生物识别访问控制系统中集中式与分布式架构的比较

E. C. Driscoll, R. Fowler
{"title":"生物识别访问控制系统中集中式与分布式架构的比较","authors":"E. C. Driscoll, R. Fowler","doi":"10.1109/CCST.1989.751978","DOIUrl":null,"url":null,"abstract":"The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assumptions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \"biometrics\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate. The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assump tions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \"biometrics\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A comparison of centralized versus distributed architectures in biometric access control systems\",\"authors\":\"E. C. Driscoll, R. Fowler\",\"doi\":\"10.1109/CCST.1989.751978\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assumptions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \\\"biometrics\\\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate. The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assump tions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \\\"biometrics\\\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate.\",\"PeriodicalId\":288105,\"journal\":{\"name\":\"Proceedings. International Carnahan Conference on Security Technology\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-10-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1989.751978\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1989.751978","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

控制使用物理设施或计算机数据库的需要每年都在增加。身份验证在这种控制中是隐含的,即必须能够确认门口个人的身份,才能授予访问权限。过去,自动身份验证很困难。早期的门禁系统要么依赖于手动身份验证手段(例如,保安人员识别每个面孔),要么将问题简化为验证某些物理对象(例如门禁卡)而不是个人的身份。第一种技术很昂贵。第二种观点认为,这件东西总是依附于它的主人。这是一个糟糕的假设,门禁卡的丢失或共享是当今门禁系统的最大弱点。在过去的十年里,这项技术已经可以实现对个人身份的真实验证。这项技术是基于一个叫做“生物计量学”的领域,即测量每个人的独特生物特征。稍后可以根据请求访问的个人检查这些功能,并且可以准确地确认该个人的身份。本文将介绍并比较基于集中式和分布式架构的生物识别门禁系统。本文将比较这两种体系结构方法,概述它们的相对优点和缺点,并讨论其中一种更合适的应用程序。控制使用物理设施或计算机数据库的需要每年都在增加。身份验证在这种控制中是隐含的,即必须能够确认门口个人的身份,才能授予访问权限。过去,自动身份验证很困难。早期的门禁系统要么依赖于手动身份验证手段(例如,保安人员识别每个面孔),要么将问题简化为验证某些物理对象(例如门禁卡)而不是个人的身份。第一种技术很昂贵。第二种假设是,这件物品总是依附于它的主人。这是一个糟糕的假设,门禁卡的丢失或共享是当今门禁系统的最大弱点。在过去的十年里,这项技术已经可以实现对个人身份的真实验证。这项技术是基于一个叫做“生物计量学”的领域,即测量每个人的独特生物特征。稍后可以根据请求访问的个人检查这些功能,并且可以准确地确认该个人的身份。本文将介绍并比较基于集中式和分布式架构的生物识别门禁系统。本文将比较这两种体系结构方法,概述它们的相对优点和缺点,并讨论其中一种更合适的应用程序。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A comparison of centralized versus distributed architectures in biometric access control systems
The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assumptions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called "biometrics", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate. The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assump tions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called "biometrics", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信