Referring now to the figures and to
The record for identity r is partitioned into groups 101. The example in
The groups may include identifiers that are required, identifiers obtained from readily available databases, and identifiers selected by the legitimate claimant when the record is established. For example, in
The generic notation outcome is used for the response to identifier k (match, no-match, or ambiguous). The input parameter φg, 0≦φg≦1, is the probability that an impostor finds a “wallet” with the information for all identifiers in group g. Consider identifier k ∈ g and suppose no other identifiers from group g have so far been probed. Let PIr(k=outcome) be the probability that a random (ignorant or well-informed) impostor provides an outcome response for identifier k. This probability is a combination of PI0r(k=outcome) and of PLr(k=outcome). Specifically, it is:
PI
r(k=outcome)=(1−φg)PI0r(k=outcome)+φgPLr(k=outcome). (1)
Note that when it is assumed that PIr(k=ambiguous)=PLr(k=ambiguous)=PVr(k=ambiguous), Equation (1) can then rewritten as:
PI
r(k=match)=(1−φg)PI0r(k=match)+φgPLr(k=match), (2.1)
PI
r(k=no-match)=1−PIr(k=match)−PVr(k=ambiguous). (2.2)
The legitimate claimant probabilities PLr(k=outcome) remain unchanged during the session; i.e.; they are independent of the claimant's responses. On the other hand, the response probabilities for a match or no-match of a random (ignorant or well-informed) impostor may change during a session, depending on the responses.
The set K={k1, . . . , kj, . . . , kq} is defined as the ordered set of identifiers already probed during the session. Each of the elements in the set represents a probed identifier and the response (match, no-match, or ambiguous) provided by the claimant to that identifier. K is partitioned into G subsets, one for each group g. These subsets are denoted as Kg={k ∈ g & k ∈ K} for g=1, 2, . . . , G.
Select best identifier 202
The method next selects at each point in time during a session the best identifier in step 202. The following notation is introduced:
P
r(Kg)=(1−φg)P0r(Kg)+φgQr(Kg), (3.3)
where outcomej is the response to identifier kj. Equation (3.3) follows directly from (3.1), (3.2), and the conception of a random impostor as behaving either ignorantly or as a legitimate claimant, depending on whether a wallet for group g is in the possession of the impostor, which happens with probability φg.
The method selects the next identifier as the one that would approximately yield the largest expected decrease in the ratio of the joint probabilities Pr(K)/Qr(K) per unit cost. Specifically, for any identifier k that is still available for probing, the following expressions are computed:
The identifier that provides the largest ratio Valuer(k) is selected as the best identifier that will be used. Note that since PVr(k=ambiguous) is assumed to be the same for an impostor or a legitimate claimant, the corresponding term (not shown in right-hand-side of equation (4.1)) is zero. For the first identifier (sets Kg are empty), the conditional probabilities are simply replaced by the prior probabilities at the beginning of the session. The conditional probabilities that will be used in subsequent iterations are computed later as will be described in conjunction with step 208. The identifier selection based on equations (4.1)-(4.2) is given as an example. Various other expressions that approximate the largest expected decrease in the ratio of the joint probabilities Pr(K)/Qr(K) per unit cost can also be used.
The “cost” parameters cr(k) can be set to one when the record for identity r is established. When identifier k is probed during a session cr(k) is increased. This would reduce the likelihood that identifier k would be used repeatedly in successive sessions by a claimant for identity r. Alternatively, instead of using cost parameters, the method can select randomly one of the N best identifiers, where N is a specified input. Both of these schemes would lead to some diversity in the identifiers probed in successive sessions.
Probe Claimant and Receive Response 203
Compute Joint Probabilities of Responses 204
Let P0r(Kg)=Qr(Kg)=1 for Kg=Ø. Suppose k ∈ g is the most recent identifier probed and k ∈ Kg. The method can compute the joint probabilities of equation (3.1) and equation (3.2) either directly or by using the following recursive equations:
P0r(Kg ␣ k)=P0r(Kg)PI0r(k=outcome), (5.1)
Q
r(Kg ␣ k)=Qr(Kg)PLr(k=outcome). (5.2)
Let
Let Pr(K)=Qr(K)=1 for K=Ø. Suppose k is the most recent identifier probed and thus added into K. The overall joint probabilities Pr(K) and Qr(K) are the products, over the groups g, of the corresponding probabilities Pr(Kg) and Qr(Kg) for the individual groups g, so the method can compute the overall joint probabilities, either directly by multiplying appropriately the individual joint probabilities determined by equations (3.1), (3.2), and (3.3), or by using the following recursive equations in step 204:
P
r(K␣k)=Pr(K)PIr(k=outcome|K), (6.1)
Q
r(K␣k)=Qr(K)PLr(k=outcome). (6.2)
Test Whether the Claimant is Accepted 205
After the joint probabilities Pr(K) and Qr(K) are recomputed with the latest response, the method computes the ratio of the joint probabilities. If
P
r(K)/Qr(K)≦α, (7)
then in step 205 the claimant is accepted as a legitimate claimant for identity r. Condition (7) guarantees that an impostor will be erroneously accepted with a probability that does not exceed α. Note that the ratio test includes joint probabilities for both the legitimate claimant and the impostor. The superficially tempting acceptance condition Pr(K)≦α is a necessary one for attaining the desired low probability for admitting an impostor, but it may not suffice. For instance, if K′ and K″ are two possible response histories that satisfy α/2<Pr(K′)≦α and α/2<Pr(K″)≦α, and if the access-control procedure were to specify granting access when encountering these histories, then the probability of an impostor gaining access would be at least as large as Pr(K′)+Pr(K″)>α, violating the design goal.
If condition (7) is satisfied, the claimant is accepted in step 205 and the session terminates as indicated by step 209.
Test Whether the Claimant is Rejected 206
After the joint probabilities Pr(K) and Qr(K) are recomputed with the latest response, the method computes the ratio of the joint probabilities. If
Q
r(K)/Pr(K)≦β, (8)
then the claimant is rejected as a legitimate claimant for identity r in step 206. Condition (8) guarantees that a legitimate claimant will be erroneously rejected with a probability that does not exceed β. Note that the ratio test includes joint probabilities for both the legitimate claimant and the impostor. The superficially tempting rejection condition Qr(K)≦β is a necessary one for attaining the desired low probability for erroneously rejecting a legitimate claimant, but it may not suffice.
If condition (8) is satisfied, the claimant is rejected in step 206 and the session terminates as indicated by step 209.
Test Whether the Session Should Terminate with an Inconclusive Result 207
Suppose the session has not been terminated with an acceptance in step 205 or rejection in step 206 of the claimant. Then, if the number of identifiers probed reached a predetermined quantity S, the session terminates with an inconclusive result as indicated by step 207. If S identifiers were used, the session terminates as indicated by step 209. If less than S identifiers were used, the session continues with step 208.
Re-Compute Impostor's Conditional Probabilities 208
Suppose the latest identifier probed is in group g. In step 208 the method then re-computes the impostor's conditional probabilities for all identifiers in group g that have not yet been probed. Specifically, the method re-computes
The example below illustrates the changes in an impostor's conditional probabilities. Suppose PI0r(k=match)=0.01, k ∈ g, φg=0.01, and PLr(k=match)=0.9 for all identifiers in group g. The probability that an (ignorant or well-informed) impostor responds with a match to the first probed identifier from group g is by equation (1) PIr(k=match)=0.019. Suppose the first probed identifier results in a match response. Using equation (9), the impostor's conditional probability for a match with a second identifier from group g is 0.434. Suppose the second identifier also results in a match response. The impostor's conditional probability for a match with a third identifier from group g is 0.889. Hence, after the first two matches, the impostor's conditional probability for responding with a match for the remaining identifiers in group g is almost the same as that of a legitimate claimant. Hence, there is hardly any value in probing more identifiers from group g. If the first two probes result in one match and one no-match, the impostor's conditional probability for a match with a third identifier from group g is 0.085.
Probabilities of an Inconclusive Termination, and Granting or Denying Access
An inconclusive termination of a session occurs when the number of identifiers probed reaches S and the claimant has neither been accepted nor rejected. Consider the case of a legitimate claimant. The probability of an inconclusive termination of a session for a legitimate claimant is derived by enumerating all possible sequences of responses in the session. An effective method of executing this enumeration is by building a tree, where each of the nodes of the tree would indicate a set of identifiers K that has already been probed and associated information.
The method for computing the probability of inconclusive terminations for a legitimate claimant generates a tree starting from a root node with K=Ø, which is initially treated as an unmarked node. At each iteration, the method selects an unmarked node with the set of identifiers K. The method selects the best identifier, say identifier k, as the next one to be probed and generates three links and three new nodes with a set of identifiers already probed K␣k, after which, the selected node is marked as having been handled. Note that each of the three nodes represented by the set K␣k have different responses to identifier k, one with a match, a second with a no-match, and a third with an ambiguous response. The computations done at each of the new nodes are as described in conjunction with the description of
The method can also compute the probability of accepting a legitimate claimant by summing all joint probabilities Qr(K) at nodes marked as terminal when the claimant is accepted, and the probability of rejecting a legitimate claimant by summing all joint probabilities Qr(K) at nodes marked as terminal when the claimant is rejected (the latter sum will not exceed β).
Likewise, the method can compute the probability of inconclusive terminations for an impostor by summing all joint probabilities Pr(K) at nodes marked as terminal with inconclusive termination. The method can also compute the probability of accepting an impostor by summing all joint probabilities Pr(K) at nodes marked as terminal when the claimant is accepted (the sum will not exceed α), and the probability of rejecting an impostor by summing all joint probabilities Pr(K) at nodes marked as terminal when the claimant is rejected.
The above described method can be practiced on any interactive system where a claimant can interact and provide responses to probes of identifiers. Typical systems include an automated telephone system coupled to a dedicated database containing information of multiple identifiers, an interactive computer connected to a dedicated database containing information of multiple identifiers for each identity, and the like as are known in the art.
While there has been described and illustrated an automated adaptive method for identity verification with quantified performance guarantees, it will be apparent to those skilled in the art that variations and modifications are possible without deviating from the broad scope and teachings of the present invention which shall be limited solely by the scope of the claims appended hereto.