The present invention relates to a fingerprint authentication system, and to a method of authenticating a user by means of a fingerprint authentication system.
Various types of biometric systems are used more and more in order to provide for increased security and/or enhanced user convenience.
In particular, fingerprint sensing systems have been adopted in, for example, consumer electronic devices, thanks to their small form factor, high performance, and user acceptance.
For continued trust in fingerprint sensing systems, it is important to provide fingerprint sensing systems with high performance in terms of convenience as well as security. In particular, it would be desirable to provide fingerprint sensing systems that are capable of rejecting attempts to get a positive authentication result using a fake finger.
Various fingerprint sensing systems, employing so-called anti-spoofing measures, have been suggested.
For example, US2009/0316963 discloses a fingerprint sensor including a finger sensing area and a controller. The controller aligns authentication data and enrollment data and performs spoof attempt detection based on corresponding pairs of finger features and their spatial locations in the aligned enrollment and authentication data.
However, it would still be desirable to provide for authentication with an improved performance, in particular in respect of rejecting spoofing attempts.
In view of the above-mentioned and other drawbacks of the prior art, it is an object of the present invention to provide for improved authentication, in particular in respect of rejecting spoofing attempts.
According to a first aspect of the present invention, it is therefore provided a method of authenticating a user by means of a fingerprint authentication system, the method comprising the steps of: receiving a touch by a candidate finger probe; acquiring a first candidate fingerprint image indicating a surface topography of the candidate finger probe; determining a first authentication representation based on the first candidate fingerprint image; retrieving a stored enrollment representation of an enrolled fingerprint of the user; comparing the first authentication representation with the enrolment representation; determining a liveness score for the candidate finger probe; and when the liveness score indicates a likely spoof: providing a signal indicating a failed authentication; determining a first anti-spoofing representation based on the first candidate fingerprint image; and storing the first anti-spoofing representation.
It should be noted that the steps of methods according to embodiments of the present invention need not necessarily be in the order recited in the claims.
It should also be noted that a fingerprint authentication system may be comprised in a stand-alone electronic device, such as a mobile communication device, a watch or a smart card, or may be formed by interconnected devices, such as a computer and a fingerprint acquisition device connected to the computer.
The fingerprint sensing arrangement may, for example, be a capacitive fingerprint sensing arrangement, detecting a measure indicative of the capacitive coupling between each sensing element in an array of sensing elements and a finger surface touching the sensing arrangement surface. Sensing elements at locations corresponding to ridges in the fingerprint will exhibit a stronger capacitive coupling to the finger than sensing elements at locations corresponding to valleys in the fingerprint.
However, the various embodiments of the present invention are not limited to a particular fingerprint sensing technology, but are equally applicable to any sensing technology capable of providing an indication of the surface topography of the top surface of the candidate finger probe, for instance, acoustic, optical, thermal or piezo-electric fingerprint sensing arrangements etc.
Furthermore, the fingerprint authentication system according to embodiments of the present invention may be embodied as a system of components, or in a single component, such as an integrated circuit.
The above-mentioned liveness score that is determined for the candidate finger probe (which may or may not be a real finger) may be based on one or several fingerprint images and/or on one or several auxiliary properties that may be used for indicating a likelihood of a spoof attempt.
The present invention is based upon the realization that only a small portion of a spoof made from a latent fingerprint is likely to be of sufficiently high quality to potentially achieve a successful authentication, and that the most likely way an impostor would use such a spoof would be to move it between authentication attempts to try to align the small high quality portion, having a top surface with a surface topography of sufficient quality to result in a good fingerprint image, with the sensing area of the fingerprint sensor using trial-and-error. The present inventor has further realized that this attack pattern, in combination with a liveness score, can be used to identify a likely spoof, and that an anti-spoofing representation of the likely spoof can be determined and stored for increasing the chances of rejecting subsequent spoofing attempts, even when the small high quality portion is aligned with the sensing area of the fingerprint sensor.
By basing the anti-spoofing representation on a candidate fingerprint image indicative of the surface topography of the candidate finger probe, at least certain kinds of spoofing attempts can be identified without using sub-surface imaging techniques, allowing for the use of various fingerprint sensing techniques that are unable to sense underlying structures of a candidate finger probe, and/or facilitating processing and analysis of signals acquired from the fingerprint sensor.
In embodiments, the above-mentioned signal indicating a failed authentication may be provided when the first authentication representation matches with the stored enrolment representation, and the liveness score indicates a likely spoof.
In embodiments, the method according to the present invention may further comprise the steps of: acquiring a second candidate fingerprint image of the candidate finger probe; determining a second authentication representation based on the second candidate fingerprint image; retrieving the stored first anti-spoofing representation; comparing the second authentication representation with the first anti-spoofing representation; and when the second authentication representation matches with the first anti- spoofing representation, providing a signal indicating a failed authentication.
The first candidate fingerprint image may be acquired in connection with a first authentication attempt, and the second candidate fingerprint image may be acquired in connection with a second authentication attempt.
Using the stored first anti-spoofing representation, the second authentication attempt can be rejected even if the second authentication representation matches well with the stored enrollment representation. A good match between the second authentication representation and the first anti-spoofing representation is an indication that the second authentication attempt is with the same spoof that was identified in the first (failed) authentication attempt. Accordingly, embodiments of the present invention strengthen the defenses against spoofing attacks, especially so-called presentation attacks.
In embodiments, the method according to the invention may further comprise the step of: when the second authentication representation matches the first anti-spoofing representation: determining a second anti-spoofing representation based on the second candidate fingerprint image; and storing the second anti-spoofing representation. In other words, an anti-spoofing “template” may be expanded with anti-spoofing representations determined in connection with additional detected spoofing attempts. This may increase the precision in the rejection of subsequent spoofing attempts.
According to embodiments, a determination of whether or not the second authentication representation matches the first anti-spoofing representation may depend on a time between the first authentication attempt and the second authentication attempt.
In a so-called presentation attack, several authentication attempts may be expected over a relatively short period of time. If the time between the first authentication attempt and the second authentication attempt is relatively short, it can therefore be assumed that the probability of an ongoing presentation attack is higher than if the time is relatively long. For instance, if the time between the first authentication attempt and the second authentication attempt is less than, say, ten seconds, the probability of an ongoing presentation attack may be considered to be higher than if the time between the first authentication attempt and the second authentication attempt is longer than, say, one minute.
Accordingly, the determination of whether or not there is a match may depend on the time between the first authentication attempt and the second authentication attempt in such a way that a shorter time increases a likelihood of the second authentication representation matching the first anti-spoofing representation.
Any additional matching requirement may result in an increase of the occurrence of false rejections, which is undesirable. It would therefore be advantageous to only match an authentication representation against an anti-spoofing representation when a presentation attack or similar may reasonably occur and/or to limit the coverage of the stored anti-spoofing representation(s). To that end, it may be advantageous to discard any stored anti-spoofing representation upon receiving an indication of a successful authentication by the user.
This may, in particular, be the case when the successful authentication provides a supplementary indication of user presence, by an alternative authentication method. For instance, the successful authentication may be the result of the entry of a correct passcode (such as a password or PIN-code).
In embodiments, furthermore, the liveness score may be determined based on at least one acquired candidate fingerprint image.
Alternatively, or in combination, the fingerprint authentication system may comprise liveness sensing circuitry for sensing a liveness property of said candidate finger probe, and the liveness score may be determined further based on such liveness property.
The liveness property may, advantageously, be selected from a set of properties of the candidate finger probe including: a dimension; a relation between dimensions; a deformation property; an optical property an electrical property; and a perspiration property.
According to a second aspect of the present invention, there is provided a fingerprint authentication system for authenticating a user, comprising: a fingerprint sensing arrangement; a memory; and processing circuitry coupled to the fingerprint sensing arrangement, the processing circuitry being configured to: control the fingerprint sensing arrangement to acquire a first candidate fingerprint image of a candidate finger probe; determine a first authentication representation based on the first candidate fingerprint image; retrieve, from the memory, a stored enrollment representation of an enrolled fingerprint of the user; compare the first authentication representation with the enrolment representation; determine a liveness score for the candidate finger probe; and when the first authentication representation matches with the enrolment representation, and the liveness score indicates a likely spoof: provide a signal indicating a failed authentication; determine a first anti-spoofing representation based on the first candidate fingerprint image; and store, in the memory, the first anti-spoofing representation.
The processing circuitry may be realized as hardware and/or as software running on one or several processors.
Further embodiments of, and effects obtained through this second aspect of the present invention are largely analogous to those described above for the first aspect of the invention.
The fingerprint authentication system according to embodiments of the present invention may be included in an electronic device, further comprising a processing unit configured to control the fingerprint authentication system to carry out a fingerprint authentication of a user, and to perform at least one action only upon successful authentication of the user.
These and other aspects of the present invention will now be described in more detail, with reference to the appended drawings showing an example embodiment of the invention, wherein:
In the present detailed description, various embodiments of the electronic device according to the present invention are mainly discussed with reference to a mobile phone with a substantially square fingerprint sensor being accessible through an opening in the back cover. Furthermore, the fingerprint sensor 3 and the processing circuitry are schematically indicated as being different separate components.
It should be noted that this by no means limits the scope of the present invention, which equally well includes, for example, other types of electronic devices, such as smart watches, smart cards, laptop computers etc. Furthermore, the fingerprint sensing device need not be substantially square, but could be elongated or have any other suitable shape. Moreover, the fingerprint sensing device may be arranged in any suitable location in the electronic device, such as being integrated with a button on the front or the side of the mobile phone, or arranged under a cover glass etc. In addition, the processing circuitry, or parts of the processing circuitry, may be integrated with the fingerprint sensor.
With reference to
As is schematically indicated in
The above-mentioned communication circuitry 5 may, for example, comprise one or several of various antennas and control units for wireless communication, and the above-mentioned user interface circuitry 6 may, for example, comprise one or several of a display, a microphone, a speaker, and a vibration unit.
As is schematically indicated in
The charge amplifier 18a-b comprises at least one amplifier stage, here schematically illustrated as an operational amplifier (op amp) 24a-b having a first input (negative input) 25a-b connected to the sensing structure 17a-b, a second input (positive input) 26a-b connected to sensor ground or another reference potential, and an output 27a-b. In addition, the charge amplifier 18a-b comprises a feedback capacitor 29a-b connected between the first input 25a-b and the output 27a-b, and reset circuitry, here functionally illustrated as a switch 30a-b, for allowing controllable discharge of the feedback capacitor 29a-b. The charge amplifier 18a-b may be reset by operating the reset circuitry 30a-b to discharge the feedback capacitor 29a-b.
As is often the case for an op amp 24a-b in a negative feedback configuration, the voltage at the first input 25a-b follows the voltage at the second input 26a-b. Depending on the particular amplifier configuration, the potential at the first input 25a-b may be substantially the same as the potential at the second input 26a-b, or there may be a substantially fixed offset between the potential at the first input 25a-b and the potential at the second input 26a-b. In the configuration of
When a time-varying potential is provided to the finger 15 by the excitation signal providing circuitry 19, a corresponding time-varying potential difference occurs between the sensing structure 17a-b and the finger 15.
The above-described change in potential difference between the finger 15 and the sensing structure 17a-b results in a sensing voltage signal Vs on the output 27a-b of the charge amplifier 18a-b.
When the indicated sensing element 13a-b is selected for sensing, the selection switch 21a-b is closed to provide the sensing signal to the readout line 33. The readout line 33, which may be a common readout line for a row or a column of the sensor array 5 in
The output of the multiplexer 36 is connected to a sample-and-hold circuit 37 and an analog-to-digital converter 38 in series for sampling and converting the analog signals originating from the sensing elements 13a-b to a digital representation of the fingerprint pattern of the finger 15 on the sensor 2.
As is schematically indicated in
Accordingly, the charge amplifier 40 comprises at least one amplifier stage, here schematically illustrated as an operational amplifier (op amp) 44 having a first input (negative input) 45 connected to the finger detecting structure 11b, a second input (positive input) 46 connected to sensor ground or another reference potential, and an output 47. In addition, the charge amplifier 40 comprises a feedback capacitor 49 connected between the first input 45 and the output 47, and reset circuitry, here functionally illustrated as a switch 50, for allowing controllable discharge of the feedback capacitor 49. The charge amplifier may be reset by operating the reset circuitry 50 to discharge the feedback capacitor 49. As is also indicated in
In
A first exemplary embodiment of a method according to an aspect of the present invention will now be described with reference to the flow-chart in
In a first step 100, a first candidate fingerprint image of the candidate finger probe is acquired using the fingerprint sensor 3. The candidate finger probe may be a real finger, or a spoof that may have been manufactured based on a latent print. A schematic illustration of such a spoof 50 is provided in
Referring now briefly to
Since the sensing area of the fingerprint sensor 3 is considerably smaller than the candidate finger probe, only a portion of the candidate finger probe will be imaged by the fingerprint sensor 3 as the above-mentioned first candidate fingerprint image. Assuming in the following that the candidate finger probe is the spoof 50 in
Returning to the flow-chart in
Subsequently (or any time after receiving the touch by the candidate finger probe), in step 108, a liveness score is determined. There are various well-known ways of determining a liveness score. For instance, the candidate fingerprint image may be analyzed in view of various properties of the enrolled fingerprint, such as ridge dimensions, the presence and distribution of sweat pores, the existence of perspiration etc. According to other known ways of determining a liveness score, auxiliary sensors may be used for detecting one or several properties of the candidate finger probe. It could, for instance, be feasible to use the above-described finger detection circuitry to obtain a measure indicative of electrical properties of the candidate finger probe.
In the next step 110 it is determined whether or not the first authentication representation and the enrollment representation match. For instance, a match score may be determined indicating the similarity between the first authentication representation and the enrollment representation, and the match score may be compared with a threshold that may be predefined or adaptive.
If it is determined in step 110 that there is no match, it is concluded that the authentication attempt failed, as indicated in
If the liveness score indicates that the candidate finger probe is likely to be a real finger, it is concluded that the authentication attempt was successful, indicated by ‘Pass’ in
Instead, it is likely that the liveness score for the second example fingerprint image 58 would indicate a likely spoof. The method then proceeds to step 114 where an anti-spoofing representation is determined based on the first candidate fingerprint image (here the second example fingerprint image 58 in
A second exemplary embodiment of a method according to an aspect of the present invention will now be described with reference to the flow-chart in
In a first step 200, a candidate fingerprint image of the candidate finger probe is acquired using the fingerprint sensor 3. The candidate finger probe may be a real finger, or a spoof that may have been made based on a latent print. As mentioned above, a schematic illustration of such a spoof 50 is provided in
An authentication representation is determined based on the candidate fingerprint image in step 202. A stored anti-spoofing representation determined in connection with one or several previous authentication attempt(s) is retrieved in step 204.
Subsequently, in step 206, the authentication representation and the anti-spoofing representation are compared, and it is determined if there is a match. Assuming that the acquired candidate fingerprint image is the third example fingerprint image 60 in
This result is significant, because the third example fingerprint image 60 in
If there is no anti-spoofing match in step 206, the example method in
If it is determined in step 212 that there is no enrollment match, it is concluded that the authentication attempt failed, as indicated in
The liveness score is evaluated in step 216. If the liveness score indicates that the candidate finger probe is likely to be a real finger, it is concluded that the authentication attempt was successful, indicated by ‘Pass’ in
The person skilled in the art realizes that the present invention by no means is limited to the preferred embodiments described above. On the contrary, many modifications and variations are possible within the scope of the appended claims. For example, the above-described liveness evaluation may take place before the authentication matching.
In the claims, the word “comprising” does not exclude other elements or steps, and the indefinite article “a” or “an” does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measured cannot be used to advantage. A computer program may be stored/distributed on a suitable medium, such as an optical storage medium or a solid-state medium supplied together with or as part of other hardware, but may also be distributed in other forms, such as via the Internet or other wired or wireless telecommunication systems. Any reference signs in the claims should not be construed as limiting the scope.
Number | Date | Country | Kind |
---|---|---|---|
1750629-6 | May 2017 | SE | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/SE2018/050431 | 4/26/2018 | WO | 00 |