{"title":"认证服务和生物识别技术:网络安全问题","authors":"O.S. Benavente, R. Piccio-Marchetti","doi":"10.1109/CCST.2005.1594871","DOIUrl":null,"url":null,"abstract":"The Internet is increasingly becoming a public vehicle for remote operations. Integrating biometric information in the authentication chain exposes new problems. Remote virtual identity is starting to play in the way towards an eEurope, and applications for e-government integrate biometrics. Remote identity of subjects should be unambiguously stated. Several features drive the spread of biometric authentication in network applications, in order to provide end-to-end security across the authentication chain aliveness detection and fake-resistive methods, network protocols, security infrastructure, integration of biometrics and public key infrastructure (PKI), etc. This paper proposes a mid-layer interoperable architecture furnished with a set of generic interfaces and protocol definitions. This scheme enables a future introduction of new modules and applications with a minimal development effort.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"163 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Authentication services and biometrics: network security issues\",\"authors\":\"O.S. Benavente, R. Piccio-Marchetti\",\"doi\":\"10.1109/CCST.2005.1594871\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet is increasingly becoming a public vehicle for remote operations. Integrating biometric information in the authentication chain exposes new problems. Remote virtual identity is starting to play in the way towards an eEurope, and applications for e-government integrate biometrics. Remote identity of subjects should be unambiguously stated. Several features drive the spread of biometric authentication in network applications, in order to provide end-to-end security across the authentication chain aliveness detection and fake-resistive methods, network protocols, security infrastructure, integration of biometrics and public key infrastructure (PKI), etc. This paper proposes a mid-layer interoperable architecture furnished with a set of generic interfaces and protocol definitions. This scheme enables a future introduction of new modules and applications with a minimal development effort.\",\"PeriodicalId\":411051,\"journal\":{\"name\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"volume\":\"163 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2005.1594871\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594871","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication services and biometrics: network security issues
The Internet is increasingly becoming a public vehicle for remote operations. Integrating biometric information in the authentication chain exposes new problems. Remote virtual identity is starting to play in the way towards an eEurope, and applications for e-government integrate biometrics. Remote identity of subjects should be unambiguously stated. Several features drive the spread of biometric authentication in network applications, in order to provide end-to-end security across the authentication chain aliveness detection and fake-resistive methods, network protocols, security infrastructure, integration of biometrics and public key infrastructure (PKI), etc. This paper proposes a mid-layer interoperable architecture furnished with a set of generic interfaces and protocol definitions. This scheme enables a future introduction of new modules and applications with a minimal development effort.