Authentication device, authentication system, and authentication method

ABSTRACT

An authentication feature is provided to improve the safety and reliability of services provided by an electronic device. The electronic device includes a processor that outputs multiple challenges in a sequence, receives responses corresponding to the multiple challenges from a user and outputs a result based on whether the responses satisfy conditions of the multiple challenges.

This application is a National Stage Entry of PCT/JP2015/002926 filed onJun. 11, 2015, which claims priority from Japanese Patent Application2014-126353 filed on Jun. 19, 2014, the contents of all of which areincorporated herein by reference, in their entirety.

TECHNICAL FIELD

The present invention relates to a technique for authentication such asidentity verification.

BACKGROUND ART

To make sure that a user of online service is not a computer program(so-called bot) but a human, a CAPTCHA (Completely Automated PublicTuring test to tell Computers and Humans Apart) may sometimes be used.The CAPTCHA, which is also called a reverse Turing test or humaninteraction proofs, is a type of challenge-response test. In the presentspecification, verifying whether the user of online service is a humanis referred to as a verification of existence. The existence means thatthe user is a living human being, and not an intangible computerprogram.

In general, to provide safe and highly reliable online services,identity verification (personal authentication) is needed. The identityverification is a process of verifying whether the user accessing theonline service is a person who is permitted to use the online service.As one example, in a process of the identity verification, determinationis made as to whether a user ID (identification) and a password enteredby the user match with those which are registered, and, if they aredetermined to match, the determination is made that the user is a personwho is permitted to use the service. In another example, determinationis made as to whether biometric information regarding the user matcheswith pre-registered biometric information, and, if the pieces ofinformation are determined to match with each other, the determinationis made that the user is the person who is permitted to use the service.Either one or both of a facial image and a voice (voice print), forexample, may be used as the biometric information.

For example, a method for verifying the identity disclosed in PTL 1includes (a) obtaining voice data and video data recorded when the useruttered the selected phrase, and (b) generating voice features and videofeatures for identification based on the voice data and video data. Themethod for verifying the identity further includes (c) determiningwhether the user is a person in question by comparing these voicefeatures and video features with pre-registered feature vectors.

A method for performing identity verification (personal authentication)disclosed in PTL 2 includes obtaining time-series facial images takenwhen a user gives utterance and determining whether the user is a personin question based on the time-series facial images. Specifically,according to PTL 2, a facial image taken immediately before theutterance is defined as a reference frame, and a facial image taken at acentral time in a period of time when individual phonemes are uttered isdefined as a phoneme frame. An authentication device disclosed in PTL 2obtains feature points in the reference frame and those in the phonemeframe and determines the amount of displacement of feature points(feature point displacement amount) in the phoneme frame relative tofeature points in the reference frame. Then, the authentication devicegenerates a single feature vector composed of a plurality of featurepoint displacements that have been obtained with respect to a pluralityof phoneme frames, and compares the feature vector with a pre-registeredtemplate vector. Subsequently, the authentication device obtains asimilarity between the feature vector and the template vector throughthe comparison, and determines whether the user is the person inquestion based on the similarity.

PTL 3 discloses a finger vein authentication system of achallenge-response type. In the authentication system according to PTL3, a finger used for personal authentication is specified at random, anda site (site to be verified) of the finger used for personalauthentication is determined at random.

PTL 4 discloses verifying the existence of a user in addition toverifying whether the user is a person in question (personalauthentication). The authentication system disclosed in PTL 4 performs aprocess of identity verification of a user (personal authentication) byusing a password, biometric information, passport, driver's license,integrated circuit (IC) card, or the like. Then, the authenticationsystem obtains information about the user position and time at which theprocess of identity verification was performed, and stores the obtainedinformation. In addition, the authentication system compares the userposition and time at which the identity was verified with the userposition and time at which the immediately previous (i.e., the last)identity verification had been performed. The authentication system thendetermines whether the distance and duration of movement of the user areappropriate, and verifies the existence of the user by using thedetermination result.

CITATION LIST Patent Literature

[PTL 1] Japanese Unexamined Patent Application Publication No. H9(1997)-179583

[PTL 2] Japanese Unexamined Patent Application Publication No.2006-268563

[PTL 3] Japanese Unexamined Patent Application Publication No.2009-031986

[PTL 4] Japanese Unexamined Patent Application Publication No.2008-269556

SUMMARY OF INVENTION Technical Problem

In general, CAPTCHA-based verification of the existence uses a challengeimage. The challenge image is an image of letters with distortion ornoise added such that the letters are difficult to recognize for acomputer running in accordance with a computer program (decipherprogram) for deciphering random character string. For example, in aprocess of verifying the existence, the challenge image is presented toa user, and then determination is made as to whether the user hassucceeded in correctly reading the challenge image. If the user hascorrectly read the image, the existence of the user is verified.However, to cope with advanced decipher program, the challenge images inthe CAPTCHA are complicated to the extent even human beings may noteasily determine the images any more. Thus, there is a growing need fora technique for verifying the existence of a user based on a newreference different from the existing CAPTCHA.

From a viewpoint of providing safe and highly reliable online service,the CAPTCHA-based verification of the existence is not enough. Inaddition to the CAPTCHA, either one or both of identity verification anduniqueness verification is/are needed. Uniqueness, as used in thepresent specification, means that only a single online account is issuedto a single person. In other words, the uniqueness means that onlineaccounts are not issued to a single person redundantly.

The present invention has been designed for the purpose of solving theproblems described above. That is, a primary object of the presentinvention is to provide a technique for improving safety and reliabilityof services provided by a computer.

Solution to Problem

To achieve the primary object of the present invention, Anauthentication device of the present invention includes:

a transmission unit that transmits a challenge to a terminal device onwhich the challenge is presented to a user of being authenticated, thechallenge being information serving as a basis on which the user inputsinformation to be used in an authentication process; and

a determination unit that performs the authentication process todetermine whether a response is correct or wrong, the response beinginformation which is inputted by the user to the terminal device basedon the challenge,

wherein the transmission unit includes a function to transmit, to theterminal device, a plurality of challenges to the user, the challengesbeing different from one another, and at least one of the challenges isinformation requesting the user to make the response that includesbiometric information on the user; and

wherein the determination unit further includes a function to determinewhether time information regarding the challenge and the response to thechallenge satisfies a condition regarding the response.

An authentication system of the present invention includes:

the authentication device of the present invention; and

the terminal device that presents to the user of being authenticated theplurality of challenges transmitted from the authentication device, andaccepts responses made by the user to the challenges and transmits theresponses to the authentication device.

An authentication method of the present invention includes:

when transmitting a challenge to a terminal device that presents thechallenge to a user of being authenticated, the challenge beinginformation serving as a basis on which the user inputs information tobe used for an authentication process, transmitting by a computer to theterminal device a plurality of challenges which are different from oneanother and include the challenge requesting the user to make a responsewhich includes biometric information regarding the user;

determining by a computer whether the response inputted by the user tothe terminal device based on the challenge is correct or wrong againstthe challenge; and

determining by a computer whether time information regarding thechallenge and the response to the challenge satisfies a conditionregarding the response.

A computer recording medium of the present invention storing a procedurefor causing a computer to execute the processes of:

when transmitting a challenge to a terminal device that presents thechallenge to a user of being authenticated, the challenge beinginformation serving as a basis on which the user inputs information tobe used for an authentication process, transmitting to the terminaldevice a plurality of challenges which are different from one anotherand include the challenge requesting the user to make a response whichincludes biometric information regarding the user;

determining whether the response inputted by the user to the terminaldevice based on the challenge is correct or wrong against the challenge;and

determining whether time information regarding the challenge and theresponse to the challenge satisfies a condition regarding the response.

The above-mentioned primary object of the present invention is alsoachieved by an authentication method of the present invention accordingto the authentication device of the present invention. In addition, theabove-mentioned primary object of the present invention is also achievedby a computer program and a program storage medium according to theauthentication device of the present invention and authentication methodof the present invention.

Advantageous Effects of Invention

The present invention allows of improving safety and reliability ofservices provided by a computer.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram schematically illustrating a configuration ofan authentication device according to a first example embodiment of thepresent invention.

FIG. 2 is a block diagram schematically illustrating a configuration ofan online service system which is an authentication system according toa second example embodiment of the present invention.

FIG. 3 is a flow chart illustrating example operation of theauthentication device according to the second example embodiment.

FIG. 4 is a sequence diagram illustrating an example procedure forissuing an account, the procedure including an authentication processaccording to the second example embodiment.

FIG. 5 is a sequence diagram illustrating an example procedure for usingan online service, the procedure including the authentication processaccording to the second example embodiment.

FIG. 6 illustrates specific examples of challenges.

FIG. 7 illustrates other specific examples of challenges.

FIG. 8 illustrates further other specific examples of challenges.

FIG. 9 illustrates still further other specific examples of challenges.

FIG. 10 illustrates specific examples of temporal relations betweenchallenges and their responses according to the second exampleembodiment.

DESCRIPTION OF EMBODIMENTS

Example embodiments of the present invention will be described belowwith reference to the drawings.

First Example Embodiment

FIG. 1 is a block diagram schematically illustrating a configuration ofan authentication device according to a first example embodiment of thepresent invention. The authentication device 1 is coupled to a terminaldevice 7. The terminal device 7 includes an input unit (not illustrated)in which information is input and an output unit (not illustrated) whichoutputs information. Examples of the input unit may include a keyboardand a touch panel. Examples of the output unit may include a speakerproducing a sound and a display showing images.

The authentication device 1 includes a transmission unit 2 and adetermination unit 3. The transmission unit 2 and determination unit 3are functional units implemented by, for example, execution of acomputer program by a control device 5 that includes a processor (notillustrated).

The transmission unit 2 has a function to transmit a challenge to theterminal device 7. The challenge means information (e.g., image data orvoice data) serving as a basis on which a user 8 of being authenticatedinputs information used for an authentication process. For example, whenthe challenge is presented by the output unit in the terminal device 7,the user 8 inputs information (response) based on the challenge into theterminal device 7 using the input unit in the terminal device 7.

In the first example embodiment, the transmission unit 2 transmits aplurality of challenges different from one another toward the user 8 ofbeing authenticated. At least of one of the plurality of challenges isinformation requesting the user 8 to give the response that includesbiometric information regarding the user 8.

The determination unit 3 has a function to determine, upon receipt fromthe terminal device 7 the response inputted by the user 8 to theterminal device 7, whether the response to the challenge is correct orwrong, which constitutes the authentication process. By way of example,suppose that the challenge is image data showing a plurality of numericcharacters (e.g., distorted numeric characters). Then, the user 8 entersnumbers read from the image (challenge) into the terminal device 7. Theentered numbers, which constitute the response, are transmitted from theterminal device 7 to the authentication device 1. The determination unit3 determines whether the numbers entered as responses match with thenumeric characters shown in the image data presented as a challenge. Ifthe numbers match with the numeric characters, the determination unit 3determines that the response is correct. In this case, theauthentication device 1 can verify the existence of the user 8 (theresponse has been inputted by a real human and not by a computer(computer program)).

If, for example, the challenge is the information requesting the user 8to give the response that includes biometric information regarding theuser 8, the determination unit 3 compares the response, i.e., biometricinformation received from the terminal device 7 with the pre-registeredbiometric information regarding the user 8. In this case, if thebiometric information (response) received matches with thepre-registered biometric information, the determination unit 3determines that the user 8 is the pre-registered user (can verify theidentity of the user).

In addition, as the authentication process, the determination unit 3 hasa function to make the determination as to whether time informationregarding the challenge transmitted by the transmission unit 2 and theresponse received from the terminal device 7 satisfies a conditionregarding the response.

The condition is, for example, a condition for the existence to enablesupposing that the response is given by a human being. That is,depending on a state of information included in the challenge, theinformation may be easily interpreted by a human being through thechallenge, but may be difficult for a computer to decipher. In suchcases, it is expected that a difference is caused in the length of timefrom presentation of the challenge to input of the response, dependingon a case where the user 8 is human and a case where the user 8 is acomputer. The determination unit 3 can verify the existence of the user8 by using such temporal difference.

The authentication device 1 according to the first example embodimentperforms the authentication process on the user 8 with a plurality ofchallenges, thereby enhancing reliability of the authentication. Inaddition to the function to determine whether the response to thechallenge is correct or wrong, the authentication device 1 has, forexample, the function to verify the existence of the user 8 by usingtime information regarding the challenge and the response. Thus, forexample, the authentication device 1 can avoid a situation where imagedata including distortion or noise which may not easily determined by ahuman has to be employed as the challenge.

In addition, with at least one of the challenges, the authenticationdevice 1 requests the user 8 to give the response that includesbiometric information regarding the user 8. Thus, the authenticationdevice 1 can perform verification of the identity by using the biometricinformation included in the response. In other words, the authenticationdevice 1 according to the first example embodiment can perform aso-called challenge-response test to verify not only the existence ofthe user 8 but also the identity of the user 8, thereby improvingreliability of authentication. Consequently, when adopted as anauthentication device for a service provided by a computer, theauthentication device 1 according to the first example embodiment canimprove safety and reliability of the service.

Second Example Embodiment

A second example embodiment of the present invention will be describedbelow.

FIG. 2 is a block diagram illustrating an example configuration of anonline service system, which is a computer system including anauthentication device according to the second example embodiment. Theonline service system of the second example embodiment includes a server10. The server 10, which can be coupled to a client 20, i.e., a terminaldevice, via an information communication network 30, has a function toprovide an online service to a user that uses the client 20. Inaddition, the server 10 has a function to serve as an authenticationdevice that determines whether the online service can be provided. Inother words, the server 10 performs, as the authentication process,identity verification to determine whether the user of the client 20 ispermitted to receive the online service. Additionally, the server 10verifies the existence of the user. Moreover, the server 10 managesaccounts for the online service. Additionally, the server 10 may verifythe uniqueness of the user (i.e., verify that a plurality of accountsare not issued to the same user). The server 10 may be a single computerdevice, or may be configured by a plurality of communicatively coupledcomputer devices.

In the second example embodiment, the server 10 includes a controldevice 11, a storage device 12, and a communication unit 13.

The communication unit 13 has a function to enable communications withother communication devices via the information communication network30. For example, the communication unit 13 includes a network interfacecard (NIC) compliant with the IEEE 802.3 series and has a function tocontrol communications through the card. The communication unit 13 mayinclude a communication protocol stack (e.g., Transmission ControlProtocol (TCP)/Internet Protocol (IP) and User Datagram Protocol(UDP)/IP protocol stack), and may have a function to controlcommunications based on the stack.

The storage device 12 is a device (non-transitory computer readablemedium) that can store computer programs and various types of data. Forexample, the storage device 12 is composed of a combination of avolatile memory and a non-volatile memory. Examples of volatile memorymay include static random access memory (SRAM) and dynamic RAM (DRAM).Examples of the non-volatile memory may include a mask read only memory(MROM), a programmable ROM (PROM), and a flash memory. The server 10 mayalso include, as the storage device 12, a device having a magneticrecording medium (e.g., a flexible disk, magnetic tape, or hard diskdrive) or a magneto-optic recording medium (e.g., a magneto-opticaldisk). In addition, the storage device 12 may be disposed physicallyapart from the control device 11.

In the second example embodiment, the storage device 12 stores atransmission processing program and a determination processing program.The transmission processing program represents a procedure fortransmitting the challenge to be used for the challenge-response test.As described in the first example embodiment, the challenge isinformation (e.g., image data or voice data) serving as the basis onwhich the user to be authenticated inputs the information used for theauthentication process. The determination processing program representsa procedure for performing a authentication process based on theinformation (response) inputted by the user based on the challenge.

In the second example embodiment, the server 10 is coupled to thestorage device 14. The storage device 14 stores information to be usedfor the authentication process. For example, the storage device 14stores the biometric information regarding the users who are permittedto use online services that can be provided by the server 10. Thebiometric information stored in the storage device 14 may be defined asappropriate depending on types of authentication processes, and specificexamples of the biometric information may include image data or featurepoint data representing a face, voice print, fingerprint, vein pattern,iris pattern, or the like. The server 10 obtains such biometricinformation through the use of the client 20 and the informationcommunication network 30 and stores the biometric information to thestorage device 14, by the server 10 operating in accordance with aprocedure for issuing a new online account (procedure for registering auser). The server 10 may update the biometric information stored in thestorage device 14 periodically or non-periodically. In addition, whenbiometric information has been obtained from a user through theauthentication process, the server 10 may update the biometricinformation regarding the user stored in the storage device 14 by usingthe obtained biometric information.

The control device 11 is configured with, for example, a processor suchas a central processing unit (CPU). The control device 11 can havevarious functions by reading and executing the software (computerprograms) stored in the storage device 12. In the second exampleembodiment, the control device 11 has a function to conduct thechallenge-response test. That is, the control device 11 includes atransmission unit 15 and a determination unit 16 as functional units.

The transmission unit 15 has a function to transmit to the client 20 theplurality of challenges to be presented to the user of beingauthenticated. The challenges are different from one another. At leastof one of these challenges is the information requesting the user togive the response that includes the biometric information.

The determination unit 16 has a function to determine, upon receipt ofthe response inputted by the user into the client 20 based on thechallenge, whether the response is correct or wrong. In addition, thedetermination unit 16 has a function to determine whether a responsetime needed for the response satisfies a condition for the existence,based on the information regarding the starting time of transmission bythe transmission unit 15 and on the information regarding the startingtime of receiving the response. The starting time of transmission refersto the time when the transmission unit 15 transmits the challenge, whilethe starting time of reception refers to the time when the response tothe challenge is received from the client 20.

Specific examples of operation of the transmission unit 15 and thedetermination unit 16 are described later.

The following describes the client 20. The client 20 is a terminaldevice operated by the user and communicates with the server 10 in awired or wireless manner via the information communication network(e.g., Internet) 30. The client 20 may be, for example, a personalcomputer, tablet, or smart phone.

The client 20 includes a control device 21, a storage unit 22, acommunication unit 23, an output device 24, and an input device 25.

The storage unit 22 is configured by, for example, a combination ofvolatile memory and non-volatile memory. The storage unit 22 stores thesoftware (computer program) representing an operation procedure to beconducted by the control device 21.

The communication unit 23 has a function to enable communications withother communication devices (e.g., server 10) via the informationcommunication network 30. The communication unit 23 includes, forexample, a network interface card (NIC) compliant with the IEEE 802.3series. The communication unit 23 also includes a communication protocolstack (e.g., Transmission Control Protocol (TCP)/Internet Protocol (IP)and User Datagram Protocol (UDP)/IP protocol stack). Additionally, thecommunication unit 23 may have a function to enable wirelesscommunication. For example, the communication unit 23 may enablewireless communications based on a cellular transceiver communicationstandard such as Wideband Code Division Multiple Access(W-CDMA)/Long-Term Evolution (LTE). The communication unit 23 may alsoenable wireless communication based on a communication standard for aWi-Fi® transceiver such as IEEE 802.11 a/b/g/n, or for a Bluetooth®transceiver.

The output device 24 is a device that sends (outputs) information in themode where a human being can perceive with the sense of vision, hearing,smelling, skin (sense of touch, pain, or temperature), or a combinationthereof. Specific examples of the output device 24 include a displaydevice displaying images and a speaker outputting sounds. The client 20includes a plurality of types of output devices 24.

The input device 25 is a device that accepts information from the user.Specific examples of the input device 25 include an operation button,touch panel, mouse, keyboard, camera, and microphone. The client 20includes a plurality of types of input devices 25.

The control device 21 includes a processor such as a CPU, and caninclude various functions by reading and executing the software(computer program) from the storage unit 22. For example, the controldevice 21 provides an environment (e.g., web browser) that allows use ofan online service provided by the server 10.

FIG. 3 is a flowchart illustrating example operations of the server 10.The example operation described here is for the server 10 conducting thechallenge-response test as the authentication process. The server 10 mayconduct the challenge-response test at a time, for example, when the newonline account is issued to the user or when the request for issuing theonline account is received from the client 20. In addition, the server10 may conduct the challenge-response test at a time, when theregistered user starts using the online service or when the request foraccessing the online service is received from the client 20. Thus, theserver 10 can conduct the challenge-response test at any of a pluralityof timings and the server 10 conducts the challenge-response test at anappropriate timing by taking into consideration the content and otherfactors of the service to be provided.

For example, the control device 11 in the server 10 creates challengedata for the user of being authenticated at a time when thechallenge-response test is conducted (Step S101). The challenge dataincludes the plurality of challenges different from one another, andfurther includes program data for controlling the control device 21 inthe client 20 such that these challenges are continuously outputted insequence from the output device 24 in the client 20.

The control device 11 (transmission unit 15) in the server 10 transmitsthe generated challenge data to the client 20 through the communicationunit 13 (Step S102).

Later, upon receipt of data that includes responses to the transmittedchallenges (Step S103), the server 10 analyzes the received data toextract the information necessary for the authentication process. Theoperations in Step S102 and Step S103 may be performed in parallel interms of time. For example, the server 10 may receive response data fromthe client 20 while transmitting the challenge data that includes avideo stream or an audio stream to be played by streaming on the client20. Response data may also include the video stream or the audio steam.

Then, based on the extracted information, the control device 11 (thedetermination unit 16) in the server 10 determines whether the responsemade by the user is correct (i.e., whether it is appropriate as theresponse to the challenge). In addition, the server 10 (thedetermination unit 16) verifies the existence of the user by using timeinformation regarding the challenge and the response. In this step, theresponse time or input duration, for example, is used as the timeinformation.

The response time may be, for example, a time period from when theoutput device 24 outputs the challenge to when the input device 25inputs the response in the client 20. The response time can be obtainedby calculating the difference between the starting time of outputtingthe challenge in the client 20 and the starting time of inputting itscorrect response in the client 20. Alternatively, as the response time,a time period from transmission of the challenge by the transmissionunit 15 in the server 10 to reception of its response by the server 10may be used, since the time period is approximately proportional to theresponse time. In other words, the difference between the starting timeof transmission of a challenge from the server 10 and the starting timeof reception of its response by the server 10 may be used as theresponse time.

The input duration for the response refers to a time period when theuser is inputting the response to the challenge. In other words, thechallenge may be command information instructing the user to perform aspecified action (e.g., change face direction, change facial expression,or give an utterance). In such cases, the response is performing theaction by the user in accordance with the instruction given by thechallenge, and the input duration is the time period (time) when theuser is performing the action, i.e., giving the response. In the casewhere information instructing the user to perform an action is thechallenge, a device like a camera or microphone for inputting an action,namely a response to the challenge, is activated in the client 20.

The server 10 determines whether the response time or the input durationsatisfies the predetermined condition for effectiveness and determineswhether the time information is appropriate. The condition foreffectiveness is a condition to expect that the response has been givenby a human being.

Then, the server 10 determines whether the existence of the user can beverified based on the determination results as to whether the responseis correct or wrong and whether the time information is appropriate(Step S104). If the received response is correct as the response to thechallenge and the time information regarding the challenge and itsresponse is appropriate, the control device 11 (the determination unit16) determines that the existence of the user is verified (Step S105).

On the other hand, if the received response is not correct as theresponse to the challenge or the time information regarding the responseis not appropriate, the control device 11 (the determination unit 16)determines that the existence of the user may not be verified (StepS106). In other words, the control device 11 (the determination unit 16)determines that the user may not be a human being.

In the second example embodiment, the server 10 serving as theauthentication device conducts the challenge-response test by asking theuser to give the plurality of responses to the plurality of challengesthat are continuously presented in sequence. Then, the server 10verifies whether the user is a human being (i.e., existence of user)based on the time information regarding the response time, the inputduration or the like for the user to give the responses. In other words,the server 10 verifies whether the user is a human being based onwhether the response is inputted at the appropriate timing (timeperiod).

The server 10 requests the user to give responses for thechallenge-response test such that at least one of the plurality ofresponses includes the biometric information (e.g., a facial image,voice or the like). That is, the server 10 verifies the existence of theuser based on whether the time information, such as the response time orthe input duration, regarding the response that includes the biometricinformation (e.g., the facial image or voice) from the user, isappropriate. Accordingly, the server 10 of the second example embodimentcan have an advantage that it is not necessarily need to use a complexchallenge image that includes so much distortion or noise that humanbeings cannot easily recognize the image.

Furthermore, in the second example embodiment, at least one of theplurality of responses includes the biometric information (e.g., thefacial image or voice). As the result, the server 10 can obtain theeffect as described below. In addition to using the biometricinformation included in the response for verifying the existence of theuser, the server 10 can also use the biometric information for verifyingthe identity (personal authentication) and the uniqueness of the user.As described above, in order to provide the safe and highly reliableonline services, the CAPTCHA-based verification of the existence is notenough, it is preferable to conduct either one or both of the identityverification and the uniqueness verification in addition to the CAPTCHA.The identity verification (personal authentication) means verifyingwhether the user accessing the online service is the person who ispermitted to use the online service. The uniqueness verification meansverifying that the plurality of online accounts are not issued to asingle person redundantly. In the second example embodiment, theresponse used for verifying the existence of the user includes thebiometric information regarding the user, and thus the server 10 can usethe biometric information for verifying the identity and the uniquenessof the user as well. In other words, the server 10 can use a singleresponse made by the user for the plurality of authentication processes,and thereby allows for user authentication through a plurality ofauthentication processes while avoiding an increase in the burdenimposed on the user for inputting responses. As a result, the server 10can improve the safety and reliability of online services.

The following describes specific examples of processes related toauthentication for the online service system according to the secondexample embodiment. FIG. 4 is a sequence diagram illustrating a flow ofprocesses related to the authentication for the online service system.The process flow illustrated in FIG. 4 is related to the process ofissuing the online account. In the middle of the process of issuing theonline account, the authentication process according to the secondexample embodiment is performed.

For example, when the user instructs the client 20 to issue the accountusing the input device 25, the client 20 transmits a request for issuingthe account (online account) to the server 10 (Step S201). The requestfor issuing the online account is, in other words, an application foruser registration needed for using the online service.

Upon receipt of the request for issuance, the server 10 performsverification of the existence (the challenge-response test) to verifywhether the user operating the client 20 is a human being.

That is, the server 10 creates the challenge data and transmits thechallenge data to the client 20 (Step S202). Upon receipt of thechallenge data, based on the challenge data, the client 20 continuouslypresents the plurality of challenges in sequence to the user using theoutput device 24 (Step S203). When the user inputs the responses to thechallenges into the client 20 using the input device 25, the client 20accepts the responses (Step S204). Then, the client 20 generates theresponse data that includes responses to the individual challenges andtransmits the response data to the server 10 (Step S205).

Upon receipt of the response data, the server 10 verifies the existenceusing the received responses (Step S206). That is, the server 10verifies the existence of the user by using the determination result asto whether the responses to the challenges are correct or wrong and thetime information regarding the responses.

In addition, the server 10 checks the biometric information included inthe response against the biometric information registered in the storagedevice 14. For example, the server 10 calculates a similarity (matchingprobability) between the biometric information included in the responseand the registered biometric information to determine whether thesimilarity is equal to or greater than a threshold. When the server 10determines that the storage device 14 does not register the biometricinformation which matches with the biometric information included in theresponse (i.e., biometric information whose similarity is equal to orgreater than the threshold), the server 10 determines that the userrequesting for the account is not registered. The server 10 can verifythe uniqueness of the user, and thus issues the account to the user.

On the other hand, if the biometric information included in the responsematches with the registered biometric information (i.e., if thebiometric information whose similarity is equal to or greater than thethreshold is registered in the storage device 14), the server 10 refusesto issue the account. That is, the server 10 determines that it ishighly probable that the user requesting for issuing the account is thesame person as the registered users, and refuses to issue the account inorder to prevent issuing the plurality of accounts to the same user.

Then, the server 10 transmits to the client 20 the determination resultas to whether an account can be issued based on the result of theauthentication process (Step S207). Upon receipt of the determinationresult, the client 20 presents the determination result to the userusing the output device 24 (Step S208).

If the existence of the user is not verified as the result of theauthentication process, the server 10 does not need to perform theprocess of verifying the uniqueness of the user. Alternatively, theserver 10 may perform the process of verifying the existence of the userand the process of verifying the uniqueness of the user in parallel interms of time.

The following describes another process flow in the online servicesystem. The following description about the process flow in the onlineservice system assumes that the authentication process of the secondexample embodiment is performed when the user starts using the onlineservice. FIG. 5 is a sequence diagram illustrating the process flow.

For example, when the user requests the client 20 by using the inputdevice 25 to access the server 10 that provides the online service, theclient 20 transmits an access request to the server 10 (Step S301). Inthis step, the client 20 transmits, as the access request, the useridentification (ID) (account ID) assigned to the user.

Upon receipt of the access request, the server 10 conducts thechallenge-response test, which serves as the process of verifying theidentity to determine whether the user operating the client 20 ispermitted to provide the service.

That is, the server 10 creates the challenge data and transmits thechallenge data to the client 20 (Step S302). Upon receipt of thechallenge data, the client 20 continuously presents the plurality ofchallenges in sequence to the user based on the challenge data by usingthe output device 24 (Step S303). When the user inputs responses to thechallenges into the client 20 using the input device 25, the client 20accepts the responses (Step S304). Then, the client 20 generatesresponse data that includes responses to the individual challenges andtransmits the response data to the server 10 (Step S305).

Upon receipt of the response data, the server 10 verifies the existenceof the user using the received responses as described above. Inaddition, the server 10 performs verification of the identity of theuser (the personal authentication) using the user's biometricinformation included in a response (Step S306). That is, the server 10reads from the storage device 14 the biometric information associatedwith a user ID identical to the user ID that has been received in theform of the access request. Then, the server 10 checks the biometricinformation included in the response received from the client 20 againstthe biometric information that has been read. Through the checking, theserver 10 calculates, for example, the similarity (matching probability)between the biometric information included in the response and theregistered biometric information.

If the biometric information included in the response matches with theregistered biometric information at a high probability (i.e., if thesimilarity (matching probability) is equal to or greater than thethreshold), the server 10 determines that it is highly probable that theuser sending a request for access is an authorized user. The server 10then permits an access with the client 20 operated by the user.

On the other hand, if the biometric information included in the responsematches with the registered biometric information at a low probability(i.e., if the similarity (matching probability) is less than thethreshold), the server 10 determines that the user sending a request foraccess may not be an authorized user. The server 10 then refuses theaccess with the client 20 operated by the user.

Next, the server 10 transmits to the client 20 the determination resultas to whether the access based on the result of verification of theidentity is allowable (in other words, provision of service) (StepS307). Upon receipt of the determination result, the client 20 presentsthe determination result to the user using the output device 24 (StepS308).

If the existence of the user is not verified, the server 10 does notneed to perform the process of verifying the identity of the user.Alternatively, the server 10 may perform the process of verifying theexistence of the user and the process of verifying the identity of theuser in parallel in terms of time.

In each process flows for the online system described with reference toFIGS. 4 and 5, the challenge-response test conducted to verify theexistence of the user provides biometric information, which is used forverifying not only the existence but also the identity or theuniqueness. This allows the server (authentication device) 10 to performthe plurality of processes for authentication while avoiding an increasein the burden imposed on the user, thereby enhancing reliability ofauthentication.

The above has described processes in a system including theauthentication process of the second example embodiment, with theexample processes of issuing a new online account and starting to usethe online service. However, the authentication process of the secondexample embodiment may be applied to processes other than the onesdescribed above.

The following describes specific examples of challenges used for thechallenge-response test, which constitutes the authentication processperformed by the server 10 according to the second example embodiment.

For example, the server 10 may provide the client 20 with the pluralityof challenges in the mode of the video stream or the audio stream to beplayed by streaming on the client 20. The video stream or the audiostream continuously presents the plurality of challenges in sequence.The term “streaming” or “played by streaming” as used herein means thetechnology for playing back a data file while downloading the data file.That is, the term “streaming” or “played by streaming” as used in thepresent specification includes not only pure streaming where the videostream or the audio stream is not cached but also progressive downloadwhere the streams are cached. Progressive download may also be calledprogressive streaming or on-demand streaming.

The number of challenges included in a single video stream or a singleaudio stream and the length of time for playing each challenge areappropriately set by taking into consideration factors such as accuracyof authentication, a standard response time taken by users, and burdensimposed on users. For example, the number of challenges may be about 3,and the length of time for playing the whole video stream or audiostream may be about 5 to 10 seconds.

The server 10 creates the single video stream or the single audio streamby randomly selecting some challenges from the plurality of challengesprepared in advance (e.g., images, voices or the like) and linking theselected challenges.

A computer may not easily interpret each of the plurality of challengesthat are continuously provided in sequence in the mode of the videostream or the audio stream. Thus, by using the plurality of challengesin the mode of the video stream or the audio stream, the server 10 canimprove the accuracy of determination (verification) as to the existenceof the user. Specifically, the plurality of challenges are provided inthe mode of the video stream or the audio stream, and are played inseries immediately after the challenges are received by the client 20.The user is prompted to make instantaneous (real-time) responses tothese challenges. On the other hand, a computer has difficulty ininstantaneously interpreting the challenges provided in sequence, andthus fails to give (return) correct responses to the server 10. As aresult, even when a computer tries to impersonate a human being, theserver 10 can deny the existence of the user by performing the processof verifying the existence that involves the plurality of challenges inthe mode of the video stream or the audio stream.

Optionally, the server 10 may create the challenge data which includesdata for controlling the output device 24 in the client 20 so as topresent the individual challenges to the user for periods of time(hereinafter also referred to as output durations) different from oneanother. In addition, the server 10 may randomly determine outputdurations of the individual challenges. For example, the server 10differentiates, for each challenge, periods of time for displaying orperiods of time for outputting of each challenges (images or voices)included in the video stream or the audio stream. This makes itdifficult for a computer to predict timing when the challenge isswitched to another challenge. Thus, interpretation of challengesbecomes more difficult. As a result, the server 10 can further improvethe accuracy of determination (verification) of the existence of theuser.

Although presenting the plurality of challenges in the mode of the videostream or the audio stream to the user can improve the accuracy ofdetermination as to the existence of the user, the plurality ofchallenges do not need to be presented in the mode of the video streamor the audio stream.

For example, the server 10 may create individual challenges in the formof independent data files (e.g., still image files or sound files). Inthis case, the server 10 creates the challenge data which includescontrol data for controlling the output device 24 in the client 20 suchthat display or output of still images or sounds representing challengesis updated at a predetermined timing. Additionally, the server 10 mayadjust the output durations for the individual challenges such that thedisplay or the output of still images or sounds representing thechallenges is updated at a non-periodical timing. Furthermore, theserver 10 may adjust the output durations for the individual challengessuch that the output durations of displaying or outputting of stillimages or sounds representing the challenges are different from oneanother.

FIGS. 6 to 9 illustrate specific examples of challenges. Any challengesillustrated in FIGS. 6 to 9 prompts a user to input a response whichincludes the biometric information regarding the user. For example, theserver 10 randomly selects from these challenges the plurality ofchallenges to be presented to the user. The server 10 may create thevideo stream or the audio stream by linking together the plurality ofchallenges which have been randomly selected.

FIG. 6 illustrates specific examples of challenges in the case where adirection of face is used for the user authentication. In the examplesin FIG. 6, four different ways of challenges (image A, image B, image C,and voice) are classified for each type and the same type of challengesare associated with one another. Each of the types is given a “code”serving as an identifier and a “type” serving as a name. For example,among the four challenges of a type in which the code is “FD02” and thetype is “Leftward”, the image A is an icon image representing a flippedmirror image of the face oriented to the left. The image B is an imageshowing a character string: “Face to the left”. The image C is an arrowicon image instructing the user to face the left. The voice is voicedata instructing the user to face the left.

FIG. 7 illustrates specific examples of challenges in the case wherefacial expressions are used for the user authentication. As with FIG. 6,FIG. 7 illustrates that four different ways of challenges (image A,image B, image C, and voice) are classified for each type and the sametype of challenges are associated. Each of the types is given a “code”serving as an identifier and a “type” serving as a name. For example,among the four challenges of a type in which the code is “FE02” and thetype is “Happy”, the image A is an icon image representing a happy face.The image B is an image showing a character string: “Give a happy face”.The image C is an icon image showing a kanji character representinghappiness. The voice is voice data instructing the user to give a happyface.

FIG. 8 illustrates specific examples of challenges in the case wherepronunciation of numbers is used for the user authentication. As withFIGS. 6 and 7, FIG. 8 illustrates that four different ways of challenges(image A, image B, image C, and image D) are classified for each typeand the same type of challenges are associated. Each of the types isgiven a “code” serving as an identifier and a “type” serving as a name.For example, among the four challenges of a type in which the code is“VN02” and the type is “2 pronunciations”, the image A is an imageshowing an Arabic number “2” with a character string: “Pronounce thisnumber”. The image B is an image showing two dots with a characterstring: “Pronounce the number of dots”. The image C is an image showingtwo lines with a character string: “Pronounce the number of lines”. Theimage D is an image showing a mathematical expression whose answer is 2with a character string: “Pronounce the answer”.

FIG. 9 illustrates specific examples of challenges in the case wherepronunciation of vowels is used for the user authentication. As withFIGS. 6 to 8, FIG. 9 illustrates that four different ways of challenges(image A, image B, image C, and image D) are classified for each type,and the same type of challenges are associated. Each of the types isgiven a “code” serving as an identifier and a “type” serving as a name.For example, among the four challenges of a type in which the code is“VV_A” and the type is “Pronunciation of a”, the image A is an imageshowing a lower-case alphabetical character “a” with a character string:“Pronounce”. The image B is an image showing an upper-case alphabeticcharacter “A” with a character string: “Pronounce”. The image C is animage showing a Katakana character “

” with a character string: “Pronounce”. The image D is an image showinga Hiragana character “

” with a character string: “Pronounce”.

For example, when the challenge related to the direction of face asillustrated in FIG. 6 is used, the server 10 determines whether thedirection of face extracted from, for example, an image data that isincluded in the response to the challenge is in accordance with theinstruction given by the challenge. If the challenge additionallyincludes an instruction about a period of time (input duration) when theuser is following the instruction to change the direction of face, theserver 10 determines whether the input duration detected from theresponse is consistent with a period of time compliant with theinstruction (e.g., instruction about output duration) given by thechallenge.

Further, for example, when a sound as illustrated in FIG. 6 or 7 is usedfor the user authentication, the server 10 determines whether the sounddetected from the response is in accordance with the instruction givenby the challenge. In addition, the server 10 determines whether theresponse time or a sound input duration detected from the response tothe challenge is consistent with the period of time in accordance withthe instruction (e.g., instruction about output duration) given by thechallenge.

FIG. 10 illustrates a specific example of the plurality of challengesand the plurality of responses according to the challenges. In thespecific example, the challenges are in the mode of the video streamplayed by streaming. The video stream composed of challenges includes aperiod 501 when the facial icon image representing a request for theaction of facing upward is displayed on the output device 24 (display)in the client 20. Further, the video stream includes a period 502 whenthe image of characters representing a request for pronouncing a numberis displayed, and at the same time, a sound of, for example, reading thedisplayed characters is produced, which is further followed by a period503 when the facial icon image representing a request for the action offacing the left is displayed. That is, the video stream displays threechallenges during the periods 501, 502, and 503. Individual lengths ofthe periods 501, 502, and 503 (i.e., output durations (periods whenchallenges are played)) are different from one another. Specifically,the length of the period 501 (output duration) is 3 seconds, the lengthof the period 502 (output duration) is 5 seconds, and the length of theperiod 503 (output duration) is 2 seconds.

The specific example in FIG. 10 shows that responses to the challengesinclude the action of facing upward, the action of pronouncing “4”, andthe action of facing the left, which are performed by the user. Theseresponses are taken by, for example, a camera serving as the inputdevice 25 and transmitted from the client 20 to the server 10 in themode of the video stream serving as the response data.

The server 10 analyzes the received response data (e.g., the videostream) to identify responses. Then, the server 10 performs theauthentication process using the responses.

For example, the server 10 makes the determination, as theauthentication process, as to whether the response time (T1) needed forthe user to start reacting (facing upward) to the instruction given bythe challenge “Face upward” is equal to or less than a predeterminedvalue (e.g., 1.0 second). Additionally, the server 10 may determinewhether the time when the user keeps facing upward (input duration (T2))is consistent with the length according to the output duration (3seconds) of presenting the challenge (e.g., within a range of 2.0 to 4.0seconds). Furthermore, the server 10 may determine whether the responsetime (T3) needed for the user to start reacting (answering) to theinstruction given the challenge “Pronounce the answer” is equal to orless than the predetermined value (e.g., 1.0 second). Additionally, theserver 10 may determine whether the response time (T4) needed for theuser to start reacting (facing the left) to the instruction given by thechallenge “Face the left” is equal to or less than the predeterminedvalue (e.g., 1.0 second). Still further, the server 10 may determinewhether the length of time when the user keeps facing the left (inputduration (T5)) is consistent with the length according to the outputduration (2 seconds) of presenting the challenge (e.g., within a rangeof 1.0 to 3.0 seconds).

Other Example Embodiments

The present invention is not limited to the first and second exampleembodiments, but may employ various example embodiments. For example,although the second example embodiment describes an example where theauthentication device of the present invention is applied to the onlineservice system, the authentication device of the present invention canbe applied to systems other than online service systems.

At least a part of the processes among processes handled by the server10 and client 20 (e.g., pattern matching for detecting the facial imageor the predetermined voice from the response data), as described in thesecond example embodiment, may be performed by using a dedicatedhardware piece.

The part or the whole of the above example embodiments can be describedas, but is not limited to, the following supplementary notes.

(Supplementary Note 1)

A method for conducting a challenge-response test, the method includes:

transmitting challenge data to an input and output system, the challengedata being used to control the input and output system such that theinput and output system continuously outputs a plurality of challengesin sequence;

receiving, through the input and output system, response datarepresenting a plurality of responses to the plurality of challenges bya user; and

determining whether at least one of an input start time and an inputduration regarding each of the plurality of responses contradicts withat least one of an output start time related to the input start time andan output duration related to the input duration concerning each of theplurality of challenges, in order to verify whether the user is a humanbeing,

at least a part of the plurality of responses represents biometricinformation regarding the user.

(Supplementary Note 2)

In the method according to Supplementary Note 1,

at least a part of the plurality of responses represents the biometricinformation regarding the user, and

the method further includes, for one or both of verification of identityof the user and verification of uniqueness of the user, comparing thebiometric information with pre-registered biometric informationregarding the user or pre-registered biometric information regardinganother user.

(Supplementary Note 3)

The method according to Supplementary Note 2, further includes:

receiving a request for accessing an online service or a request forissuing an online account through the input and output system, and, uponreceiving, transmitting the challenge data.

(Supplementary Note 4)

The method according to Supplementary Note 3, further includes:

on condition that verification which the user is a human being issuccessfully performed and that at least one of verification of identityof the user and verification of uniqueness of the user is successfullyperformed, transmitting to the input and output system a responserepresenting that access to the online service or issuance of the onlineaccount is permitted.

(Supplementary Note 5)

In the method according to any one of Supplementary Notes 2 to 4,

the challenge data includes first challenge image data or firstchallenge voice data to instruct to turn a direction of face as one ofthe plurality of challenges, and

the response data includes response image data captured an image of aface in the user.

(Supplementary Note 6)

The method according to Supplementary Note 5 includes

determining whether the direction of face in the user and an inputduration of continuing the direction of face detected from the responseimage data contradict with an output duration of an instructionrepresented in the first challenge image data or the first challengevoice data.

(Supplementary Note 7)

In the method according to any one of Supplementary Notes 2 to 6,

the challenge data includes second challenge image data or secondchallenge voice data to instruct to utter a predetermined sound or wordas one of the plurality of challenges, and

the response data includes response voice data where a voice uttered bythe user is recorded.

(Supplementary Note 8)

The method according to Supplementary Note 7 includes

determining whether the voice of the user and an input duration of thevoice detected from the response voice data contradict with an outputduration of the instruction represented in the second challenge imagedata or the second challenge voice data.

(Supplementary Note 9)

In the method according to any one of Supplementary Notes 1 to 8,

the challenge data includes a video stream or an audio stream which isplayed by streaming playback in the input and output system andcontinuously indicates the plurality of challenges in sequence.

(Supplementary Note 10)

In the method according to Supplementary Note 9,

the streaming playback includes progressive download.

(Supplementary Note 11)

The method according to any one of Supplementary Notes 1 to 10, furtherincludes

generating the challenge data such that each output durations in theplurality of challenges is different from one another.

(Supplementary Note 12)

A computer system includes:

a memory; and

at least one processor that is coupled to the memory and is configuredto execute the method according to any one of Supplementary Notes 1 to11.

(Supplementary Note 13)

A program causes a computer to execute the method according to any oneof Supplementary Notes 1 to 11.

While the invention has been particularly shown and described withreference to example embodiments thereof, the invention is not limitedto these embodiments. It will be understood by those of ordinary skillin the art that various changes in form and details may be made thereinwithout departing from the spirit and scope of the present invention asdefined by the claims.

This application is based upon and claims the benefit of priority fromJapanese patent application No. 2014-126353, filed on Jun. 19, 2014, thedisclosure of which is incorporated herein in its entirety by reference.

REFERENCE SIGNS LIST

1 Authentication device

2, 15 Transmission unit

3, 16 Determination unit

7 Terminal device

10 Server

20 Client

What is claimed is:
 1. An authentication device comprising: a processorconfigured to: output at least three challenges in a sequencecorresponding to an authentication request for a user, the outputting ofthe at least three challenges comprises: outputting a first instructionat a first time, the first instruction comprising first information andsecond information, the first information requesting the user to movethe face of the user in a first direction, and the second informationindicating a first period of time the face of the user continuouslykeeps facing in the first direction of the first information in astationary state; outputting a second instruction at a second time afterthe first period of time, the second instruction comprising thirdinformation and fourth information, the third information requesting theuser to perform a challenge, and the fourth information indicating asecond period of time the user has to perform the challenge; andoutputting a third instruction at a third time after the secondinstruction is output, the third instruction comprising fifthinformation and sixth information, the fifth information requesting theuser to move the face of the user in a second direction, and the sixthinformation indicating a second period of time the face of the usercontinuously keeps facing in the second direction of the fifthinformation in a stationary state; capture a first facial image of theuser in response to the first instruction; capture a voice of the userin response to the second instruction; capture a second facial image ofthe user in response to the third instruction; output a result based onwhether the face of the user continuously keeps facing in the firstdirection in the stationary state for the first period of time indicatedby the second information, based on the result captured from the secondinstruction, and based on whether the face of the user continuouslykeeps facing the second direction in the stationary state for the secondperiod of time indicated by the sixth information.
 2. The authenticationdevice according to claim 1, wherein the first facial image and thesecond facial image are captured as a video by a camera.
 3. Theauthentication device according to claim 1, wherein the second directionis different from the first direction.
 4. The authentication deviceaccording to claim 1, wherein the second period of time is differentfrom the first period of time.
 5. An authentication device comprising: aprocessor configured to: output at least three challenges in a sequencecorresponding to an authentication request for a user, the outputtingthe at least three challenges comprises: outputting a first instructionat a first time, the first instruction comprising first information andsecond information, the first information requesting the user to movethe face of the user in a first direction, and the second informationindicating a first period of time the face of the user continuouslykeeps facing in the first direction of the first information in astationary state; outputting a second instruction at a second time afterthe first period of time, the second instruction comprising thirdinformation and fourth information, the third information requesting theuser to perform a challenge, and the fourth information indicating asecond period of time the user has to perform the challenge; andoutputting a third instruction at a third time after the secondinstruction is output, the third instruction comprising fifthinformation and sixth information, the fifth information requesting theuser to move the face of the user in a second direction, and the sixthinformation indicating a second period of time the face of the usercontinuously keeps facing in the second direction of the fifthinformation in a stationary state; capture a first facial image of theuser in response to the first instruction; capture a voice of the userin response to the second instruction; capture a second facial image ofthe user in response to the third instruction; and authenticate accessto an external device based on whether the face of the user continuouslykeeps facing in the first direction in the stationary state for thefirst period of time indicated by the second information, based on theresult captured from the second instruction, and based on whether theface of the user continuously keeps facing the second direction in thestationary state for the second period of time indicated by the sixthinformation.
 6. An authentication device comprising: a processorconfigured to: output at least three challenges in a sequencecorresponding to an authentication request for a user, the outputting ofthe at least three challenges comprises: outputting a first instructionat a first time, the first instruction comprising first information andsecond information, the first information requesting the user to movethe face of the user in a first direction, and the second informationindicating a first period of time the face of the user continuouslykeeps facing in the first direction of the first information in astationary state; outputting a second instruction at a second time afterthe first period of time, the second instruction comprising thirdinformation and fourth information, the third information requesting theuser to perform a challenge, and the fourth information indicating asecond period of time the user has to perform the challenge; andoutputting a third instruction at a third time after the secondinstruction is output, the third instruction comprising fifthinformation and sixth information, the fifth information requesting theuser to move the face of the user in a second direction, and the sixthinformation indicating a second period of time the face of the usercontinuously keeps facing in the second direction of the fifthinformation in a stationary state; output a first icon imagecorresponding to the first instruction, the first icon imagerepresenting a face corresponding to the first instruction; output asecond icon image corresponding to the third instruction, the secondicon image representing a face corresponding to the second instruction;capture a first facial image of the user in response to the firstinstruction capture a voice of the user in response to the secondinstruction; capture a second facial image of the user in response tothe third instruction; and output a result based on whether the face ofthe user continuously keeps facing in the first direction in thestationary state for the first period of time indicated by the secondinformation, based on the result captured from the second instruction,and based on whether the face of the user continuously keeps facing thesecond direction in the stationary state for the second period of timeindicated by the sixth information.
 7. The authentication deviceaccording to claim 6, wherein the facial image comprises a plurality offrames.
 8. The authentication device according to claim 6, wherein thefirst icon faces the first direction and the second icon faces thesecond direction.
 9. The authentication device according to claim 6,wherein the at least three challenges are different operations to beperformed by the user.
 10. The authentication device according to claim6, wherein the at least three challenges are continuously presented tothe user.
 11. The authentication device according to claim 6, whereinthe first facial image and the second facial image are captured as avideo by a camera.
 12. The authentication device according to claim 6,wherein the processor is further configured to refrain from outputtingthe result, which indicates an existence of the user based on adetermination that the face of the user does not continuously keepfacing in the first direction in the stationary state for the firstperiod of time indicated by the second information, or the face of theuser does not continuously keep facing the second direction in thestationary state for the second period of time indicated by the sixthinformation.
 13. The authentication device according to claim 6, whereinthe first instruction comprises a request for biometric information onthe user.
 14. The authentication device according to claim 13, whereinthe processor is further configured to determine that the user to beauthenticated is a pre-registered user based on the biometricinformation included in the captured first facial images or the capturedsecond facial image.
 15. The authentication device according to claim12, wherein the processor is further configured to determine that theuser to be authenticated is a pre-registered user based on the biometricinformation included in the captured first facial images or the capturedsecond facial image after confirming the existence of the user.
 16. Theauthentication device according to claim 12, wherein the processor doesnot recognize that the user to be authenticated is a pre-registered userbased on the biometric information included in the captured first facialimages or the captured second facial image when the existence of theuser is not confirmed.
 17. The authentication device according to claim6, wherein the first icon image directs the user to move in a specificmanner to perform a first challenge indicated in the first instruction.18. The authentication device according to claim 6, wherein the firsticon image moves in a specific manner to guide the user how to perform afirst challenge indicated in the first instruction.
 19. Theauthentication device according to claim 6, wherein the first icon imagedirects the user to move the face in the first direction to perform afirst challenge indicated in the first instruction.
 20. Anauthentication device comprising: a processor configured to: output atleast three challenges in a sequence corresponding to an authenticationrequest for a user, the outputting of the at least three challengescomprises: outputting a first instruction at a first time, the firstinstruction comprising first information and second information, thefirst information requesting the user to move the face of the user in afirst direction, and the second information indicating a first period oftime the face of the user continuously keeps facing in the firstdirection of the first information in a stationary state; outputting asecond instruction at a second time after the first period of time, thesecond instruction comprising third information and fourth information,the third information requesting the user to perform a challenge, andthe fourth information indicating a second period of time the user hasto perform the challenge; and outputting a third instruction at a thirdtime after the second instruction is output, the third instructioncomprising fifth information and sixth information, the fifthinformation requesting the user to move the face of the user in a seconddirection, and the sixth information indicating a second period of timethe face of the user continuously keeps facing in the second directionof the fifth information in a stationary state; output a first iconimage corresponding to the first instruction, the first icon imagerepresenting a face corresponding to the first instruction; output asecond icon image corresponding to the third instruction, the secondicon image representing a face corresponding to the second instruction;capture a first facial image of the user in response to the firstinstruction; capture a voice of the user in response to the secondinstruction; capture a second facial image of the user in response tothe third instruction; and authenticate access to an external devicebased on whether the face of the user continuously keeps facing in thefirst direction in the stationary state for the first period of timeindicated by the second information, based on the result captured fromthe second instruction, and based on whether the face of the usercontinuously keeps facing the second direction in the stationary statefor the second period of time indicated by the sixth information. 21.The authentication device according to claim 20, wherein the processoris further configured to deny access to the external device based on adetermination that the face of the user does not continuously keepfacing in the first direction in the stationary state for the firstperiod of time indicated by the second information, or the face of theuser does not continuously keep facing the second direction in thestationary state for the second period of time indicated by the sixthinformation.
 22. The authentication device according to claim 20,wherein the first icon image directs the user to move in a specificmanner to perform a first challenge indicated in the first instruction.23. The authentication device according to claim 20, wherein the firsticon image moves in a specific manner to guide the user how to perform afirst challenge indicated in the first instruction.
 24. Theauthentication device according to claim 20, wherein the first iconimage directs the user to move the face in a direction to perform afirst challenge indicated in the first instruction.
 25. A method ofauthenticating a user comprising: outputting at least three challengesin a sequence corresponding to an authentication request from a user,the outputting of the at least three challenges comprises: outputting afirst instruction at a first time, the first instruction comprisingfirst information and second information, the first informationrequesting the user to move the face of the user in a first direction,and the second information indicating a first period of time the face ofthe user continuously keeps facing in the first direction of the firstinformation in a stationary state; outputting a second instruction at asecond time after the first period of time, the second instructioncomprising third information and fourth information, the thirdinformation requesting the user to perform a challenge, and the fourthinformation indicating a second period of time the user has to performthe challenge; and outputting a third instruction at a third time afterthe second instruction is output, the third instruction comprising fifthinformation and sixth information, the fifth information requesting theuser to move the face of the user in a second direction, and the sixthinformation indicating a second period of time the face of the usercontinuously keeps facing in the second direction of the fifthinformation in a stationary state; capturing a first facial image of theuser in response to the first instruction; capture a voice of the userin response to the second instruction; capturing a second facial imageof the user in response to the third instruction; outputting a resultbased on whether the face of the user continuously keeps facing in thefirst direction in the stationary state for the first period of timeindicated by the second information, based on the result captured fromthe second instruction, and based on whether the face of the usercontinuously keeps facing the second direction in the stationary statefor the second period of time indicated by the sixth information.
 26. Amethod of authenticating a user comprising: outputting at least threechallenges in a sequence corresponding to an authentication request froma user, the outputting of the at least three challenges comprises:outputting a first instruction at a first time, the first instructioncomprising first information and second information, the firstinformation requesting the user to move the face of the user in a firstdirection, and the second information indicating a first period of timethe face of the user continuously keeps facing in the first direction ofthe first information in a stationary state; outputting a secondinstruction at a second time after the first period of time, the secondinstruction comprising third information and fourth information, thethird information requesting the user to perform a challenge, and thefourth information indicating a second period of time the user has toperform the challenge; and outputting a third instruction at a thirdtime after the second instruction is output, the third instructioncomprising fifth information and sixth information, the fifthinformation requesting the user to move the face of the user in a seconddirection, and the sixth information indicating a second period of timethe face of the user continuously keeps facing in the second directionof the fifth information in a stationary state; capturing a first facialimage of an image in response to the first instruction; capture a voiceof the user in response to the second instruction; capturing a secondfacial image of the user in response to the third instruction; andauthenticating access to an external device based on whether the face ofthe user continuously keeps facing in the first direction in thestationary state for the first period of time indicated by the secondinformation, based on the result captured from the second instruction,and based on whether the face of the user continuously keeps facing thesecond direction in the stationary state for the second period of timeindicated by the sixth information.
 27. A non-transitory computerreadable medium having stored therein a program for performing a methodof authenticating a user comprising: outputting at least threechallenges in a sequence corresponding to an authentication request froma user, the outputting of the at least three challenges comprises:outputting a first instruction at a first time, the first instructioncomprising first information and second information, the firstinformation requesting the user to move the face of the user in a firstdirection, and the second information indicating a first period of timethe face of the user continuously keeps facing in the first direction ofthe first information in a stationary state; outputting a secondinstruction at a second time after the first period of time, the secondinstruction comprising third information and fourth information, thethird information requesting the user to perform a challenge, and thefourth information indicating a second period of time the user has toperform the challenge; and outputting a third instruction at a thirdtime after the second instruction is output, the third instructioncomprising fifth information and sixth information, the fifthinformation requesting the user to move the face of the user in a seconddirection, and the sixth information indicating a second period of timethe face of the user continuously keeps facing in the second directionof the fifth information in a stationary state; capturing a first facialimage of the user in response to the first instruction; capture a voiceof the user in response to the second instruction; capturing a secondfacial image of the user in response to the third instruction;outputting a result based on whether the face of the user continuouslykeeps facing in the first direction in the stationary state for thefirst period of time indicated by the second information, based on theresult captured from the second instruction, and based on whether theface of the user continuously keeps facing the second direction in thestationary state for the second period of time indicated by the sixthinformation.
 28. A non-transitory computer readable medium having storedtherein a program for performing a method of authenticating a usercomprising: outputting at least three challenges in a sequencecorresponding to an authentication request from a user, the outputtingof the at least three challenges comprises: outputting a firstinstruction at a first time, the first instruction comprising firstinformation and second information, the first information requesting theuser to move the face of the user in a first direction, and the secondinformation indicating a first period of time the face of the usercontinuously keeps facing in the first direction of the firstinformation in a stationary state; outputting a second instruction at asecond time after the first period of time, the second instructioncomprising third information and fourth information, the thirdinformation requesting the user to perform a challenge, and the fourthinformation indicating a second period of time the user has to performthe challenge; and outputting a third instruction at a third time afterthe second instruction is output, the third instruction comprising fifthinformation and sixth information, the fifth information requesting theuser to move the face of the user in a second direction, and the sixthinformation indicating a second period of time the face of the usercontinuously keeps facing in the second direction of the fifthinformation in a stationary state; capturing a first facial image of theuser in response to the first instruction; capture a voice of the userin response to the second instruction; capturing a second facial imageof the user in response to the third instruction; authenticating accessto an external device based on whether the face of the user continuouslykeeps facing in the first direction in the stationary state for thefirst period of time indicated by the second information, based on theresult captured from the second instruction, and based on whether theface of the user continuously keeps facing the second direction in thestationary state for the second period of time indicated by the sixthinformation.