skip to main content
10.1145/967900.967990acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Protected transmission of biometric user authentication data for oncard-matching

Authors Info & Claims
Published:14 March 2004Publication History

ABSTRACT

Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncard-matching need protection by appropriate means in order to assure data origin in the biometric sensor and to prevent bypassing the sensor. For this purpose, the verification data to be transferred to the user smartcard is protected with a cryptographic checksum that is calculated within a separate security module controlled by a tamper resistant card terminal with integrated biometric sensor.

References

  1. R. Aufreiter. Match-On-Card the missing link between Biometrics and Cryptography? Proceedings of ISSE, 2001.Google ScholarGoogle Scholar
  2. ISO/IEC FCD 19784, BioAPI Specification, 2003.Google ScholarGoogle Scholar
  3. ISO/IEC CD3 19785, Common Biometric Exchange Formats Framework (CBEFF), 2003.Google ScholarGoogle Scholar
  4. Common Criteria for Information Technology Security Evaluation (CC) V2.0, 1998.Google ScholarGoogle Scholar
  5. DIN V66400, Finger Minutiae Encoding Format and Parameters for OnCard Matching V1.0, 2003.Google ScholarGoogle Scholar
  6. Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic requirements, V1.6 (E-Sign-K Specification). CEN/ISSS WS/E-Sign Deaft CWA Group K, 2003.Google ScholarGoogle Scholar
  7. Directive 1999/93/EC of the European Parliament and of the Council of Dec. 13th 1999 on a Community Framework for Electronic Signatures, 2000.Google ScholarGoogle Scholar
  8. German Health Professional Card and Security Module Card Specification - Pharmacist & Physician, V2.0 (HPC Specification), 2003.Google ScholarGoogle Scholar
  9. ISO/IEC 19794, Biometrics - Biometric Data Formats for Interchange (standard under development), 2003.Google ScholarGoogle Scholar
  10. ISO/IEC FDIS 7816-11, Identification Cards - Integrated Circuit Cards - Part 11: Personal verification through biometric methods, 2003.Google ScholarGoogle Scholar
  11. ISO/IEC FDIS 7816-4, Identification Cards-Integrated Circuit Cards - Part 4: Organization, security and commands for interchange, 2003.Google ScholarGoogle Scholar
  12. ISO/IEC FDIS 7816-8, Identification Cards - Integrated Circuit Cards - Part 8: Security related interindustry commands, 2003.Google ScholarGoogle Scholar
  13. Information Technology Security Evaluation Criteria (ITSEC) V1.2, 1991.Google ScholarGoogle Scholar
  14. T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. Proceedings of SPIE, 4677, 2002.Google ScholarGoogle Scholar
  15. R. Müller. Fingerprint Verification with Microprocessor Security Tokens. Herbert Utz Verlag, München, 2001.Google ScholarGoogle Scholar
  16. German Signature Act - SigG, Fed. Law Gaz. 2001, Part I Nr. 22, pp 876--884, 2001.Google ScholarGoogle Scholar
  17. German Signature Ordinance - SigV, Fed. Law Gaz. 2001, Part I Nr. 59, 2001.Google ScholarGoogle Scholar
  18. ZAVIR, Ascribability of actions in virtual worlds. http://zavir.sit.fraunhofer.de, 2003.Google ScholarGoogle Scholar
  1. Protected transmission of biometric user authentication data for oncard-matching

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '04: Proceedings of the 2004 ACM symposium on Applied computing
          March 2004
          1733 pages
          ISBN:1581138121
          DOI:10.1145/967900

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 March 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader