The present invention relates generally to systems and methods for using biometric data to authenticate identity. More particularly, the invention relates to protecting access to personal biometric information through the use of transformation functions so that each application has a unique biometric template format.
In biometric authentication, a human or animal biological entity (e.g. finger, hand, eye, voice, etc.) is measured. Information unique to that individual is extracted and encoded in a standard data format called a biometric template. The initial extraction of biometric information and storage of that information in a database is called “enrollment”. To establish or verify identity, biometric information is extracted anew and a “recognition” template is generated and compared to one or more enrollment templates in the enrollment database.
Biometric data may be supplemented with secondary identification information such as name, address or identification number. The database is indexed by the secondary information, so that the user's enrollment template can be easily retrieved from a database. The recognition and enrollment templates are compared and, if a match is found, the user's identity is confirmed. Matching a recognition template to a single enrollment template that is retrieved from a database indexed by a secondary identifier is called “verification”.
In “identification” systems, secondary identifying information is not required to retrieve a specific enrollment template from a database. The recognition template is compared against all templates in an enrollment database. An index or identification number may be stored with each enrollment template, however, to link that template to individual identification or privilege information contained in a separate database. When an identification attempt is successful, the index or identification number of the matching enrollment template is typically returned or reported so it can be used in granting privileges. Identification is practical only if the biometric technology employed is extremely accurate and specific, so that false matches rarely occur.
A verification or identification system containing a large database of enrollment templates enables the establishment of a centralized authentication server, for use by a number of applications. Applications include maintaining physical security, information security, financial transactions, testing services, voter registration, immigration, entitlements, and so on.
Access to biometric databases by multiple applications raises data privacy concerns because biometric templates can be considered to be personal information that can be used for unauthorized purposes such as fraud. For example, stolen enrollment templates could be used to misrepresent personal identity. Furthermore, once a biometric template is compromised, it cannot be re-issued like a password can. Hence the theft of conventional biometric data is irreversible.
The iris recognition technology described in U.S. Pat. No. 4,641,349 (Flom et al.), U.S. Pat. No. 5,291,560, (Daugman), and U.S. Pat. Nos. 5,572,596 and 5,751,836 (Wildes et at.), provides a powerful recognition capability, using a standard biometric template format. Cryptographic techniques can be used to protect biometric data that is stored in various types of digital media. Techniques to protect integrity and privacy of digital data, including biometric data, are known to those skilled in the art. A specific technique is described in co-pending application Ser. No. 09/232,538 entitled “Method and Apparatus for Securely Transmitting and Authenticating Biometric Data Over a Network,” which is hereby incorporated by reference. One approach is to encrypt templates, but because the algorithms used to match templates, and thereby authenticate individual identity, cannot typically operate on encrypted templates, the templates must be decrypted prior to matching, exposing the decrypted template to attacks during the matching process. Furthermore, cryptographic algorithms can be computationally expensive and can have resulting deleterious effects on system performance.
Thus, techniques for protecting access to personal biometric information that overcomes the drawbacks of the prior art is needed.
The present invention discloses systems and methods for transforming a biometric template so that each application has a unique format. One transformed template cannot be successfully matched to a second template extracted from the same biologic entity unless the second template is transformed so that its format is identical to that of the first template. Thus a template generated in a format corresponding to application A could not be used to authenticate a user for application B because the enrollment database for application B would have a different format than the enrollment database for application A. The ability to create changeable, unique formats for biometric templates allows users to replace or re-issue biometric data that has been compromised.
The foregoing summary, as well as the following detailed description of preferred embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the invention, there is shown in the drawings exemplary constructions of the invention; however, the invention is not limited to the specific methods and instrumentalities disclosed. In the drawings:
a is a flow diagram of an enrollment portion of a biometric authentication method as is well-known in the art;
b is a flow diagram of a recognition portion of a biometric authentication method as is well-known in the art;
a is a flow diagram of an exemplary enrollment portion of an exemplary biometric authentication method in accordance with one aspect of the invention;
b is a flow diagram of an exemplary recognition portion of an exemplary biometric authentication method in accordance with one aspect of the invention;
Overview
a represents a portion of a typical biometric authentication technique 100a as is well-known in the art, in which enrollment data is captured and stored in a database. Referring now to
b represents a recognition portion of a typical biometric authentication technique 100b as is well-known in the art. At step 150, biometric data is captured. At step 154, a recognition template is created using methods well-known to those skilled in the art. At step 158, if the system is a verification system, secondary information is appended to the template. At step 162 the enrollment template for the user, as identified by the secondary identifier, is retrieved from the database of enrollment templates. At step 166, the enrollment template and the recognition template are compared. At step 170 if the recognition template matches the enrollment template, authentication is successful. At step 174, if the recognition template does not match the enrollment template, authentication fails.
If the system is an identification system the recognition template is compared with a template in the enrollment (template) database. At step 182, if the enrollment template and the recognition template match, authentication is successful. If the templates do not match, at step 186, the system checks to see if there are more templates in the database. If there are more templates in the database, processing returns to step 178 and the next template in the database is retrieved, and the process is repeated. If all the templates have been compared to the recognition template and no match has been found, authentication fails (step 190).
Application-Specific Biometric Templates
The present invention discloses systems and methods for transforming a biometric template so that each application that uses a biometric template to control access to the application, is associated with a unique template format. One transformed template cannot be successfully matched to a second template extracted from the same biologic entity unless the second template is transformed so that its format is substantially identical to that of the first template. Thus a template generated in a format corresponding to application A could not be used to authenticate a user for application B because the enrollment database for application B would have a different format than the enrollment database for application A.
a represents a flow diagram of an exemplary enrollment portion of a biometric authentication method 200a in accordance with one aspect of the present invention. The enrollment process 200a creates a database for an application, where the database contains enrollment templates having a format unique to the application. In method 200a biometric data from the user is processed to create a root enrollment template having a standard format. The root template is then transformed using a transformation function so that the format of the transformed template is specific to a particular application. An enrollment database of transformed templates for a particular application is generated as transformed templates are added to the database.
For example, and referring now to
FA (T1). At step 222, the resultant transformed template FA (T1) is then stored in a database DBA where DBA is the database of transformed enrollment templates for application A. The database DBA may be indexed by secondary identification information in a verification system.
The transformed template FA (T1) is unique for application A so that FA(T1) preferably will not successfully match with any other application, (such as for example, application B), even if root enrollment template T1 or is the root template for both applications. Likewise FB (T1) preferably will not successfully match with application A.
b represents a flow diagram of an exemplary recognition portion of a biometric authentication method 200b in accordance with one aspect of the present invention, in which a root recognition template is created and compared to a database of transformed enrollment templates for a particular application. The root recognition template is captured using methods well-known to those skilled in the art and transformed using a unique transformation function for the application. A matching function (described below) compares the transformed recognition template with one or more transformed templates from the enrollment database for the application. If a match is found, the authentication process is successful. If no match is found, the authentication process fails. The matching function compares the transformed recognition template with one (if the system is a verification system or more (if the system is an identification system) transformed enrollment templates from the application database.
For example, and referring now to
If the system is an identification system, a database key value, index, or identification number is appended to the biometric template. At step 276, the transformation function FA for application A is applied to the root recognition template, T1, with the resultant transformed template being represented by FA (T1). At step 278, the recognition template is compared with each template in the enrollment database until a match is found. At step 282, if a match is found, authentication is successful and an index, database key, or identification number is returned for use in retrieving corresponding secondary identification information from the secondary identification database. In an identification system such an index or database key is required unless all individuals in the enrollment database have identical privileges. Such a system is described in co-pending application entitled “Anonymous Biometric Authentication”, U.S. application Ser. No. 09/781,733. If no match is found for the recognition template, at step 286, the system determines if there are more templates in the database. If there are more templates in the database, the next template is retrieved at step 278 and the process is repeated. If all the templates in the database have been compared to the recognition temple and no match has been found, authentication fails (step 290).
It should be understood that although the example illustrates the generation of a single enrollment template, a plurality of templates may be generated, representing a plurality of samples of the same biometric entity, thus accounting for variation in the template generation process which may otherwise result in false rejections of the recognition template.
According to another aspect of the invention, the transformed enrollment and recognition template could be created directly, without ever generating the root template, by incorporating the transformation process into the template generation process, thus avoiding possible exposure of the root template to piracy.
A. The Matching Algorithm
A matching algorithm preferably compares at least two transformed templates. A determination is made as to whether the templates being compared came from the same biological entity. As stated above, the transformed template FA (T1) is unique for application A so that FA (T1) will not successfully match with templates from any other application, such as for example, application B, even if root enrollment template T1 is the root template used for both applications. Likewise FB (T1) will not successfully match with transformed templates for application A.
For example, consider biometric templates T1, and T2 derived from the same biologic entity (e.g. hand, finger, eye, etc.) so that an appropriate matching function M(T1, T2) has a value:
M(T1,T2)=1
if the templates match (i.e. they came from the same biologic entity) and
M(T1,T2)=0
if the templates do not match. If templates T1 and T2 are generated in the same way with the same format and come from the same biologic entity, preferably M(T1, T2) will have a value of 1, meaning that a match has been found.
According to one aspect of the invention, a transformation function FA applied to the root templates T1 and T2 creates transformed templates FA(T1) and FA(T2), having a unique format specific to application A. It is preferable that the transformation FA have the property that the matching process is invariant under the transformation, that is:
M(FA(T1),FA(T2))=M(T1,T2)
This invariance is desirable because it means that matching can be performed on the transformed templates, making it unnecessary to reverse the transformation, thereby recreating and exposing the root templates T1 and T2 prior to or during the matching process.
B. Properties of Transformation Functions
A template generated in a format corresponding to application A cannot be used to authenticate a user for application B because the enrollment database for application B has a different format than the enrollment database for application A. For example, if the transforming function for application A is FA and the transforming function for application B is FB, then as stated previously, comparison of the transformed template for application A with the transformed template for application B for the same biometric sample, will not be successfully authenticated. In mathematical terms:
M(FA(T1),FB(T2))=0
where T1 and T2 are root biometric samples from the same biological entity. This property assures that a template generated for one application A cannot be used for another application B.
However, in contrast, if the transformation function for application A is applied to both root biometric samples from the same biological entity, it is preferable that authentication is successful, or in mathematical terms:
M(FA(T1),FA(T2))=1 and
M(FB(T1),FB(T2))=1
If a template from Application A were used to attempt to authenticate to a database created for Application B, authentication fails. The user template is created with the format of Application A, while all the enrollment templates have the format of Application B. Preferably, the match function, when comparing templates with different formats, will nearly always return a zero, indicating no match. The probability of such a match returning a value of one will be no greater than the likelihood of two randomly selected templates matching, which is to say the likelihood will be no greater than the single-match false-accept probability of the biometric technology. In the case of exceptionally strong biometric technologies like iris recognition, this probability is extremely small. This is true even if the two templates T1 and T2 are from the same biologic entity and even if T1 and T2 are identical. Preferably, a template with format corresponding to FA will in general not match any template in the enrollment database of application B even if that database contains an enrolled template from the same biologic entity. Hence templates enrolled for application A, preferably, cannot be sold, stolen, licensed, or in other ways misappropriated to authenticate to Application B, or to create or expand an enrollment database for Application B because their format will be incompatible.
According to another aspect of the invention, as shown in
FB(T1)=FA,B(FA(T1))
or
FA,B=FBFA−1
where FB is the format created for application B and FA−1 is the inverse of transformation A, having the property that:
FA(FA−1(T))=T.
If user 1 has created an enrolled template for application A, user 1 can authorize the custodian of database DBA to make the user 1's enrolled template FA(T1) available to the application B database, DBB after application of transformation FA,B to FA(T1) to change the format of the application A-transformed template.
In this case, preferably, responsibility for definition and application of transformation FA,B can rest in a trusted format authority that maintains a registry of formats and defines and applies the transformations desired to convert templates from one format to another.
As shown in
Preferably, such transformations would be performed only if specifically requested and authorized by the user who produced the original template. According to one aspect of the invention the biometric itself is used to authorize the transfer of the enrollment template as shown in
At step 404 user 1 submits a request for transfer of user 1's enrollment template for application A (FA(T1)) from application A to application B. User 1 also submits a recognition template (FA(T2)) as evidence of authorization to the Template Authority at step 406. At step 408, the Template Authority submits the data request, along with user 1's recognition template, (FA(T2)) to the application A database DBA. At step 412, the recognition template (FA(T2)) is matched against the template (verification system) or templates (identification system) of the application A database DBA. If the Matching function is unsuccessful, the transfer is denied at step 420. If authorized, at step 424, user 1's enrollment template (FA(T1)) from the database for application A, DBA is returned to the Template Authority. At step 428, the template authority creates and applies the appropriate transformation FBFA−1 to convert user 1's enrollment template (FA(T1)) to the application B format. At step 432, the enrollment template FA,B(FA(T1)) is transmitted to the application B database, DBB and stored in database DBB.
Preferably, the database owner of application A database, DBA has no knowledge of the format of application B database DBB and vice versa. Preferably, both the transforms and their inverses are secret. Preferably, the format authority can control the transfer of templates from one database to another, avoiding the inconvenience and substantial cost of constant re-enrollments as biometric applications proliferate, yet protecting the privacy of individual users by protecting the templates and transformations.
In accordance with another aspect of the invention, and as illustrated in
Referring now to
Preferably, such a capability provides a powerful defense against loss or theft of biometric templates, either through observation of the transmission of templates across a network, or by penetration of an enrollment database. Optionally, periodic database transformation may be applied to existing databases so that if data is stolen, the stolen template will remain valid only until the next transformation is applied.
Authentication may be required in a client-server environment in which the user, running a client application, wishes to request a service (such as an electronic transaction) from a server application running on a different computer. The client and server computers may be interconnected through a local or wide area network. It is well known that replay attacks can be used in such a system, in which authentication data transmitted over a network is observed and recorded by an attacker and then replayed later in an attempt to gain access to the legitimate user's privileges. A defense against such attacks is the application of a “single use” transformation, that is only valid for a single transaction between the server and any client. In accordance with another aspect of the invention, a user whose converted template FA(T1) has been stored in Application A database DBA, initiates such a transaction by requesting an authentication server for a unique, single-use transformation number or transformation key. The authentication server may generate a random or otherwise unique number or key X. The server may transmit the unique number or key X to the client and approximately simultaneously applies a transformation function where the unique key X is part of the transformation function. In other words:
FX,A=FA Fx−1
The transformed template FX,A (T1) is saved, preferably in temporary storage. The unique key, the transformation function using the unique key X, FX, and the inverse of FX, FX−1 are deleted. The client upon receiving X, generates the function FX. A root biometric template T1 is then captured. The root biometric template T1 is transformed using transformation function FX, creating FX(T1). The transformed template FX(T1) is digitally signed using digital signature generating procedures that are well-known to those who are skilled in the art. The transformed template FX(T1) may optionally be encrypted or signed and encrypted. The signed and/or encrypted template is transmitted to the server. The server decrypts the template, if the template was encrypted, and verifies the integrity of the template using standard digital signature techniques. The server uses the preferably temporarily-stored transformation function FX,A to convert the user's template to a format compatible with application A database, DBA. In other words:
Thus, the client's template has been generated and transmitted to the server in a unique format valid for only a single transaction. Only the server has the information needed to render FX(T1) compatible with the enrollment database, DBA.
In accordance with another aspect of the invention, before the enrollment process is performed, the client application generates a unique transformation function FA. The client then creates a unique A transformation function FA. Transformation function FA is applied to the root enrollment template before the template is sent to the server. The transformation function FA, or information required to generate it may also be stored on a smart card or other form of portable media that the user may keep in his possession. This aspect of the invention enables the user to perform enrollments for a number of applications, each time saving the appropriate transformation in portable storage. Each template in the enrolled database will have its own unique format, known only to the user, thus enabling the user to have complete control over the use of the user's biometric data. The unique format of the biometric template is defined by the transformation stored on the portable media.
When authentication for application A is required, the user may capture an image with the appropriate biometric device and generate a root template. The user may then insert the portable media for the A application into an appropriate reader. Such devices are well-known in the art. The client application may read in the transformation function, and apply the transformation funciton to the root template. The transformed template may be sent to the server. It should be noted that, as previously discussed, the transformed template may be encrypted and digitally signed prior to sending to the server.
C. Data Structure for Biometric Templates
In one embodiment of the invention, a biometric template may include an array [t1 t2 t3 . . . tn] of independent data entities ti, where ti may be isolated binary bits or groups of bits. In one embodiment of the invention, the matching function is one that judges the similarity between two templates by examining corresponding independent data entities. An exemplary matching function is the function known as the Hamming Distance function, HD(T1, T2). The Hamming Distance function examines every pair of corresponding bits in templates T1 and T2 and counts the proportion of bits that differ between the two templates. The HD concept can be generalized to larger data entities, counting the number of corresponding entities that are not identical. For example, bits might be examined in groups of 2 bits, in which one bit represents a data value and the second bit a control bit indicating the validity of the data bit. In this case, the two data bits are compared and used in the HD calculation only if both control bits have a value confirming the validity of the data bits.
A preferred transformation function for an application A, FA used for transforming biometric templates in accordance with the present invention preferably does not alter the length of the template, change the value of the control bits or alter the number of matching (or mismatching) data bit pairs. A preferred transformation is permutation, that alters the position of some or all data bits. For a template including n independent entities, there are n! possible transformations. For example, if the data entities are 8-bit bytes, and there are 256 data bytes in each template, the number of possible permutations is 256!=8.6×10506. If the data entities are single bits, the number of permutations is 2048! that is approximately 105894. In one embodiment of the invention only transformations that alter the position of every data entity, are used, preventing the possibility of false matches. Such permutations are termed “derangements”. The number of possible derangements of 256 data elements, for example, is 6.2×10506. All such permutations possess readily-computed inverses.
Another form of transformation is based on the logical exclusive-or (XOR) function. In this transformation single bit values are XORed with a predefined mask function. If Ti is the ith data bit of template T and Mi is the ith mask bit then the ith transformed template bit is:
Fi(T)=Ti XOR Mi
The XOR function changes the value of any bit for which the corresponding mask bit is a 1. If the template has 2048 data bits, for example, the number of possible masks is 22048=3.2×10616. Preferably, the mask contains 1's in at least half its positions to avoid ineffective transformations that do not significantly affect the template. The number of such transformations is 1.6×10616. The XOR function serves as its own inverse.
It is also possible to combine transformations of different types. Thus a permutation could be followed by a logical XOR transformation, further enhancing the security of the templates and increasing the number of possible forms of transformation. The extremely high number of possible, unique transformations of the biometric template makes the scheme highly effective against brute force attacks.
It is noted that the foregoing examples have been provided merely for the purpose of explanation and are in no way to be construed as limiting of the present invention. While the invention has been described with reference to various embodiments, it is understood that the words which have been used herein are words of description and illustration, rather than words of limitation. Further, although the invention has been described herein with reference to particular means, materials and embodiments, the invention is not intended to be limited to the particulars disclosed herein; rather, the invention extends to all functionally equivalent structures, methods and uses, such as are within the scope of the appended claims. Those skilled in the art, having the benefit of the teachings of this specification, may effect numerous modifications thereto and changes may be made without departing from the scope and spirit of the invention in its aspects.
Number | Date | Country | |
---|---|---|---|
Parent | 09860991 | May 2001 | US |
Child | 11453959 | Jun 2006 | US |