{"title":"A simple model for biometric identification technology using fingerprint scanning","authors":"S. Musa, T. Jefferson, M. Sadiku","doi":"10.1109/SECON.2012.6197071","DOIUrl":null,"url":null,"abstract":"This paper presents a simple model for combination of biometric fingerprint recognition and traditional password technologies offering increased levels of computer user authentication security needed to protect access to sensitive information and to help identify authorized system users. In developing a viable system incorporating this technology, various models were used to qualify processes and applicability to applications in the higher education environment. Through the use of these models, this paper will identify enhanced alternatives that can replace less secure traditional methods of logging-on to computers. The benefits of using this technology over aging password, tokens, or smart card technology will become increasingly apparent and set the stage for meeting the security and authentication challenges of the 21st Century.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Proceedings of IEEE Southeastcon","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2012.6197071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper presents a simple model for combination of biometric fingerprint recognition and traditional password technologies offering increased levels of computer user authentication security needed to protect access to sensitive information and to help identify authorized system users. In developing a viable system incorporating this technology, various models were used to qualify processes and applicability to applications in the higher education environment. Through the use of these models, this paper will identify enhanced alternatives that can replace less secure traditional methods of logging-on to computers. The benefits of using this technology over aging password, tokens, or smart card technology will become increasingly apparent and set the stage for meeting the security and authentication challenges of the 21st Century.