The present invention relates to a gripping-feature learning authentication system and a gripping-feature learning authentication method that acquire a gripping-feature sample when a mobile information terminal is gripped and performs user authentication.
The growing impersonation crimes using voice call functions and communication functions such as email functions of fixed phones and mobile information terminals are becoming a problem of public concern. A typical impersonation using the voice call functions and communication functions is the so-called “It's me” fraud (a fraud where the criminal impersonates a family member or a friend of the victim to ask the victim to send money). In order to prevent such abuse of the functions of mobile information terminals, the security of the mobile information terminals has been ensured by user authentication at the start of use of the mobile information terminals. One example of the known user authentication means for mobile information terminals is fingerprint authentication means included in a mobile information terminal disclosed in Patent Literature 1.
Patent Literature 1 discloses a fingerprint-authentication-capable mobile information terminal that includes sending and receiving means for communicating with another mobile information terminal, fingerprint reading means, fingerprint authentication means for authenticating a read fingerprint, and means for omitting fingerprint authentication in a predetermined period of time after successful fingerprint authentication, wherein communication with another mobile information terminal is activated only if a user of the mobile information terminal is validated as the authentic owner of the mobile information terminal through successful fingerprint authentication and the sending and receiving means is deactivated after the expiration of the period in which the authentication is omitted. Since the mobile information terminal in Patent Literature 1 is configured as described above, the functionality of the mobile information terminal is disabled before the fingerprint authentication of the authentic owner to prevent a criminal use of the mobile information terminal by a malicious third party while at the same time the conventional convenience of the mobile information terminal is maintained by setting an appropriate authentication omission period after fingerprint authentication is performed.
The mobile information terminal including fingerprint authentication means in Patent Literature 1 can prevent impersonation or the like in the event of loss or theft of the mobile information terminal. However, taking an “It's me” fraud as an example of impersonation, the criminal committing the “It's me” fraud does not necessarily use a mobile information terminal that the criminal picked up or stole. The mobile information terminal including fingerprint authentication means described above has no effect if the criminal committing the “It's me” fraud uses his own mobile information terminal. This is because the criminal using his own mobile information terminal can be authenticated by his own mobile information terminal with a fingerprint of his own. Furthermore, a criminal does not necessarily use a fingerprint-authentication capable mobile information terminal to commit an “It's me” fraud. In any case, the criminal committing an “It's me” fraud can attain his purpose by making a call or communicating (through email or otherwise) on his own mobile information terminal to persuade the victim by telling the victim a lie, for example telling the victim that he has changed his phone number or email address because he has signed up a new mobile information terminal contract or that he is urgently phoning from a terminal of his friend because the battery of his terminal is flat.
The cause of the fact that the fingerprint authentication described above has no effect of preventing some kind of impersonation as described above is that the fingerprint authentication authenticates only the relationship between a user and a mobile information terminal owned by the user and cannot directly authenticate the relationship between calling and called parties or the relationship between parties communicating with each other (authentication of whether the calling and called parties or communicating parties are close in relationship to each other). This does not apply only to the fingerprint authentication described above but is a common problem among all types of user authentication schemes used in mobile information terminals.
An object of the present invention is to provide a gripping-feature learning authentication system that enables authentication between a calling party and a called party and between a communicating pair to prevent impersonation using a voice call function and communication function.
A gripping-feature learning authentication system of the present invention includes a mobile information terminal and a server. The mobile information terminal includes a trigger monitoring part, a gripping-feature sample acquisition part, a template learning part, a template sending part, an authentication request sending/receiving part, an authentication data sending part, and a determination result receiving part. When a sampling trigger is generated, the trigger monitoring part outputs a gripping-feature acquisition signal. The gripping-feature sample acquisition part acquires the gripping-feature acquisition signal to acquire the gripping-feature sample. The template learning part uses the gripping-feature sample to learn a user authentication template. The template sending part pairs the learned user authentication template and a terminal identification number of the mobile information terminal and sends the pair to the server. The authentication request sending/receiving part sends and receives an authentication request. The authentication data sending part sends the terminal identification number of the mobile information terminal to the server when the authentication request sending/receiving part sends an authentication request and sends a gripping-feature sample to the server when the authentication request sending/receiving part receives an authentication request. The determination result receiving part receives a result of determination made by a member authentication part from the server.
On the other hand, the server includes a template receiving part, a member template storage, an authentication data receiving part, a member authentication part and a determination result sending part. The template receiving part receives a pair of a user authentication template and a terminal identification number sent from the mobile information terminal. The member template storage stores the received user authentication template in association with member information indicating a member group to which the user of the mobile information terminal belongs. The authentication data receiving part receives a terminal identification number sent from a mobile information terminal that has sent an authentication request and a gripping-feature sample sent from a mobile information terminal that has received the authentication request. The member authentication part compares the user authentication template of each of users belonging to the member group indicated in member information corresponding to the terminal identification number received by the authentication data receiving part with the received gripping-feature sample to determine the probability that the user corresponding to the terminal identification number received by the authentication data receiving part and the user corresponding to the received gripping-feature sample belong to the same member group. The determination result sending part sends the result of the determination made by the member authentication part to the mobile information terminal that has sent the authentication request.
A gripping-feature learning authentication system of the present invention enables authentication between calling and called parties and between a communicating pair to prevent impersonation using a voice call function and a communication function.
Now, embodiments of the present invention will be described in detail. Components having the same functions are assigned the same numbers, and a description thereof will given just once.
Examples of a device that embodies a mobile information terminal which is one of the components of a gripping-feature learning authentication system of the present invention include portable terminals, PDAs, portable gaming machines, electronic organizers and electronic book readers. However, in addition to or in place of these devices, any other devices that meet requirements (1) through (3) given below can be used as mobile information terminals of the present invention: a device that (1) is designed to be used while being gripped and is capable of acquiring gripping-features while being used, (2) allows a timing of acquiring a gripping-feature sample to be specified, and (3) has a voice call function and/or a communication function that can be used for impersonation. In the following descriptions of embodiments, a portable terminal will be taken as a specific example and explained in detail.
First, gripping-feature samples to be acquired by portable terminals 400, 400′, and 400″ according to all embodiments of the present invention will be described. Since human beings are innately different in (1) the lengths of their fingers and (2) the strength of their gripping force and, as an acquired nature, (3) in the habit of gripping a portable terminal, gripping-features are extremely suitable as biometric information used for authentication. More specifically, gripping-feature authentication has almost the same level of precision as general face authentication in terms of the false rejection rate and the false acceptance rate. Gripping-feature samples can include, for example, a gripping-pressure distribution, a gripping-shape distribution and a gripping-heat distribution. As an example method of acquiring these gripping-feature samples, when pressure sensors are distributed in an array on the portable terminals 400, 400′, and 400″, the gripping-pressure distribution can be acquired. In the same manner, when CCD (CMOS) sensors are distributed in an array, the gripping-shape distribution can be obtained. In the same manner, when infrared sensors are distributed in an array, the gripping-heat distribution can be obtained. When a portable terminal has operating keys at the rear surface thereof (touch sensitive panel), gripping-features can be acquired even from the pressing states (whether the operating keys or the touch sensitive panel is pressed) of the operating keys (touch sensitive panel) when the terminal is gripped. In the following descriptions of the embodiments, a gripping-pressure distribution will be used as a gripping-feature sample.
Acquisition of a gripping-feature distribution by using a pressure sensor array will be described in detail with reference to
Referring back to
The concept of a sampling trigger used on portable terminals 400, 400′, and 400″ according to any embodiment of the present invention will be described below. As stated above, the present invention uses gripping-feature samples. A sampling trigger is a timing at which a gripping-feature sample is acquired. According to the present invention, a user authentication template is learned from gripping-feature samples and the learned user authentication template is used to perform authentication, as will be detailed later. Since the present invention is aimed at authentication between calling and called parities and between a communicating pair (hereinafter referred to as member authentication), the member authentication needs to be performed while a voice call is being made or an emails are being exchanged. This is because the purpose of the member authentication is to determine whether the person a user is currently phoning (or exchanging emails) is really an authentic person.
Gripping-features stated above usually vary depending on the situation of use of the portable terminal. The way in which the portable terminal is gripped differs from situation to situation, for example a situation where an email is being typed, a situation where the camera function is used, and a situation where a voice call is being made. Accordingly, for example when member authentication is to be performed during a voice call, only gripping-feature samples in the gripping state in a voice call are collected to learn a user authentication template first. Then, to perform the member authentication, gripping-feature samples need to be acquired while the terminal is gripped during a voice call and the gripping-feature samples need to be compared with the user authentication template. Therefore, gripping-feature samples need to be acquired at timings that meet a certain condition in both learning and authentication. For example, when member authentication is to be performed during a voice call, the portable terminal may be monitored to determine whether the portable terminal is in a voice call and, only if the portable terminal is in a voice call, a timing of acquiring a gripping-feature sample may be generated at regular intervals (for example once a minute). When member authentication is to be performed during exchange of emails, the portable terminal may be monitored to determine whether a mailer is active or not and, only if the mailer is active, a timing may be generated in response to a depression of a particular operating key (for example an OK key). Timing of acquiring a gripping-feature sample such as “once a minute in a voice call” or “a depression of the OK key while a mailer is active” stated above is referred to as a sampling trigger. A gripping-feature sample is acquired in response to generation of a sampling trigger.
Examples of the distance serving as a determination criterion of authentication, described earlier, will be explained below. It is assumed here, for example, that a pressure value xi,j was acquired from the i-th sensor element in the j-th measurement performed for learning, where i=1, 2, . . . , n, j=1, 2, . . . , m, n indicates the number of sensor elements and is an integer equal to 2 or greater, and m indicates the number of gripping-feature measurements for learning and is an integer equal to 2 or greater. The average of the pressure values, the variance, and the vectors of the average and the variance are defined as follows:
The user authentication template is indicated with a subscript “le”. The Mahalanobis's generalized distance f1 is given by the following expression.
As another example distance, the Euclid distance f2 can be defined by the following expression.
As still another example distance, the Manhattan distance f3 can be defined by the following expression.
These three distances can be used to perform determination with the following determination expression in common. Data of the user-to-be-authenticated, acquired for determination, is indicated with a subscript “self”, and data of other people is indicated with a subscript “oth”. When the threshold used to determine other people is defined as xthre, the following expression can be used to determine other people.
xthre<othf
It is assumed here that gripping-feature sample data of other people is available in some method, such as embedding the data in the portable terminal in advance, allowing the user to access the data on the Internet, or allowing the user to acquire the data by asking other people to grip the portable terminal. From the data of other people and the user authentication template, the distance othf is calculated. The threshold Xthre is determined to satisfy the following condition after the distance selff is calculated from a gripping-feature sample of the authentic user, not used for template learning and the learned template.
selff<Xthre<othf
The user authentication template is obtained from the average of gripping-feature samples in the foregoing description. However, other methods can be used. For example, a pressure distribution acquired from n sensor elements is divided into appropriate areas (10 areas, for example, where n is larger than 10); the sum (or the average) of gripping pressure in each of the areas is calculated to generate vector data consisting of, as a vector element, the sum (or the average) of gripping pressure in the area; and such vector data is generated for m gripping-feature samples, and the average thereof is used as the template. Alternatively, the positions of the sensor elements having the top 20 pressure values among n sensor elements are recorded; vector data thereof is generated; and such vector data is generated for m gripping-feature samples, and the average thereof is used as the template.
Member information used by portable terminals 400, 400′, and 400″ according to any embodiment of the present invention will be described below. Member information is stored on a server and is a list on which terminal identification numbers of portable terminals owned by users are recorded in association with a member group to which the users belong. The concept of terminal identification number herein encompasses not only numbers that depends on terminals themselves but also any kinds of identification information that uniquely identify users' portable terminals, such as USIM (Universal Subscriber Identity Module) serial numbers, subscribers' telephone numbers, and numbers relating to contract information. The term member group as used herein refers to a group that is formed automatically based on whether or not users are close in relation to each other, or on declaration by users. The server holds a user authentication template of each of the users contained in the member information described above. Information concerning each of the users recorded in the member information is stored on the server in association with the user's authentication template.
Member information is recorded as a member information table 54T in a member template storage 540 of the server 500 illustrated in
Member information stored on the server will be described in further detail with a specific example. It is assumed here that user A and user B are in a parent-child relationship and are subscribers to a portable terminal rate plan such as a family rate plan. The server has acquired information about subscription to rate plans such as a family rate plan and a friend rate plan beforehand. Since user A and user B are family, the terminal identification numbers IDA and IDB of the portable terminals of user A and user B are recorded beforehand in Table 54Tb as belonging to the same member group G1, as indicated in Table 54Tb. Then user A and user B continue using their portable terminals to generate a sampling trigger. Each time a sampling trigger is generated, the portable terminal to which the present invention is applied acquires a gripping-feature sample, the portable terminal to which the presentation invention is applied learns a user authentication template from the gripping-feature samples, and send the learned user authentication template to the server. The server receives the user authentication templates from user A and user B and records the user authentication template TMPA of user A in table 54Ta in association with information concerning user A, and records the user authentication template TMPB of user B in table 54Tb in association with information concerning user B.
Consider a situation where the portable terminals of user A and user B are in a voice call. If user A suspects that the other party in the call is not user B but a third party who is pretending user B, user A sends a request for authentication to the portable terminal of user B and the portable terminal of user B receives the authentication request and sends a gripping-feature sample to the server. The operations of sending the authentication request and the gripping-feature sample are concealed from the party who is phoning using the portable terminal of user B. The server acquires the terminal identification numbers IDA, IDB, . . . of all of the users belonging to member group G1 in table 54Tb to which user A belong, which can be acquired by referring to table 54Ta, reads the user authentication templates TMPA, TMPB, . . . associated with those terminal identification numbers from table 54Ta, and compares the user authentication templates with the gripping-feature sample received from the portable terminal of user B to determine whether or not the received gripping-feature sample belongs to user B.
In this way, member information is used for member authentication in combination with the user authentication template of each user. While member information is automatically acquired by the server analyzing the rate plan such as a family rate plan or friend rate plan to which the user subscribes, in the example described above, the method for acquiring member information is not limited to this. For example, member information may be created by a user declaring that another user belongs to the user's member group. A user may belong to a plurality of member groups at the same time. For example, if user B and user A are family, user B belongs to the same member group G1 as user A. If user B is a friend of user P, user B belongs to the same member group G2 as well. Since user A and user P are not directly related to each other, user A and user P belong to different member groups. Accordingly, user B can belong to both of member group G1 to which user A belongs and member group G2 to which user P belongs.
Based on the assumptions described above, a gripping-feature learning authentication system 1000 that implement member authentication according to a first embodiment will be described in detail. A learning operation of the gripping-feature learning authentication system 1000 according to the first embodiment will be described first with reference to
When a sampling trigger is generated, the trigger monitoring part 115 generates a gripping-feature acquisition signal and provides the gripping-feature acquisition signal to the gripping-feature sample acquisition part 120 (Yes in S115). If the sampling trigger is not generated, the processing returns to the start (No in S 115). In response to the gripping-feature acquisition signal sent from the trigger monitoring part 115, the gripping-feature sample acquisition part 120 acquires gripping-feature samples from the pressure sensor array 105 (S 120). Here, the number of acquired gripping-feature samples is denoted by Sm and the number of learning-start samples is denoted by SFm. The number of learning-start samples, SFm, is a predetermined number of samples required for learning a user authentication template. It has been found that a sufficiently precise user authentication template cannot be generated if user authentication template leaning is performed with a small number of acquired gripping-feature samples. Therefore, the number of samples empirically found to be required to obtain a sufficiently precise user authentication template is set as the number of learning-start samples, SFm. Accordingly, when the number of gripping-feature samples Sm stored in the temporary sample storage 130 stored in the temporary sample storage 130 reaches the number of learning-start samples SFm (Sm≧SFm) (Yes in S 130), the processing proceeds to step S 135, where the template learning part 135 uses the gripping-feature samples to learn a user authentication template (S135). When the number of gripping-feature samples Sm stored in the temporary sample storage 130 has not yet reached the number of learning-start samples SFm (Sm<SFm) (No in S 130), the processing returns to the start and, upon generation of a sampling trigger, a gripping-feature sample is acquired (S115, S 120). Steps S115 and S120 are repeated (No in S 130) until the number of gripping-feature samples Sm stored in the temporary sample storage 130 reaches the number of learning-start samples SFm. The user authentication template can be obtained from the average of gripping-feature samples (a gripping-pressure distribution in the present embodiment) as has been described above. Then, the template sending part 420 sends the pair of the learned user authentication template and the terminal identification number of the portable terminal to the server 500 (S420).
The server 500, on the other hand, receives the pair of the user authentication template and the terminal identification number sent from the portable terminal 400 (S520). The member template storage 540 stores the received user authentication template in association with member information as shown in the pair of tables 54Ta and 54Tb in
A member authentication operation of the gripping-feature learning authentication system 1000 of the present embodiment will be described next with continuing reference to
The portable terminal 400y first originates a voice call to the portable terminal 400x (S001). Call processing is performed by the network and the call arrives at the portable terminal 400x (S002). The user of the portable terminal 400x responds to the arrived call, the call is established (S003) and a phone conversation is started. Here, suppose that the user of the portable terminal 400x doubts whether the person on the other end of the call is truly the user of the portable terminal 400y. For example, assume that the user of the portable terminal 400x and the user of the portable terminal 400y are friends and, frequently have phone conversations on the portable terminal. Suppose, however, that since the voice of the calling person sounds unusual and odd in this phone call (for example, the voice is somewhat different than usual or specifics of the conversation are odd), the user of the portable terminal 400x doubt whether the calling person is the user of the portable terminal 400y. At this point in time, the user of the portable terminal 400x operates the portable terminal 400x to activate the authentication request sending/receiving part 460 of the portable terminal 400x. The authentication request sending/receiving part 460 of the portable terminal 400x sends an authentication request to the portable terminal 400y (S460a). It is assumed here that a particular key for generating a trigger causing the authentication request sending/receiving part 460 to perform the authentication request send operation (S460a) is preset on every portable terminal 400, including the portable terminals 400x and 400y. Accordingly, the user of the portable terminal 400x can send the authentication request to the portable terminal 400y by depressing the preset particular key. Preferably, a key on a side face, for example, of the portable terminal is assigned as the preset particular key so that the user can readily depress the key during a phone conversation.
While the authentication request sending/receiving part 460 is activated in response to the depression of the particular key by the user of the portable terminal 400x in the foregoing description, the way to activate the authentication request sending/receiving part 460 is not limited to this. For example, a display element for issuing an authentication request may be displayed on the display during a voice call to allow the user to send an authentication request by selecting the display element and depressing an OK key. Alternatively, the authentication request sending/receiving part 460 of the portable terminal 400x, which is the called terminal, may automatically operate to perform step 460a upon establishment of a call or upon the lapse of a predetermined period of time after establishment of a call. In this case, a key for generating the trigger does not need to be provided on the portable terminal.
The authentication request sending/receiving part 460 of the portable terminal 400y receives the authentication request from the portable terminal 400x (S460b). Then, the authentication data sending part 470 of the portable terminal 400x sends the terminal identification number of the portable terminal 400x to the server 500 (S470a) when the authentication request sending/receiving part 460 sends the authentication request. When the authentication request sending/receiving part 460 of the portable terminal 400y receives the authentication request (S460b), the authentication data sending part 470 sends a most recently acquired gripping-feature sample to the server 500 (S470b). The authentication data sending part 470 operates differently depending on whether the authentication request sending/receiving part 460 sends or receives an authentication request, for the following reason. The user who is requesting authentication can be regarded as the authentic owner of the terminal and does not need to be authenticated. Therefore the owner of the portable terminal identified by the terminal identification number and the user requesting the authentication can be treated as one and the same person. On the other hand, the user whose authentication has been requested needs to be subjected to authentication. Therefore, authentication is need to be performed to compare the most recently acquired gripping-feature sample with the user authentication template for authentication.
The following is an operation performed by the server 500. The authentication data receiving part 560 of the server 500 receives the terminal identification number sent from the portable terminal (portable terminal 400x) that has sent the authentication request and the gripping-feature sample sent from the portable terminal (portable terminal 400y) that has received the authentication request (S560). The member authentication part 570 of the server 500 uses the terminal identification number received from the portable terminal 400x to read the corresponding member group G from Table 54Ta stored in the member template storage 540, refers to table 54Tb to compare the user authentication templates in table 54Ta that correspond to the terminal identification numbers of all of the members included in the member group G with the gripping-feature sample received from the portable terminal 400y, thereby determines the probability that the user of the portable terminal 400y belongs to the same member group (S570). In this description, the probability that the user of the portable terminal 400x and the person operating the portable terminal 400y belong to the same member group is determined. The determination result sending part 580 of the server 500 sends the result of the determination made by the member authentication part 570 to the portable terminal (portable terminal 400x) that has sent the authentication request (S580a).
Here, the probability means the highest degree of match of the gripping-feature with each of a plurality of candidate user authentication templates selected. For example, if a user authentication template is represented by a vector TMP=(v1, v2, . . . , vn) and a gripping-feature sample acquired is represented by a vector X=(x1, x2, . . . , xn), then the probability P(X) can be given by the following expression on the basis that the perfect match=100%.
This is illustrative only and those skilled in the art can readily give various definitions. The probability P may be directly sent to the portable terminal as the determination result or the probability may be compared with a predetermined threshold before sending the result of determination as to whether the users belong to the same member group.
The determination result receiving part 480 of the portable terminal 400x receives the result of the determination made by the member authentication part 570 from the server 500 (S480). In this way, if the user of the portable terminal 400x doubts whether the person on the other end of the call is the user of the portable terminal 400y, the user of the portable terminal 400x sends an authentication request and receives the probability that the person currently operating the portable terminal 400y belongs to the same member group as the user of the portable terminal 400x as a determination result notice from the server 500. Accordingly, the user of the portable terminal 400x can determine his/her attitude to the person operating the portable terminal 400y according to the determination result received. For example, if the determination result notice received from the server 500 indicates a low probability that the person currently operating the portable terminal 400y matches any of the users belonging to the same member group as the user of the portable terminal 400x, the user of the portable terminal 400x can determine that the person operating the portable terminal 400y is a malicious third party pretending his/her friend and hung up.
A gripping-feature learning authentication system 2000 according to a second embodiment which allows member information to be flexibly created and changed by user settings will be described below in detail. A learning operation of the gripping-feature learning authentication system 2000 according to the second embodiment will be described with reference to
As illustrated in
A gripping-feature learning authentication system 3000 according to a third embodiment, in which the function of the server is extended, will be described in detail. Learning operation of the gripping-feature learning authentication system 3000 of the third embodiment is exactly the same as that of the gripping-feature learning authentication system 2000 of the second embodiment and therefore the description of the operation will be omitted. Authentication operation of the gripping-feature learning authentication system 3000 of the third embodiment will be described with continuing reference to
The present embodiment differs from the second embodiment in that whereas the server 500′ of the second embodiment includes the determination result sending part 580, the server 500″ of the present embodiment includes a determination result sending part 580′ having a function further extended from the function of the determination result sending part 580. The components of the server 500″ other than the determination result sending part 580′ operate exactly the same way as the components labeled with the same reference numerals in the second embodiment and therefore the description of the operations of those components will be omitted. Authentication operation of the gripping-feature learning authentication system 3000 according to the present embodiment differs from the second embodiment in that if the result of determination (probability) made by the member authentication part 570 is lower than or equal to a predetermined threshold, the determination result sending part 580′ sends a disconnection request to the network (S580b). After the communication has been disconnected, a notice that communication has been forcedly disconnected because of the result of member authentication may be sent to the portable terminal 400′x.
Alternatively, each time the member authentication part 570 provides a bad determination result (a probability of belonging to the same member group as an authentication requesting terminal that is lower than or equal to a predetermined value), for example the determination result sending part 580′ may add up the number of bad determination results as a third party point and, when the third party point exceeds a predetermined value, the determination result sending part 580′ may send a disconnection request to the network (S580b). For example, the server 500″ may send the first bad determination result to the portable terminal 400′x (S580a), the portable terminal 400′x, which received the first bad determination result, may return to step S460a as indicated by a dashed line in
The security against impersonation can be further improved in this way by the determination result sending part 580′ sending a disconnection request to the network if the result of determination (probability) made by the member authentication part 570 is not good, or the third party point, which is the sum of the number of times the member authentication part 570 has provided a bad determination result, exceeds a predetermined value.
A gripping-feature learning authentication system 4000 according to a fourth embodiment 4, in which the function of the server is further extended, will be described below in detail. Learning operation of the gripping-feature learning authentication system 4000 of the present embodiment is exactly the same as that of the gripping-feature learning authentication system 2000 of the second embodiment and therefore the description of the operation will be omitted. Authentication operation of the gripping-feature learning authentication system 4000 according to the present embodiment will be described with reference to
In this way, the server can provide information indicating the current position of the portable terminal that has received the authentication information to provide the position information to the user as information for determining authenticity. Furthermore, if the user determines that the person on the other end of communication is an impersonating criminal, the user can provide the position information to the police to help the police detect the criminal.
A gripping-feature learning authentication system 5000 according to a fifth embodiment in which a server performs a learning operation will be described in detail below. Authentication operation of the gripping-feature learning authentication system 5000 according to the present embodiment is exactly the same as the authentication operation of the gripping-feature learning authentication system 2000 of the second embodiment and therefore the description of the authentication operation will be omitted. Learning operation of the gripping-feature learning authentication system 5000 of the present embodiment will be described with reference to
The gripping-feature sample receiving part 520′ of the server 500″″ receives the gripping-feature samples sent from the portable terminal 400″ (S520′). The member information receiving part 530 of the server 500″″ receives the member information sent from the portable terminal 400″ (S530). The template learning part 135 of the server 500″″ uses the received gripping-feature samples to learn a user authentication template (S135). The member template storage 540 stores the learned user authentication template and the received member information in association with each other (S540).
Since the server 500″″ of the present embodiment includes the template learning function, the need for the portable terminal to learn a template is eliminated and memory can be saved.
While the description of embodiments has disclosed the first embodiment, which is a basic embodiment, the second embodiment in which the member information storage 410, the member information sending part 430, and the member information receiving part 530 are added to the first embodiment, the third embodiment in which the determination result sending part 580 of the second embodiment is replaced with the determination result sending part 580′ having extended functionality, the fourth embodiment in which the position information acquisition part 590 is added to the second embodiment, and the fifth embodiment in which the template learning part 135 of the portable terminals of the second embodiment is moved to the server, the combinations of the components are not limited to those described above. The functionality of the determination result sending part 580 of the first embodiment may be extended to that of the determination result sending part 580′. The position information acquisition part 590 may be added to the first embodiment. Both of the determination result sending part 580′ and the position information acquisition part 590 may be added to the first embodiment. The template learning part 135 of the portable terminals of the first embodiment and the variation of the first embodiment may be moved to the server. The position information acquisition part 590 may be added to the third embodiment. The template learning part 135 of the portable terminals of the third embodiment or the variation of the third embodiment may be moved to the server. The template learning part 135 of the portable terminals of the fourth embodiment may be moved to the server.
<Possible Cases>
Possible cases where a gripping-feature learning authentication system of the present invention is used will be described below and patterns for achieving the object of the present invention will be described in detail. The possible cases can be implemented in a gripping-feature learning authentication system of any of the embodiments. The concept of the server 500 that appears in the description of the possible cases encompasses any of the server 500 of the first embodiment, the server 500′ of the second embodiment, the server 500″ of the third embodiment, the server 500″′ of the fourth embodiment, and the server 500″″ of the fifth embodiment, although the primes are omitted from the reference numeral. Settings used in the description of the possible cases will be described first with reference to
Possible case 1 will be described with reference to
In response to the call originated from the portable terminal 400c (S001), call processing is performed on the network 10 and the call arrives at the portable terminal 400a (S002). Upon the arrival of the call, the phone number of the portable terminal 400c is displayed on the incoming-call screen of the portable terminal 400a. However, since user A and user C are unacquainted with each other and the phone number of user C is not registered in the address book as stated above, the incoming call is a call from a phone number unknown to user A. It is assumed here that user A responds to the incoming call from the unknown phone number and the call is established (S003). Conversation between user A and user B starts and user B tells user A that he is user B.
Here, suppose that user A is suspicious about user B's story because the call is from an unknown number, doubts that the person with whom user A is having a conversation may be impersonating user B and wants to issue an authentication request to identify the person. User A sends an authentication request REQ to the portable terminal 400c by depressing a preset particular key in her portable terminal 400a (S460a). The portable terminal 400c receives the authentication request REQ from the portable terminal 400a (S460b). The portable terminal 400a sends its own terminal identification number ID to the server 500 (S470a). On the other hand, the portable terminal 400c sends the most recently acquired gripping-feature sample X to the server 500 (S470b). It is assumed that the sampling trigger described earlier has been set to be generated with a relatively high frequency, such as once a minute, and a gripping-feature sample X of user B is acquired as the most recent gripping-feature sample. The server 500 receives the terminal identification number ID from the portable terminal 400a and the gripping-feature sample X from the portable terminal 400c.
The server 500 compares each of user authentication templates associated with the users in the member group G to which the user with the received terminal identification number ID belongs with the received gripping-feature sample X to determine the probability P that user A and the user corresponding to the received gripping-feature sample X belong to the same member group G (S570). Since user A and user B in this possible case are subscribers to a family rate pla users A and B belong to the same member group. The server 500 compares the user authentication templates of all of the users belonging to the same member group as user A, including user B, with the gripping-feature sample X acquired by the portable terminal 400c from user B. Thus the result of determination (probability P) based on the comparison indicates a significantly high probability that the person who is currently having a conversation with user A is user B, who belongs to the same member group. The server 500 sends the result of the determination P to the portable terminal 400a (S580a). The portable terminal 400a receives the result of the determination from the server 500 (S480). In this way, user A can feel certain that the person making a conversation with user A is user B, her husband, even though the incoming call is from an unknown number. The gripping-feature learning authentication system of the present invention has the advantageous effect described above because the gripping-feature learning authentication system achieves authentication between people operating portable terminals, rather than authentication between portable terminals or authentication between user portable terminals.
Possible case 2 will be described next with reference to
In response to the call originated from the portable terminal 400c (S001), call processing is performed on the network 10 and the call arrives at the portable terminal 400a (S002). Upon the arrival of the call, the phone number of the portable terminal 400c is displayed on the incoming-call screen of the portable terminal 400a. However, since user A and user C are unacquainted with each other and the phone number of user C is not registered in the address book as stated above, the incoming call is a call from a phone number unknown to user A. It is assumed here that user A responds to the incoming call from the unknown phone number and the call is established (S003). Conversation between user A and user C starts and user C impersonates user B to victimize user A.
Here, supposed that user A is suspicious about user B's story because the call is from an unknown number, doubts that the person with whom user A is having a conversation may be impersonating user B, and wants to issue an authentication request to identify the person. User A sends an authentication request REQ to the portable terminal 400c by depressing a preset particular key on her portable terminal 400a (S460a). The portable terminal 400c receives the authentication request REQ from the portable terminal 400a (S460b). The portable terminal 400a sends its own terminal identification number ID to the server 500 (S470a). On the other hand, the portable terminal 400c sends the most recently acquired gripping-feature sample X to the server 500 (S470b). It is assumed that the sampling trigger described earlier has been set to be generated with a relatively high frequency and the gripping-feature sample X of user C is acquired as the most recent gripping-feature sample.
The server 500 receives the terminal identification number ID from the portable terminal 400a and the gripping-feature sample X from the portable terminal 400c (S560). The server 500 compares user authentication templates of the users in the member group G corresponding to the terminal identification number received from the portable terminal 400a with the gripping-feature sample X received from the portable terminal 400c to determine the probability P that user A and the user corresponding to the received gripping-feature sample X belong to the same member group (S570). Since user A and user B in this possible case are subscribers to a family rate pla users A and B belong to the same member group. The server 500 compares the user authentication templates of all of the users belonging to the same member group as user A with the gripping-feature sample acquired from user C. Thus the result of determination based on the comparison indicates a significantly low probability that the person who is currently having a conversation with user A is user B, who belongs to the same member group. The server 500 sends the result of determination to the portable terminal 400a (S580a). The portable terminal 400a receives the result of the determination from the server 500 (S480). If this possible case is applied to the gripping-feature learning authentication system 3000 of the third embodiment, the operation of sending a disconnection request from the server 500 to the network 10 (S580b) is added (
Possible case 3 will be described next with reference to
In response to the call originated from the portable terminal 400b (S001), call processing is performed on the network 10 and the call arrives at the portable terminal 400a (S002). Upon the arrival of the call, the phone number of the portable terminal 400b is displayed on the incoming-call screen of the portable terminal 400a. Since user A and user B are a married couple as stated above, user A believes that the call is from his husband, user B, of course. It is assumed here that user A responds to the incoming call and the call is established (S003). Conversation between user A and user C starts. Suppose, however, that since the voice of the person currently having the conversation with user A sounds somewhat unusual, user A doubts that the person with whom user A is having a conversation may be impersonating user B, and wants to issue an authentication request to identify the person. User A sends an authentication request REQ to the portable terminal 400b by depressing a preset particular key on her portable terminal 400a (S460a). The portable terminal 400b receives the authentication request REQ from the portable terminal 400a (S460b). The portable terminal 400a sends its own terminal identification number ID to the server 500 (S470a). On the other hand, the portable terminal 400b sends the most recently acquired gripping-feature sample X to the server 500 (S470b). It is assumed that the sampling trigger described earlier has been set to be generated with a relatively high frequency and the gripping-feature sample X of user C is acquired as the most recent gripping-feature sample.
The server 500 receives the terminal identification number ID from the portable terminal 400a and the gripping-feature sample X from the portable terminal 400b (S560). The server 500 compares user authentication templates of all of the users in the member group G corresponding to the terminal identification number ID received from the portable terminal 400a with the gripping-feature sample X received from the portable terminal 400b to determine the probability P that user A and the user corresponding to the received gripping-feature sample X belong to the same member group G (S570). Since user A and user B in this possible case are subscribers to a family rate plan, they belong to the same member group G If user C does not belong to the same member group G as user A, the result of the determination (probability P) based on the comparison with the gripping-feature sample X acquired from user C indicates a significantly low probability that the person who is currently having a conversation with user A belong to the same member group G, and the person is unlikely to be user B. The server 500 sends the result P of the determination to the portable terminal 400a (S580a). The portable terminal 400a receives the result of the determination from the server 500 (S480). If this possible case is applied to the gripping-feature learning authentication system 3000 of the third embodiment, the operation of sending a disconnection request from the server 500 to the network 10 (S580b) is added. In this way, user A can be assured that the person making a conversation with user A is not user B, even though the incoming call is from the portable terminal 400b owned by user B and the person making the conversation is impersonating user B, her husband. The gripping-feature learning authentication system of the present invention has the advantageous effect described above because the gripping-feature learning authentication system achieves authentication between people operating portable terminals.
Each type of processing described above may be executed not only time sequentially according to the order in the description but also in parallel or individually when necessary or according to the processing capability of each apparatus that executes the processing. Appropriate changes can be made to the present invention without departing from the scope of the present invention.
When the configurations described above are implemented by a computer, the processing details of the functions that should be provided by each apparatus are described in a program. When the program is executed by the computer, the processing functions are implemented on the computer.
The program containing the processing details can be recorded in a computer-readable recording medium. The computer-readable recording medium can be any type of medium, such as a magnetic recording device, an optical disc, a magneto-optical recording medium, or a semiconductor memory.
The program is distributed by selling, transferring, or lending a portable recording medium, such as a DVD or a CD-ROM, with the program recoded on it, for example. The program may also be distributed by storing the program in a storage unit of a server computer and transferring the program from the server computer to another computer through a network.
A computer that executes this type of program first stores the program recorded on a portable recording medium or the program transferred from the server computer in its storage unit. Then, the computer reads the program stored in its storage unit and executes processing in accordance with the read program. In a different program execution form, the computer may read the program directly from the portable recording medium and execute processing in accordance with the program, or the computer may execute processing in accordance with the program each time the computer receives the program transferred from the server computer. Alternatively, the above-described processing may be executed by a so-called application service provider (ASP) service, in which the processing functions are implemented just by giving program execution instructions and obtaining the results without transferring the program from the server computer to the computer. The program of this form includes information that is provided for use in processing by the computer and is treated correspondingly as a program (something that is not a direct instruction to the computer but is data or the like that has characteristics that determine the processing executed by the computer).
In the description given above, each apparatus is implemented by executing the predetermined program on the computer, but at least a part of the processing may be implemented by hardware.
Number | Date | Country | Kind |
---|---|---|---|
2011034393 | Feb 2011 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2012/052893 | 2/8/2012 | WO | 00 | 7/11/2013 |