1. Field of the Invention
This invention relates generally to the field of data processing systems. More particularly, the invention relates to a system and method for authorizing a new authenticator.
2. Description of Related Art
While the system shown in
Systems have been designed for providing secure user authentication over a network using biometric sensors. In such systems, the score generated by the application, and/or other authentication data, may be sent over a network to authenticate the user with a remote server. For example, Patent Application No. 2011/0082801 (“'801 Application”) describes a framework for user registration and authentication on a network which provides strong authentication (e.g., protection against identity theft and phishing), secure transactions (e.g., protection against “malware in the browser” and “man in the middle” attacks for transactions), and enrollment/management of client authentication tokens (e.g., fingerprint readers, facial recognition devices, smartcards, trusted platform modules, etc).
The assignee of the present application has developed a variety of improvements to the authentication framework described in the '801 application. Some of these improvements are described in the following set of US Patent Applications (“Co-pending Applications”), all filed Dec. 29, 1012, which are assigned to the present assignee and incorporated herein by reference: Ser. No. 13/730,761, Query System and Method to Determine Authentication Capabilities; Ser. No. 13/730,776, System and Method for Efficiently Enrolling, Registering, and Authenticating With Multiple Authentication Devices; Ser. No. 13/730,780, System and Method for Processing Random Challenges Within an Authentication Framework; Ser. No. 13/730,791, System and Method for Implementing Privacy Classes Within an Authentication Framework; Ser. No. 13/730,795, System and Method for Implementing Transaction Signaling Within an Authentication Framework.
Briefly, the Co-Pending Applications describe authentication techniques in which a user enrolls with authentication devices (or Authenticators) such as biometric devices (e.g., fingerprint sensors) on a client device. When a user enrolls with a biometric device, biometric reference data is captured (e.g., by swiping a finger, snapping a picture, recording a voice, etc). The user may subsequently register the authentication devices with one or more servers over a network (e.g., Websites or other relying parties equipped with secure transaction services as described in the Co-Pending Applications); and subsequently authenticate with those servers using data exchanged during the registration process (e.g., cryptographic keys provisioned into the authentication devices). Once authenticated, the user is permitted to perform one or more online transactions with a Website or other relying party. In the framework described in the Co-Pending Applications, sensitive information such as fingerprint data and other data which can be used to uniquely identify the user, may be retained locally on the user's authentication device to protect a user's privacy.
A better understanding of the present invention can be obtained from the following detailed description in conjunction with the following drawings, in which:
Described below are embodiments of an apparatus, method, and machine-readable medium for authorizing a new authenticator. Throughout the description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. In other instances, well-known structures and devices are not shown or are shown in a block diagram form to avoid obscuring the underlying principles of the present invention.
The embodiments of the invention discussed below involve authentication devices with user verification capabilities such as biometric modalities or PIN entry. These devices are sometimes referred to herein as “tokens,” “authentication devices,” or “authenticators.” While certain embodiments focus on facial recognition hardware/software (e.g., a camera and associated software for recognizing a user's face and tracking a user's eye movement), some embodiments may utilize additional biometric devices including, for example, fingerprint sensors, voice recognition hardware/software (e.g., a microphone and associated software for recognizing a user's voice), and optical recognition capabilities (e.g., an optical scanner and associated software for scanning the retina of a user). The user verification capabilities may also include non-biometric modalities, like PIN entry. The authenticators might use devices like trusted platform modules (TPMs), smartcards and secure elements for cryptographic operations and key storage.
In a mobile biometric implementation, the biometric device may be remote from the relying party. As used herein, the term “remote” means that the biometric sensor is not part of the security boundary of the computer it is communicatively coupled to (e.g., it is not embedded into the same physical enclosure as the relying party computer). By way of example, the biometric device may be coupled to the relying party via a network (e.g., the Internet, a wireless network link, etc) or via a peripheral input such as a USB port. Under these conditions, there may be no way for the relying party to know if the device is one which is authorized by the relying party (e.g., one which provides an acceptable level of authentication strength and integrity protection) and/or whether a hacker has compromised or even replaced the biometric device. Confidence in the biometric device depends on the particular implementation of the device.
The term “relying party” is sometimes used herein to refer, not merely to the entity with which a user transaction is attempted (e.g., a Website or online service performing user transactions), but also to the secure transaction servers implemented on behalf of that entity which may performed the underlying authentication techniques described herein. The secure transaction servers may be owned and/or under the control of the relying party or may be under the control of a third party offering secure transaction services to the relying party as part of a business arrangement.
The term “server” is used herein to refer to software executed on a hardware platform (or across multiple hardware platforms) that receives requests over a network from a client, responsively performs one or more operations, and transmits a response to the client, typically including the results of the operations. The server responds to client requests to provide, or help to provide, a network “service” to the clients. Significantly, a server is not limited to a single computer (e.g., a single hardware device for executing the server software) and may, in fact, be spread across multiple hardware platforms, potentially at multiple geographical locations.
System and Method for Authorizing a New Authenticator
In some instances, it may be useful to allow a new authenticator to be enabled using registered authenticators on existing client devices. For example, if the user purchases a new device with a new set of authenticators, it would be beneficial to provide the user with a way to automatically register all of the new authenticators using the existing authenticators.
The embodiments of the invention described below allow a user to authorize the authenticator(s) on a new client device using an existing/old, trusted client device that is registered with one or more relying parties. In particular, these embodiments may be used to enable new authenticators on new or existing client devices and keep the registrations in sync between multiple client devices.
In one embodiment, once the connection is established between the client with Aold 202 and the client with Anew 200, a secure protocol is implemented (described in detail below) to transfer and integrate the registration data from the old/existing client 202 to the new client 200. For example, in one embodiment, the old client 202 sends registration data to the new client 200 which then generates a new set of key pairs (e.g., one for each relying party) and sends the public keys back to the old client 202 along with an indication of the types of authenticators on the new client 200. The client with Aold then generates a signed authorization object (e.g., using the public keys, authenticator identification data, and user account data) which it sends to each respective relying party 250.
As illustrated in
As illustrated the new client 200 and the old client 202 both include secure storage 325 and 326, respectively, for storing the registration data for each relying party (e.g., public/private key pairs used during authentication). In addition, the relying party 250 includes a secure transaction database 325 for securely storing registration data for each of the client devices 200-202 (e.g., user account data, authenticator identification data, public keys provided by for each authenticator, etc).
In one embodiment, the user initiates the authenticator authorization application 390 on the new client device 200 and the authenticator authorization application 390 on the old client device 202 to establish the initial secure connection. The authenticator authorization applications 390-391 may be mobile device apps or applications specifically designed to perform the authorization operations described herein. In another embodiment, the authenticator authorization applications may be browser plugins executed in response to the user indicating that he/she wishes to perform authorization (e.g., via a web page with embedded Javascript or other applet or executable program code). Moreover, the authenticator authorization applications 390-391 may be software modules within a larger application such as an authentication application designed to manage authentications with relying parties. It should be noted, however, that the underlying principles of the invention are not limited to any particular implementation of the authenticator authorization applications 390-391.
In one embodiment, to approve the authorization operations on the old device 202, the user is verified by the authentication engine 311 on the old device (e.g., providing biometric input to a user authentication device 322-323). Similarly, in one embodiment, the user may be verified by the authentication engine 310 on the new client device 200. These two verification steps may provide authorization for the authenticator authorization applications 390-391 to perform the authorization process.
As mentioned, at the start of the authorization process, the authenticator authorization applications 390-391 establish a secure connection (e.g., using Bluetooth, WiFi, etc). In one embodiment, the authenticator authorization application 390 on the new client device 200 receives a set of registration data for each relying party with which the old client device 202 is registered. The registration data may include usernames and a unique code associated with the user's account on each relying party. This unique code associating the user with each relying party is sometimes referred to herein as an “AppID.” In some embodiments, where a relying party offers multiple online services, a user may have multiple AppIDs with a single relying party (one for each service offered by the relying party).
In one embodiment, the authenticator authorization application 390 on the new client 200 then generates a new public/private key pair for each relying party (e.g., one for each Username+AppID pair). The authenticator authorization application 390 on the new client 200 sends the authenticator authorization application 391 on the old client 202 the key pair (or just the public key) along with an authenticator ID identifying each new authenticator type (e.g., an Authenticator Attestation ID or “AAID”). The user may then be prompted to confirm the authorization of the new authenticator(s).
In one embodiment, the authenticator authorization application 391 generates a signed authorization object comprising a signature over the tuple of the AAID, the public key and the AppID for each relying party. In one embodiment, the signature is generated using the current authentication key associated with the relying party (e.g., a private key associated with the old authenticator for the relying party). The authenticator authorization application 391 then authenticates to each of the relying parties (e.g., via the old authentication engine 311 and one or more old authenticators 322-323) and includes the signed authorization object as an extension to one of the authentication messages.
Upon receiving the signed authentication message, the secure transaction service 304 may then verify the signature (e.g., using the public key corresponding to the private key used to generate the signature). Once verified, it may identify the user's account with the AppID and store the new AAID and the new public key for the new authenticator(s) within the secure transaction database 325. The user may subsequently authenticate using the new authenticators 320-321 without re-registering with each relying party 250.
Although illustrated in
One embodiment of a method for authorizing a new authenticator is illustrated in
At 401, the user triggers the authorization of one or more new authenticators (Anew) and establishes a secure communication channel with the old authenticator(s) (Aold). As mentioned, the secure communication channel may be established via a direct connection (e.g., via NFC, Bluetooth, etc) or over a network (e.g., via an Ethernet or WiFi connection).
At 402, the new authenticator receives a username and user/relying party ID code for each relying party.
At 403, the new authenticator generates a public/private key pair for each username/AppID pair (e.g., for each unique relying party account).
At 404, the old authenticator receives the key pairs and an authenticator attestation ID code identifying the type of each new authenticator (e.g., an AAID). The user may then be asked to confirm the authorization operation.
At 405, the old authenticator generates a signed authorization object comprising a signature over the tuple of the AAID, the public key and the AppID for each relying party. As mentioned, the signature may be generated using the current authentication key associated with the relying party (e.g., a private key associated with the old authenticator for the relying party).
At 406, the old authenticator authenticates to each relying party and includes the signed authorization object as an extension to the authentication message. Once this operation is successfully completed, the user may then authenticate with each relying party using the new device and/or new authenticators.
In one embodiment, each relying party R1-Rn can choose whether or not to accept the new authenticator 501. For example, if the AAID indicates an authenticator type which is not sufficiently reliable or accurate, then the relying party may choose to deny the new registration. Thus, each relying party may maintain an authenticator database (i.e., Metadata) containing data for all known authenticators (e.g., identified by AAID). It may then query the database in response to receiving the authorization object from the old authenticator, determine the characteristics of the new authenticator, and determine whether those characteristics are acceptable.
In one embodiment of the invention, an authenticator can specify a more generic “confirmation” method, where the authenticators may be indirectly controlled by the same entity, but still belong to different users. For example, in
It should be noted that the term “relying party” is used herein to refer, not merely to the entity with which a user transaction is attempted (e.g., a Website or online service performing user transactions), but also to the secure transaction servers implemented on behalf of that entity which may perform the underlying authentication techniques described herein. The secure transaction servers may be owned and/or under the control of the relying party or may be under the control of a third party offering secure transaction services to the relying party as part of a business arrangement. These distinctions are indicated in
In particular,
Turning to
While the secure storage 720 is illustrated outside of the secure perimeter of the authentication device(s) 710-712, in one embodiment, each authentication device 710-712 may have its own integrated secure storage. Additionally, each authentication device 710-712 may cryptographically protect the biometric reference data records (e.g., wrapping them using a symmetric key to make the storage 720 secure).
The authentication devices 710-712 are communicatively coupled to the client through an interface 702 (e.g., an application programming interface or API) exposed by a secure transaction service 701. The secure transaction service 701 is a secure application for communicating with one or more secure transaction servers 732 over a network and for interfacing with a secure transaction plugin 705 executed within the context of a web browser 704. As illustrated, the Interface 702 may also provide secure access to a secure storage device 720 on the client 700 which stores information related to each of the authentication devices 710-712 such as a device identification code, user identification code, user enrollment data (e.g., scanned fingerprint or other biometric data), and keys used to perform the secure authentication techniques described herein. For example, as discussed in detail below, a unique key may be stored into each of the authentication devices during registration and used when communicating to servers 730 over a network such as the Internet.
Once the user has enrolled with an authentication device on the client 700, the secure transaction service 701 may register the authentication device with the secure transaction servers 732-733 over the network (e.g., using the registration techniques described herein) and subsequently authenticate with those servers using data exchanged during the registration process (e.g., encryption keys provisioned into the biometric devices). The authentication process may include any of the authentication techniques described herein (e.g., generating an assurance level on the client 700 based on explicit or non-intrusive authentication techniques and transmitting the results to the secure transaction servers 732-733).
As discussed below, certain types of network transactions are supported by the secure transaction plugin 705 such as HTTP or HTTPS transactions with websites 731 or other servers. In one embodiment, the secure transaction plugin is initiated in response to specific HTML tags inserted into the HTML code of a web page by the web server 731 within the secure enterprise or Web destination 730 (sometimes simply referred to below as “server 730”). In response to detecting such a tag, the secure transaction plugin 705 may forward transactions to the secure transaction service 701 for processing. In addition, for certain types of transactions (e.g., such as secure key exchange) the secure transaction service 701 may open a direct communication channel with the on-premises transaction server 732 (i.e., co-located with the website) or with an off-premises transaction server 733.
The secure transaction servers 732-733 are coupled to a secure transaction database 740 for storing user data, authentication device data, keys and other secure information needed to support the secure authentication transactions described below. It should be noted, however, that the underlying principles of the invention do not require the separation of logical components within the secure enterprise or web destination 730 shown in
As mentioned above, the underlying principles of the invention are not limited to a browser-based architecture shown in
In either of the embodiments shown in
Embodiments of the invention may include various steps as set forth above. The steps may be embodied in machine-executable instructions which cause a general-purpose or special-purpose processor to perform certain steps. Alternatively, these steps may be performed by specific hardware components that contain hardwired logic for performing the steps, or by any combination of programmed computer components and custom hardware components.
Elements of the present invention may also be provided as a machine-readable medium for storing the machine-executable program code. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic program code.
Throughout the foregoing description, for the purposes of explanation, numerous specific details were set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art that the invention may be practiced without some of these specific details. For example, it will be readily apparent to those of skill in the art that the functional modules and methods described herein may be implemented as software, hardware or any combination thereof. Moreover, although some embodiments of the invention are described herein within the context of a mobile computing environment, the underlying principles of the invention are not limited to a mobile computing implementation. Virtually any type of client or peer data processing devices may be used in some embodiments including, for example, desktop or workstation computers. Accordingly, the scope and spirit of the invention should be judged in terms of the claims which follow.
| Number | Name | Date | Kind |
|---|---|---|---|
| 6618806 | Brown et al. | Sep 2003 | B1 |
| 6751733 | Nakamura et al. | Jun 2004 | B1 |
| 6938156 | Wheeler et al. | Aug 2005 | B2 |
| 7487347 | Smith | Feb 2009 | B2 |
| 7487357 | Smith | Feb 2009 | B2 |
| 7512567 | Bemmel et al. | Mar 2009 | B2 |
| 7698565 | Bjorn et al. | Apr 2010 | B1 |
| 7865937 | White | Jan 2011 | B1 |
| 8060922 | Crichton | Nov 2011 | B2 |
| 8166531 | Suzuki | Apr 2012 | B2 |
| 8245030 | Lin | Aug 2012 | B2 |
| 8353016 | Pravetz et al. | Jan 2013 | B1 |
| 8584224 | Pei et al. | Nov 2013 | B1 |
| 8713325 | Ganesan | Apr 2014 | B2 |
| 8719505 | Ganesan | May 2014 | B2 |
| 8776180 | Kumar et al. | Jul 2014 | B2 |
| 8856541 | Chaudhury et al. | Oct 2014 | B1 |
| 8949978 | Lin | Feb 2015 | B1 |
| 8958599 | Starner | Feb 2015 | B1 |
| 8978117 | Bentley et al. | Mar 2015 | B2 |
| 9032485 | Chu | May 2015 | B2 |
| 20020073316 | Collins et al. | Jun 2002 | A1 |
| 20030065805 | Barnes | Apr 2003 | A1 |
| 20030087629 | Juitt | May 2003 | A1 |
| 20030135740 | Talmor et al. | Jul 2003 | A1 |
| 20030152252 | Kondo | Aug 2003 | A1 |
| 20030226036 | Bivens et al. | Dec 2003 | A1 |
| 20040101170 | Tisse | May 2004 | A1 |
| 20040123153 | Wright et al. | Jun 2004 | A1 |
| 20050160052 | Schneider | Jul 2005 | A1 |
| 20050223236 | Yamada et al. | Oct 2005 | A1 |
| 20050278253 | Meek et al. | Dec 2005 | A1 |
| 20060029062 | Rao | Feb 2006 | A1 |
| 20060282670 | Karchov | Dec 2006 | A1 |
| 20070005988 | Zhang et al. | Jan 2007 | A1 |
| 20070088950 | Wheeler et al. | Apr 2007 | A1 |
| 20070107048 | Halls et al. | May 2007 | A1 |
| 20070165625 | Eisner | Jul 2007 | A1 |
| 20070168677 | Kudo | Jul 2007 | A1 |
| 20070169182 | Wolfond | Jul 2007 | A1 |
| 20070278291 | Rans et al. | Dec 2007 | A1 |
| 20080005562 | Sather et al. | Jan 2008 | A1 |
| 20080046334 | Lee et al. | Feb 2008 | A1 |
| 20080046984 | Bohmer et al. | Feb 2008 | A1 |
| 20080049983 | Miller et al. | Feb 2008 | A1 |
| 20080086759 | Colson | Apr 2008 | A1 |
| 20080134311 | Medvinsky | Jun 2008 | A1 |
| 20080172725 | Fujii et al. | Jul 2008 | A1 |
| 20080235801 | Soderberg et al. | Sep 2008 | A1 |
| 20080271150 | Boerger et al. | Oct 2008 | A1 |
| 20080289019 | Lam | Nov 2008 | A1 |
| 20080313719 | Kaliski, Jr. et al. | Dec 2008 | A1 |
| 20080320308 | Kostiainen et al. | Dec 2008 | A1 |
| 20090064292 | Carter et al. | Mar 2009 | A1 |
| 20090089870 | Wahl | Apr 2009 | A1 |
| 20090116651 | Liang | May 2009 | A1 |
| 20090133113 | Schneider | May 2009 | A1 |
| 20090138724 | Chiou et al. | May 2009 | A1 |
| 20090138727 | Campello | May 2009 | A1 |
| 20090158425 | Chan et al. | Jun 2009 | A1 |
| 20090183003 | Haverinen | Jul 2009 | A1 |
| 20090193508 | Brenneman | Jul 2009 | A1 |
| 20090235339 | Mennes et al. | Sep 2009 | A1 |
| 20090307139 | Mardikar et al. | Dec 2009 | A1 |
| 20100029300 | Chen | Feb 2010 | A1 |
| 20100042848 | Rosener | Feb 2010 | A1 |
| 20100070424 | Monk | Mar 2010 | A1 |
| 20100082484 | Erhart et al. | Apr 2010 | A1 |
| 20100105427 | Gupta | Apr 2010 | A1 |
| 20100169650 | Brickell et al. | Jul 2010 | A1 |
| 20100175116 | Gum | Jul 2010 | A1 |
| 20100186072 | Kumar | Jul 2010 | A1 |
| 20100223663 | Morimoto et al. | Sep 2010 | A1 |
| 20100242088 | Thomas | Sep 2010 | A1 |
| 20100325664 | Grebenick et al. | Dec 2010 | A1 |
| 20100325684 | Grebenik | Dec 2010 | A1 |
| 20100325711 | Etchegoyen | Dec 2010 | A1 |
| 20110004933 | Dickinson et al. | Jan 2011 | A1 |
| 20110022835 | Schibuk | Jan 2011 | A1 |
| 20110047608 | Levenberg | Feb 2011 | A1 |
| 20110078443 | Greenstein et al. | Mar 2011 | A1 |
| 20110082801 | Baghdasaryan et al. | Apr 2011 | A1 |
| 20110083016 | Kesanupalli et al. | Apr 2011 | A1 |
| 20110107087 | Lee et al. | May 2011 | A1 |
| 20110167154 | Bush et al. | Jul 2011 | A1 |
| 20110191200 | Bayer et al. | Aug 2011 | A1 |
| 20110197267 | Gravel et al. | Aug 2011 | A1 |
| 20110219427 | Hito et al. | Sep 2011 | A1 |
| 20110246766 | Orsini et al. | Oct 2011 | A1 |
| 20110265159 | Ronda | Oct 2011 | A1 |
| 20110279228 | Kumar | Nov 2011 | A1 |
| 20110280402 | Brahim | Nov 2011 | A1 |
| 20110296518 | Faynberg et al. | Dec 2011 | A1 |
| 20110307949 | Ronda | Dec 2011 | A1 |
| 20110314549 | Song et al. | Dec 2011 | A1 |
| 20120018506 | Hammad et al. | Jan 2012 | A1 |
| 20120023568 | Cha et al. | Jan 2012 | A1 |
| 20120046012 | Forutanpour et al. | Feb 2012 | A1 |
| 20120084566 | Chin et al. | Apr 2012 | A1 |
| 20120102553 | Hsueh et al. | Apr 2012 | A1 |
| 20120124651 | Ganesan | May 2012 | A1 |
| 20120159577 | Belinkiy | Jun 2012 | A1 |
| 20120191979 | Feldbau | Jul 2012 | A1 |
| 20120204032 | Wilkings | Aug 2012 | A1 |
| 20120272056 | Ganesan | Oct 2012 | A1 |
| 20120313746 | Rahman et al. | Dec 2012 | A1 |
| 20120317297 | Bailey | Dec 2012 | A1 |
| 20130042327 | Chow | Feb 2013 | A1 |
| 20130046976 | Rosati | Feb 2013 | A1 |
| 20130061055 | Schibuk | Mar 2013 | A1 |
| 20130073859 | Carlson et al. | Mar 2013 | A1 |
| 20130097682 | Zeljkovic | Apr 2013 | A1 |
| 20130119130 | Braams | May 2013 | A1 |
| 20130124285 | Pravetz et al. | May 2013 | A1 |
| 20130125197 | Pravetz | May 2013 | A1 |
| 20130125222 | Pravetz et al. | May 2013 | A1 |
| 20130133049 | Peirce | May 2013 | A1 |
| 20130144785 | Karpenko et al. | Jun 2013 | A1 |
| 20130159413 | Davis et al. | Jun 2013 | A1 |
| 20130159716 | Buck et al. | Jun 2013 | A1 |
| 20130337777 | Deutsch et al. | Dec 2013 | A1 |
| 20140007215 | Romano | Jan 2014 | A1 |
| 20140013422 | Janus et al. | Jan 2014 | A1 |
| 20140040987 | Haugsnes | Feb 2014 | A1 |
| 20140044265 | Kocher et al. | Feb 2014 | A1 |
| 20140066015 | Aissi | Mar 2014 | A1 |
| 20140068746 | Gonzalez | Mar 2014 | A1 |
| 20140075516 | Chermside | Mar 2014 | A1 |
| 20140089243 | Oppenheimer | Mar 2014 | A1 |
| 20140096182 | Smith | Apr 2014 | A1 |
| 20140101439 | Pettigrew et al. | Apr 2014 | A1 |
| 20140109174 | Barton | Apr 2014 | A1 |
| 20140115702 | Li et al. | Apr 2014 | A1 |
| 20140130127 | Toole et al. | May 2014 | A1 |
| 20140137191 | Goldsmith et al. | May 2014 | A1 |
| 20140164776 | Hook et al. | Jun 2014 | A1 |
| 20140173754 | Barbir | Jun 2014 | A1 |
| 20140188770 | Agrafioti et al. | Jul 2014 | A1 |
| 20140189350 | Baghdasaryan | Jul 2014 | A1 |
| 20140189360 | Baghdasaryan | Jul 2014 | A1 |
| 20140189779 | Baghdasaryan | Jul 2014 | A1 |
| 20140189791 | Lindemann | Jul 2014 | A1 |
| 20140189807 | Cahill et al. | Jul 2014 | A1 |
| 20140189808 | Mahaffey et al. | Jul 2014 | A1 |
| 20140189828 | Baghdasaryan | Jul 2014 | A1 |
| 20140201809 | Choyi et al. | Jul 2014 | A1 |
| 20140250523 | Savvides et al. | Sep 2014 | A1 |
| 20140258125 | Gerber et al. | Sep 2014 | A1 |
| 20140258711 | Brannon | Sep 2014 | A1 |
| 20140282868 | Sheller et al. | Sep 2014 | A1 |
| 20140282945 | Smith et al. | Sep 2014 | A1 |
| 20140282965 | Sambamurthy et al. | Sep 2014 | A1 |
| 20140289833 | Briceno et al. | Sep 2014 | A1 |
| 20140298419 | Boubez | Oct 2014 | A1 |
| 20150180869 | Verma | Jun 2015 | A1 |
| 20150269050 | Filimonov | Sep 2015 | A1 |
| 20150326529 | Morita | Nov 2015 | A1 |
| 20150381580 | Graham et al. | Dec 2015 | A1 |
| Number | Date | Country |
|---|---|---|
| WO2013082190 | Jun 2013 | WO |
| Entry |
|---|
| Anthony J. Nicholson, “Mobile Device Security Using Transient Authentication,” IEEE Transactions on Mobile Computing vol. 5, No. 11, pp. 1489-1502 (Nov. 2006). |
| Mohammad O. Derawi, “Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition” (2010). |
| BehavioSec, “Measuring FAR/FRR/EER in Continuous Authentication,” Stockholm, Sweden (2009). |
| The Online Certificate Status Protocol (OCSP, RFC2560), 22 pages, Aug. 11, 2015. 950. |
| see current WikiPedia article for “Eye Tracking” at n.wikipedia.org/wiki/Eye—tracking, 15 pages, Jun. 21, 2014. |
| (see Hartzell, “Crazy Egg Heatmap Shows Where People Click on Your Website” (Nov. 30, 2012), currently at www.michaelhartzell.com/Blog/bid/92970/Crazy-Egg-Heatmap-shows-where-people-click-on-your-website). |
| Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US13/77888, mailed Aug. 8, 2014, 10 pages. |
| Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US14/39627, mailed Oct. 16, 2014, 3 pages. |
| Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US14/31344, mailed Nov. 3, 2014, 8 pages. |
| Office Action from U.S. Appl. No. 14/066,384, mailed Jan. 7, 2015, 24 pages. |
| Office Action from U.S. Appl. No. 14/145,439, mailed Feb. 12, 2015, 18 pages. |
| Office Action from U.S. Appl. No. 14/145,533, mailed Jan. 26, 2015, 13 pages. |
| Office Action from U.S. Appl. No. 14/145,607, mailed Mar. 20, 2015, 22 pages. |
| Office Action from U.S. Appl. No. 14/218,551, mailed Apr. 23, 2015, 9 pages. |
| Office Action from U.S. Appl. No. 14/218,575, mailed Feb. 10, 2015, 17 pages. |
| Office Action from U.S. Appl. No. 14/066,273, mailed May 8, 2015, 31 pages. |
| Notice of Allowance from U.S. Appl. No. 14/145,533, mailed May 11, 2015, 5 pages. |
| Notice of Allowance from U.S. Appl. No. 14/145,439, mailed Jul. 6, 2015, 6 pages. |
| Transmittal of International Preliminary Report on Patentability from foreign counterpart PCT/US2013/077888, mailed Jul. 9, 2015, 7 pages. |
| Office Action from U.S. Appl. No. 14/268,733, mailed Jul. 16, 2015, 13 pages. |
| Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/028924, mailed Jul. 30, 2015, 10 pages. |
| Office Action from U.S. Appl. No. 14/218,575, mailed Aug. 7, 2015, 19 pages. |
| Final Office Action from U.S. Appl. No. 14/066,384, mailed Aug. 20, 2015, 23 pages. |
| Office Action from U.S. Appl. No. 14/268,619, mailed Aug. 24, 2015, 17 pages. |
| Notice of Allowance from U.S. Appl. No. 14/145,607, mailed Sep. 2, 2015, 19 pages. |
| Final Office Action from U.S. Appl. No. 14/218,551, mailed Sep. 9, 2015, 15 pages. |
| Notice of Allowance from U.S. Appl. No. 14/145,533, mailed Sep. 14, 2015, 13 pages. |
| Notice of Allowance from U.S. Appl. No. 14/448,697, mailed Sep. 15, 2015, 14 pages. |
| Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/042785, mailed Oct. 16, 2015, 8 pages. |
| Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/042799, mailed Oct. 19, 2015, 13 pages. |
| Office Action from U.S. Appl. No. 14/448,641, mailed Nov. 9, 2015, 21 pages. |
| Barker et al; “Recommendation for key management Part 3: Application-Specific Key Management Guidance”; NIST special Publication 800-57, pp. 1-103, Dec. 2009. |
| Office Action from U.S. Appl. No. 14/448,814, mailed Aug. 4, 2015, 13 pages. |
| World Wide Web Consortium, W3C Working Draft: Media Capture and Streams (2013). |
| Office Action from U.S. Appl. No. 14/218,692, mailed Nov. 4, 2015, 16 pages. |
| Notice of Allowance from U.S. Appl. No. 14/145,439, mailed Oct. 28, 2015, 12 pages. |
| Brickell, Ernie, Jan Camenisch, and Liqun Chen. “Direct anonymous attestation.” Proceedings of the 11th ACM conference on Computer and communications security. ACM, 2004, 6 pages. |
| Chen, Liqun, and Jiangtao Li. “Flexible and scalable digital signatures in TPM 2.0.” Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013. |
| Chakka, Murali Mohan, et al. “Competition on counter measures to 2-d facial spoofing attacks.” Biometrics (IJCB), 2011 International Joint Conference on. IEEE, 2011, 6 pages. |
| Marcialis, Gian Luca, et al. “First international fingerprint liveness detection competition—livdet 2009.” Image Analysis and Processing—ICIAP 2009. Springer Berlin Heidelberg, 2009. 12-23. |
| Uludag, Umut, and Anil K. Jain. “Attacks on biometric systems: a case study in fingerprints.” Electronic Imaging 2004. International Society for Optics and Photonics, 2004, 12 pages. |
| Ratha, Nalini K., Jonathan H. Connell, and Ruud M. Bolle. “An analysis of minutiae matching strength.” Audio-and Video-Based Biometric Person Authentication. Springer Berlin Heidelberg, 2001, 7 pages. |
| Schneier, B., “Biometrics: Uses and Abuses”. Aug. 1999. Inside Risks 110 (CACM 42, Aug. 8, 1999). http://www.schneier.com/essay-019.pdf. |
| Zhao, W., et al. “Face Recognition: A Literature Survey”. ACM Computing Surveys, vol. 35, No. 4. Dec. 2003, pp. 399-458. |
| Abate, A., et al., “2D and 3D face recognition: A survey”. Pattern Recognition Letters. 2007, 28, pp. 1885-1906. |
| GSM Arena. GSM Arena. [Online] Nov. 13, 2011. [Cited: Sep. 29, 2012.] http://www.gsmarena.com/ice—cream—sandwichs—face—unlock—duped—using—a—photograph-news-3377.php. Downloaded Aug. 18, 2015. |
| Wilson, R., James. Unbuntu Life, “How to Trick Google's New Face Unlock On Android 4.1 Jelly Bean”. Print Screen Mac. [Online] Aug. 6, 2012. [Cited: Sep. 28, 2012.] http://printscreenmac.info/how-to-trick-android-jelly-bean-face-unlock/. downloaded Aug. 13, 2015. |
| Phillips, P., J., et al., “Face Recognition Vendor Test 2002: Evaluation Report”. s.l.: NISTIR 6965, 2002. 56 pages. http://www.face-rec.org/vendors/FRVT—2002—Evaluation—Report.pdf. |
| Phillips, P.J., et al., “FRVT 2006 and ICE 2006 Large-Scale Results”, NIST IR 7408. Gaithersburg: NIST, 2006. Mar. 29, 2007. pp. 1-55. |
| Grother, P.J., et al., NIST. Report on the Evaluation of 2D Still-Image Face Recognition Algorithms, NIST IR 7709. s.l.: NIST, 2011. Jun. 22, 2010. pp. 1-58. |
| Roberts, C., “Biometric Attack Vectors and Defences”. Sep. 2006. 25 pages. http://otago.ourarchive.ac.nz/bitstream/handle/10523/1243/BiometricAttackVectors.pdf. |
| Pinto, A., et al., “Video-Based Face Spoofing Detection through Visual Rhythm Analysis”. Los Alamitos: IEEE Computer Society Conference Publishing Services, 2012. Conference on Graphics, Patterns and Images, 25. 8 pages. (SIBGRAPI). http://sibgrapi.sid.inpe.br/rep/sid.inpe.br/sibgrapi/2012/07.13.21.16?mirror=sid.inpe.br/banon/2001/03.30.15.38.24&metadatarepository=sid.inpe.br/sibgrapi/2012/07.13.21.16.53. |
| Li, J., et al., “Live Face Detection Based on the Analysis of Fourier Spectra”. Biometric Technology for Human Identification. 2004, pp. 296-303. |
| Tan, X., et al., “Face Liveness Detection from A Single Image with Sparse Low Rank Bilinear Discriminative Model”. s.l.: European Conference on Computer Vision, 2010. pp. 1-14. |
| Määttä, J., et al., “Machine Vision Group, University of Oulu”, Finland. “Face Spoofing Detection From Single Images Using Micro-Texture Analysis”. Oulu, Finland: IEEE, 2011. pp. 1-7. http://www.ee.oulu.fi/research/mvmp/mvg/files/pdf/131.pdf. |
| Heikkilä, M., et al., “A Texture-Based Method for Modeling the Background and Detecting Moving Objects”. Oulu: IEEE, Jun. 22, 2005. Draft. 16 pages. http://www.ee.oulu.fi/mvg/files/pdf/pdf—662.pdf. |
| Peng, Y., et al. “RASL: Robust Alignment by Sparse and Low-rank Decomposition for Linearly Correlated Images”. IEEE Conference on Computer Vision and Pattern Recognition. 2010, pp. 763-770. http://yima.csl.illinois.edu/psfile/RASL—CVPR10.pdf. |
| Kong, S., et al., “Recent advances in visual and infrared face recognition”—a review. Journal of Computer Vision and Image Understanding. Jun. 2005, vol. 1, 97, pp. 103-135. |
| Kollreider, K., et al., Halmstad University, SE-30118, Sweden. Evaluating Liveness by Face Images and the Structure Tensor. Halmstad, Sweden: s.n., 2005. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.62.6534&rep=rep1&type=pdf. |
| Smiatacz, M., et al., Gdansk University of Technology. Liveness Measurements Using Optical Flow for Biometric Person Authentication. Metrology and Measurement Systems. 2012, vol. XIX, 2. pp. 257-268. |
| Bao, W., et al., et al.,“A liveness detection method for face recognition based on optical flow field”. Image Analysis and Signal Processing, IASP 2009. Apr. 11-12, 2009, pp. 233-236. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5054589&isnumber=5054562. |
| Pan, G., et al., “Liveness Detection for Face Recognition”. Recent Advances in Face Recognition. Vienna: I-Tech, 2008, Ch. 9, pp. 109-124, ISBN: 978-953-7619-34-3. |
| National Science & Technology Council's Subcommittee on Biometrics. Biometrics Glossary. 33 pages, Last updated Sep. 14, 2006. NSTC. http://www.biometrics.gov/documents/glossary.pdf. |
| Ross, A., et al. “Multimodal Biometrics: An Overview”. Proceedings of 12th European Signal Processing Conference (EUSIPCO). Sep. 2004, pp. 1221-1224. http://www.csee.wvu.edu/˜ross/pubs/RossMultimodalOverview—EUSIPCO04.pdf. |
| Rodrigues, R.N., et al. Robustness of multimodal biometric fusion methods against spoof attacks. Journal of Visual Language and Computing. 2009. 11 pages, doi:10.1016/j.jvlc.2009.01.010; http://cubs.buffalo.edu/govind/papers/visual09.pdf. |
| Akhtar, Z., et al., “Spoof Attacks on Multimodal Biometric Systems”. Alfarid. Singapore: IACSIT Press, Singapore, 2011. 2011 International Conference on Information and Network Technology IPCSIT. vol. 4. pp. 46-51. http://www.ipcsit.com/vol4/9-ICINT2011T046.pdf. |
| Hernandez, T., “But What Does It All Mean? Understanding Eye-Tracking Results (Part 3)”, Sep. 4, 2007, 2 pages. EyeTools. Part III: What is a heatmap . . . really? [Online] [Cited: Nov. 1, 2012.] http://eyetools.com/articles/p3-understanding-eye-tracking-what-is-a-heatmap-really. |
| Nielsen, Jakob. useit.com. Jakob Nielsen's Alertbox—Scrolling and Attention. [Online] Mar. 22, 2010. [Cited: Nov. 1, 2012.] 6 pages. http://www.useit.com/alertbox/scrolling-attention.html. |
| Nielsen, Jakib. useit.com. Jakob Nielsen's Alertbox—Horizontal Attention Leans Left. [Online] Apr. 6, 2010. [Cited: Nov. 1, 2012.] 4 pages. http://www.useit.com/alertbox/horizontal-attention.html. |
| Lubin, G., et al., Business Insider. “16 Heatmaps That Reveal Exactly Where People Look”. [Online] May 21, 2012. [Cited: Nov. 1, 2012.] pp. 1-21. http://www.businessinsider.com/eye-tracking-heatmaps-2012-5?op=1. |
| Huang, L., et al., “Clickjacking: Attacks and Defenses”. s.l.: Usenix Security 2012, pp. 1-16, 2012. https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final39.pdf. |
| Willis, N., Linux.com. Weekend Project: Take a Tour of Open Source Eye-Tracking Software. [Online] Mar. 2, 2012. [Cited: Nov. 1, 2012.] https://www.linux.com/learn/tutorials/550880-weekend-project-take-a-tour-of-open-source-eye-tracking-software. |
| Chetty, G. School of ISE, University of Canberra, Australia. “Multilevel liveness verification for face-voice biometric authentication”. BYSM-2006 Symposium. Baltimore: BYSM-Symposium, 9 pages. Sep. 19, 2006. http://www.biometrics.org/bc2006/presentations/Tues—Sep—19/BSYM/19—Chetty—research.pdf. |
| Tresadern, P., et al., “Mobile Biometrics (MoBio): Joint Face and Voice Verification for a Mobile Platform”. 2012. http://personal.ee.surrey.ac.uk/Personal/Norman.Poh/data/tresadern—PervComp2012—draft.pdf. |
| Jafri, R., et al., “A Survey of Face Recognition Techniques. Journal of Information Processing Systems”, vol. 5, No. 2, Jun. 2009. vol. 5, 2, pp. 41-68. http://www.cosy.sbg.ac.at/˜uhl/face—recognition.pdf. |
| Himanshu, et al., “A Review of Face Recognition”. International Journal of Research in Engineering & Applied Sciences. Feb. 2012, vol. 2, 2, pp. 835-846. http://euroasiapub.org/IJREAS/Feb2012/81.pdf. |
| Phillips, P. J., et al., “Biometric Image Processing and Recognition”. Chellappa. 1998. Eusipco. 8 pages. |
| Zhou, et al., “Face Recognition from Still Images and Videos”. University of Maryland, College Park, MD 20742. Maryland: s.n., Nov. 5, 2004. pp. 1-23, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.77.1312&rep=rep1&type=pdf. |
| Quinn, G.W., et al., NIST. “Performance of Face Recognition Algorithms on Compressed Images”, NIST Inter Agency Report 7830. s.l.: NIST, Dec. 4, 2011. |
| The Extended M2VTS Database. [Online] [Cited: Sep. 29, 2012.] downloaded Jan. 28, 2015, 1 page; http://www.ee.surrey.ac.uk/CVSSP/xm2vtsdb/. |
| Ratha, N. K., et al., IBM. “Enhancing security and privacy in biometrics-based authentication systems”. IBM Systems Journal. 2001, vol. 40, 3. pp. 614-634. |
| Schuckers, S., Schuckers SAC. “Spoofing and Anti-Spoofing Measures”. Information Security Technical Report. Dec. 10, 2002, vol. 7, 4., pp. 56-62. |
| Schwartz, W., et al., “Face Spoofing Detection through Partial Least Squares and Low-Level Descriptors”. s.l.: Intl. Joint Conference on Biometrics,, 2011. pp. 1-8. |
| Edited by Kresimir Delac, Mislav Grgic and Marian Stewart Bartlett. s.l.: InTech, Jun. 1, 2008. http://cdn.intechopen.com/finals/81/InTech-Recent—advances—in—face—recognition.zip. ISBN 978-953-7619-34-3. Uploaded as Chapters 1-15. |
| Pan, G., et al., “Monocular camera-based face liveness detection by combining eyeblink and scene context” pp. 215-225. s.l.: Springer Science+Business Media, LLC, Aug. 4, 2010. http://www.cs.zju.edu.cn/˜gpan/publication/2011-TeleSys-liveness.pdf. |
| Tronci, R, et al., “Fusion of multiple clues for photo-attack detection in face recognition systems”. 09010 Pula (CA), Italy: s.n., 2011. pp. 1-6. http://prag.diee.unica.it/pra/system/files/Amilab—IJCB2011.pdf. |
| Rocha, A., et al., “Vision of the Unseen: Current Trends and Challenges in Digital Image and Video Forensics”. s.l.: ACM Computing Surveys, 2010. http://www.wjscheirer.com/papers/wjs—csur2011—forensics.pdf. |
| Linux.com, The source for Linux information. 2012. 3 pages, downloaded Jan. 28, 2015. |
| Kollreider, K., et al., “Non-instrusive liveness detection by face images”. Image Vis. Comput. (2007). doi:10.1016/j.imavis.2007.05.004, Received Feb. 18, 2006, received in revised form, Jan. 24, 2007 and accepted May 22, 2007. 12 pages. |
| Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/042870, mailed Oct. 30, 2015, 9 pages. |
| Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/42827, mailed Oct. 30, 2015, 9 pages. |
| Validity, OSTP Framework, 24 pages, 2010. |
| Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US15/50348, mailed Dec. 22, 2015, 9 pages. |
| Office Action from U.S. Appl. No. 14/448,868, mailed Dec. 3, 2015, 15 pages. |
| Office Action from U.S. Appl. No. 14/487,992, mailed Dec. 31, 2015, 12 pages. |
| Final Office Action from U.S. Appl. No. 14/268,619, mailed Dec. 14, 2015, 10 pages. |
| Notification of Transmittal of International Search Report and Written Opinion from PCT/US2015/028927, mailed Jul. 30, 2015, 12 pages. |
| Transmittal of International Preliminary Report On Patentability from foreign counterpart PCT Patent Application No. PCT/US2014/039627 mailed Dec. 10, 2015, 8 pages. |
| Notice of Allowance from U.S. Appl. No. 14/448,697, mailed Jan. 14, 2016, 23 pages. |
| Final Office Action from U.S. Appl. No. 14/268,733, mailed Jan. 15, 2016, 14 pages. |
| Notice of Allowance from U.S. Appl. No. 14/145,533, mailed Jan. 20, 2016, 12 pages. |
| Office Action from U.S. Appl. No. 14/218,743, mailed Jan. 21, 2016, 12 pages. |
| Office Action from U.S. Appl. No. 14/218,551, mailed Jan. 21, 2016, 11 pages. |
| Office Action from U.S. Appl. No. 14/218,575, mailed Jan. 29, 2016, 25 pages. |
| Niinuma, Koichiro, and Anil K. Jain. “Continuous user authentication using temporal information.” SPIE Defense, Security, and Sensing. International Society for Optics and Photonics, 2010. (currently at http://www.cse.msu.edu/biometrics/Publications/Face/NiinumaJain—ContinuousAuth—SPIE10.pdf). |
| Office Action from U.S. Appl. No. 14/218,551, mailed May 12, 2016, 11 pages. |
| Office Action from U.S. Appl. No. 14/448,868, mailed May 12, 2016, 11 pages. |
| Final Office Action from U.S. Appl. No. 14/448,814, mailed Jun. 14, 2016, 17 pages. |
| Office Action from U.S. Appl. No. 14/066,273, mailed Jun. 16, 2016, 43 pages. |
| Notice of Allowance from U.S. Appl. No. 14/448,641, mailed Jun. 7, 2016, 13 pages. |
| Office Action from U.S. Appl. No. 14/218,611, mailed Jun. 16, 2016, 13 pages. |