICE
FR3064093B1|2019-08-30|METHOD FOR DIGITAL MESSAGING ASSOCIATING A MESSAGE TO A MATERIAL SUBJECT
EP2682900B1|2018-01-31|Signature authentication method
WO2013156728A1|2013-10-24|Security device and identity document
EP3425555A1|2019-01-09|Electronic device with biometric fingerprint sensor for input assistance or fingerprint reading
FR3110009A1|2021-11-12|Process for recognizing and identifying keys for the purpose of their duplication
FR3089320A1|2020-06-05|Biometric verification shared between a processor and a secure element
EP2423852A2|2012-02-29|Multimodal biometric identification method, system and device enabling the implementation thereof.
FR2958818A1|2011-10-14|Method for assuring biometric authentication of user for allowing user to carry out e.g. payment, involves comparing authentication data with reference biometric data, and providing authentication assertion when two data are same
同族专利:
公开号 | 公开日
US20160148075A1|2016-05-26|
FR3028980B1|2017-01-13|
US10157328B2|2018-12-18|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US6735695B1|1999-12-20|2004-05-11|International Business Machines Corporation|Methods and apparatus for restricting access of a user using random partial biometrics|
EP1480105A2|2003-05-23|2004-11-24|Activcard Inc.|Secure messaging for security token|
EP2065823A1|2007-11-26|2009-06-03|BIOMETRY.com AG|System and method for performing secure online transactions|
US7386401B2|1994-11-21|2008-06-10|Phatrat Technology, Llc|Helmet that reports impact information, and associated methods|
AU4388900A|2000-05-16|2001-11-26|Swisscom Mobile Ag|Biometric method for identification and authorisation|
US6773400B2|2002-04-01|2004-08-10|Philip Chidi Njemanze|Noninvasive transcranial doppler ultrasound face and object recognition testing system|
US20040158155A1|2002-04-01|2004-08-12|Njemanze Philip Chidi|Transcranial doppler spectroscopy for assessment of brain cognitive functions|
ES2564787T3|2003-04-10|2016-03-29|Ronald R. Erickson|Information carrier inserted for optical data|
US8109629B2|2003-10-09|2012-02-07|Ipventure, Inc.|Eyewear supporting electrical components and apparatus therefor|
US20050276454A1|2004-06-14|2005-12-15|Rodney Beatson|System and methods for transforming biometric image data to a consistent angle of inclination|
US20060157559A1|2004-07-07|2006-07-20|Levy Kenneth L|Systems and methods for document verification|
US20070052672A1|2005-09-08|2007-03-08|Swisscom Mobile Ag|Communication device, system and method|
DE102005043025B4|2005-09-09|2014-07-31|Continental Automotive Gmbh|Method and device for determining a rate of rotation|
US20070112287A1|2005-09-13|2007-05-17|Fancourt Craig L|System and method for detecting deviations in nominal gait patterns|
JP2008198028A|2007-02-14|2008-08-28|Sony Corp|Wearable device, authentication method and program|
US20110098083A1|2008-05-19|2011-04-28|Peter Lablans|Large, Ultra-Thin And Ultra-Light Connectable Display For A Computing Device|
US8520979B2|2008-08-19|2013-08-27|Digimarc Corporation|Methods and systems for content processing|
US8768313B2|2009-08-17|2014-07-01|Digimarc Corporation|Methods and systems for image or audio recognition processing|
AU2011220382A1|2010-02-28|2012-10-18|Microsoft Corporation|Local advertising content on an interactive head-mounted eyepiece|
US8944590B2|2010-07-02|2015-02-03|Mitsui Chemicals, Inc.|Electronic spectacle frames|
US8531355B2|2010-07-23|2013-09-10|Gregory A. Maltz|Unitized, vision-controlled, wireless eyeglass transceiver|
US9247212B2|2010-08-26|2016-01-26|Blast Motion Inc.|Intelligent motion capture element|
US8797358B1|2010-11-02|2014-08-05|Google Inc.|Optimizing display orientation|
US8645063B2|2010-12-22|2014-02-04|Custom Sensors & Technologies, Inc.|Method and system for initial quaternion and attitude estimation|
KR101660505B1|2011-03-08|2016-10-10|엘지전자 주식회사|Mobile terminal and control method therof|
US9256711B2|2011-07-05|2016-02-09|Saudi Arabian Oil Company|Systems, computer medium and computer-implemented methods for providing health information to employees via augmented reality display|
US9153074B2|2011-07-18|2015-10-06|Dylan T X Zhou|Wearable augmented reality eyeglass communication device including mobile phone and mobile computing via virtual touch screen gesture control and neuron command|
US9342610B2|2011-08-25|2016-05-17|Microsoft Technology Licensing, Llc|Portals: registered objects as virtualized, personalized displays|
US9367770B2|2011-08-30|2016-06-14|Digimarc Corporation|Methods and arrangements for identifying objects|
EP2631743B1|2012-02-24|2018-05-02|BlackBerry Limited|Handheld device with notification message viewing|
US9763592B2|2012-05-25|2017-09-19|Emotiv, Inc.|System and method for instructing a behavior change in a user|
US9599632B2|2012-06-22|2017-03-21|Fitbit, Inc.|Fitness monitoring device with altimeter|
US9275277B2|2013-02-22|2016-03-01|Kaiser Foundation Hospitals|Using a combination of 2D and 3D image data to determine hand features information|
JP6044403B2|2013-03-18|2016-12-14|富士通株式会社|Imaging apparatus, imaging method, and imaging program|
US9058480B2|2013-11-05|2015-06-16|Google Inc.|Directional touch unlocking for electronic devices|
US20160012465A1|2014-02-08|2016-01-14|Jeffrey A. Sharp|System and method for distributing, receiving, and using funds or credits and apparatus thereof|
JP6340838B2|2014-03-10|2018-06-13|富士通株式会社|Biometric authentication device, biometric authentication method, and program|
TWI520007B|2014-05-30|2016-02-01|由田新技股份有限公司|Eye-controlled password input apparatus, method, computer readable medium, and computer program product thereof|
DE102014109682B4|2014-07-10|2016-04-28|Bundesdruckerei Gmbh|Mobile terminal for collecting biometric data|
US10448867B2|2014-09-05|2019-10-22|Vision Service Plan|Wearable gait monitoring apparatus, systems, and related methods|
US9686272B2|2015-02-24|2017-06-20|Go Daddy Operating Company, LLC|Multi factor user authentication on multiple devices|
US9665896B2|2015-03-10|2017-05-30|Wal-Mart Stores, Inc.|System and method for age verification over mobile app for purchasing age-restricted items|
US9726904B1|2015-09-29|2017-08-08|Snap Inc.|Eyewear with conductive temple joint|JP6737062B2|2016-08-16|2020-08-05|富士ゼロックス株式会社|Program and information processing device|
CN106355072B|2016-08-19|2019-02-22|沈建国|The implementation method and its device of threedimensional model identifying code|
US10693644B2|2017-06-23|2020-06-23|International Business Machines Corporation|Single-input multifactor authentication|
KR102154103B1|2018-08-10|2020-09-10|주식회사 큐티티|Medical information transmission system using ultrasonic wave authentication|
法律状态:
2015-10-23| PLFP| Fee payment|Year of fee payment: 2 |
2016-05-27| PLSC| Publication of the preliminary search report|Effective date: 20160527 |
2016-10-24| PLFP| Fee payment|Year of fee payment: 3 |
2017-10-20| PLFP| Fee payment|Year of fee payment: 4 |
2018-10-24| PLFP| Fee payment|Year of fee payment: 5 |
2019-10-22| PLFP| Fee payment|Year of fee payment: 6 |
2020-03-27| CA| Change of address|Effective date: 20200218 |
2020-03-27| CD| Change of name or company name|Owner name: IDEMIA FRANCE, FR Effective date: 20200218 |
2020-03-27| CJ| Change in legal form|Effective date: 20200218 |
2020-10-21| PLFP| Fee payment|Year of fee payment: 7 |
2021-10-20| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
申请号 | 申请日 | 专利标题
FR1402618A|FR3028980B1|2014-11-20|2014-11-20|METHOD AND DEVICE FOR AUTHENTICATING A USER|FR1402618A| FR3028980B1|2014-11-20|2014-11-20|METHOD AND DEVICE FOR AUTHENTICATING A USER|
US14/946,083| US10157328B2|2014-11-20|2015-11-19|Method and device for authentification of a user|
[返回顶部]