一个简单的模型用于指纹扫描的生物特征识别技术

S. Musa, T. Jefferson, M. Sadiku
{"title":"一个简单的模型用于指纹扫描的生物特征识别技术","authors":"S. Musa, T. Jefferson, M. Sadiku","doi":"10.1109/SECON.2012.6197071","DOIUrl":null,"url":null,"abstract":"This paper presents a simple model for combination of biometric fingerprint recognition and traditional password technologies offering increased levels of computer user authentication security needed to protect access to sensitive information and to help identify authorized system users. In developing a viable system incorporating this technology, various models were used to qualify processes and applicability to applications in the higher education environment. Through the use of these models, this paper will identify enhanced alternatives that can replace less secure traditional methods of logging-on to computers. The benefits of using this technology over aging password, tokens, or smart card technology will become increasingly apparent and set the stage for meeting the security and authentication challenges of the 21st Century.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A simple model for biometric identification technology using fingerprint scanning\",\"authors\":\"S. Musa, T. Jefferson, M. Sadiku\",\"doi\":\"10.1109/SECON.2012.6197071\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a simple model for combination of biometric fingerprint recognition and traditional password technologies offering increased levels of computer user authentication security needed to protect access to sensitive information and to help identify authorized system users. In developing a viable system incorporating this technology, various models were used to qualify processes and applicability to applications in the higher education environment. Through the use of these models, this paper will identify enhanced alternatives that can replace less secure traditional methods of logging-on to computers. The benefits of using this technology over aging password, tokens, or smart card technology will become increasingly apparent and set the stage for meeting the security and authentication challenges of the 21st Century.\",\"PeriodicalId\":187091,\"journal\":{\"name\":\"2012 Proceedings of IEEE Southeastcon\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-03-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Proceedings of IEEE Southeastcon\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2012.6197071\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Proceedings of IEEE Southeastcon","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2012.6197071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

本文提出了一个简单的生物指纹识别与传统密码技术相结合的模型,提供了更高级别的计算机用户认证安全性,以保护对敏感信息的访问并帮助识别授权的系统用户。在开发包含该技术的可行系统时,使用了各种模型来确定过程及其在高等教育环境中的应用的适用性。通过使用这些模型,本文将确定增强的替代方案,可以取代不太安全的传统计算机登录方法。与老化的密码、令牌或智能卡技术相比,使用这种技术的好处将变得越来越明显,并为迎接21世纪的安全和身份验证挑战奠定了基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A simple model for biometric identification technology using fingerprint scanning
This paper presents a simple model for combination of biometric fingerprint recognition and traditional password technologies offering increased levels of computer user authentication security needed to protect access to sensitive information and to help identify authorized system users. In developing a viable system incorporating this technology, various models were used to qualify processes and applicability to applications in the higher education environment. Through the use of these models, this paper will identify enhanced alternatives that can replace less secure traditional methods of logging-on to computers. The benefits of using this technology over aging password, tokens, or smart card technology will become increasingly apparent and set the stage for meeting the security and authentication challenges of the 21st Century.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信