Progress of Ubiquitous Information Services and Keeping Their Security by Biometrics Authentication
نویسنده
چکیده
With progress of both fixed and mobile networks, various ubiquitous information services have been brought up to apply in actual business scene. In fact, it becomes possible to receive and send information in various access points not only in offices but also in cars through sophisticated ubiquitous terminals such as PDA, cellular phone, mobile PC and so on. Moreover, the spread of RFID-tag application to household commodities will accelerate the popularization of ubiquitous services. Every ubiquitous terminal will have RFID reader/writer on board in near future. By using the ubiquitous information service environment, variety of services such as e-government, e-bank, e-commerce, Intelligent Transport Systems service that usually require customized services for each customer has already been provided. However, high-tech crimes such as skimming and phishing are increasing day by day inversely increment of its convenience. Such high-tech crimes were happened in worldwide actually. It is impossible to keep security by 4 or more digits PIN code any longer. Biometrics authentication is promising to protect against high-tech crimes in the present situation. I will give an overview of current ubiquitous information services, focusing on some of actual services in keeping security by biometrics authentication.
منابع مشابه
Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملBiometric Authentication: A Review
Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs to be identified based on some characteristic physiological paramet...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کامل