Fingerprint sensors have become ubiquitous in mobile devices as well as other devices (e.g., locks on cars and buildings) and applications for authenticating a user's identity. They provide a fast and convenient way for the user to unlock a device, provide authentication for payments, etc. It is essential that fingerprint sensors operate at a level of security that, at a minimum, reduces the potential for circumvention of security of fingerprint authentication. For instance, fake fingers having fake or spoofed fingerprints can be used to attempt to circumvent fingerprint authentication at fingerprint sensors.
The accompanying drawings, which are incorporated in and form a part of the Description of Embodiments, illustrate various non-limiting and non-exhaustive embodiments of the subject matter and, together with the Description of Embodiments, serve to explain principles of the subject matter discussed below. Unless specifically noted, the drawings referred to in this Brief Description of Drawings should be understood as not being drawn to scale and like reference numerals refer to like parts throughout the various figures unless otherwise specified.
The following Description of Embodiments is merely provided byway of example and not of limitation. Furthermore, there is no intention to be bound by any expressed or implied theory presented in the preceding background or in the following Description of Embodiments.
Reference will now be made in detail to various embodiments of the subject matter, examples of which are illustrated in the accompanying drawings. While various embodiments are discussed herein, it will be understood that they are not intended to limit to these embodiments. On the contrary, the presented embodiments are intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope the various embodiments as defined by the appended claims. Furthermore, in this Description of Embodiments, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present subject matter. However, embodiments may be practiced without these specific details. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the described embodiments.
Some portions of the detailed descriptions which follow are presented in terms of procedures, logic blocks, processing and other symbolic representations of operations on data within an electrical device. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. In the present application, a procedure, logic block, process, or the like, is conceived to be one or more self-consistent procedures or instructions leading to a desired result. The procedures are those requiring physical manipulations of physical quantities. Usually, although not necessarily, these quantities take the form of acoustic (e.g., ultrasonic) signals capable of being transmitted and received by an electronic device and/or electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in an electrical device.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the description of embodiments, discussions utilizing terms such as “capturing,” “performing,” “determining,” “detecting,” “interacting,” “imaging,” “operating,” “activating,” “triggering,” “confirming,” “weighting,” “matching,” “using,” “comparing,” “executing,” or the like, refer to the actions and processes of an electronic device such as an electrical device.
Embodiments described herein may be discussed in the general context of processor-executable instructions residing on some form of non-transitory processor-readable medium, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or distributed as desired in various embodiments.
In the figures, a single block may be described as performing a function or functions; however, in actual practice, the function or functions performed by that block may be performed in a single component or across multiple components, and/or may be performed using hardware, using software, or using a combination of hardware and software. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, logic, circuits, and steps have been described generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure. Also, the example fingerprint sensing and spoof detection system and/or mobile electronic device described herein may include components other than those shown, including well-known components.
Various techniques described herein may be implemented in hardware, software, firmware, or any combination thereof, unless specifically described as being implemented in a specific manner. Any features described as modules or components may also be implemented together in an integrated logic device or separately as discrete but interoperable logic devices. If implemented in software, the techniques may be realized at least in part by a non-transitory processor-readable storage medium comprising instructions that, when executed, perform one or more of the methods described herein. The non-transitory processor-readable data storage medium may form part of a computer program product, which may include packaging materials.
The non-transitory processor-readable storage medium may comprise random access memory (RAM) such as synchronous dynamic random access memory (SDRAM), read only memory (ROM), non-volatile random access memory (NVRAM), electrically erasable programmable read-only memory (EEPROM), FLASH memory, other known storage media, and the like. The techniques additionally, or alternatively, may be realized at least in part by a processor-readable communication medium that carries or communicates code in the form of instructions or data structures and that can be accessed, read, and/or executed by a computer or other processor.
Various embodiments described herein may be executed by one or more processors, such as one or more motion processing units (MPUs), sensor processing units (SPUs), host processor(s) or core(s) thereof, digital signal processors (DSPs), general purpose microprocessors, application specific integrated circuits (ASICs), application specific instruction set processors (ASIPs), field programmable gate arrays (FPGAs), a programmable logic controller (PLC), a complex programmable logic device (CPLD), a discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein, or other equivalent integrated or discrete logic circuitry. The term “processor,” as used herein may refer to any of the foregoing structures or any other structure suitable for implementation of the techniques described herein. As it employed in the subject specification, the term “processor” can refer to substantially any computing processing unit or device comprising, but not limited to comprising, single-core processors; single-processors with software multithread execution capability; multi-core processors; multi-core processors with software multithread execution capability; multi-core processors with hardware multithread technology; parallel platforms; and parallel platforms with distributed shared memory. Moreover, processors can exploit nano-scale architectures such as, but not limited to, molecular and quantum-dot based transistors, switches and gates, in order to optimize space usage or enhance performance of user equipment. A processor may also be implemented as a combination of computing processing units.
In addition, in some aspects, the functionality described herein may be provided within dedicated software modules or hardware modules configured as described herein. Also, the techniques could be fully implemented in one or more circuits or logic elements. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of an SPU/MPU and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with an SPU core, MPU core, or any other such configuration.
Discussion begins with a description of an example electronic device including a fingerprint sensor, upon which described embodiments can be implemented. An example system for fingerprint authentication using a fingerprint imaging sensor and a spoof detector sensor is then described, in accordance with various embodiments. Example operations for operating a system for fingerprint authentication using a fingerprint imaging sensor and a spoof detector sensor are then described.
Fingerprint sensors are used in electronic devices for user authentication, such as mobile electronic devices and applications operating on mobile electronic devices, locks for accessing cars or buildings, for protecting against unauthorized access to the devices and/or applications. Authentication of a fingerprint at a fingerprint sensor is performed before providing access to a device and/or application. The fingerprint sensor may be based on different principles such as capacitive, optical, or ultrasound technologies. To authenticate the user, a fingerprint captured by the fingerprint sensor is compared to registered fingerprint images of authenticated users that were acquired during an enrollment process.
In order to circumvent fingerprint authentication, attempts can be made to copy or spoof fingerprints of an authorized user using a fake or artificial finger. As such, fingerprint sensors should be capable of distinguishing real fingers from fake, artificial, or even dead fingers, also referred to herein as performing “spoof detection,” “fake finger detection,” or “liveness detection.” A “spoofed” fingerprint is a fake or artificial fingerprint that is used to attempt to circumvent security measures requiring fingerprint authentication. For example, an artificial finger may be used to gain unauthorized access to the electronic device or application, by making an unauthorized copy of the fingerprint of an authorized user, e.g., “spoofing” an actual fingerprint. The spoof detection may be performed by analyzing fingerprint images captured by the fingerprint sensor, e.g., performing biometric analysis of the fingerprint images, or looking at any characteristics that can help distinguish a fake/spoof fingerprint from a real fingerprint. These characteristics may be static features or dynamic features which have a certain time dependency because they change over time.
Many existing fingerprint sensor systems perform fingerprint acquisition and liveness detection using a single sensor. However, combining both functionalities in a single sensor may require compromises that negatively impact performance and may not achieve optimal performance of both the fingerprint imaging function and the spoof detection function. In this disclosure, novel systems and methods are described in which the fingerprint imaging functionality and the spoof detection functionality are separated. The embodiments described herein include a fingerprint sensor systems that combines a fingerprint sensor used to capture an image of the fingerprint with a spoof detection sensor used to perform the spoof detection to validate the finger is not a fake or spoof but a real finger. Although in this disclosure the focus is on detecting fingerprint, it should be appreciated that the techniques described herein may also be applied to areas of the body.
In accordance with the various embodiments, a fingerprint authentication system including a fingerprint imaging sensor and a spoof detector sensor is described. In some embodiments, the fingerprint imaging sensor and/or the spoof detector sensor are ultrasonic sensors. In some embodiments, the fingerprint imaging sensor includes a two-dimensional array of ultrasonic transducers, where the fingerprint imaging sensor is for capturing an image of a fingerprint of a finger. In some embodiments, the spoof detector sensor includes at least one ultrasonic transducer, where the spoof detector sensor is for capturing data used to determine whether the finger is a real finger. A contact layer overlies the fingerprint imaging sensor and the spoof detector sensor, where the contact layer is for receiving the finger of a user. A processor of the fingerprint authentication system is configured to perform a user authentication operation using the fingerprint imaging sensor and the spoof detector sensor, where the user authentication operation is for authenticating a user using a single touch action.
In one embodiment, the single touch action is a single contact between the finger and the fingerprint authentication system. In some embodiments, the layout of the contact layer, the fingerprint imaging sensor and the spoof detector sensor is such that the finger interacts with both the fingerprint imaging sensor and the spoof detector sensor during the user authentication operation using the single touch action. In some embodiments, the fingerprint imaging sensor and the spoof detector sensor operate concurrently during a single contact between the finger and the fingerprint authentication system. In some embodiments, the fingerprint imaging sensor triggers activation of the spoof detector sensor during the user authentication operation in response to detecting the finger interacting with the fingerprint authentication system. In some embodiments, the spoof detector sensor triggers activation of the fingerprint imaging sensor during the user authentication operation in response to determining that the finger is a real finger during the single touch action.
In some embodiments, the user authentication operation includes performing a matching operation comparing the image of the fingerprint captured at the fingerprint imaging sensor to a stored fingerprint image of an authenticated user. Confirmation that the image of the fingerprint is from a real finger based on the data used to determine whether the finger is a real finger captured at the spoof detector sensor is performed. In some embodiments, the fingerprint imaging sensor also captures data used to determine whether the finger is a real finger. In some embodiments, the user authentication operation includes weighting the data used to determine whether the finger is a real finger captured at the fingerprint imaging sensor differently than the data used to determine whether the finger is a real finger captured at the spoof detector sensor. In some embodiments, the spoof detector sensor also captures signal characteristics data for use during the matching operation of the user authentication operation. In some embodiments, the user authentication operation includes using a location of the finger relative to the fingerprint imaging sensor and the spoof detector sensor in performing user authentication.
Turning now to the figures,
As depicted in
Host processor 110 can be one or more microprocessors, central processing units (CPUs), DSPs, general purpose microprocessors, ASICs, ASIPs, FPGAs or other processors which run software programs or applications, which may be stored in host memory 130, associated with the functions and capabilities of electronic device 100.
Host bus 120 may be any suitable bus or interface to include, without limitation, a peripheral component interconnect express (PCIe) bus, a universal serial bus (USB), a universal asynchronous receiver/transmitter (UART) serial bus, a suitable advanced microcontroller bus architecture (AMBA) interface, an Inter-Integrated Circuit (I2C) bus, a serial digital input output (SDIO) bus, a serial peripheral interface (SPI) or other equivalent. In the embodiment shown, host processor 110, host memory 130, display 140, interface 150, transceiver 160, sensor processing unit (SPU) 170, and other components of electronic device 100 may be coupled communicatively through host bus 120 in order to exchange commands and data. Depending on the architecture, different bus configurations may be employed as desired. For example, additional buses may be used to couple the various components of electronic device 100, such as by using a dedicated bus between host processor 110 and memory 130.
Host memory 130 can be any suitable type of memory, including but not limited to electronic memory (e.g., read only memory (ROM), random access memory, or other electronic memory), hard disk, optical disk, or some combination thereof. Multiple layers of software can be stored in host memory 130 for use with/operation upon host processor 110. For example, an operating system layer can be provided for electronic device 100 to control and manage system resources in real time, enable functions of application software and other layers, and interface application programs with other software and functions of electronic device 100. Similarly, a user experience system layer may operate upon or be facilitated by the operating system. The user experience system may comprise one or more software application programs such as menu navigation software, games, device function control, gesture recognition, image processing or adjusting, voice recognition, navigation software, communications software (such as telephony or wireless local area network (WLAN) software), and/or any of a wide variety of other software and functional interfaces for interaction with the user can be provided. In some embodiments, multiple different applications can be provided on a single electronic device 100, and in some of those embodiments, multiple applications can run simultaneously as part of the user experience system. In some embodiments, the user experience system, operating system, and/or the host processor 110 may operate in a low-power mode (e.g., a sleep mode) where very few instructions are processed. Such a low-power mode may utilize only a small fraction of the processing power of a full-power mode (e.g., an awake mode) of the host processor 110.
Display 140, when included, may be a liquid crystal device, (organic) light emitting diode device, or other display device suitable for creating and visibly depicting graphic images and/or alphanumeric characters recognizable to a user. Display 140 may be configured to output images viewable by the user and may additionally or alternatively function as a viewfinder for camera. It should be appreciated that display 140 is optional, as various electronic devices, such as electronic locks, doorknobs, car start buttons, etc., may not require a display device.
Interface 150, when included, can be any of a variety of different devices providing input and/or output to a user, such as audio speakers, touch screen, real or virtual buttons, joystick, slider, knob, printer, scanner, computer network I/O device, other connected peripherals and the like.
Transceiver 160, when included, may be one or more of a wired or wireless transceiver which facilitates receipt of data at electronic device 100 from an external transmission source and transmission of data from electronic device 100 to an external recipient. By way of example, and not of limitation, in various embodiments, transceiver 160 comprises one or more of: a cellular transceiver, a wireless local area network transceiver (e.g., a transceiver compliant with one or more Institute of Electrical and Electronics Engineers (IEEE) 802.11 specifications for wireless local area network communication), a wireless personal area network transceiver (e.g., a transceiver compliant with one or more IEEE 802.15 specifications for wireless personal area network communication), and a wired a serial transceiver (e.g., a universal serial bus for wired communication).
Electronic device 100 also includes a sensor assembly in the form of integrated Sensor Processing Unit (SPU) 170 which includes sensor processor 172, memory 176, a fingerprint sensor 178, spoof detection sensor 179, and a bus 174 for facilitating communication between these and other components of SPU 170. In some embodiments, SPU 170 may include at least one additional sensor 180 (shown as sensor 180-1, 180-2, . . . 180-n) communicatively coupled to bus 174. In some embodiments, at least one additional sensor 180 is a force or pressure sensor (e.g. a touch sensor) configured to determine a force or pressure or a temperature sensor configured to determine a temperature at electronic device 100. The force or pressure sensor may be disposed within, under, or adjacent fingerprint sensor 178 and/or spoof detection sensor 179. In some embodiments, all of the components illustrated in SPU 170 may be embodied on a single integrated circuit. It should be appreciated that SPU 170 may be manufactured as a stand-alone unit (e.g., an integrated circuit), that may exist separately from a larger electronic device and is coupled to host bus 120 through an interface (not shown). It should be appreciated that, in accordance with some embodiments, that SPU 170 can operate independent of host processor 110 and host memory 130 using sensor processor 172 and memory 176.
Sensor processor 172 can be one or more microprocessors, CPUs, DSPs, general purpose microprocessors, ASICs, ASIPs, FPGAs or other processors which run software programs, which may be stored in memory 176, associated with the functions of SPU 170. It should also be appreciated that fingerprint sensor 178, spoof detection sensor 179, and additional sensor 180, when included, may also utilize processing and memory provided by other components of electronic device 100, e.g., host processor 110 and host memory 130.
Bus 174 may be any suitable bus or interface to include, without limitation, a peripheral component interconnect express (PCIe) bus, a universal serial bus (USB), a universal asynchronous receiver/transmitter (UART) serial bus, a suitable advanced microcontroller bus architecture (AMBA) interface, an Inter-Integrated Circuit (I2C) bus, a serial digital input output (SDIO) bus, a serial peripheral interface (SPI) or other equivalent. Depending on the architecture, different bus configurations may be employed as desired. In the embodiment shown, sensor processor 172, memory 176, fingerprint sensor 178, and other components of SPU 170 may be communicatively coupled through bus 174 in order to exchange data.
Memory 176 can be any suitable type of memory, including but not limited to electronic memory (e.g., read only memory (ROM), random access memory, or other electronic memory). Memory 176 may store algorithms or routines or other instructions for processing data received from fingerprint sensor 178 and/or one or more sensor 180, as well as the received data either in its raw form or after some processing. Such algorithms and routines may be implemented by sensor processor 172 and/or by logic or processing capabilities included in fingerprint sensor 178, spoof detection sensor 179, and/or sensor 180.
A sensor 180 may comprise, without limitation: a temperature sensor, touch sensor, a humidity sensor, an atmospheric pressure sensor, an infrared sensor, a radio frequency sensor, a navigation satellite system sensor (such as a global positioning system receiver), an acoustic sensor (e.g., a microphone), an inertial or motion sensor (e.g., a gyroscope, accelerometer, or magnetometer) for measuring the orientation or motion of the sensor in space, or other type of sensor for measuring other physical or environmental factors. In one example, sensor 180-1 may comprise an acoustic sensor, sensor 180-2 may comprise a temperature sensor, and sensor 180-n may comprise a motion sensor.
In some embodiments, fingerprint sensor 178, spoof detection sensor 179, and/or one or more sensors 180 may be implemented using a microelectromechanical system (MEMS) that is integrated with sensor processor 172 and one or more other components of SPU 170 in a single chip or package. It should be appreciated that fingerprint sensor 178 and or spoof detection sensor 179 may be disposed behind display 140. Although depicted as being included within SPU 170, one, some, or all of fingerprint sensor 178, spoof detection sensor 179, and/or one or more sensors 180 may be disposed externally to SPU 170 in various embodiments. It should be appreciated that fingerprint sensor 178 can be any type of fingerprint sensor, including without limitation, an ultrasonic sensor, an optical sensor, a camera, etc.
Embodiments of the described fingerprint sensing system are configured to perform the user authentication and liveness determination in one touch of the finger on the contact layer of the fingerprint sensing system, also referred to herein as a “single touch action.” The single touch action described herein is a single contact between the finger and the fingerprint sensing system (e.g., the time between a user placing a finger on the fingerprint sensing system and removing of the finger from contact with the fingerprint sensing system. In order to perform both user authentication and liveness determination during a single touch action, embodiments described herein provide for the spatial distribution of an fingerprint imaging sensor and a spoof detection sensor to preclude against, or at least make highly difficult, deception or circumvention of the fingerprint sensing system. For example, by putting a fake finger with the correct ridge/valley pattern on the fingerprint imaging sensor and putting another real finger with an incorrect ridge/valley pattern on the spoof detection sensor, a fingerprint sensing system may be circumvented in that the fingerprint may be authenticated and a real finger may be detected, despite the fingerprint not coming from the real finger. Therefore, the layout/design of the fingerprint sensing system should prevent these scenarios and ensure it is the same finger that is put on both sensors at the same time, in one touch. For some sensor techniques, a contact between the sensor and the finger is needed, e.g., ultrasonic sensors. For other sensors such a contact may not be needed, but rather an interaction with the fingerprint sensing system may only be needed.
In accordance with the described embodiments, the fingerprint imaging sensor creates a representation of the ridge/valley pattern of a user's fingerprint via a variety of different imaging modalities such as capacitive, optical or acoustic imaging. The ridge/valley pattern often represents a visual image of the fingerprint and its valley-ridge pattern. For the spoof detection sensor, unique characteristics of human physiology are collected that may not be observable via the epidermis or via the fingerprint imaging sensor. The spoof detection sensor may output a likelihood or confidence that the finger is a real finger, without providing any image, ridge/valley pattern or other two-dimensional pattern, or other spatial information.
In some embodiments, e.g., fingerprint imaging sensor 202 and spoof detection sensor 204 underlie a common contact layer also represented by the dashed box 206. In such an embodiment, dotted ellipse 209 represents the region of the surface of the finger 208 that makes contact with the contact layer and interacts with both fingerprint imaging sensor 202 and spoof detection sensor 204. As shown, both fingerprint imaging sensor 202 and spoof detection sensor 204 underlie the contact layer and the region of the surface of the finger 208 that makes contact with the contact layer.
The dashed box 216 indicates that both fingerprint imaging sensor 212 and spoof detection sensor 214 may be combined together on one substrate and/or in one package. The dotted ellipse 219 represents the region of the surface of the finger 218 that interacts with both fingerprint imaging sensor 212 and spoof detection sensor 214.
In some embodiments, e.g., where fingerprint imaging sensor 212 is an ultrasonic imaging sensor, fingerprint imaging sensor 212 and spoof detection sensor 214 underlie a common contact layer also represented by the dashed box 216. In such an embodiment, dotted ellipse 219 represents the region of the surface of the finger 218 that makes contact with the contact layer and interacts with both fingerprint imaging sensor 212 and spoof detection sensor 214. As shown, both fingerprint imaging sensor 212 and spoof detection sensor 214 underlie the contact layer and the region of the surface of the finger 218 that makes contact with the contact layer.
In some embodiments, e.g., where fingerprint imaging sensor 222 is an ultrasonic imaging sensor, fingerprint imaging sensor 222 and spoof detection sensor 224 underlie a common contact layer also represented by the dashed box 226. In such an embodiment, dotted ellipse 229 represents the region of the surface of the finger 228 that makes contact with the contact layer and interacts with both fingerprint imaging sensor 222 and spoof detection sensor 224. As shown, both fingerprint imaging sensor 222 and spoof detection sensor 224 underlie the contact layer and the region of the surface of the finger 228 that makes contact with the contact layer.
In some embodiments, e.g., where fingerprint imaging sensor 232 is an ultrasonic imaging sensor, fingerprint imaging sensor 232 and spoof detection sensor 234 underlie a common contact layer also represented by the dashed box 236. In such an embodiment, dotted ellipse 239 represents the region of the surface of the finger 238 that makes contact with the contact layer and interacts with both fingerprint imaging sensor 232 and spoof detection sensor 234. As shown, both fingerprint imaging sensor 232 and spoof detection sensor 234 underlie the contact layer and the region of the surface of the finger 238 that makes contact with the contact layer.
With reference to
With reference to
The fingerprint imaging sensors described herein may be any type of fingerprint sensor used to capture a fingerprint image, e.g., a capacitive fingerprint sensor, an optical fingerprint sensor, or an ultrasonic fingerprint sensor. For ultrasonic sensors, the design may be using a film based piezoelectric material (PVDF-like) or may be using an array of ultrasonic transducers. The ultrasonic transducers may be MEMS-type transducers, for example, using piezoelectric membranes to generate ultrasonic waves. These membranes may have internal support structures in addition to the edge support structures. The piezoelectric materials used may be any material known to the person skilled in the art, such as PZT, Aluminum Nitrate, with or without Sc doping, etc. A minimum dimension is required in order to provide a sufficiently larger area of the fingerprint to compare the captured fingerprint image with the previous stored fingerprint image (template) during enrollment. The exact requirement of the surface and minimum dimension may depend on the fingerprint matching process and the algorithms used. The requirements, for both sensors, may further depend on the required level of security.
The spoof detection sensors described herein may be any type of sensor that can provide an indication of liveness of the finger on the sensor. The liveness indication may be based on the detection of the characteristics of live human tissue, bones, blood vessels, or any other type of structures, and their interactions with the sensor. This type of liveness may be considered static liveness. The liveness indication may also be based on a dynamic liveness, such as the detection of a pulse, heartbeat, blood flow, etc. As understood by one of ordinary skill in the art, ultrasonic signals as a function of depth are different for real fingers than fake/spoofed fingers. Any other type of dynamic characteristic that requires data acquisition for a certain window of time may be used. In some embodiments, the spoof detection sensor does not provide localized information (non-spatial data), for example the spoof detection sensor may not provide a spatial representation of the ridge/valley pattern. The term localized information refers to an imaging capability. The fingerprint imaging sensor does provide localized information in the form of a fingerprint image. The spoof detection sensor may not have any imaging capability, and it may only provide a liveness indication. In various embodiments, the fingerprint imaging sensor provides an image of the fingerprint, while the spoof detection sensor does not provide an image, but only a liveness indication. This liveness indication may be without any spatial information. The fingerprint imaging sensor and spoof detection sensor are complimentary, since the fingerprint imaging sensor is used for authentication, and the spoof detection sensor is used to make sure the obtained fingerprint image is from a real finger and not from a fake or spoof finger.
As presented above, embodiments described herein provide for authentication of a user using a fingerprint imaging sensor and a spoof detection sensor during a single touch action. A one-touch verification module may be used to check a single finger is touching both sensors. For example, the one touch verification module may monitor the initial contact with the sensor (or the finger lifting), and use the initial stage of the finger press to verify the one-touch. When a finger is starting to be pressed onto the sensors, the signal due to the interaction of the sensors with the finger will increase. When a single finger presses on both sensors at the same time, the signal increase for the image sensor and liveness sensor should show similar characteristics and timing. Through comparison of these characteristics and timing the likelihood or confidence of a one-touch occurring can be determined. If this likelihood of confidence is below a threshold, actions may be taken, such as e.g. not operating the sensor system, asking the user to press again, or adjusting operation of the sensor(s) and increasing security in the verification process.
In some embodiments, the one-touch verification module uses an optional presence sensor that is used to detect if there is a finger present on the sensor. If the presence sensor has detected a finger, it may indicate the finger presence to the fingerprint imaging sensor and/or spoof detection sensor. The use of a presence sensor may use lower resources (battery, processing), and may wake the fingerprint imaging sensor and/or spoof detection sensor from a lower power mode.
Thus far, embodiments have been discussed where the fingerprint imaging sensor provides a fingerprint image that is used to match with fingerprint images acquired during enrollment or other fingerprint templates of authorized users, and where the spoof detection sensor is used to determine if the finger is a real live finger and not a fake or spoof finger. However, in some embodiments the fingerprint imaging sensor may also be used to provide a liveness determination and/or the spoof detection sensor may also be used to provide authentication data to identify the user or look at user characteristics. The data from both sensors may be orthogonally combined to improve authentication and/or liveness determination thereby enabling a much higher security. The liveness characteristics may be stored within the image template, and vice versa. This may also have practical implementation for the size requirements of the fingerprint imaging sensor. As discussed above, normally a certain minimum sensor surface area may be needed to capture a sufficiently large area of the fingerprint. If the spoof detection sensor can also provide some user authentication information, the fingerprint imaging sensor surface area may be below the commonly accepted minimum limit. This has the advantage that a smaller fingerprint sensor system becomes possible with the proposed embodiments.
For example, the data from the fingerprint imaging sensor 502 may be used to make a liveness determination 514 based on details of the fingerprint image, e.g., ridge/valley profile characteristics, presence and characteristics of pores, etc., as understood by one of ordinary skill in the art. These types of investigations help enhance the possibility of detecting fake finger, although sophisticated fake finger may remain undetected, which is the reason for the need for a separate spoof detection sensor. The data from the spoof detection sensor 504 may be used to authenticate a user based on the liveness data. For example, if the spoof detection sensor 504 is used to acquire blood pressure data, blood flow data, heart rate data, etc., this data may also contain characteristics of a user since blood pressure profiles and heart rate profiles differ from user to user. In another example, if the spoof detection sensor 504 is an ultrasonic sensor, the interaction of the ultrasonic waves with the tissue of the finger of the user may also have certain characteristic that can be used for identification of the user (e.g., comparing to data collected during enrollment).
More generally, any type of interaction with the finger of the user may result in measurable characteristics that may be used for identification. These measured characteristics are then compared to the characteristics acquired during the enrollment of the user. The authentication of the user based on the spoof detection sensor 504 only may not be as reliable and accurate as the authentication using the fingerprint imaging sensor 502, but the combination of the fingerprint imaging sensor 502 and spoof detection sensor 504 can increase the accuracy and confidence in the authentication. When combining the different data from the different sensors, the data may be weighted based on the confidence of the data. For example, in the authentication determination 522, the data from the fingerprint imaging sensor 502 may have a higher weight than the data from the spoof detection sensor 504, while on the other hand, in the liveness determination 524, the data from the spoof detection sensor 504 may have a higher weight than the data from the fingerprint imaging sensor 502. The confidence in the determination data of each individual sensor may also influence the weighing when the data from both sensors is combined.
In some embodiments, the result from one sensor may influence the operating of the other sensor. For example, if the spoof detection sensor determines a high liveness indicator (high confidence), the fingerprint imaging sensor may only be used to capture the fingerprint image for matching with fingerprint templates of users with access. Consequently, the configuration of the fingerprint imaging sensor may be modified for a lower resolution, lower SNR/CNR, smaller images, less averaging, etc. On the other hand, if the spoof detection sensor determines a low liveness factor (low confidence), the fingerprint sensing system may use the fingerprint imaging sensor for additional liveness investigation. This may take more resources and/or more time, and may therefore only be done when the spoof detection sensor has a low confidence that the finger is not a fake or spoof finger. For example, the fingerprint imaging sensor may need to acquire more data, for example, for a higher resolution, deeper layers, better SNR or CNR, etc. As such, results from the spoof detection sensor may be used to determine the setting of the fingerprint imaging sensor. The inverse may also be used. For example, the fingerprint imaging sensor may use the captured image to determine a liveness indication. Only if the liveness indication is low, or the confidence is low, the system may engage the spoof detection sensor for further investigation. This type of solution may be used if the spoof detection sensor takes more resources or more time.
In some embodiments, the liveness data and indication may be location dependent. For example, the characteristics of the finger may be different at different location of the finger. This may influence the liveness determination of the spoof detection sensor. In this case, the location of the spoof detection sensor may be determined using the fingerprint imaging sensor.
With reference to
At procedure 720, during a single touch action between the finger and the contact layer, wherein the single touch action is a single contact between the finger and the contact layer, an image of a fingerprint of the finger is captured at the fingerprint imaging sensor and data used to determine whether the finger is a real finger (e.g., liveness data) is captured at the spoof detector sensor. In one embodiment, the capturing the image of the fingerprint of the finger at the fingerprint imaging sensor and the capturing the data used to determine whether the finger is a real finger at the spoof detector sensor are performed concurrently during the single contact between the finger and the contact layer of the fingerprint authentication system.
In one embodiment, as shown at procedure 722, activation of the capturing the data used to determine whether the finger is a real finger at the spoof detector sensor is triggered in response to detecting the finger interacting with the fingerprint authentication system. In one embodiment, as shown at procedure 724, activation of the capturing the image of the fingerprint of the finger at the fingerprint imaging sensor is triggered in response to determining that the finger is a real finger during the single touch action.
At procedure 730, a user authentication operation using the image of the fingerprint as captured by the fingerprint imaging sensor and the data used to determine whether the finger is a real finger as captured at the spoof detector sensor, wherein the user authentication operation is for authenticating a user using the single touch action.
In some embodiments, procedure 730 is performed according to the procedures of flow diagram 800 of
In one embodiment, as shown at procedure 840, a matching operation is performed comparing the image of the fingerprint captured at the fingerprint imaging sensor to a stored fingerprint image of an authenticated user. At procedure 850, confirmation that the image of the fingerprint is from a real finger based on the data used to determine whether the finger is a real finger captured at the spoof detector sensor is performed. In some embodiments, a location of the finger relative to the fingerprint imaging sensor and the spoof detector sensor is used in performing user authentication.
The examples set forth herein were presented in order to best explain, to describe particular applications, and to thereby enable those skilled in the art to make and use embodiments of the described examples. However, those skilled in the art will recognize that the foregoing description and examples have been presented for the purposes of illustration and example only. Many aspects of the different example embodiments that are described above can be combined into new embodiments. The description as set forth is not intended to be exhaustive or to limit the embodiments to the precise form disclosed. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
Reference throughout this document to “one embodiment,” “certain embodiments,” “an embodiment,” “various embodiments,” “some embodiments,” or similar term means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, the appearances of such phrases in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics of any embodiment may be combined in any suitable manner with one or more other features, structures, or characteristics of one or more other embodiments without limitation.
This application claims priority to and the benefit of co-pending U.S. Provisional Patent Application 62/908,370, filed on Sep. 30, 2019, entitled “SYSTEM AND METHOD FOR FINGERPRINT LIVENESS DETECTION,” by Gupta, et al., having Attorney Docket No. IVS-932-PR, and assigned to the assignee of the present application, which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
62908370 | Sep 2019 | US |