Including Biometric Authentication in a Smart Card Operating System

One of the most secure medias in where to store personal a sensible data, are smart cards. They can provide security through cryptography and secret keys. Unfortunately, they suffer a lack of security when the card holder identity is to be authenticated. The only way, nowadays, to achieve such a task is through Card Holder Verification Keys, which are closely related to the Personal Identification Number (PIN). The author, aware of this problem, has worked in enabling a Biometric Authentication inside a smart card, in order to provide the same level of security that PINs have, without being able to be copied. After studying several biometric techniques, he has developed, up to today, three of them (based on Voice, Hand Geometry and Iris). Therefore, he has obtained the conclusions needed to integrate the Biometric Authentication into the Operating System of a Smart Card. Using JavaCards, prototypes have been developed, taking several tests to prove the viability of them. Results obtained, specially the ones using the RISC-based JavaCard, show the possibility of launching a commercial product, without going to an expensive masking level of development.

[1]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[2]  R. Sanchez-Reillo,et al.  Improving access control security using iris identification , 2000, Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083).

[3]  Raul Sanchez-Reillo,et al.  Access control system with hand geometry verification and smart cards , 2000 .

[4]  Ana González-Marcos,et al.  Multiresolution Analysis and Geometric Measures for Biometric Identification Systems , 1999, CQRE.

[5]  R. Sanchez-Reillo,et al.  Securing information and operations in a smart card through biometrics , 2000, Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083).

[6]  Gerhard Goos,et al.  Secure Networking — CQRE [Secure] ’ 99 , 1999, Lecture Notes in Computer Science.

[7]  R. Sanchez-Reillo,et al.  Minimal template size for iris-recognition , 1999, Proceedings of the First Joint BMES/EMBS Conference. 1999 IEEE Engineering in Medicine and Biology 21st Annual Conference and the 1999 Annual Fall Meeting of the Biomedical Engineering Society (Cat. N.

[8]  Sharath Pankanti,et al.  Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .

[9]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Ana González-Marcos,et al.  Biometric Identification through Hand Geometry Measurements , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[11]  Douglas A. Reynolds,et al.  Robust text-independent speaker identification using Gaussian mixture speaker models , 1995, IEEE Trans. Speech Audio Process..