The present invention relates to a method of authenticating an image displayed on a screen. More in particular, the present invention relates to a method of verifying the authenticity of an image being rendered on a display screen.
Display screens are used for displaying various types of images. Some images may contain pure graphical information such as pictures, while other images may contain alphanumeric characters. In ATMs (Automatic Teller Machines) and computers, for example, the graphical screen image will typically be mixed and contain both pure graphical information such as symbols, and alphanumeric characters such as text and numbers.
Often display screens are used for carrying out transactions involving secret or confidential information. In ATMs, for example, secret access codes or PINs (Personal Identification Numbers) are used to authorize an electronic financial transaction. Similarly, computers may be used to carry out financial transactions via the Internet. In such instances, it is vital that the information rendered by the display screen is authentic, that is, is not tampered with. Cases of fraud involving “fake” ATMs have been reported, and it is well known that Internet traffic can be interfered with, possibly resulting in an unauthorized person gaining access to confidential or secret information.
The paper “The Untrusted Computer Problem and Camera-Based Authentication” by M. Burnside et al., MIT Technical Memo 450, March 2002, discloses a method of verifying the trustworthiness of a “public” computer, that is a computer available to the general public. In particular, the paper discloses a method of authenticating the image displayed on the screen of the computer. To this end, a camera monitors the display screen of the computer. The image on the screen contains security information, such as a MAC (Message Authentication Code), an encrypted serial number and an encrypted password. A camera-equipped security device checks the serial number, calculates a MAC on the basis of the information displayed on the screen and compares this calculated MAC with the MAC displayed on the screen. If all checks succeed the image is deemed to be authentic.
Although this Prior Art method provides an excellent degree of protection against tampering and security attacks, it suffers from the disadvantage that a camera must used. This is both cumbersome and relatively expensive. During an initial calibration phase, a mapping between the pixels (“picture elements”) of the display screen and the pixels of the camera has to be made. It will be clear that the need for such a calibration phase hampers the usefulness of this known method. In addition, the cost of a camera which necessarily involves a lens is relatively high, thus limiting large-scale consumer applications.
It is therefore an object of the present invention to overcome these and other problems of the Prior Art and to provide a method of verifying the authenticity of an image being rendered on a display screen which is both easier and less expensive. Accordingly, the present invention provides a method of verifying the authenticity of an image being rendered on a display screen using a graphical representation of an authentication code associated with the image, said graphical representation also being rendered on the display screen, the method comprising the steps of:
By using a scanner, both for reading (that is, producing an electronic representation of and optionally processing) the image and for reading the authentication code, the use of a camera and its associated drawbacks is avoided. In particular, no calibration phase is necessary while in a typical embodiment lenses can be omitted. In addition, a scanner can be smaller and less expensive than a camera.
Preferably, the scanner is a hand-held scanner. In a preferred embodiment, the scanner is a hand-held, portable scanner which can easily be carried by the user. In particular credit-card size scanners are preferred. An example of such a scanner is disclosed in United States Patent U.S. Pat. No. 4,922,111 (Sanyo Electric).
Although various types of scanners can be used, including scanners providing two-dimensional scanning, it is preferred that the scanner is a linear scanner. That is, the scanner has a linear array of scanning elements (photo-sensitive elements). By moving the linear array of scanning elements in a direction which is substantially perpendicular to the array, a two-dimensional scan is obtained.
Advantageously, the step of producing an electronic representation of the image and the step of deriving the authentication code from its graphical representation may together involve a single scanning motion. That is, a single scan is made in which both the image and the (graphical representation of the) authentication code are scanned. It is noted that the authentication code and the associated image are typically displayed simultaneously, although the authentication code could also be displayed before or after the associated image.
Although preferably a single scanner is used to scan the image and the authentication code, embodiments can be envisaged in which separate scanners are used.
A user can scan the image and the associated authentication code as often as desired. It is preferred that the user performs such an authentication scan every time the screen information is updated, or at least every time important and/or confidential screen information is updated. To this end, the display screen may provide a scanning prompt after the image is changed. Such a scanning prompt may comprise a text on the screen (e.g. “scan now”), a separate off-screen indication light and/or a sound signal or spoken message.
The image displayed may contain various types of information. The image may comprise alphanumeric characters, such as letters and numbers, but the image may also, or alternatively, comprise symbols and/or pictures. It will be understood that the method of the present invention is particularly useful when the image comprises financial information, such as bank account numbers, bank balances, account access codes and similar information.
The authentication code may be distinguished from the image proper displayed on the screen by its particular graphical representation, for example a bar code or another symbolic representation. Alternatively, or additionally, the graphical representation of the authentication code may comprise guide marks for guiding the scanner. In this case the guiding of the scanner may involve both guiding the user when using a hand-held scanner and facilitating the process of deriving the authentication code from its graphical representation. Guide marks may also be provided for scanning the entire image. For example, a line surrounding a particular image may serve as a guide mark and indicate the part of the screen which is to be scanned. Of course, symbols such as dots and/or triangles may be used instead of, or in addition to a line.
When scanning the image and the authentication code, both are preferably converted into an electronic representation such as a bit map. Any recognition of image features and of the authentication code may be based upon such a bit map, that is, may be based upon the electronic representation of the image. In an advantageous embodiment, however, the step of producing an electronic representation of the image involves optical character recognition (“OCR”). In this embodiment, any alphanumeric and/or other characters displayed on the screen are recognized. It will be understood that OCR may also be used to recognize the authentication code if this code is represented by suitable characters.
The method of the present invention may advantageously further comprise the steps of:
In this way, the authenticity of the image can be verified by way of the authentication code.
The present invention further provides a scanning device for use in the method as defined above, the scanning device comprising:
The present invention will further be explained below with reference to exemplary embodiments illustrated in the accompanying drawings, in which:
The system 9 shown merely by way of non-limiting example in
The display screen 10 may be an LCD (Liquid Crystal Display) screen, a CRT (Cathode Ray Tube), a plasma screen or any other suitable screen. The scanner 20 is, in the embodiment shown, a linear hand-held scanner which can be carried by the user. To scan any image displayed on the display screen 10, the user moves the scanner across the relevant section of the screen.
A possible lay-out of the screen 10 is shown in more detail in
As shown in
In addition to, or instead of the guide marks 3 shown in
In a preferred embodiment, the scanner 20 is provided with optical character recognition (OCR) software and/or hardware. This allows the scanner to read and interpret both the text and/or data of the image and the alphanumeric authentication codes when the scanner is moved across the relevant sections of the screen 10.
In an alternative embodiment, however, the scanner is a bar code scanner provided with a key pad, the user being able to enter important data using the key pad and scanning the bar code representation of the authentication code of those key data. The user could, for instance, enter a bank balance or another confidential number in the key pad of the scanner and then scan the authentication code corresponding with the bank balance. The scanner would then check the authentication code and indicate whether the authentication codes matches the number which was keyed in.
The authentication code is preferably a so-called MAC (Message Authentication Code). A MAC is a number produced by using a so-called hash function which is a one-way function: it is relatively easy to derive the MAC from the input (here: the image data) using the hash function but it is virtually impossible to derive the input from the MAC. To provide additional security, the process of deriving a MAC typically involves the use of a cryptographic key. MACs, hash functions and cryptographic keys are well known to those skilled in the art and are described in more detail in the textbook “Applied Cryptography” by Bruce Schneier, second edition, John Wiley & Sons, 1996.
A side view of the scanner 20 is presented in
The exemplary scanner 20 schematically shown in
In the embodiment shown, the scanner 20 is a passive scanner which has no light source for illuminating the scanned object. As in the present invention the scanned object typically is a luminous display screen, a passive scanner is sufficient. However, embodiments can be envisaged in which the scanner is provided with a light source for illuminating the screen.
The scanner 20 is advantageously shaped and dimensioned so as to resemble a credit card or similar card, the photosensitive elements 21 preferably being accommodated in an edge of the card-shaped substrate constituting the scanner body. Thus a very compact and practical hand-held scanner is obtained.
The microprocessor 23 is arranged for carrying out suitable software programs stored in the memory 24. Such programs may include programs for optical character recognition, bar code recognition, producing an authentication code using an electronic representation of an image, and comparing authentication codes. Instead of, or in addition to the microprocessor and associated memory shown, a dedicated circuit such as an ASIC (Application Specific Integrated Circuit) may be used.
On the basis of the scanning signals produced by the photosensitive elements 21 and transmitted by the I/O circuit 22, the microprocessor 23 (or its equivalent) may produce a bit map of the scanned image, that is, a digital (electronic) representation of the image 1 and possibly also of the authentication code 2. The bit map may then be processed by the microprocessor 23 to produce an authentication code. Alternatively, optical character recognition is applied to the image and digital representations of the characters of the image are produced which then are used to produce an authentication code. In both cases, an electronic representation of the image is produced. Also, in both cases parts of the image may be selected to produce the authentication code: only particular areas, words and/or numbers may be used, thus reducing the computational load and the memory requirements.
As mentioned above, producing an authentication code typically involves a so-called hash function known per se, and typically also a cryptographic key. The particular procedure of producing an authentication code is not essential for the present invention.
The method steps of an advantageous embodiment of the present invention are illustrated in
In step 53 the scanner calculates a further authentication code, denoted MAC2, on the basis of the scanned image. As mentioned above, a selection step for selecting relevant parts of the scanned image may precede the calculation.
The authentication codes are compared in step 54: the scanner checks whether MAC1=MAC2. If this is true, the image corresponding with the MACs is deemed authentic and a positive indication is issued, for example the indicator 29 (
It is noted that in the above example it is assumed that all processing takes place in the scanner. Although this is the preferred arrangement, alternative embodiments are possible where the scanner is capable of communicating with a processing device, for example via a cable or a wireless connection using a suitable wireless protocol, such as Bluetooth®. In such an embodiment, the scanner could be less expensive and more compact.
The present invention is based upon the insight that for the verification of the authenticity of an image a scanner is much more practical than a camera The scanner can be hand-held, relatively inexpensive and does not require a calibration procedure. Using a scanner, consumers will be able to carry out secure transactions, even when the terminal they are using is not secure.
It is noted that any terms used in this document should not be construed so as to limit the scope of the present invention. In particular, the words “comprise(s)” and “comprising” are not meant to exclude any elements not specifically stated. Single (circuit) elements may be substituted with multiple (circuit) elements or with their equivalents.
It will be understood by those skilled in the art that the present invention is not limited to the embodiments illustrated above and that many modifications and additions may be made without departing from the scope of the invention as defined in the appending claims.
Number | Date | Country | Kind |
---|---|---|---|
03103874.8 | Oct 2003 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB04/52093 | 10/14/2004 | WO | 4/18/2006 |