E. Dimitrova, Dragomira Dimitrova, Vasil Dimitrov, V. Trifonov
{"title":"当代高安全信息系统的认证访问方法","authors":"E. Dimitrova, Dragomira Dimitrova, Vasil Dimitrov, V. Trifonov","doi":"10.1109/ICEST52640.2021.9483496","DOIUrl":null,"url":null,"abstract":"In this paper, a reliable method for access to information systems that require an increased level of security is proposed. In addition to the username and password, the individual's handwriting can be used as a second level of authenticcation. It is less invasive than the fingerprint and iris recognition and its technical implementation is not difficult and expensive.","PeriodicalId":308948,"journal":{"name":"2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Contemporary Authentication Access Approach for High Security Information Systems\",\"authors\":\"E. Dimitrova, Dragomira Dimitrova, Vasil Dimitrov, V. Trifonov\",\"doi\":\"10.1109/ICEST52640.2021.9483496\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a reliable method for access to information systems that require an increased level of security is proposed. In addition to the username and password, the individual's handwriting can be used as a second level of authenticcation. It is less invasive than the fingerprint and iris recognition and its technical implementation is not difficult and expensive.\",\"PeriodicalId\":308948,\"journal\":{\"name\":\"2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEST52640.2021.9483496\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEST52640.2021.9483496","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Contemporary Authentication Access Approach for High Security Information Systems
In this paper, a reliable method for access to information systems that require an increased level of security is proposed. In addition to the username and password, the individual's handwriting can be used as a second level of authenticcation. It is less invasive than the fingerprint and iris recognition and its technical implementation is not difficult and expensive.