Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND APPARATUS FOR SECURE INSERTION OF AN ACCESS CODE USING AN EYE-TRACKING DEVICE
Document Type and Number:
WIPO Patent Application WO/2007/017500
Kind Code:
A1
Abstract:
The present invention concerns a method and an apparatus for the secure insertion of a code, using an eye controlled interface, in order to access to any protected application. Besides the present invention allows the user to interface with eye-tracking systems and devices that enable him to use only his own gaze rather than the usual user interface like keyboards, mouse, etc. increasing, in such way, the security level of said code insertion.

Inventors:
MARINGELLI FRANCESCO (IT)
Application Number:
PCT/EP2006/065133
Publication Date:
February 15, 2007
Filing Date:
August 08, 2006
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SR LABS S R L (IT)
MARINGELLI FRANCESCO (IT)
International Classes:
G07F7/10; G06F3/00
Domestic Patent References:
WO2005010836A12005-02-03
Foreign References:
US6282553B12001-08-28
US4595990A1986-06-17
US5471542A1995-11-28
US4973149A1990-11-27
Attorney, Agent or Firm:
GERVASI, Gemma et al. (Milan, IT)
Download PDF:
Claims:
CLAIMS

1. Apparatus for the secure insertion of an access code characterized by comprising: means of visualization of graphic images or text, means of survey of the gaze coordinates of the user turned to said means of visualization, means of processing of the data produced by said means of survey of the gaze coordinates of the user, means of interfacing with the security systems that regulate the access to the areas protected from password.

2. Apparatus for the secure insertion of an access code according to claim 1 characterized in that said means of processing of the produced data comprise means of data filtering, means of determination of the areas activated by the user gaze - on said means of visualization - means of activation of the components belonging to said active areas, means of dispatch to said means of visualization, means of activation of feedback corresponding to the determined action, means of generating a password corresponding to the determined action and means of dispatch of said password to said means of interfacing with the security systems.

3. Apparatus for the secure insertion of an access code according to claim 2 characterized in that said means of visualization of images comprise at least a monitor (10), said means of survey of the gaze coordinates of the user include at least an eye-tracker device (1 1 ). 4. Apparatus for the secure insertion of an access code according to claim 2 characterized in that said means of processing of the data produced by said means of survey of the gaze coordinates comprise an electronic calculator (12) suitably associated to said monitor (10) and to said eye-tracker device (1 1 ).

5. Apparatus for the secure insertion of an access code according to the previous claim characterized in that said eye-tracker device (1 1 ) is integrated in said monitor (10).

6. Apparatus for the secure insertion of an access code according to the previous claim characterized in that said electronic calculator (12) is a personal computer.

7. Method for the secure insertion of an access code characterized in that it comprises the following steps: a) A page that requires to the user to insert his own password is visualized (20) on said means of visualization associated to said means of data processing.

b) The user gaze coordinates are calculated (21 ) by the eye - tracking device. c) The data concerning to said user gaze coordinates are sent (22) to said means of processing. d) The data concerning to said user gaze coordinates are filtered (23) from said means of processing. e) The filtered data coming from the previous step are interpreted (24) to determine the corresponding optical command. f) The action corresponding to said optical command is performed (25). g) An apposite feedback is sent (26) to said means of visualization. h) The steps a) - g) are repeated until the password is completely inserted. i) Said password is sent (27) to said means of interfacing with the security systems, j) The code corresponding to said password is sent (28) to said security systems that determine its validity. 8. Method for the secure insertion of an code access according to claim 7 characterized in that said step d) is performed by said raw data filtering module according to the following steps sequence: k) A pre-filtering is performed (30) so that the non valid samples are noticed and eliminated. I) The coordinates of the point gazed by the user are determined (31 ) m) The average and the standard deviation related to the number desired of samples are calculated (32) n) The tolerances for the evaluations are planned (33) o) The acceptable data are discriminated (34) from those to be discarded 9. Method for the secure insertion of an access code according to claim 8 characterized in that said step e) is performed according to the following steps sequence: p) The filtered data are elaborated (40) in order to determine what area of the interface has currently gazed by the user. q) The component of the graphical interface related to the area determined at the previous step is activated (41 ). The activation of such selection can for example happen using dwell time on the active component.

The optical command corresponding to the data coming from the previous step is determined (42), including the action to perform and a possible feedback to be sent to said means of visualization.

Description:

METHOD AND APPARATUS FOR SECURE INSERTION OF AN ACCESS CODE USING AN EYE-TRACKING DEVICE Field of the invention

The present invention concerns the field of the authentication of the individual identity during the procedure of access to a determined system or to a determined protected resource. The apparatus and the method according to the present invention are used in the field of the security systems in order to manage, protect and control conditional access resources, particularly through the password use. State of the art In these last years, in the field of computer science, the necessity to increase the security measures to protect the access to reserved and sensitive data, so that only authenticated and qualified users has access, has taken a great importance. For instance with the proliferation of the cash points, the automated teller machines and other automatic equipments of this type, today different devices of authentication that use magnetic cards or microprocessor and password are used on large scale.

At the ATM points for banking transactions whoever in possession of an ATM card and aware of the corresponding personal identification number (PIN) is allowed to access to the corresponding bank account to withdraw or to transfer money. The simple passwords or also the security magnetic cards that are normally used to authenticate the users introduce the drawback that they can be lost, stolen and cloned so that whoever improperly takes possession of these could access to sure areas. In banks and in other societies of services is an extremely important problem to establish the clients identity, in other words the authentication; the correct authentication, in fact, is required to protect themselves against any attempt of possible swindler to access the account of another person. Therefore it is clear the necessity of security measures that are not easily susceptible of violation and duplication. One of the most used and simple methods to provide access to computer systems, to secure areas, to financial transaction systems, etc. is characterized by the insertion of a password using a keyboard to which is often associated a

display.

A standard method for the insertion of an alphanumeric password, for instance, consists in typing the password on a standard ASCII keyboard or a numerical keyboard. The user password is not directly displayed on the screen but an asterisk or another character is shown as feedback to every character inserted to confirm the occurred typing.

Nevertheless, in many systems it is possible, for a not authorized observer, to see or to film the sequence of the code insertion in order to steal it. Frequent changes of the password used by the authorized user can prevent this possibility, but despite this changes a not authorized user can still access to different systems before the password is changed. Moreover, in systems like the

Automatic Teller Machine (ATM), the user password or the secret code cannot be easily changed. For these reasons, it is extremely important that the passwords and the methods of code and password insertion are secure regarding the possible identification from third persons.

Therefore, the purpose of the present invention is to realize a method and an apparatus that allow the secure insertion of password to a conditioned access application / system, erasing the possibility of code theft through direct observation or video recording of code typing.

The method and the apparatus according to the present invention allow the code/password insertion without the use of the user hands but only with his gaze, using an eye-tracking device. Summary of the invention

The object of the present invention is a method and an apparatus for the secure insertion of password or access codes to protected areas and contents protected as described in the claims that compose the integral part of the present description. Brief description of the figures

Fig. 1 shows a block diagram of a preferred embodiment of the present invention.

Fig. 2 shows the flow chart of the method according to the present invention.

Fig. 3 shows the flow chart regarding the routine of raw data filtering upcoming from the eye - tracker device.

Fig. 4 shows the flow chart regarding the routine of optical command determination corresponding to the data upcoming from the eye-tracker device. Detailed description of the invention

The apparatus, object of the present invention, includes: means of visualization of graphical images or text, means of survey of the gaze coordinates of the user turned to these visualization means, means of processing of the data produced by means of survey of the user gaze coordinates, means of interfacing with the security systems that regulate the access to the areas protected by password.

Said means of produced data processing include means of data filtering, means of identification of the activated areas - on said means of visualization of graphical images or text - by the user gaze, means of activation of the components belonging to said active areas, means of dispatch, to said means of visualization, of feedback corresponding to the determined action, means of generating a password corresponding to the determined action and means of dispatch, to said means that generate the interface with the security systems, of said password. In a preferred embodiment of the present invention, described in Fig. 1 , said means of images visualization include at least a monitor 10, said means of survey of the user gaze coordinates comprise at least an eye-tracker device 1 1 , said means of processing of the data produced by said means of survey of the user gaze coordinates include means of data elaboration, for instance a personal computer 12, associated to said monitor 10 and to said eye-tracker device 1 1. The apparatus according to the present invention develops the method following described, as shown in Fig. 2, where it is illustrated the flow chart that describes the single steps of it. a) A page that requires to the user to insert his own password is visualized (20) on said means of visualization associated to said means of data processing, b) The user gaze coordinates are calculated (21 ) by the eye - tracking device, c) The data concerning said user gaze coordinates are sent (22) to said means of processing.

d) The data concerning said user gaze coordinates are filtered (23) from said means of processing. e) The filtered data coming from the previous step are interpreted (24) to determine the corresponding optical command. f) The action corresponding to said optical command is performed (25). g) An apposite feedback is sent (26) to said means of visualization, h) The steps a) - g) are repeated until the password is completely inserted, i) Said password is sent (27) to said means of interfacing with the security systems. j) The code corresponding to said password is sent (28) to said security systems that determine its validity.

The step d) of the sequence previously described is developed by the raw data filtering module according to the steps sequence following described and illustrated in Fig. 3: k) A pre-filtering is performed (30), so that the non valid samples are noticed and eliminated.

I) The coordinates of the point gazed by the user are determined (31 ) m) The average and the standard deviation (32) related to the number desired of samples are calculated n) The tolerances for the evaluations are planned (33) o) The acceptable data are discriminated (34) from those to be discarded The determination of the optical command corresponding to the data coming from the eye-tracker, referring to the step e) of the sequence illustrated in the Fig. 2, is performed according to the following sequence and illustrated in Fig. 4: p) The filtered data are elaborated (40) in order to determine what area of the interface has currently gazed from the user. q) The component of the graphical interface related to the area determined at the previous step is activated (41 ). The activation of such selection can for example happen using dwell time on the active component. r) The optical command corresponding to the data coming from the previous step is determined (42), including the action to perform and a possible feedback to be sent to said means of visualization.