Secure continuous biometric-enhanced authentication
نویسندگان
چکیده
Biometrics have the potential to solidify person-authentication by examining "unforgeable" features of individuals. This paper explores issues involved with effective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication will reduce security rather than increase it. A novel biometric-enhanced authentication system, based on a trusted camera that continuously uses face recognition to verify identity, is described and evaluated in the context of Linux. With cryptographically-signed messages and continuous authentication, the difficulty of bypassing desktop authentication can be significantly increased.
منابع مشابه
Secure Continuous Biometric-Enhanced Authentication (CMU-CS-00-134)
Biometrics have the potential to solidify person-authentication by examining \unforgeable" features of individuals. This paper explores issues involved with e ective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication ...
متن کاملThe Biometric Daemon: A Public Perspective
Information privacy is maintained through authentication—the act of proving to a system that you are who you say you are. Unfortunately, current authentication methods are affected by a range of usability problems that impact significantly on the security of people’s data and access to secure systems. Recently, an experience-oriented security device, the Biometric Daemon, has been proposed whic...
متن کاملContinuous user authentication using multi-modal biometrics
As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security e particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the fundamental issue of usable and secure authentication through utilizing biometric-based techniques to continuously verify user identity. This p...
متن کاملA Prototype Implementation of Continuous Authentication for Tactical Applications
Recent advances in wireless and computing technology have led to accelerated efforts to equip soldiers at the tactical level with sophisticated handheld communications devices to share situational awareness data. An important consideration is how to secure these devices, and how to ensure that the users of the devices have not been compromised. This paper presents the details of prototyping act...
متن کاملA Dual Integrated Watermarking Approach for Biometric Authentication
To improve the information authentication and network security one of the effective authentication mechanism is Biometric authentication System. But when this authentication system is a offline authentication system, in such case, it is required to secure this authentication information. In this work, a biometric watermarking based authentication system is defined to secure the authentication s...
متن کامل