首页> 外文期刊>International Journal of Integrated Engineering >Security Features in Fingerprint Biometric System
【24h】

Security Features in Fingerprint Biometric System

机译:指纹生物识别系统中的安全功能

获取原文
获取外文期刊封面目录资料

摘要

Nowadays, embedded systems run in every setting all around the globe. Recent advances in technology have created many sophisticated applications rich with functionality we have never seen. Nonetheless, security and privacy were a common issue for these systems, whether or not sensitive data can be protected from malicious attacks. These concerns are justified on the grounds that the past of security breaches and the resulting consequences narrate horrific stories concerning embedded systems. The attacks are now evolving, becoming more complex with technological advancements. Therefore, a new way of implementing security in embedded systems must be pursued. This paper attempts to demonstrate the incorporation of security features in fingerprint biometric system in the requirements analysis phase, ensuring the same throughout the system life cycle of embedded systems based on case study. The comparison of various biometric technologies such as face, fingerprint, iris, palm print, hand geometry gait, signature, and keystroke is presented. The aim of this paper includes analyzing, decomposing and transforming the threats and counter-measures identified during the requirements analysis using the abuse case into more specific safety requirements or functions. Furthermore, we have shown that the incorporation of security features into the biometric fingerprint system by analyzing the requirements of the system and providing the main steps for the protection of the biometric system in this paper.
机译:如今,嵌入式系统在全球各地的每个设置中运行。最近的技术进步创造了丰富的富有功能的复杂应用程序,我们从未见过。尽管如此,安全性和隐私是这些系统的常见问题,是否可以保护敏感数据免受恶意攻击。这些担忧是依据安全漏洞的过去和由此产生的后果叙述了有关嵌入式系统的可怕故事。攻击现在正在发展,与技术进步变得更加复杂。因此,必须追求在嵌入式系统中实现安全性的新方法。本文试图在要求分析阶段,在指纹生物识别系统中展示在指纹生物识别系统中的安全性,确保基于案例研究的嵌入式系统的整个系统生命周期中的相同。提供了各种生物识别技术的比较,如面部,指纹,虹膜,手掌打印,手几何步态,签名和击键。本文的目的包括使用滥用案例进入更具体的安全要求或功能,分析,分解和转换所识别的威胁和反击措施。此外,我们已经表明,通过分析系统的要求并提供本文保护生物识别系统的主要步骤,通过分析系统的主要步骤并将安全功能纳入生物指纹系统。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号