A Trusted Biometric System
نویسندگان
چکیده
This technical report describes a method for biometric identification based user authentication in distributed environments, which makes use of Trusted Platforms combined with Smart Cards and Trusted Biometric Readers for providing a trusted biometric system. With this authentication method, a user can establish a trust relationship with a Biometric Reader (via integrity checking), and the user can trust that the system (incorporating both reader and platform) will not disclose his or her sensitive biometric information to any unauthorized entity. Such an approach can be applied, regardless of the type of Biometric Reader. It provides an alternative to integrating biometric capture with Smart Cards, for example by providing a Biometric Reader actually on a Smart Card.
منابع مشابه
Secure Continuous Biometric-Enhanced Authentication (CMU-CS-00-134)
Biometrics have the potential to solidify person-authentication by examining \unforgeable" features of individuals. This paper explores issues involved with e ective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication ...
متن کاملSecure continuous biometric-enhanced authentication
Biometrics have the potential to solidify person-authentication by examining "unforgeable" features of individuals. This paper explores issues involved with effective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication...
متن کاملPrivacy Information Management for Video Surveillance
The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this...
متن کاملAnalyzing Trusted Elements in Mobile Devices
Since last two decades, we have witnessed a significant trend from PC to mobile devices. The primary focus of this shift on mobile devices is making a device personal to the user, but, unfortunately, neglecting the trustworthiness of mobile devices. Mobile devices consist of many elements in hardware, software (firmware) and a combination of both. Some of these elements on mobile devices are tr...
متن کاملThe Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective
The deployment of biometric systems could have serious life long implications for the privacy and data protection rights of individuals. The use of appropriate biometric technologies permitting the creation of multiple trusted revocable protected biometric identities may present a response to this challenge. The paper presents a review from a legal perspective of these privacy enhancing technol...
متن کامل