The invention relates to the field of security scanners (which can also be called body scanners or full body scanners) and to authenticating a user (i.e., the person who passes through the security scanner) of such. Authenticating is in particular facilitated by a user device (such as a mobile phone) of the user. More specifically, the user is authenticated by comparing information captured by the security scanner by means of electromagnetic radiation with visual information captured by the user device.
A conventional security scanner is typically used in an airport or a public facility to detect an object on or inside a human body for security screening purposes. This allows for checking people for prohibited items without physically removing clothes or making physical contact.
As a conventional security scanner obtains information about the user, which is highly personal and confidential, the scanner is typically operated by authorities.
However, there is the desire to use the information obtained by the security scanner for other paid services and not only for security purposes provided by authorities. Since the use of this information is only intended for the user himself, there is the need for reliably authenticating the user of the security scanner.
Therefore, the object of the invention is to provide a device for authenticating a user of a security scanner.
Moreover, the object is to provide an according method, system and computer program.
The object is solved by the features of the independent claims. The dependent claims contain further developments.
An inventive device for authenticating a user is configured to: compare first data captured by a user device to second data captured by a security scanner; and authenticate the user of the user device, if the first data matches the second data; wherein the second data is captured by the security scanner by means of electromagnetic radiation with a wavelength in a mm range and/or a cm range; the first data comprises visual information of the user of the user device; and the second data comprises biometrical information.
This is beneficial, as data that can be captured by a user of a user device (e.g. a common device like a mobile phone with a camera) can be compared to data captured by a security scanner to authenticate the user of the user device before transmitting confidential data to the user device.
In particular, the user is authenticated before confidential data is transmitted from the security scanner to the user device.
In particular, the user device comprises at least one of: a mobile phone, a mobile phone with a camera, a laptop computer with a camera, a computer with a camera, a tablet computer with a camera.
In particular, the device is configured to determine that the first data matches the second data, if a deviation between the first and second data is below a predefined threshold.
In particular, the user device is external to the device for authenticating a user.
In particular, to compare the first data, the device is configured to receive the first data from the user device.
In particular, the security scanner is external to the device for authenticating a user.
In particular, to compare the second data, the device is configured to receive the second data from the security scanner.
In particular, the device for authenticating a user can also be integrated in the security scanner, or the user device.
In particular, the biometrical information can be obtained by the security scanner. In particular, the biometrical information can be transmitted to the device after it is obtained by the security scanner. In particular, the biometrical information can be obtained by the device itself.
In particular, the user is authenticated before transmitting confidential data to the user takes place.
In particular, the device is a part of the security scanner or is the security scanner.
Advantageously and preferably, the first data comprises a picture of the user.
This is beneficial, as biometrical information obtained from the picture of the user further secures the authentication process.
In particular, the picture of the user comprises a self-portrait (e.g. a “selfie”) of the user. In particular, the picture of the user is taken in real time by an app that has access to a camera of the user device.
Using the “selfie” allows for an easy and convenient manner of taking the picture of the user.
Advantageously and preferably, the first data comprises biometrical information, or wherein the device is configured to process the first data to obtain biometrical information.
This ensures that the device can be realized in a versatile manner, which allows to generate the biometrical information in the device itself, or have the biometrical information provided to the device. Thereby, the generation of the biometrical information can be offloaded to the user device, which reduces operating load at the device for authenticating the user.
In particular, if the first data comprises a picture of the user, the biometrical information can be comprised by the picture.
In particular, the biometrical information can be obtained by processing the picture in the user device. In particular, the biometrical information can be obtained by processing the picture in the device.
Advantageously and preferably, the first data and the second data comprise information about a facial area of the user.
This ensures that facial features and lineaments of the user can improve security of the authentication process.
Advantageously and preferably, the device can be configured to ask the user, by means of the user device, to take a certain position and/or gesture (for example ask the user to close one eye). This ensures to reduce the chances that the user is not real and that the device is tricked.
Advantageously and preferably, the device is further configured to transmit additional data to the user device, if the user is authenticated successfully.
This is beneficial as it allows to use all of the information obtained by the security scanner for other purposes than security related ones. The additional data can e.g. be sold to the user, which allows for generating new business models.
In particular, the additional data is data of the security scanner.
In particular, the additional data does not comprise a raw image obtained by the security scanner. This is beneficial because a user should not be aware of the capability of the security scanner, e.g. so that the user cannot figure out ways on how to cheat the security scanner.
In particular, no “naked picture” is transmitted in the additional data.
In particular, the additional data can be generated by the security scanner based on the second data (e.g. based on raw images). In this case, the security scanner can store the additional data (which e.g. comprises non-medical data or medical data) directly to a database.
In particular, the additional data can be generated by the device based on the second data. In this case, the device can store the additional data directly to the database.
In particular, the database can be comprised by the device or the security scanner, or can be external to the device or the security scanner.
Advantageously and preferably, the additional data comprises information regarding the size of a body part of the user.
This is beneficial as the information regarding the size of the body parts can be used for fitting purposes.
In particular, the information regarding the size of a body part of the user comprises at least one of: hip width, arm length, leg length, shoulder width. This ensures that the user may be provided with an exact size of clothes.
In particular, the information regarding the size of a body part of the user can be referred to as non-medical information. This is because it relates only to the size of body parts, but not to diseases associated with said size.
Advantageously and preferably, the additional data comprises a normalized confection size.
This is beneficial, as it makes fitting of clothes even more precise.
In particular, the confection size of the user can be referred to as non-medical information. This is for the same reasons as above.
In particular, the user device is configured to tell the user which confection size the user has for various brands. If the normalized confection size is “50”, the user device may tell that for brand A it is 52, or for brand B is “48”. This is beneficial as the user knows what size to buy for different brands. The normalized confection size can be determined e.g. by the device, the user device or the security scanner.
Advantageously and preferably, the additional data comprises information regarding a medical anomaly of the body of the user.
This is beneficial as it supports medical check-ups of the user.
In particular, the information regarding a medical anomaly of the user's body can be referred to as medical information.
In particular, the information regarding a medical anomaly may include information regarding at least one of: thicker liver, oblique position of the spine, hip obliquity, thyroid problems.
Advantageously and preferably, the first data further comprises unique information regarding the security scanner and wherein the device is further configured to assess whether the second data is captured by a security scanner which corresponds to the unique information.
This ensures that security of the authentication process is further increased.
In particular, the unique information is a number or a serial number. In particular, the unique information can be included in a QR code. In particular, the unique information can be captured by the user when walking through the security scanner (e.g. by scanning the QR code with the user device). In particular, the authentication is only successful if the first and second data matches AND if the unique information matches with the security scanner which captured the second data.
Advantageously and preferably, the first data comprises additional identification data in the form of a time stamp indicating when the user went through the security scanner, or in the form of identification information of the user, preferably captured by a reader in the area of the security scanner; and wherein the device is configured to only use second data for comparison, which corresponds to the time stamp or the identification information.
This is beneficial as it further increases the security and efficiency of the authentication process.
The time stamp facilitates that a database can be queried more efficiently. A query of the database is simpler, because the time stamp is used when the user walks through the security scanner. Only that kind of second data which is linked to the user's identification information is used for comparison. The data that is captured with the security scanner can be linked to a time stamp and/or identification information. For example, the user walking through the security scanner can put his identification (ID) card into a reader. In particular, the identification information (i.e. ID information, relating to the ID card) is read and linked to the second data captured by the security scanner.
Advantageously and preferably, the device is a cloud computing device.
This is beneficial, as an authentication service can be flexibly provided to a security scanner, without the need for modification or new hardware of the security scanner.
In particular, the device and/or the cloud computing device can be realized by means of a computer program.
An inventive system comprises: the inventive device or any of its advantageous forms described above, and a security scanner, wherein the security scanner is configured to store the second data and in particular the additional data in a database.
This ensures that a security scanner can be equipped with the device for authenticating a user.
In particular, the second data is stored in an encrypted manner. In particular, the additional data can be deleted after a predetermined amount of time (for example 1 week).
Advantageously and preferably, the security scanner is configured to capture the additional data if a control signal is provided to the security scanner.
This ensures that a payment process can be effectively implemented. That is, the control signal can be provided after a payment of a service has been made.
In particular, the control signal includes at least one of: a press of a button (e.g. by the user), a trigger from the system (e.g. released by the user or by a control device, e.g. a payment system that transmits the control signal if the user paid for the service).
Advantageously and preferably, the security scanner is configured to increase the resolution if the control signal is present.
This ensures that the additional data is captured with a higher resolution only, if the control signal is present, as capturing with a higher resolution might take more time.
Advantageously and preferably, the system further comprises an artificial intelligence, AI, module configured to detect a medical anomaly based on the second data.
This is beneficial as it allows for AI based detection of a medical anomaly.
In particular, the AI module is part of the security scanner and/or the system. Input knots of the AI module can be fed with visual data of the additional data (for example pixels). Output knots of the AI module indicate a medical anomaly. The AI module e.g. can be implemented by means of machine learning and/or a neural network.
Advantageously and preferably, the system further comprises the user device in form of at least one of: a mobile phone; a laptop computer; a tablet device; a computer comprising a camera.
This ensures that the authentication of the user can be supported by the user device of the user.
An inventive method for authenticating a user comprises the steps of: comparing, by a device, first data captured by a user device to second data captured by a security scanner; and authenticating, by the device, the user of the user device, if the first data matches the second data; wherein the second data is captured by the security scanner by means of electromagnetic radiation with a wavelength in a mm range and/or a cm range; the first data comprises visual information of the user of the user device; and the second data comprises biometrical information.
Advantageously and preferably, the first data comprises biometrical information, or wherein the method further comprises processing, by the device, the first data to obtain biometrical information.
Advantageously and preferably, the first data and the second data comprise information about a facial area of the user.
Advantageously and preferably, the method further comprises transmitting, by the device, additional data to the user device, if the user is authenticated successfully.
Advantageously and preferably, the additional data comprises information regarding the size of a body part of the user.
Advantageously and preferably, the additional data comprises a normalized confection size.
Advantageously and preferably, the additional data comprises information regarding a medical anomaly of the body of the user.
Advantageously and preferably, the first data further comprises unique information regarding the security scanner and wherein the method further comprises assessing, by the device, whether the second data is captured by a security scanner which corresponds to the unique information.
Advantageously and preferably, the first data comprises additional identification data in the form of a time stamp indicating when the user went through the security scanner, or in the form of identification information of the user, preferably captured by a reader in the area of the security scanner; and wherein the method further comprises only using, by the device, second data for comparison, which corresponds to the time stamp or the identification information.
Advantageously and preferably, the method is a cloud computing method.
The inventive method comprises the same advantages as the inventive device.
An inventive computer program comprises program code for performing steps of the above described inventive method, when the computer program product runs on a computer or a digital signal processor.
The inventive computer program product comprises the same advantages as the inventive device.
An exemplary embodiment of the invention is now further explained with respect to the drawings by way of examples only, in which
In the following, the function of an embodiment of the inventive device is described based on
To authenticate the user 101, the device 100 is configured to compare first data 102 captured by a user device 103 to second data 104 captured by a security scanner 105. The user device 103 is e.g. carried by the user 101 when using the security scanner 105.
The user 101 of the user device 103 is authenticated, if the first data 102 matches the second data 104. To obtain the second data 104, the second data 104 is forwarded to the device 100 once it is captured by the security scanner 105 by means of electromagnetic radiation with a wavelength in a mm range and/or a cm range. Comparison of the first and second data is enabled as the first data 102 comprises visual information of the user 101 of the user device 103 and the second data 104 comprises biometrical information.
The security scanner, (which also may be referred to as body scanner or full-body scanner) normally operates in an EHF range (e.g., 30 GHz to 300 GHz). The wavelength ranges from 10 mm to 1 mm. Thus, the radiation in this band can be called cm waves or millimeter waves. However, frequencies below are also possible.
While a conventional security scanner only analyzes whether a prohibited item is hidden in a pocket of the user 101 or not, the device 100 enables to securely share further details of a human body (that is, the body of the user 101), which are also captured by the security scanner 105.
With the strict authentication measures implemented by the device 100, for example airports or facilities themselves (that is, private companies) can operate the security scanner and not only authorities. One scenario could be that travelers who use the security scanner 105 in order to board their flights can receive more details upon request. For example, travelers can pay for additional data.
As illustrated in
Further optionally, the first data 102 can comprise information about a facial area 203 of the user 101. This may in particular be the case, if the first data 102 relates to a picture 201 of the face of the user 101, e.g., a “selfie” of the user 101. The biometrical information 202 can in particular be obtained based on the information about a facial area 203 of the user 101.
Further optionally, the second data 104 can comprise information about a facial area 203 of the user 101. The information about the facial area 203 of the user 101 which is comprised in the second data 104 is in particular obtained by a scan performed by the security scanner 105.
Further optionally, the device 100 can be configured to transmit additional data 204 to the user device 103, if the user 101 is authenticated successfully.
In other words, the device 100 enables that only the user 101 who went through the security scanner 105 obtains the captured data (i.e., the additional data 204) and nobody else. This can be achieved in particular by performing the following steps: 1. A user walks through the security scanner. 2. The security scanner captures the second data 104. 3. The user 101 authenticates himself. 4. The user receives the additional data 204 (which may include medical data and/or non-medical data, as described below).
The authentication may be done by comparing data captured by the security scanner (i.e., the second data 104) with data captured by the user 101 (i.e., the first data 102).
For example, the user 101 can create a selfie, wherein biometric features can be extracted from the selfie and can be compared to the data captured by the security scanner 105. If a match is detected, the user can view the medical or non-medical data (i.e., the additional data 204).
As it is illustrated in
Further optionally, the additional data 204 may comprise a normalized confection size 206, which may also be called non-medical data.
However, the additional data 204 optionally may also comprise information 207 regarding a medical anomaly of the body of the user 101. This kind of information 207 may be called medical data.
The information 207 regarding a medical anomaly of the body of the user 101 may include at least one of: thicker liver; oblique position of the spine; hip obliquity; thyroid problems. These are however just examples to illustrated the function of the device. The information 207 regarding a medical anomaly of the body of the user 101 may comprise any information regarding a disease that is detectable by means of electromagnetic waves.
Turning back to
Also, e.g. due to data privacy reasons, the device 100 can be configured to only provide the additional data 204 for a predefined amount of time, e.g. several seconds, minutes, hours, days or weeks.
Further optionally, an additional QR code, which could be obtained directly at the security scanner 105 could be used to harden the authentication and/or to prove whether the user paid for the additional data 204. That is, the first data 102 may further comprises unique information 208 regarding the security scanner 105. The device 100 may assess whether the second data 104 is captured by a security scanner 105 which corresponds to the unique information 208.
As illustrated in
Optionally, the device 100 can be a cloud computing device.
Optionally, the security scanner 105 can capture the additional data 204 if a control signal is provided to the security scanner 105. The security scanner 105 may also increase its resolution, if the control signal is present. On the one hand, it can be controlled that the additional data is only provided if the user 101 has pay for a certain service. On the other hand, the higher resolution is only asked for, if it is desired by the user (as scanning in higher resolution takes more time and otherwise would increase the duration of a conventional security scan).
The system 400 may also include an artificial intelligence, AI, module to detect a medical anomaly based on the second data 104.
As illustrated in
Further optionally, the user device may run an application which is configured to give the user information about the size needed to buy cloths from certain brands. The app may scale the confection size so that the user 101 knows that his actual size corresponds to size 50 for brand X and to size 48 for brand Y.
It is important to note that the inventive system and method very closely correspond. Therefore, all of the above said regarding the system is also applicable to the method and vice versa. Everything which is described in the description and/or claimed in the claims and/or drawn in the drawings can be combined.
The invention is not limited to the illustrated embodiment. All features described above or features shown in the figures can be combined with each other in any advantageous manner within the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
22 170 698.9 | Apr 2022 | EP | regional |