Browse Prior Art Database

Biometrics with contemplation validity

IP.com Disclosure Number: IPCOM000011914D
Original Publication Date: 2003-Mar-26
Included in the Prior Art Database: 2003-Mar-26
Document File: 3 page(s) / 18K

Publishing Venue

IBM

Abstract

Disclosed is a system for biometrics with contemplation validity. The system is characterized by the feature; authorizing device can detect the invalid body-exertion, such as bribe or intimidating. To realize the feature, the system uses the principle of lie-detector.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 3

Biometrics with contemplation validity

Background

Nowadays, the authentication scheme based on biometrics garners keen attention. The scheme, however, verifies if the body exerted is legal or not, but not verifies the contemplation of body-exertion is legal or not. Hence, it is a general way to "bribe" or "intimidate" the legal individual to attack against a secure system. The system disclosed is to countervail the annoying situation; "legal body, illegal contemplation."

Related Art

Biometrics Several concrete methods are known: by fingerprint, retina, voice print, face mask, etc...

Lie-detector Several concrete methods are known: by sweating, pulse, eye-fringe temperature, etc...

Other technologies against "legal body, illegal contemplation" [Brain Fingerprinting] http://www.brainwavescience.com/

Summary of the Invention

The Individual There are legal individual (X) who has rights to access and an attacker (Y) who want scrape through a biometrics-based authentication system.

The Device The authenticating device (D) has two components. One (C1), so-called biometrics component, is for identify the owner of body exerted; import the character of body from sensor and identify. (C1) has its sensor (S1). Another (C2), so-called lie-detector, is for contemplation validation; import mental state and validate the contemplation behind the background of body exertion. (C2) has its sensor (S2).

The Procedure (Legal)

The individual(X) exerts his/her body to device(D) for authentication.

(D) imports data for identify person from (S1).

(D) asks (X) to some questions and force (X) to answer with prescribed one. For

example, ask "You're now exerting your body with someone's intimidation and/or bribe, aren't you?", "You have shame for validity of this authentication procedure?", and force (X) to push "No" button in each question. (S2) imports data for contemplation validation.

If the answers are not problematic, (D) authenticates (X).


1.


2.


3.


4.


5.


6.

The Case of Illegal use If an attacker(Y) shoves his gun at (X)'s temple, this system will not authenticate (X).

First, (C1) certifies (X) as a legal individual with data from (S1).

(D) certifies (X) is legal individual.

1

Page 2 of 3

Next, (D) asks question "You're now exerting your body with someone's intimidation and/or bribe, are'nt you?". The more strongly (Y) bribes (X), the more (X) discomposures and (C2) detects the illegal body exertion.
(D) may ask question again(*), reject authentication, or report the suspect try.

(*) It is good idea to re-ask occasio...