Biometric ID Technical overview Overview The Microsoft Tamper-Resistant Biometric ID Card system (MS Biometric ID) provides a cryptographically secure ID card that can be easily deployed at a low cost. This system requires only simple, low-cost, off-the-shelf hardware to generate and validate ID cards. It can create secure cards using only standard paper, or business card stock. It can also be integrated into a system using smart cards, if desired. The technology can extract identifying features from a facial photograph on the ID, reducing the amount of data that it must store in order to later validate that photograph. It incorporates the photograph information with the textual information on the card and, optionally, with further biometric information such as a fingerprint, and digitally signs the result. It stores the signed result in a proprietary high-density 2D color barcode on the card. The barcode contains error correction and color calibration information. To validate an ID card the system scans the card using a standard 300dpi device. It then compares the scanned photograph to the stored photograph information. It evaluates the textual information on the card using a highly accurate proprietary OCR algorithm, and compares the result to the stored textual information. Finally, it can compare a fingerprint or iris scan to the stored fingerprint or iris information. If any piece of information does not match, the card fails to validate. ID Issuer Process Face Compression RSA Sign Text Hashing Issuer’s Private Key Figure 1: MS Biometric ID Issuer Process © 2005 Microsoft Corporation. All rights reserved. The information contained in this document relates to Microsoft Research pre-release/prototype products and technologies, which may be substantially modified before their final commercial release by third party IP venture companies. Accordingly, the information may not accurately describe or reflect the products and technologies when first commercially released. This document is provided for informational purposes only and Microsoft makes no warranties, express or implied, with respect to this document or the information contained in it. Reproduction and redistribution of this document requires the express permission of Microsoft Corporation. ID Verifier Process Authentic / Invalid Compare Scan Face Compression ? Issuer’s Public Key Scan Scan & OCR RSA Verify Text Hashing Figure 2: MS Biometric ID Verifier’s Process Components MS Biometric ID incorporates three state-of-the-art technologies: 1. Face compression: Storing a standard JPEG face image from an ID card (approximately 2cm x 2cm) in a barcode could require a barcode larger than the ID card itself. After compression the face image data can fit into a small barcode in one corner of the card. However, the system can use this compressed data to robustly determine if the original image has been tampered with or replaced. 2. OCR: Standard OCR algorithms are not accurate enough to use in ID card validation, due to the problems caused by false negatives. For this technology Microsoft Research has developed a neural-network based OCR algorithm that remains accurate even when faced with standard wear and tear that can slightly alter characteristics of characters. 3. 2D color barcode: To further reduce the space requirements of the biometric information on an ID card, the system uses a very high density color barcode. By using eight colors this barcode achieves approximately twice the density of existing barcodes, while still incorporating error correction information. Core Scenarios The Microsoft Biometric ID system can incorporate any combination of textual, facial biometric, other biometric, or other information on an ID card. It can be used in any situation that calls for creating an inexpensive artifact for secure identification of a person or entity. For instance: Company ID cards for employees: Many large companies require employees to carry corporate IDs with facial photographs. Security personnel then visually examine ID photos to validate that an ID holder is an employee. This system would allow security personnel to quickly validate that an ID is not a fake, or alteration of a valid ID. © 2005 Microsoft Corporation. All rights reserved. 2 The information contained in this document relates to Microsoft Research pre-release/prototype products and technologies, which may be substantially modified before their final commercial release by third party IP venture companies. Accordingly, the information may not accurately describe or reflect the products and technologies when first commercially released. This document is provided for informational purposes only and Microsoft makes no warranties, express or implied, with respect to this document or the information contained in it. Reproduction and redistribution of this document requires the express permission of Microsoft Corporation. Driver’s licenses: The driver’s license has become the de facto means for proving identity, age, and residency in the United States. As such it is a common target for faking or alteration. This system would allow an organization that accepts a driver’s license as ID to quickly check the license for validity. Event tickets: This system would allow event promoters to cheaply produce and validate tickets for events. While the tickets may not need to be tied to a particular person, they could contain textual information as well as a unique identifier for the ticket in the barcode. PIN alternative: IDs such as ATM cards that require automated validation have associated PINs or passwords, which have significant security drawbacks. This system can create cards that have biometric data such as a fingerprint, which a validating reader can scan and check against the data in the card. Documentation For more information on the MS Biometric ID technology please visit http://www.microsoft.com/products/msbit/default.mspx. Related Work Differentiating Features Cryptographically tamper-resistant: Information on the ID card is digitally signed using RSA public-private key encryption and stored in a barcode. During verification, the information on the ID badge is verified against the barcode. Cost effective to issue: ID cards can be printed on common physical media such as paper or plastic with no special features. The digitally signed barcode is used to detect tampering with the physical ID. Cost effective to validate: The integrity of the information on the ID card is validated using PC software and a business card scanner. All that is then required is a person to confirm that the face on the card matches the face of the presenter. For a mobile solution, the software can be embedded in a smart scanner with only a red/green LED display to determine authenticity. Does not compromise the privacy of the individual: The Microsoft Tamper-Resistant Biometric ID Card system does not require the remote creation, access or storage of any personally identifiable information. All the information required to check the validity of the card is on the card itself. Furthermore, the information on the card cannot be changed by the issuer without issuing a new card, meaning that the cardholder is always aware of any changes to the information on the card. Can be combined with any biometric data. Demo/Prototype Development Status The system can now produce and validate ID cards. The prototype uses a standard PC, webcam, color inkjet printer, fingerprint scanner, and business card scanner. The state of the code is that of a mature prototype. © 2005 Microsoft Corporation. All rights reserved. 3 The information contained in this document relates to Microsoft Research pre-release/prototype products and technologies, which may be substantially modified before their final commercial release by third party IP venture companies. Accordingly, the information may not accurately describe or reflect the products and technologies when first commercially released. This document is provided for informational purposes only and Microsoft makes no warranties, express or implied, with respect to this document or the information contained in it. Reproduction and redistribution of this document requires the express permission of Microsoft Corporation.