Presentation title - uni

Download Report

Transcript Presentation title - uni

IST-2002-506883
Secure contracts signed by mobile Phone
SecurePhone:
a mobile phone
with biometric authentication
and e-signature support
for dealing secure transactions
on the fly
Presentation Outline
•
•
•
•
•
•
•
SecurePhone concept and use
Project aim 1: secure exchange
Project aim 2: multi-modal Biometric Recogniser
Performance on PDA
Implementation constraints and performance
on SIMcard
PDA selection
Conclusion
A Talking Elevator, WS2006 UdS, SecurePhone
2
What is a SecurePhone?
•
A SecurePhone is a new mobile communications device
that enables users to exchange text/audio documents
during a phone call to draw legally valid transactions.
•
It combines biometric identity verification with
e-signing in a system using front-edge technologies
(wireless networking, double-key cryptography).
•
Biometric recognizer enables strong authentication by
comparing live biometric features with models trained
on enrollment data which were previously stored on
the PDA or on the device’s SIM card.
•
Biometric authentication grants access to built-in
e-signing facilities, also integrated on the PDA/SIM.
A Talking Elevator, WS2006 UdS, SecurePhone
3
User interface
User Interface implementation includes:
•
biometric data management modules
̶ capture and pre-processing of enrollment
or “live” test data on PDA
̶ training of GMM models (“templates”) for
identity verification on PC (or PDA)
̶ Verification on PDA (now)/SIM (underway)
•
SharedDoc module
̶ interactive modification and exchange
of a text file, the “e-contract”
̶ exchange of audio files
A Talking Elevator, WS2006 UdS, SecurePhone
4
Project aim 1: secure exchange
Secure PKI (personal key infrastructure)
Deal secure m-contracts during a mobile phone call
• secure: private key stored on SIM card
• dependable: multi-modal: voice, face, signature
• user-friendly: familiar, intuitive, non-intrusive
• flexible: legally binding text/audio transactions
• dynamic: mobile (anytime, anywhere)
A Talking Elevator, WS2006 UdS, SecurePhone
5
PK technology in SecurePhone
•
Public key encryption technology is used for e-signature,
i.e. to enforce data integrity and non-repudiation; in
P2B, public-key technology is used for authentication
over networks and/or form e-signing.
•
SIM card is used as a tamper-proof device for e-signing
and storing the user’s e-signature private key (“strong
signature” if the corresponding digital certificate is
e-signed by a valid CA).
•
Standard e-signature certificates and procedures are
used for certificate verification and management, so
documents e-signed by means of the SecurePhone have
the same legal validity as documents e-signed by other
means.
A Talking Elevator, WS2006 UdS, SecurePhone
6
Biometric verification architectures
•
•
Biometric templates can be stored
̶ on the SIM card (ToC)
̶ on the PDA/host (ToH)
̶ on a Trusted Third Party (TTP) server (ToS)
Matching/verification can be performed
̶ by an applet running on the SIM card (MoC)
̶ by an application running on the PDA/host (MoH)
̶ by an application running on a TTP server (MoS)
•
Only ToC + MoC meets requirements on
̶ security
̶ privacy and user acceptance
A Talking Elevator, WS2006 UdS, SecurePhone
7
Person-to-Person (P2P) user scenario
• During a phone call, two SecurePhone end users (actors)
agree on drawing a distance contract by setting up a direct
m-transaction
• One actor (proposer) sends an e-document (e-contract, i.e.
text/audio file) to the other actor (endorser)
• In case of text files, the e-contract can be interactively
modified and transmitted back and forth until a formal
agreement on its contents is reached
• To finalize the m-transaction, the endorser e-signs the
e-contract and sends it to the proposer as evidence of
formal acceptance of the terms contained therein
• Depending on the e-contract type, the proposer may also
be requested to e-sign the e-contract
A Talking Elevator, WS2006 UdS, SecurePhone
8
Person-to-Business (P2B) scenario
• Scenario compatible with SecurePhone architecture, but
not implemented in the project
• SecurePhone user accesses the server of service provider
using his browser
• Server sets up an SSL/TLS communication channel with
strong client authentication
• Browser triggers local authentication, which releases
private key
• The e-signing of web-based forms is accepted by service
provider as evidence of agreed e-contracts
A Talking Elevator, WS2006 UdS, SecurePhone
9
Project aim 2: biometric verification
•
In both P2P and P2B, the user (i.e. a host application)
needs to locally authenticate in order to “unlock”
cryptographic functions and access the private key
securely stored on the SIM card
•
PIN- or password-based authentication is admissible yet
weak and unsatisfactory for security-critical applications
(e-commerce, e-health- e-government)
•
Local authentication strengthened in order to increase
user’s trust in the system by combining
̶ WYK: a token that only the user knows (signature)
̶ WYH: a token that only the user holds (PDA with SIM card)
̶ WYA: biometric identity
A Talking Elevator, WS2006 UdS, SecurePhone
10
User verification system
• User requests PDA to verify their identity
• PDA requests user to
• read prompt (face in box)
79851
• sign signature
• Feature processing applied to each modality
[silence removal, histogram equalisation, MFCC or Haar
wavelets, online CMS, delta features, etc.]
• for each modality S(i)=log p(Xi|C)-log p(Xi|I)
• if S(i) < θ(i) for any (i) please repeat
start/stop
Press to start/stop speaking
• else fused-score = log p(S|C) - log p(S|I)
• if fused-score > φ user accepted
• else user rejected
A Talking Elevator, WS2006 UdS, SecurePhone
11
Multi-modal biometric verification
face
voice
signature
preprocessing
preprocessing
preprocessing
modelling
modelling
modelling
fusion
client & impostor
joint-score models
user profile
reject user
accept user
release private key
A Talking Elevator, WS2006 UdS, SecurePhone
12
Voice verification (SU / GET ENST)
• Fixed 5-digits prompt – conceptually neutral, easily
extendable, requires few Gaussians
• 22 KHz sampling
• Online energy based non-speech frame removal
• MFCCs with online CMS and first-order time difference
features – slow to compute, but fixed point faster than
floating point
• Features modelled by 100-Gaussian GMM pdf,
with UBM for model initialisation and score normalisation
• Training on data from 2 indoor and 2 outdoor recordings
from one session, testing on similar data from another
session
A Talking Elevator, WS2006 UdS, SecurePhone
13
Face verification (BU)
• Static face recognition – 10 grey-scale images selected at
random, 160x192 pixels
• Histogram equalisation and z-score normalisation of features
• Haar low-low-4 (or low-high) wavelet features – fast to
compute
• Features modelled by only 4 Gaussian GMM pdf – UBM used
for model initialisation and score normalisation
• Training on data from 2 indoor and 2 outdoor recordings from
one session, testing on similar data from another session
A Talking Elevator, WS2006 UdS, SecurePhone
14
Signature verification (GET INT)
• Shift normalisation, but no rotation or scaling
• 2D coordinates (100 Hz) augmented by time difference
features, curvature, etc. – total 19 features
Note: no pressure or angles available, since obtained from
PDA’s touch screen, not from writing pad
• Fast to compute
• Features modelled by 100 Gaussian GMM pdf – UBM used for
model initialisation and score normalisation
• Training and testing on data from one session
A Talking Elevator, WS2006 UdS, SecurePhone
15
Fusion (GET INT)
• For each modality S(i) = log p(Xi|C) - log p(Xi|I)
• LLR score fusion was tested by:
• Optimal linear weighted sum:
Fused-score = sum over i of w(i) * S(i)
• GMM scores modelling, i.e. modelling both client and
impostor joint score pdf’s by diagonal covariance
GMMs:
Fused-score = log p(S|C) - log p(S|I)
PDAtabase
• After initial development with many databases, CSLU/BANCAlike database recorded on Qtek2020 PDA for realistic
conditions (sensors, environment)
• 60 English subjects: 24 for UBM, 18 for g1, 18 for g2.
Accept/reject threshold optimised on g1, then evaluated
on g2, vice versa
• Video (voice + face): 6 x 5-digit, 10-digit and phrase prompts;
2 sessions, with 2 inside and 2 outside recordings per session
• Signatures in one session, 20 expert impostorisations for each
• Virtual couplings of audio-visual with signature data
(independent)
• Automatic test script allows to test many possible configuration
• User just provides executables for feature modelling, scores
generation and scores fusion
Performance on PDA
DET curves for prompts T1 (5 digits, left), T2 (10 digits, middle) and
T3 (short phrases, right) in PDAtabase
A Talking Elevator, WS2006 UdS, SecurePhone
18
Performance on PDA
EER
R=1
R=0.1
R=10
WER (FAR/FRR)
WER (FAR/FRR)
WER (FAR/FRR)
T1 2.39 2.40 (1.57/3.24) 1.87 (4.97/1.56) 1.02 (0.43/6.95)
T2 1.54 1.60 (0.89/3.32) 1.37 (3.05/1.20) 0.63 (0.25/4.37)
T3 2.30 2.37 (1.61/3.14) 2.03 (4.54/1.78) 0.92 (0.38/6.34)
Fusion results (% WER, FAR and FRR) for
the best fusion method (Min-Max + GMM),
for the 3 prompt types in the PDAtabase
A Talking Elevator, WS2006 UdS, SecurePhone
19
Implementation constraints
• PDA main processor is much slower than PC, but does speech
preprocessing in real time for 22 kHz signals
Note: speech signal taken directly from mic, therefore > 8 kHz
• Only data on the SIM card is secure, so all biometric models
must be stored and processed on the SIM, which has very
limited computational resources
• SIM model storage limited to 40 K: text-dependent prompts
Note: text-independent prompts or varied text-dependent
prompts are more secure, but would require 200-400 K
• GMM based verification is well suited to integer computation
• Enrolment can use only one short indoor session
A Talking Elevator, WS2006 UdS, SecurePhone
20
Performance on SIMcard
• SIM processor very slow: single verification takes 53 minutes!
• Most time goes to voice and signature processing: these use a
large number of frames and models with a lot of Gaussians.
• Not acceptable for any practical application.
• Drastic measures needed: global processing.
• By using means and standard deviations across all parameters
for all frames in the utterance/signature, the number of
frames is reduced to one.
• Since the data are much simpler, only a few Gaussian mixtures
are needed for modelling
• Single verification now under 1 second, but performance for
T1 is now 10.5% EER.
A Talking Elevator, WS2006 UdS, SecurePhone
21
Remarks on PDA selection
•
No suitable off-the-shelf products at moment of
selection fulfilled all SecurePhone requirements
•
Limitations of Qtek 2020:
– Class B GPRS  impossible to transmit voice and
data simultaneously
– Camera is on the rear  difficulties with video
acquisition and text prompt reading
– Proprietary video SDK, not freely available 
problems with low-level raw image data recording
•
Now available: Qtek 9000 solves first two problems,
solution to last problem may be usuable with Qtek
9000!
A Talking Elevator, WS2006 UdS, SecurePhone
22
Conclusion
The SecurePhone
•
combines secure communication with user
authentication
•
•
•
•
•
•
is user-friendly and respects privacy
does not require special hardware
enables m-business with legal validity
can easily be extended to other applications
delivers proof-of-concept
has very high performance on PDA, performance
on SIM must still be improved.
A Talking Elevator, WS2006 UdS, SecurePhone
23
Secure contracts signed by mobile Phone
IST-2002-506883
http://www.secure-phone.info
A Talking Elevator, WS2006 UdS, SecurePhone
24