Secure Identification System - SIS
نویسندگان
چکیده
The secure identification of a person was and still of great interest in different fields of human activities. The traditional identification methods such as PIN, passwords aren’t capable to achieve a high level of secure identification. In the contrast, the biometrics allows to attain the suitable solution for this vital question. Different types of biometrics are reviewed. Its characteristics are unique for each person either for physiological or behavioral biometrics. It is shown that the fingerprint recognition has a very good balance of all desirable properties. The design of secure identification fingerprint-based system, in its hardware and software parts, is done. This system was implemented with the suitable features.
منابع مشابه
Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations
Safety Instrumented Systems (SIS) as defined in IEC 61508 and IEC 61511 are very important for the safety of offshore oil & natural gas installations. SIS typically include the Emergency Shutdown System (ESD) that ensures that process systems return to a safe state in case of undesirable events. Partly as a consequence of the evolving “Integrated Operations” concept, a need is emerging for remo...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملSecure Information Sharing Using Attribute Certificates and Role Based Access Control
In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based ...
متن کاملFormal Models for Group-Centric Secure Information Sharing
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several directions in which this theory can be extended. The traditional approach to information sharing, characterized as Dissemination-Centric in this paper, focuses on attaching attributes and policies to an object (sometimes called ...
متن کامل