25
SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly IST-2002-506883 Secure contracts signed by mobile Phone Jacques Koreman, ISK

SecurePhone : a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly IST-2002-506883Secure contracts

  • View
    215

  • Download
    1

Embed Size (px)

Citation preview

SecurePhone: a mobile phone

with biometric authentication and e-signature support

for dealing secure transactions on the fly

IST-2002-506883

Secure contracts signed by mobile Phone

Jacques Koreman, ISK

2Dept. of Telematics, NTNU, 07.12.2006

What is a SecurePhone?

• Mobile communications device that enables exchange of text/audio documents during a phone call to draw legally valid transactions.

• Secure communication uses e-signing in a system using front-edge technologies (wireless networking, double-key cryptography).

• Biometric recogniser enables strong authentication by comparing live biometric features with models trained on enrolment data.

• Biometric authentication grants access to built-in e-signing facilities integrated on the PDA/SIM.

3Dept. of Telematics, NTNU, 07.12.2006

Presentation Outline

• SecurePhone concept and use

• Project aim 1: secure exchange

• Project aim 2: biometric recognition– on PDA, high performance– on SIMcard, proof-of-concept

• Conclusion

• Outlook

4Dept. of Telematics, NTNU, 07.12.2006

Project aim 1: secure exchangeProject aim 1: secure exchange

Secure PKI (personal key infrastructure)

• Public key encryption technology is used for e-signature, i.e. to enforce data integrity and non-repudiation

• Standard e-signature certificates and proce-dures are used for certificate verification and management, so documents e-signed by means of the SecurePhone have the same legal validity as documents e-signed by other means.

5Dept. of Telematics, NTNU, 07.12.2006

Secure architecture• SIM card used as a tamper-proof device for storage

of private key ("strong signature" if the correspond-ing digital certificate is issued by a valid CA).

• Storage of biometric templates and matching

>on a TTP server (ToS/MoS): not implemented

>on the PDA/host (ToH/MoH): implemented

>on the SIM card (ToC/M0C): proof-of-concept

• Only ToC+MoC meets requirements on

>security

>privacy and user acceptance

6Dept. of Telematics, NTNU, 07.12.2006

User scenario

• During a phone call, two SecurePhone end users (actors) agree on drawing a distance contract.

• One actor (proposer) sends an e-contract (text/audio file) to the other actor (endorser) .

• In case of text files, the e-contract can be interactively modified and transmitted back and forth until a formal agreement on its contents is reached

• To finalize the m-transaction, the endorser e-signs and sends the e-contract as evidence of formal acceptance of the terms contained therein.

• Depending on the e-contract type, the proposer may also be requested to e-sign the e-contract.

8Dept. of Telematics, NTNU, 07.12.2006

• Local authentication unlocks cryptographic functions by accessing the private key securely stored on the SIM card

• PIN- or password-based authentication admissible yet weak unsatisfactory for security-critical applications (e-commerce, e-health, e-government)

• Local authentication strengthened in order to increase user’s trust in the system by combining

>WYK: a token only the user knows (signature)

>WYH: a token the user holds (PDA with SIMcard)

>WYA: biometric identity

Project aim 2: biometric Project aim 2: biometric verificationverification

9Dept. of Telematics, NTNU, 07.12.2006

Password are not reliable enoughPassword are not reliable enough

"Open, Sesame!"

DET curve (detection error tradeoff)

Alvin Martin et al. (1997). The DET curve in assessment of detection task

performance, www.nist.gov/speech/publications/

false acceptance rate (%)false alarm probability (%)

mis

s p

robabili

ty (

%)

fals

e r

eje

ctio

n r

ate

(%

)

EER

10Dept. of Telematics, NTNU, 07.12.2006

Fusion of multiple modalitiesFusion of multiple modalities

The Incredibles

11Dept. of Telematics, NTNU, 07.12.2006

Two types of biometrics:

• physical

• behavioural

variation! (due to repetitions, sessions, channel, background noise)

Properties of biometricsProperties of biometrics

12Dept. of Telematics, NTNU, 07.12.2006

These biometrics have a high user acceptance:

• chosen biometrics are user-friendly

• very short enrolment session

• capture does not require special hardware

• difficult to impostorise all three modalities

• biometric profile remains local, guaranteeing privacy

• processing of the biometric data also local (privacy)

Why face, voice and signature?Why face, voice and signature?

13Dept. of Telematics, NTNU, 07.12.2006

User verification procedure

Press to start/stop speaking

7 9 8 5 1

start/stop

• User requests identity verification

• PDA requests user to

•read prompt: face + voice

•sign signature

• Feature processing applied to each modality

• Comparison to biometric profiles of client and impostors

• Verification decision: accept/reject

14Dept. of Telematics, NTNU, 07.12.2006

Multi-modal biometric verificationMulti-modal biometric verification

preprocessing

modellingmodellingmodelling

preprocessingpreprocessing

face voice signature

accept release private key

reject

fusion

client & impostor joint-score models

15Dept. of Telematics, NTNU, 07.12.2006

Voice verification• Fixed 5-digits prompt – conceptually neutral,

easily extendable

• 22 KHz sampling

• Online energy based non-speech frame removal

• MFCCs with online CMS and first-order time difference features (10-ms frames)

• Features modelled by 100-Gaussian GMM, with UBM for model initialisation and score normalisation

• Training on data from 2 indoor and 2 outdoor recordings from one session, testing on similar data from another session

16Dept. of Telematics, NTNU, 07.12.2006

Face verification• Static face recognition using 10 grey-scale images

selected at random, 160x192 pixels

• Histogram equalisation and z-score normalisation of features

• Haar LL4 (or LH4) wavelet features – fast to compute (esp. compared to facial definition parameters)

• Features modelled by 4-Gaussian GMM, with UBM for model initialisation and score normalisation

• Training on data from 2 indoor and 2 outdoor recordings from one session, testing on similar data from another session

17Dept. of Telematics, NTNU, 07.12.2006

Signature verification

• Shift normalisation, but no rotation or scaling

• 2D coordinates (100 Hz) augmented by time difference features, curvature, etc. – total 19 featuresNote: no pressure or angles available, since obtained from PDA’s touch screen, not from writing pad

• Fast to compute

• Features modelled by 100 Gaussian GMM pdf – UBM used for model initialisation and score normalisation

• Training and testing on data from one session

Fusion

• For each modality S(i) = log p(Xi|C) - log p(Xi|I),

latter for casual impostors, only signatures

impostorised by experts

• Best LLR score fusion was obtained for

GMM scores modelling, i.e. modelling both

client and impostor joint score pdf’s by

diagonal covariance GMMs:

Fused-score = log p(S|C) - log p(S|I)

SHOW

DEMO

Tests on PDAtabase• Database recorded on Qtek2020 PDA for realistic

conditions (sensors, environment)

• 60 English subjects: 24 for UBM, 18 for g1, 18 for g2.Accept/reject threshold optimised on g1, then evaluated on g2, and vice versa

• Video (voice + face): 6 x 5-digit, 10-digit and phrase prompts; 2 sessions, with 2 inside and 2 outside recordings per session

• Signatures in one session, 20 expert impostorisations each

• Virtual couplings of audio-visual with signature data

• Automatic test script to test many possible configuration

• User just provides executables for feature modelling, scores generation and scores fusion

20Dept. of Telematics, NTNU, 07.12.2006

Performance on PDA

DET curves for prompts T1 (5 digits, left), T2 (10 digits, middle) and T3 (short phrases, right) in PDAtabase

21Dept. of Telematics, NTNU, 07.12.2006

Performance on PDA

Fusion results (% WER, FAR and FRR) for 3 prompt types T1 = 5 digits, T2 = 10 digits, T3 = short

phrases) in the PDAtabase, at three critical points in the DET curve

EER

R=1WER (FAR/FRR)

R=0.1WER (FAR/FRR)

R=10WER (FAR/FRR)

T1 2.392.40

(1.57/3.24)

1.87

(4.97/1.56)

1.02

(0.43/6.95)

T2 1.54 1.60

(0.89/3.32)

1.37

(3.05/1.20)

0.63

(0.25/4.37)

T3 2.30 2.37

(1.61/3.14)

2.03

(4.54/1.78)

0.92

(0.38/6.34)

22Dept. of Telematics, NTNU, 07.12.2006

Implementation constraints

• PDA main processor allows speech preprocessing in real time for 22 kHz signalsNote: signal directly from mic, therefore > 8 kHz

• Only data on the SIM card is secure, so all biometric models must be stored and processed on the SIM, which has very limited computational resources

• SIM model storage limited to 40K: text-dependent promptsNote: text-independent prompts or varied text-dependent prompts are more secure, but would require 200-400K

• Enrolment can use only one short indoor session

23Dept. of Telematics, NTNU, 07.12.2006

Performance on SIMcard• SIM processor very slow: single verification 53

min.!

• Most time goes to voice and signature processing: large #frames and models with many Gaussians.

• Drastic measures needed: global processing.

• By using means and standard deviations across all frames in the utterance/signature, the number of frames is reduced to one.

• Simpler data require few mixtures for GMM modelling

• Single verification now under 1 second, but performance for T1 is now 10.5% EER

proof-of-concept, but performance must be improved!

25Dept. of Telematics, NTNU, 07.12.2006

ConclusionConclusion

• secure: PKI with private key stored on SIM card

• dependable: multi-modal: voice, face, signature

• user-friendly: familiar, intuitive, non-intrusive

• flexible: legally binding text/audio transactions

• low-cost: no special hardware needed

• dynamic: mobile (anytime, anywhere)

Deal secure m-contracts during a mobile phone call

26Dept. of Telematics, NTNU, 07.12.2006

Outlook

• In FP7, many opportunities for security and trust projects

• Security and trust do not only depend on the communication channel

• but also on the identity of the communication partner

• for which biometric recognition can be used

If you see a role for biometric recognition in your proposal, do not hesitate to contact me!

27Dept. of Telematics, NTNU, 07.12.2006

Secure contracts signed by mobile PhoneIST-2002-506883

http://www.secure-phone.info

Please take my business card or e-mail me at [email protected]