The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System

نویسندگان

  • Yu Lu
  • Zhong Liang
  • Chen Yue
چکیده

This paper introduced fingerprint recognition to protect USB Key’s pin number. Pin number is easily stolen and sometimes it’s too hard to keep in mind. To overcome these problems, a fingerprint key based USB Key pin number protection system has been proposed. Using biometric like fingerprint to protect USB Key pin number improves security and convenience of users. And the fingerprint key is generated by user’s fingerprint and several random points. That avoids user’s privacy information disclosure because it’s hard to restore the template in calculation. With the development of mobile payment and more and more mobile devices are beginning to equip with fingerprint recognition module, the combination of fingerprint and USB Key has a good prospect and portability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Evaluation of a template protection approach to integrate fingerprint biometrics in a PIN-based payment infrastructure

Biometric authentication has a great potential to improve the security, reduce cost, and enhance the customer convenience of payment systems. Despite these benefits, biometric authentication has not yet been adopted by large-scale point-of-sale and automated teller machine systems. This paper aims at providing a better understanding of the benefits and limitations associated with the integratio...

متن کامل

A vulnerability assessment of roaming soft certificate PKI solutions

In the past two or three years most major PKI technology vendors have released products which allow digital certificate holders with “soft certificates” to have their private keys stored at a central server and uploaded when needed to their local machine. This allows users to “roam” from one machine to another without having to manually manage the export and import of their keys onto temporary ...

متن کامل

Fingerprint Abstraction Layer for Linux

Fingerprint Abstraction Layer for Linux Daniel Drake Supervisor: Toby Howard April 28, 2008 Fingerprint scanners are popular consumer computing products, but they are generally unusable under Linux-based operating environments. My project implements Linux support for a range of USB fingerprint scanners, allowing for fingerprint-based authentication capabilities. The source code for the software...

متن کامل

An Enhanced Hill Cipher and Its Application in Software Copy Protection

To protect software from unauthorized use, registration key is frequently used in the field of permission control. For the security of such a system, the key issue is to design a robust algorithm. We propose an enhanced scheme of Hill cipher based on variable modulus and algebraic alphabet to protect software copy, which uses tridiagonal matrix. Since the modulus is not a fixed number and the a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015