首页 | 本学科首页   官方微博 | 高级检索  
     

Biometric-based personal identity-authentication system and security analysis
作者姓名:LI Chao  YANG Yi-xian  NIU Xin-xin Information Security Centre  Key Laboratory of Networking and Switching Technologies  Beijing University of Posts and Telecommunications  Beijing  China
作者单位:LI Chao,YANG Yi-xian,NIU Xin-xin Information Security Centre,Key Laboratory of Networking and Switching Technologies,Beijing University of Posts and Telecommunications,Beijing 100876,China
基金项目:国家自然科学基金;北京市自然科学基金
摘    要:1 Introduction Personal authentication system is a system that verifies a person’s identity, which he (she) claims to be, usually through login name or smart card, etc. Traditional authentication is based on the possession of a secret key, that is, once the user possesses the key, his (her) authenticity is established. Personal authentication based on PKI is one of the most prevalent authentication methods, which uses a private key to prove the user’s identity. Usually cryptographic keys a…

收稿时间:28 February 2006

Biometric-based personal identity-authentication system and security analysis
LI Chao,YANG Yi-xian,NIU Xin-xin Information Security Centre,Key Laboratory of Networking and Switching Technologies,Beijing University of Posts and Telecommunications,Beijing ,China.Biometric-based personal identity-authentication system and security analysis[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):43-47.
Authors:LI Chao  YANG Yi-xian  NIU Xin-xin
Affiliation:Information Security Centre, Key Laboratory of Networking and Switching Technologies, Beijing University of Posts and Telecommunications, Beijing 100876, China
Abstract:The traditional authentication system is based on the secret key, and is mainly based on public key infrastructure (PKI). Unfortunately, a key has many disadvantages, for example, the key can be forgotten or stolen, and can be easily cracked. Nowadays, authentication systems using biometric technology have become more prevalent because of the advantages over password-based authentication systems. In this article, several biometric authentication models are presented, upon which most biometric authentication systems are based. Biometric authentication systems based-on these models provide high security for access control in non-face-to-face environment such as e-commerce, over open network.
Keywords:biometric  identity authentication  PKI  security
本文献已被 CNKI 万方数据 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号