Search

JP-2026075974-A - Information processing device, method of execution by the information processing device, and program

JP2026075974AJP 2026075974 AJP2026075974 AJP 2026075974AJP-2026075974-A

Abstract

[Problem] To provide technology that can appropriately detect impersonation using fraudulent data. [Solution] The information processing device 100 is connected to a network 111. The information processing device acquires authentication data, which is the biometric information of the person to be authenticated (authentication data acquisition unit 201), acquires fraudulent biometric data of the person by searching on the network (fraudulent data acquisition unit 202), and determines whether the authentication data is fraudulent or not based on a comparison of the authentication data and the fraudulent data (matching degree calculation unit 203, fraudulent data detection unit 204). [Selection Diagram] Figure 2

Inventors

  • 中村 浩一朗

Assignees

  • キヤノン株式会社

Dates

Publication Date
20260511
Application Date
20241023

Claims (10)

  1. An information processing device connected to a network, A first acquisition means for acquiring authentication data, which is the biometric information of the person to be authenticated, A second acquisition means for obtaining unauthorized biometric data of the person through a search on the aforementioned network, An information processing apparatus characterized by having determination means for determining whether or not the authentication data is fraudulent based on a comparison of the authentication data and the fraudulent data.
  2. The information processing apparatus according to claim 1, further comprising a biometric determination means for determining whether the authentication data is non-biological.
  3. The information processing apparatus according to claim 1, further comprising authentication means for performing biometric authentication on the authentication target using the authentication data.
  4. The information processing apparatus according to claim 1, characterized in that the biometric information of the person is a facial image.
  5. The information processing apparatus according to claim 1, characterized in that the determination means calculates the degree of agreement between the authentication data and the fraudulent data.
  6. The information processing apparatus according to claim 5, characterized in that the determination means calculates the degree of agreement while allowing for predetermined differences between the authentication data and the fraudulent data.
  7. The information processing apparatus according to claim 1, characterized in that, if the acquired fraudulent data is video data, the determination means compares each of two or more frames among the multiple frames constituting the video data with the authentication data.
  8. The system further includes a third acquisition means for obtaining the name of the person to be authenticated, The information processing apparatus according to claim 1, wherein the second acquisition means acquires fraudulent data of the biometric information of the person corresponding to the name of the person acquired by searching on the network.
  9. A method performed by an information processing device connected to a network, The first acquisition step involves obtaining authentication data, which is the biometric information of the person to be authenticated. A second acquisition step involves obtaining unauthorized biometric data of the person through a search on the aforementioned network, A method characterized by comprising a determination step of determining whether or not the authentication data is fraudulent based on a comparison of the authentication data and the fraudulent data.
  10. A program that causes a computer to perform each of the steps described in claim 9.

Description

This disclosure relates to authentication technology that identifies individuals using biometric information. In authentication systems using biometric information such as facial recognition, there are instances of impersonation where attackers can bypass authentication by using attack materials such as paper printed with the face of a registered person or a tablet PC displaying a face, thereby pretending to be the registered person (for example, Patent Documents 1 and 2). Technologies for detecting such impersonation are widely known. The technology described in Patent Document 1 involves pre-registering known fraudulent data. If the biometric data to be authenticated matches the pre-registered fraudulent data, the biometric data to be identified is determined to be known fraudulent data. This allows for the detection of impersonation. Known fraudulent data refers to biometric information that has been misused in the past, or that has the potential to be misused. Japanese Patent Publication No. 2004-272508Patent No. 6544244 This is a block diagram showing an example of the hardware configuration of a computer device according to the first embodiment.This is a block diagram showing an example configuration for the user authentication function.This flowchart shows an example of the user authentication process in the first embodiment.Figure 3 is a flowchart showing an example of the process for detecting fraudulent data in S303.This is a block diagram showing an example of the configuration of the user authentication function in the second embodiment.This flowchart shows an example of the user authentication process in the second embodiment. The embodiments of this disclosure will be described below with reference to the drawings. Not all of the features in the embodiments of this disclosure are essential, and features may be combined in any way. Furthermore, the configurations shown in the following embodiments are merely examples, and this disclosure is not limited to the illustrated configurations. In the drawings, identical or similar components are denoted by the same reference numerals to avoid redundant explanations. [First Embodiment] Figure 1 is a block diagram showing an example of the hardware configuration of a computer device in one embodiment. The computer device 100 is an example of an information processing device. The CPU 101 is a Central Processing Unit that controls the entire computer device 100. The ROM 102 is Read-Only Memory that stores programs and parameters that do not require modification. The RAM 103 is Random Access Memory that temporarily stores programs and data supplied from the storage device 104, etc. The storage device 104 includes a hard disk or memory card fixedly installed in the computer device 100. The storage device 104 may also include an external storage device. The external storage device is a storage medium such as a flexible disk (FD), a Compact Disk (CD) or other optical disk, a magnetic card, an optical card, an IC card, and/or other memory card that can be attached to and detached from the computer device 100. The input device interface 105 is connected to the input device 109 and is an interface that receives input data from the input device 109. The input device 109 is a pointing device and/or keyboard that receives user input and inputs data. The output device interface 106 is connected to the monitor 110 and outputs image data to the monitor 110. The monitor 110 displays data held by the computer device 100 and image data supplied to the computer device 100. The communication interface 107 is an interface for connecting to the network 111. The communication interface 107 is connected to the authentication data acquisition device 112 via the network 111. The authentication data acquisition device 112 acquires authentication data. As described later, the authentication data is the biometric information of the person being authenticated, and is typically image data including a facial image. The authentication data acquisition device 112 is typically a camera that captures video (e.g., a network camera). The authentication data acquisition device 112 is equipped with one or more sensors as needed, depending on the type of biometric information to be acquired. For example, if the authentication data acquisition device 112 is a camera, it may be equipped with an image sensor that receives visible light, as well as an image sensor that illuminates the authentication target with infrared light and receives the reflected light. The image sensor for visible light and the image sensor for infrared light may be configured as a single integrated image sensor, or they may be separate image sensors. Alternatively, multiple authentication data acquisition devices 112 may be connected to the network 111, and each of these multiple authentication data acquisition devices 112 may be equipped with sensors corresponding to the type of biometric information to be acquired. The a