首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
张镪  唐棣芳 《电子技术》2011,38(10):47-49
文章介纠了智能卡技术和指纹识别技术,给出了以ET44M210芯片为核心的具有指纹识别功能的智能卡系统的-种实验设计方法,并阐述了系统设计和软件流程.  相似文献   

2.
试论嵌入式自动指纹识别系统设计   总被引:1,自引:0,他引:1  
何汉 《信息通信》2014,(7):55-55
所谓的指纹识别技术是一种辨别生物独有特征的技术。文章主要写自动指纹识别的过程,然后分析嵌入式自动指纹识别硬件系统,最后对嵌入式自动指纹识别系统软件进行设计。  相似文献   

3.
本文首先介绍了智能卡技术的应用领域和智能卡技术的优越性,然后阐述了智能卡的芯片技术技术及其安全性,以及卡片的制造工艺,给出了智能卡技术的发展方向。  相似文献   

4.
本文论述了非接触智能卡的原理和技术特点,并介绍了汕头广播电视中心利用智能卡技术开发的考勤门禁管理系统的硬件构成和软件系统。  相似文献   

5.
指纹是当今应用最广泛的生物特征,指纹识别在人的身份鉴定中有重要的意义.基于DSP的嵌入式指纹识别系统具有极高的安全性和易用性.高性能价格比的DSP已逐渐应用于指纹识别技术中,并且发挥着越来越重要的作用.人们习惯上将这种在以DSP为核心的平台上运行固化指纹处理程序的指纹识别系统称为基于DSP的嵌入式指纹识别系统.  相似文献   

6.
指纹识别技术产品的开发与进展   总被引:2,自引:2,他引:0  
徐国辉 《通信技术》2009,42(8):88-90
随着计算机技术的发展,指纹识别技术作为一个安全、可靠、科学的验证技术,已经走进了我们生活的各个领域。文章详细地介绍了指纹识别技术的最新应用和发展情况,对指纹识别系统的基本原理、特征提取以及特征匹配等环节的各种技术,以及新的发展动态方面进行了介绍,同时对指纹识别产品在行业中的应用进行了相关介绍。  相似文献   

7.
与其他的身份认证方式相比,指纹识别系统的效果更加理想,不仅能够保护信息安全,具有更高的可靠性和准确性,还具有便利性高、可行性大等优点,本文在掌握了指纹识别系统优点的基础上,对指纹识别系统的硬件和软件设计进行了介绍和探讨,旨在为我国的指纹识别技术的发展和应用提供理论帮助.  相似文献   

8.
伴随着信息技术与数字化技术的不断出现,对银行系统提出了更为先进的技术性支持,其中指纹识别云技术是一种重要的技术类型。现如今,银行类安全事故不断出现,犯罪类事件也在不断发生,一些技术的产生,使得银行卡的安全性受到威胁。新时期,指纹识别云技术是一种更为先进性技术,此种技术需要持卡人的指纹,可适度提升安全度。为此,本文就指纹识别云技术在银行系统中的应用进行了分析与探究。  相似文献   

9.
本文介绍了基于开放式多媒体应用平台(OMAP)架构的嵌入式指纹识别系统的设计方案及其在汽车安防领域的应用,具体说明了嵌入式指纹识别系统的硬件设计和软件开发,并提出"个人身份码(PIN) 指纹识别"的双重认证技术。  相似文献   

10.
1989年,德国的移动运营商最早开始使用具有微处理器的智能卡,以实现网络鉴权功能,移动智能卡在移动通信中的应用发展是与GSM系统的发展紧密联系在一起的。GSM系统从制定规范的最初就有一个理念:“每一部手机都是我的手机”,即让手机的通信功能和用于个人身份验证的智能卡分离,用户可以方便地更换各种GSM制式的手机,同时使得存放在智能卡中的电话号码和其他个人信息保持不变。在GSM系统中,用于用户个人身份识别的智能卡称为SIM(SubscriberIdentityModule)卡,手机和移动智能卡分离的模式称为机卡分离的模式。近年来,…  相似文献   

11.
Various user authentication schemes with smart cards have been proposed. Generally, researchers implicitly assume that the contents of a smart card cannot be revealed. However, this is not true. An attacker can analyze the leaked information and obtain the secret values in a smart card. To improve on this drawback, we involve a fingerprint biometric and password to enhance the security level of the remote authentication scheme Our scheme uses only hashing functions to implement a robust authentication with a low computation property. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

12.
Using biometrics to verify a person's identity has several advantages over the present practices of personal identification numbers (PINs) and passwords. At the same time, improvements in VLSI technology have recently led to the introduction of smart cards with 32‐bit RISC processors. To gain maximum security in verification systems using biometrics, verification as well as storage of the biometric pattern must be done in the smart card. However, because of the limited resources (processing power and memory space) of the smart card, integrating biometrics into it is still an open challenge. In this paper, we propose a fingerprint verification algorithm using a multi‐resolution accumulator array that can be executed in restricted environments such as the smart card. We first evaluate both the number of instructions executed and the memory requirement for each step of a typical fingerprint verification algorithm. We then develop a memory‐efficient algorithm for the most memory‐consuming step (alignment) using a multiresolution accumulator array. Our experimental results show that the proposed algorithm can reduce the required memory space by a factor of 40 and can be executed in real time in resource‐constrained environments without significantly degrading accuracy.  相似文献   

13.

Remote user authentication schemes provide a system to verify the legitimacy of remote users’ authentication request over insecure communication channel. In the past years, many authentication schemes using password and smart card have been proposed. However, password might be guessed, leaked or forgotten and smart card might be shared, lost or stolen. In contrast, the biometrics which utilize biological characteristics, such as face, fingerprint or iris, have no such weakness. With the trend of mobile payment, more and more applications of mobile payment use biometrics to replace password and smart card. In this paper, we propose a biometric-based remote authentication scheme substituting biometric and mobile device bounded by user for password and smart card. This scheme is more convenient, suitable and securer than the schemes using smart cards on mobile payment environment.

  相似文献   

14.
An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of computers, VLSI Design and material science. The result of such a mixture is a miniature, fully operational, computation system. The nature of the data involved in smart card transactions and smart card intended uses, introduce another important factor in the smart card design mechanism which is security. The evolution of VLSI technology allows the efficient implementation of costly cryptographic operations in the smart card design methodology. Apart from the traditional cryptographic algorithms, additional techniques and special design materials have been introduced in order to protect the smart card system from cryptanalytic attacks. New architectures of software design, like object-oriented programming, give the opportunity to implement programmable multi-application cards. Thus, smart cards are transformed into highly secure devices and their establishment in the modern computer market can be considered certain. This establishment is bound to finance upcoming research in smart cards so that this product can become the basic component of electronic commerce worldwide.  相似文献   

15.
文中提出一种利用指纹生物特征进行密钥封装的方案。使用主成分分析方法对采集的指纹特征数据进行处理。采用Reed—Solomon编码和Hadamard编码的级联方案,随机选取一个密钥应用该级联方案进行编码,把编码后的结果与指纹生物特征生成的secure vault存储在智能卡上,并将随机密钥销毁。在验证阶段,利用相同的指纹特征将该随机密钥重构出来,以应用到其他方面。最后对方案的安全性进行分析。  相似文献   

16.
随着移动互联网、移动支付等新兴行业的快速发展,对作为安全我体的智能卡也提出了新的挑战。具备独立网络功能的智能卡的出现,使得智能卡具备了网络通信能力,将为智能卡开辟全新的应用领域,在安全支付领域发挥重要作用。本文针对具有USB高速接口的智能卡,提出了一整套网络智能卡解决方案,并在有限的硬件资源的智能卡上实现了完整的TCP/IP网络协议,性能良好.  相似文献   

17.
Wireless broadcast encryption based on smart cards   总被引:1,自引:0,他引:1  
Wireless broadcasting is an efficient way to broadcast data to a large number of users. Some commercial applications of wireless broadcasting, such as satellite pay-TV, desire that only those users who have paid for the service can retrieve broadcast data. This is often achieved by broadcast encryption, which allows a station securely to broadcast data to a dynamically changing set of privileged users through open air. Most existing broadcast encryption schemes can only revoke a pre-specified number of users before system re-setup or require high computation, communication and storage overheads in receivers. In this paper, we propose a new broadcast encryption scheme based on smart cards. In our scheme, smart cards are used to prevent users from leaking secret keys. Additionally, once an illegally cloned smart card is captured, our scheme also allows tracing of the compromised smart card by which illegal smart cards are cloned, and can then revoke all cloned smart cards. The new features of our scheme include minimal computation needs of only a few modular multiplications in the smart card, and the capability to revoke up to any number of users in one revocation. Furthermore, our scheme is secure against both passive and active attacks and has better performance than other schemes.  相似文献   

18.
Despite recent advances in smart card technology, most modern smart cards continue to rely on card readers for power and clocking, creating a potential security gap. In this paper, we present an energy-aware smart card architecture that operates using an embedded battery and crystal. This low-power VLSI system is continually active and provides enhanced security through periodic internal update when the card is detached from a reader. Our architecture achieves reduced power consumption by deactivating the majority of its circuitry, including an embedded microcontroller, for the vast majority of the card's lifetime. A proof-of-concept prototype implementation of the architecture has been developed including register-transfer-level and gate-level designs which have been synthesized to silicon. To permit extended operation for up to 18 months, critical design logic has been implemented using ultralow-power (adiabatic) circuit techniques.  相似文献   

19.
校园一指通管理系统是一种基于指纹识别的校园管理系统.该设计利用指纹识别这一生物识别技术并借助于局域网通信保证学生在校期间即使无卡也可方便地学习与生活.通过对系统整体架构和终端硬件的分析与设计,阐述整个系统进行信息处理的工作原理.同时从软件上设计计算机对由指纹采集仪获取的指纹数据进行处理、提取特征数据、封装成数据包、通过局域网发送至服务器的过程,对服务器端的指纹比对、处理请求、返回结果这一过程也进行软件设计.由于该系统具有人性化和可实现性,所以其应用前景会越来越好.  相似文献   

20.
高校食堂传统的纸质餐票、现金或基于接触式IC卡技术的消费支付方式存在服务效率不高、便捷性差、管理成本高、卡片易损坏等诸多弊端。为了克服这些弊端,研究将CAN总线技术和非接触式智能卡技术结合起来,提出一种基于CAN总线的高校食堂刷卡系统的设计方案,并完成下位机发卡节点和刷卡节点的软硬件设计,以及上位机管理软件的开发,实现安全、可靠、便捷的发卡和刷卡以及用户信息管理。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号