{"title":"The Biometric System Models with Secure Network Protocols in Open Network Environment","authors":"Woochang Shin, Young-Nyuo Shin","doi":"10.1109/SECTECH.2008.44","DOIUrl":null,"url":null,"abstract":"Biometric technology has been adopted in important elements of the national infrastructure, such as electronic passports and immigration control systems. However, the threats of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. We introduce nine telebiometrics authentication models and a biometric network protocol that is secure and compatible with international standards. We also prove the security of the suggested protocol using AVISPA tools.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2008.44","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Biometric technology has been adopted in important elements of the national infrastructure, such as electronic passports and immigration control systems. However, the threats of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. We introduce nine telebiometrics authentication models and a biometric network protocol that is secure and compatible with international standards. We also prove the security of the suggested protocol using AVISPA tools.