The present invention relates to a method of verifying the identity of a user based on a gesture performed by said user. The invention further relates to a system of verifying the identity of a user.
Today's digital user verification approaches are either in principle insecure or inconvenient. A personal password or PIN can be stolen or overseen so that a fraud can misuse it. Additional security by using session-dependent codes (e.g. TAN) adds inconveniences for storing and managing these codes. Therefore, biometric features are envisioned as a personal yet convenient way to overcome these drawbacks. Nevertheless, many of these approaches have shortcomings:
Voice Print—This approach is not yet perfectly reliable, it could be a good choice, in principle, as it makes use of a microphone, which mostly is present in many relevant devices. Furthermore, speech is in a variety of cases a natural modality of communication. However, it might be awkward for a user to speak a verification phrase aloud at a shop checkout point, or some devices might still not have microphones (an example of such a device could e.g. be a remote control).
Fingerprint—This approach is considered secure enough but requires additional hardware. Further, it requires a significant larger amount of storage space on devices.
Iris Scan, Face Recognition, etc.—Such advanced biometric user verification approaches either require dedicated additional hardware and/or are quite expensive in terms of computational resources.
Digitized handwriting signature—For payment applications this can be a good choice. Touch sensitive displays for recording the handwriting signature are also available in many devices. E.g. in U.S. Pat. No. 6,539,101 pens/styli with embedded biometric features (e.g. finger print scanners) are described. This information is then combined with handwriting based user authentication to enhance security.
It is therefore an object to provide devices and method solving the above mentioned problems.
This is obtained by a method of verifying the identity of a user, and based thereon controlling access to user specific data or actions, said method verifies said identity by receiving an identification key, and based on a comparison with a pre stored reference identification key access to said user specific data or action is controlled, said identification key being obtained by the steps of:
visually recording a gesture by recording the trajectory of a hand of said user when the user uses said hand for performing a gesture,
extracting gesture characteristics from said visually recorded gesture,
performing said verification by comparing an identification key comprising said gesture characteristics with a pre stored reference identification key comprising reference gesture characteristics.
The most significant advantage of the gesture signature over “static” approaches like iris scans or face recognition is reliability. The dynamic data inherent in a gesture signature strongly increases the verification confidence.
Further advantages separated in the categories security, reliability, convenience and bill of material are:
Security: By combining personal patterns with personal dynamic movements the highest level of security can be technically achieved.
Reliability: Since it is not necessary to record small details, but only rather crude motions, a gesture signature can be acquired reliably also in rather adverse conditions (lighting conditions, noise).
Convenience: A gesture can be recorded over a distance, or by a personal handheld device with the most common and widespread hardware, namely by video.
Bill of material: The detection of movements does not so much rely on the accurate recording of particular small details. Therefore, simple and cheap recording equipment can do the job.
In an embodiment said video recording means is placed in a wand, said wand being held in the hand of said user when the user performs the gesture, and the trajectory of said hand is obtained from the video signal recorded by said video recording means. A UI (user interface) Wand promises to be a widespread commodity for lean-back and in-a-distance interaction with devices. It is therefore faster and more convenient to stick to the UI Wand also for verification issues at a checkout when the customer already used it as virtual shopping cart. But the gesture signature is definitely much more convenient than a handwriting Signature in the living room scenario with a person controlling entertainment equipment, selecting content in a relaxed lean-back mood and verifying this at some points in time. This particularly includes home shopping via (interactive) television.
In an embodiment said wand comprises a protection system ensuring that only a registered user can validly use said wand. Thereby a wand can only be used by the registered user, and features of the wand can further be used to uniquely identify the gestures of the user.
Combining the gesture signature with a unique electronic ID of the Wand can ensure even further enhanced security. Since the verification is only valid with a particular wand, misuse of the wand by unauthorized people is made almost impossible. Further misuse of low-level digital personal ID data by a hacker is made almost impossible when the Wand cryptographically signs each given signature with transaction specific details. This can include date and time but also data that is exchanged between the administering application and transaction server and the Wand specifically on this particular transaction. This eliminates the use of the transmitted digital verification data for any other transaction.
In an embodiment said video recording means is placed around the user pointing towards the hand of said user for visually recording the hand during the gesture, and the trajectory of the gesture is extracted from said recorded gesture. Thereby the user does not have to carry any special tool, it is in the surroundings e.g. in the stores the recording means has to be placed. Thereby it is made cheaper for the user to start using the gesture as a user signature.
The invention further relates to a computer readable medium having stored therein instructions for causing a processing unit to execute the method described above.
The invention further relates to a verification system for verifying the identity of a user and based thereon controlling access to user specific data or actions, said verification system verifies said identity by receiving an identification key and based on a comparison with a pre stored reference identification key access to said user specific data or action is controlled, said verification system comprises:
video recording means for visually recording a gesture by recording the trajectory of a hand of said user when the user uses said hand for performing a gesture,
processing means for extracting gesture characteristics from said visually recorded gesture,
processing means for performing said verification by comparing an identification key comprising said gesture characteristics with a pre stored reference identification key comprising reference gesture characteristics.
In an embodiment said system further comprises:
a wand comprising said video recording means, said wand being adapted to be held in the hand of said user when the user performs the gesture,
processing means for obtaining the trajectory of said hand from the video recorded by said video recording means in said wand.
In an embodiment said system further comprises:
video recording means being adapted to be placed around the user for visually recording the hand of said user when the user performs the gesture,
processing means for obtaining the trajectory of said hand from the video recorded by said video recording means.
In the following preferred embodiments of the invention will be described referring to the figures, where
In
Two general approaches of recording the raw data of a gesture are described below being respectively one referred to as an external gesture recorder and a hand held gesture recorder.
The external gesture recorder has fixed sensors. There are several known systems that try to derive e.g. pointing information from an external video signal or a number of external video signals obtained from video recording means placed around the user to obtain the trajectory of the hands of the user. Similar systems exist to derive sign language information from video signals. It is essential to all such systems to abstract as much as possible from the individual performance of a gesture in order to filter out the generic underlying motion. For the sign language systems, the personal variation is rather considered an obstacle in the task of classifying a gesture. In a system according to the present invention, a different goal has to be achieved. The raw data is not compressed as much as it may be optimal for “recognition”. An advantage of having external video recording means is that they can furthermore supply additional face recognition data, which might be combined into one compound identification system together with the person verification based on the gesture.
An example of an external gesture recorder is illustrated in
The hand-held system has built-in sensors to record the motion of the device. Known systems are e.g. gloves or 3D mice for use in virtual reality systems, or light pens to write on a (distant) screen. But still, as compared to recognition of a generic gesture, the task of this invention is different.
According to the present invention a UI wand 301 as illustrated in
In
The UI Wand represents an excellent example, where the gesture signature blends in very naturally with other related activities such as controlling home entertainment equipment or shopping both in the real world and virtually.
The UI wand could be a user interface device for control of home entertainment equipment. By simply pointing at menus and device features (such as buttons) it is easy to select functionality and conduct certain tasks. Further gestures are also used to supply additional information (e.g. pointing at a loudspeaker and then circling clockwise to increase the volume). Whenever the user wants to access pay-per-use or age-restricted content, he must provide some sort of identification. Besides the fact that today's systems do not offer much except a PIN code that must be entered, the definite identification of the user (i.e. verification) can also be achieved by the proposed gesture signature. The user simply writes some sort of personal symbol “into the air”, which will then be processed accordingly.
In a shop, customers use the UI Wand as a virtual shopping cart. While strolling through the aisles of the store, they simply point at desired articles, indicate numbers by gestures, and proceed further. At the checkout, the customers can re-check what they “put in the shopping cart” at a dedicated display, make last-minute adjustments to it and pay. Making the personal gesture as a signature closes the deal in a secure and yet very convenient way.
The gestures mentioned above could be both two dimensional and three dimensional. Generally, the user performs a gesture trajectory in a three dimensional space. The gesture trajectory could either be projected in two dimensions in which the gesture data is recorded. Alternatively, all three dimensions of the gesture trajectory are detected, and the gesture data is based on all three dimensions.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word ‘comprising’ does not exclude the presence of other elements or steps than those listed in a claim. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a device claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Number | Date | Country | Kind |
---|---|---|---|
04103048.7 | Jun 2004 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB05/52118 | 6/27/2005 | WO | 00 | 12/18/2006 |