74 Utilization of Biometrics Authentication Technology for Airport Security

نویسنده

  • Hirofumi Konishi
چکیده

With the slogan, “Leading the World in IT Airport Applications e-Airport”, an experimental service was recently conducted at Japan's gateway to the world, the New Tokyo International Airport (hereinafter referred to as “Narita Airport”), to provide on the day flight information about aircraft arriving and departing, as well as railroad access information, which was accessible using a mobile phone, a handheld device or a wireless LAN. The service provided1) made it possible to collect information, send and receive e-mails with free access to the Internet. The feasibility experiment of the “e-Check-in”, conducted at Narita Airport, which adopted the biometrics authentication technology, that has recently been drawing a lot of attention as a part of the IT utilized for airport security, is described in this paper. This paper will verify how effective the adopted faceauthentication technology is and what was expected to be accomplished with the “e-Check-in” feasibility experiment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

The University of Saskatchewan Department of Computer Science Technical Report # 2012 - 02

Access control and authentication have become very common activities at this modern information age to ensure information security and authorized access to the information. Traditional authentication mechanisms require the users to remember secret words or phrase, or carry identification documents like passports, smart cards, etc. Biometric authentication relieves the users from the pain of rem...

متن کامل

Mouse Dynamics Biometric Technology

Different types of biometrics are currently available in the market, and are widely used in various security applications. Biometrics can be classified into two categories, “physiological biometrics” and “behavioral biometrics”. Physiological biometrics identify the user based on physiological characteristics, such as fingerprints and eye retina/iris scanning, whereas behavioral biometrics depe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003