{"title":"生物识别访问控制系统中集中式与分布式架构的比较","authors":"E. C. Driscoll, R. Fowler","doi":"10.1109/CCST.1989.751978","DOIUrl":null,"url":null,"abstract":"The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assumptions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \"biometrics\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate. The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assump tions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \"biometrics\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A comparison of centralized versus distributed architectures in biometric access control systems\",\"authors\":\"E. C. Driscoll, R. Fowler\",\"doi\":\"10.1109/CCST.1989.751978\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assumptions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \\\"biometrics\\\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate. The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assump tions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \\\"biometrics\\\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate.\",\"PeriodicalId\":288105,\"journal\":{\"name\":\"Proceedings. International Carnahan Conference on Security Technology\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-10-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1989.751978\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1989.751978","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comparison of centralized versus distributed architectures in biometric access control systems
The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assumptions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called "biometrics", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate. The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assump tions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called "biometrics", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate.