SecurePhone : a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly IST-2002-506883Secure contracts.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

BioSecure & COST 2101 – Smart Cards and Biometric – Lausanne, 2007 Sabah Jassim University of Buckingham, UK. SecurePhone A Multi-Modal Biometric Verifier.
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
Secure Communication Architectures.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
GMM-Based Multimodal Biometric Verification Yannis Stylianou Yannis Pantazis Felipe Calderero Pedro Larroy François Severin Sascha Schimke Rolando Bonal.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
BioSec © 2004 BioSec Consortium 1 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
SecurePhone : a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly IST Secure contracts.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
Security Management.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Information Security for Managers (Master MIS)
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
EUROCON “Computer as a Tool”, Belgrade, 24 th November 2005 (1) Paul Killoran EUROCON 2005 Paul Killoran, Fearghal Morgan & Michael Schukat National.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
June 28th, 2004 BioSecure, SecurePhone 1 Automatic Speaker Verification : Technologies, Evaluations and Possible Future Gérard CHOLLET CNRS-LTCI, GET-ENST.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
A Talking Elevator, WS2006 UdS, Speaker Recognition 1.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Configuring Directory Certificate Services Lesson 13.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
Module 9: Fundamentals of Securing Network Communication.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Secure contracts signed by mobile Phone IST Jacques Koreman, NTNU Andrew Morris, Spinvox International Workshop on Verbal and Nonverbal Communiation.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
The TAOS Authentication System: Reasoning Formally About Security Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
DIGITAL SIGNATURE.
PRESENTATION ON BIOMETRICS
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Providing secure mobile access to information servers with temporary certificates Diego R. López
Creating and Managing Digital Certificates Chapter Eleven.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
A Framework of Remote Biometric Authentication on the Open Network
Presentation transcript:

SecurePhone : a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly IST Secure contracts signed by mobile Phone

A Talking Elevator, WS2006 UdS, SecurePhone 2 Presentation Outline SecurePhone concept and use Project aim 1: secure exchange Project aim 2: multi-modal Biometric Recogniser Performance on PDA Implementation constraints and performance on SIMcard PDA selection Conclusion

A Talking Elevator, WS2006 UdS, SecurePhone 3 What is a SecurePhone? A SecurePhone is a new mobile communications device that enables users to exchange text/audio documents during a phone call to draw legally valid transactions. It combines biometric identity verification with e-signing in a system using front-edge technologies (wireless networking, double-key cryptography). Biometric recognizer enables strong authentication by comparing live biometric features with models trained on enrollment data which were previously stored on the PDA or on the device’s SIM card. Biometric authentication grants access to built-in e-signing facilities, also integrated on the PDA/SIM.

A Talking Elevator, WS2006 UdS, SecurePhone 4 User interface User Interface implementation includes: biometric data management modules ̶capture and pre-processing of enrollment or “live” test data on PDA ̶training of GMM models (“templates”) for identity verification on PC (or PDA) ̶Verification on PDA (now)/SIM (underway) SharedDoc module ̶interactive modification and exchange of a text file, the “e-contract” ̶exchange of audio files

A Talking Elevator, WS2006 UdS, SecurePhone 5 Project aim 1: secure exchange Secure PKI (personal key infrastructure) Deal secure m-contracts during a mobile phone call secure: private key stored on SIM card dependable: multi-modal: voice, face, signature user-friendly: familiar, intuitive, non-intrusive flexible: legally binding text/audio transactions dynamic: mobile (anytime, anywhere)

A Talking Elevator, WS2006 UdS, SecurePhone 6 PK technology in SecurePhone Public key encryption technology is used for e-signature, i.e. to enforce data integrity and non-repudiation; in P2B, public-key technology is used for authentication over networks and/or form e-signing. SIM card is used as a tamper-proof device for e-signing and storing the user’s e-signature private key (“strong signature” if the corresponding digital certificate is e-signed by a valid CA). Standard e-signature certificates and procedures are used for certificate verification and management, so documents e-signed by means of the SecurePhone have the same legal validity as documents e-signed by other means.

A Talking Elevator, WS2006 UdS, SecurePhone 7 Biometric verification architectures Biometric templates can be stored ̶on the SIM card (ToC) ̶on the PDA/host (ToH) ̶on a Trusted Third Party (TTP) server (ToS) Matching/verification can be performed ̶by an applet running on the SIM card (MoC) ̶by an application running on the PDA/host (MoH) ̶by an application running on a TTP server (MoS) Only ToC + MoC meets requirements on ̶security ̶privacy and user acceptance

A Talking Elevator, WS2006 UdS, SecurePhone 8 Person-to-Person (P2P) user scenario During a phone call, two SecurePhone end users (actors) agree on drawing a distance contract by setting up a direct m-transaction One actor (proposer) sends an e-document (e-contract, i.e. text/audio file) to the other actor (endorser) In case of text files, the e-contract can be interactively modified and transmitted back and forth until a formal agreement on its contents is reached To finalize the m-transaction, the endorser e-signs the e-contract and sends it to the proposer as evidence of formal acceptance of the terms contained therein Depending on the e-contract type, the proposer may also be requested to e-sign the e-contract

A Talking Elevator, WS2006 UdS, SecurePhone 9 Person-to-Business (P2B) scenario Scenario compatible with SecurePhone architecture, but not implemented in the project SecurePhone user accesses the server of service provider using his browser Server sets up an SSL/TLS communication channel with strong client authentication Browser triggers local authentication, which releases private key The e-signing of web-based forms is accepted by service provider as evidence of agreed e-contracts

A Talking Elevator, WS2006 UdS, SecurePhone 10 In both P2P and P2B, the user (i.e. a host application) needs to locally authenticate in order to “unlock” cryptographic functions and access the private key securely stored on the SIM card PIN- or password-based authentication is admissible yet weak and unsatisfactory for security-critical applications (e-commerce, e-health- e-government) Local authentication strengthened in order to increase user’s trust in the system by combining ̶WYK:a token that only the user knows (signature) ̶WYH:a token that only the user holds (PDA with SIM card) ̶WYA:biometric identity Project aim 2: biometric verification

A Talking Elevator, WS2006 UdS, SecurePhone 11 User verification system User requests PDA to verify their identity PDA requests user to read prompt (face in box) sign signature Feature processing applied to each modality [silence removal, histogram equalisation, MFCC or Haar wavelets, online CMS, delta features, etc.] for each modality S(i)=log p(Xi|C)-log p(Xi|I) if S(i) < θ(i) for any (i) please repeat else fused-score = log p(S|C) - log p(S|I) if fused-score > φ user accepted else user rejected Press to start/stop speaking start/stop

A Talking Elevator, WS2006 UdS, SecurePhone 12 Multi-modal biometric verification preprocessing modelling preprocessing facevoicesignature accept user release private key reject user fusion client & impostor joint-score models user profile

A Talking Elevator, WS2006 UdS, SecurePhone 13 Voice verification (SU / GET ENST) Fixed 5-digits prompt – conceptually neutral, easily extendable, requires few Gaussians 22 KHz sampling Online energy based non-speech frame removal MFCCs with online CMS and first-order time difference features – slow to compute, but fixed point faster than floating point Features modelled by 100-Gaussian GMM pdf, with UBM for model initialisation and score normalisation Training on data from 2 indoor and 2 outdoor recordings from one session, testing on similar data from another session

A Talking Elevator, WS2006 UdS, SecurePhone 14 Face verification (BU) Static face recognition – 10 grey-scale images selected at random, 160x192 pixels Histogram equalisation and z-score normalisation of features Haar low-low-4 (or low-high) wavelet features – f ast to compute Features modelled by only 4 Gaussian GMM pdf – UBM used for model initialisation and score normalisation Training on data from 2 indoor and 2 outdoor recordings from one session, testing on similar data from another session

A Talking Elevator, WS2006 UdS, SecurePhone 15 Signature verification (GET INT) Shift normalisation, but no rotation or scaling 2D coordinates (100 Hz) augmented by time difference features, curvature, etc. – total 19 features Note:no pressure or angles available, since obtained from PDA’s touch screen, not from writing pad Fast to compute Features modelled by 100 Gaussian GMM pdf – UBM used for model initialisation and score normalisation Training and testing on data from one session

Fusion (GET INT) For each modality S(i) = log p(Xi|C) - log p(Xi|I) LLR score fusion was tested by: Optimal linear weighted sum: Fused-score = sum over i of w(i) * S(i) GMM scores modelling, i.e. modelling both client and impostor joint score pdf’s by diagonal covariance GMMs: Fused-score = log p(S|C) - log p(S|I)

PDAtabase After initial development with many databases, CSLU/BANCA- like database recorded on Qtek2020 PDA for realistic conditions (sensors, environment) 60 English subjects: 24 for UBM, 18 for g1, 18 for g2. Accept/reject threshold optimised on g1, then evaluated on g2, vice versa Video (voice + face): 6 x 5-digit, 10-digit and phrase prompts; 2 sessions, with 2 inside and 2 outside recordings per session Signatures in one session, 20 expert impostorisations for each Virtual couplings of audio-visual with signature data (independent) Automatic test script allows to test many possible configuration User just provides executables for feature modelling, scores generation and scores fusion

A Talking Elevator, WS2006 UdS, SecurePhone 18 Performance on PDA DET curves for prompts T1 (5 digits, left), T2 (10 digits, middle) and T3 (short phrases, right) in PDAtabase

A Talking Elevator, WS2006 UdS, SecurePhone 19 Performance on PDA Fusion results (% WER, FAR and FRR) for the best fusion method (Min-Max + GMM), for the 3 prompt types in the PDAtabase EER R=1 WER (FAR/FRR) R=0.1 WER (FAR/FRR) R=10 WER (FAR/FRR) T (1.57/3.24)1.87 (4.97/1.56)1.02 (0.43/6.95) T (0.89/3.32)1.37 (3.05/1.20)0.63 (0.25/4.37) T (1.61/3.14)2.03 (4.54/1.78)0.92 (0.38/6.34)

A Talking Elevator, WS2006 UdS, SecurePhone 20 Implementation constraints PDA main processor is much slower than PC, but does speech preprocessing in real time for 22 kHz signals Note: speech signal taken directly from mic, therefore > 8 kHz Only data on the SIM card is secure, so all biometric models must be stored and processed on the SIM, which has very limited computational resources SIM model storage limited to 40 K: text-dependent prompts Note: text-independent prompts or varied text-dependent prompts are more secure, but would require K GMM based verification is well suited to integer computation Enrolment can use only one short indoor session

A Talking Elevator, WS2006 UdS, SecurePhone 21 Performance on SIMcard SIM processor very slow: single verification takes 53 minutes! Most time goes to voice and signature processing: these use a large number of frames and models with a lot of Gaussians. Not acceptable for any practical application. Drastic measures needed: global processing. By using means and standard deviations across all parameters for all frames in the utterance/signature, the number of frames is reduced to one. Since the data are much simpler, only a few Gaussian mixtures are needed for modelling Single verification now under 1 second, but performance for T1 is now 10.5% EER.

A Talking Elevator, WS2006 UdS, SecurePhone 22 Remarks on PDA selection No suitable off-the-shelf products at moment of selection fulfilled all SecurePhone requirements Limitations of Qtek 2020: –Class B GPRS  impossible to transmit voice and data simultaneously –Camera is on the rear  difficulties with video acquisition and text prompt reading –Proprietary video SDK, not freely available  problems with low-level raw image data recording Now available: Qtek 9000 solves first two problems, solution to last problem may be usuable with Qtek 9000!

A Talking Elevator, WS2006 UdS, SecurePhone 23 Conclusion The SecurePhone combines secure communication with user authentication is user-friendly and respects privacy does not require special hardware enables m-business with legal validity can easily be extended to other applications delivers proof-of-concept has very high performance on PDA, performance on SIM must still be improved.

A Talking Elevator, WS2006 UdS, SecurePhone 24 Secure contracts signed by mobile Phone IST