Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for sequential authentication using one or more error rates characterizing each security challenge

a technology of security challenges and error rates, applied in the field of user authentication techniques, can solve the problems of inconsistent fingerprints, sequential challenges that are not beneficial, and the set of rules or algorithms for making a binary decision to accept or reject users may be more complicated than others, and achieve the effect of convenient adaptation

Inactive Publication Date: 2006-12-28
IBM CORP
View PDF12 Cites 63 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0011] According to another aspect of the invention, one or more of the false accept and false reject error probabilities are adapted based on field data or known information about a given challenge. For example, the FA and FR values may be changed by adapting to field data reflecting the measured FA and FR values. The FA and FR values may also be changed to reflect expected security breaches. The continuous scores provided by the present invention allow easier adaptation, as they imply a statistical model that has parameters, such as FA and FR. In addition, the continuous scores provided by the present invention allow one or more of the intermediate authentication results and the cumulative authentication result to be combined with a result from another verification method (such as biometric or possession based authentication).

Problems solved by technology

For example, fingerprints are consistent and sequential challenges would not be beneficial since they capture the same identical fingerprint.
When sequential user authentication is utilized, the set of rules or algorithms for making a binary decision to accept or reject the user may be more complicated than a simple threshold, since the results from individual interaction turns (challenges) may be contradicting.
While such conversational biometric techniques provide improved authentication frameworks with a high degree of flexibility, accuracy, convenience and robustness, they suffer from a number of limitations, which if overcome, could further improve the efficiency and security of such user authentication techniques.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for sequential authentication using one or more error rates characterizing each security challenge
  • Method and apparatus for sequential authentication using one or more error rates characterizing each security challenge
  • Method and apparatus for sequential authentication using one or more error rates characterizing each security challenge

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention provides a sequential authentication system. The disclosed sequential authentication system is based on knowledge verification for the purpose of measuring a similarity score for every interaction turn. The disclosed sequential authentication system continuously estimates the probability that the user's identity claim is genuine and the probability that the user is not who he or she claims to be.

[0020] During a user authentication, a series of challenges is presented to the user, and each user response is compared to one or more models, resulting in an intermediate authentication decision (such as a log likelihood ratio (LLR)). At each interaction turn, the intermediate decisions from the individual turns are combined (such as a sum of LLRs) to create a cumulative authentication result to ultimately either accept or reject the user's identity claim. The models used for the sequential authentication process may also be adapted from the user data during a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and apparatus are provided for sequential authentication of a user that employ one or more error rates characterizing each security challenge. According to one aspect of the invention, a user is challenged with at least one knowledge challenge to obtain an intermediate authentication result; and the user challenges continue until a cumulative authentication result satisfies one or more criteria. The intermediate authentication result is based, for example, on one or more of false accept and false reject error probabilities for each knowledge challenge. A false accept error probability describes a probability of a different user answering the knowledge challenge correctly. A false reject error probability describes a probability of a genuine user not answering the knowledge challenge correctly. The false accept and false reject error probabilities can be adapted based on field data or known information about a given challenge.

Description

FIELD OF THE INVENTION [0001] The present invention is generally related to user authentication techniques and, more particularly, to techniques for providing sequential user authentication. BACKGROUND OF THE INVENTION [0002] Authenticating the identity claim of a user is an important step in ensuring the security of systems, networks, services and facilities, both for physical and for logical access. Existing user authentication is often performed on the basis of a user's knowledge of a single verification object, e.g., a password or a personal identification number (PIN) or on the basis of possession of a single verification object, e.g., a key or a card. Other existing authentication techniques include the use of a biometric feature as the verification object, e.g., a fingerprint, a voiceprint, an iris scan or a face scan. [0003] Verification is typically done by comparing the verification object obtained from the user at the time of attempted access to previously stored objects....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00G06F21/31G06F21/32G06F21/33G06F21/34
CPCG06F2221/2103H04L63/104G06F21/31H04L63/0861
Inventor NAVRATIL, JIRIOSBORN, RYAN L.PELECANOS, JASON W.RAMASWAMY, GANESH N.ZILCA, RAN D.
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products