×

Biometric Authenticaton System and Method with Vulnerability Verification

  • US 20090307764A1
  • Filed: 03/23/2007
  • Published: 12/10/2009
  • Est. Priority Date: 03/24/2006
  • Status: Active Grant
First Claim
Patent Images

1. A biometric authentication system that provides a service after carrying out personal identification of a service requester through a data communication network comprising:

  • a client terminal that receives an input of the biometric information of the service requester and performs a biometric authentication with its own biometric authentication means using the received biometric information;

    a service provider that provides a service; and

    a vulnerability verification server that keeps the vulnerability information that is the information showing the level of vulnerability of the biometric authentication means that has a possibility of being connected to the biometric authentication system,wherein;

    the client terminal produces the information that specifies the biometric authentication means and the authentication result as a process profile and is equipped with a process profile producing means that is sent to the service provider;

    the vulnerability verification server is equipped with a vulnerability verification means that replies to the service provider that provides the vulnerability information corresponding to the biometric authentication means when receiving the provided information that specifies the biometric authentication means from the service provider;

    the service provider is equipped with a service providing judgment means that decides whether the service can be provided or not to the client terminal having the applicable biometric authentication means comparing the vulnerability information with an authentication policy, and a service providing means that provides a service to the client terminal where the request of the service was made in the case that the service providing judgment means decides it is possible;

    the vulnerability information includes the type of the vulnerability, the range affected by the vulnerability, the condition of use showing whether the client terminal is used under a prescribed control or not, the difficulty of fraud and forgery, and the level of an attacker that can attack with each specification of the biometrics authentication means;

    andthe authentication policy includes the difficulty of fraud and forgery and the level of an attacker in the case that the client terminal is used under the prescribed control and the difficulty of fraud and forgery and the level of an attacker in the case that the client terminal is not used under the prescribed control.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×