Architecture for Synchronous Multiparty Authentication Using Biometrics

  • Sunil J. Noronha
  • Chitra Dorai
  • Nalini K. Ratha
  • Ruud M. Bolle
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2688)

Abstract

Biometrics-based remote individual authentication has become widespread recently. However, several existing business systems and processes often require participation of multiple parties synchronously in real time. Further, new e-business processes can be enabled by technology that allows multiple participants to authenticate themselves synchronously and persistently. In this paper, we make distinction between traditional workflow processes that require multiparty authentication from synchronous multiparty authentication needed in business and consumer scenarios. A new system and method for multiparty authentication and authorization using real-time biometrics is proposed. We define realtime biometrics to include concepts that cover certificates that witness the simultaneous acquisition of biometrics signal from multiple parties and certificates that prove that the parties continuously provided the biometrics signal over an unbroken interval of time. We also present novel business processes based on this technology such as remote (web-based) owner access to bank lockers controlled by a designated bank officer even when the officer is not physically present at the bank, notarization of a document remotely, and signing “e-Will” without being present in the attorney’s office.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    G. Ateniese, M. Steiner and G. Tsuidik, “New Multiparty authentication services and key agreement protocols”, IEEE Journal of Selected Areas in Communication, Vol. 18, No. 4, April 2000, pp. 1–13.CrossRefGoogle Scholar
  2. [2]
    A. Goh, CK Ng and WK Yip, “Multiparty authentication mechanism for networkmediated document-object conferencing and collaborative processing”, Proc. of IEEE TENCON, Vol. 3, pp. 427–432, 2000.Google Scholar
  3. [3]
    M. Peyravian, S.M. Matyas, A. Roginsky and N. Zunic, “Multiparty Biometric-Based Authentication”, Computers & Security, Vol. 19, No. 4, 369–374, 2000.CrossRefGoogle Scholar
  4. [4]
    Y-P Yu, S. Wong and M. B. Hoffberg, “Web-based biometric authentication system and method”, US Patent 5930804, July 1999.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Sunil J. Noronha
    • 1
  • Chitra Dorai
    • 1
  • Nalini K. Ratha
    • 1
  • Ruud M. Bolle
    • 1
  1. 1.IBM T.J. Watson Research CenterNew YorkUSA

Personalised recommendations