期刊文献+

基于指纹识别的网络授权系统 被引量:2

Network authorization system based on fingerprint authentication
下载PDF
导出
摘要 随着以电子商务为典型的互联网应用的迅猛发展,网络安全问题越来越受到人们的重视。其中,如何通过网络授权来保障网络资源的安全已成为目前的一个研究热点。当前主流方案采用的是基于非对称加密的公众密钥系统(Public Key Infrastructure)。该系统下用户私有密钥需要由用户自己存储保管,存在一定的丢失、被盗风险。为了解决这一问题,本文提出了一种融合自动指纹认证与PKI技术的新型网络授权机制。相比于传统的PKI机制,新系统利用易采集的人体指纹信息不仅提高了认证授权过程的便捷性,也增强了授权系统的整体安全性。 With the development of extensive Internet applications represented by electronic business, the network security problem has raised more and more attentions. Specifically, network authorization system which aims at safeguarding network resources has been a research focus. Present solutions mainly adopt Public Key Infrastructure (PKI) based on asymmetric cryptographic algorithms. In such systems, users have to storage and protect their own private keys and suffer the risks of loosing them. In allusion to this problem, this paper proposes a new network authorization system which combines automatic fingerprint authentication and the existing PKI mechanism. Compared with the traditional PKI, the new system can not only simplify the authorization process, but also improve the security level by exploiting the easy-accessible human fingerprints.
作者 肖倩 敖欣
出处 《电子设计工程》 2014年第7期128-131,共4页 Electronic Design Engineering
基金 国家自然科学基金资助项目(61170216)
关键词 指纹识别 身份认证 网络授权 公钥密码基础设施 fingerprint recognition authentication network authorization PKI
  • 相关文献

参考文献8

二级参考文献36

  • 1张海军,穆志纯,张成阳.基于ICA和BP神经网络的人耳图像识别[J].北京科技大学学报,2006,28(6):600-603. 被引量:6
  • 2苑玮琦,徐露,林忠华.一种新的基于结构特征的虹膜识别算法[J].光电子.激光,2006,17(10):1250-1254. 被引量:10
  • 3王向军,王研,李智.基于特征角点的目标跟踪和快速识别算法研究[J].光学学报,2007,27(2):360-364. 被引量:48
  • 4贾玮.图像中人脸检测定位的方法研究[硕士学位论文].北京:清华大学自动化系,1996..
  • 5lannarelli A. Ear identification[M]. Forensic Identification Series. Paramont Publishing Company,Frernont,Oalifomia,]989.
  • 6Victor B,Bowyer K,Sarkar S. An evaluation of faoe and ear biernetrics[A]. Proceedings of ICPR 2002[C]. 2002:429-432.
  • 7Burge M,Burger W. Ear biometrics in computer vision[A]. International Conference on Pattern Recognition[C]. 2000:822-826.
  • 8Moreno B,Sanchez A.On the use of outer ear images for personal identification in security applications[C]. IEEE 33rd Annual Intl. Conf. on Securitv Techology ,Madrid 3999:469-476.
  • 9MU Zhi-chun,LI Yuan,XU Zheng-guang. Shape and structural feature based ear recognition[C]. Sinobiometrics 2004, LNCS 3338: 633- 670.
  • 10Michal Choras. Ear biometrics based on geometrical feature extraction [J]. Electronic Letters on Computer Vision and Image Analysis 2005, 5(3):84-95.

共引文献599

同被引文献6

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部