Advanced Search
Volume 30 Issue 1
Jan.  2011
Turn off MathJax
Article Contents
Xin Yang, Wei Jing-zhi, Li Chao, Yang Yi-xian . Research on the Telebiometric Authentication System Based on PKI and PMI[J]. Journal of Electronics & Information Technology, 2008, 30(1): 1-5. doi: 10.3724/SP.J.1146.2007.00780
Citation: Xin Yang, Wei Jing-zhi, Li Chao, Yang Yi-xian . Research on the Telebiometric Authentication System Based on PKI and PMI[J]. Journal of Electronics & Information Technology, 2008, 30(1): 1-5. doi: 10.3724/SP.J.1146.2007.00780

Research on the Telebiometric Authentication System Based on PKI and PMI

doi: 10.3724/SP.J.1146.2007.00780
  • Received Date: 2007-05-24
  • Rev Recd Date: 2007-10-08
  • Publish Date: 2008-01-19
  • The biometric technologies for user authentication have been applied widely to identity authentication fields. But at present, the result of research on a biometric authentication system which is used for open networks has not been found. Identity authentication based on X.509 Public Key Infrastructure(PKI) and Privileges Management Infrastructure(PMI) are used widely and effectively in open network fields for authentication and privileges management. So on the basement of PKI and PMI technology, with the function of identity authentication and privileges management, the currency biometric identity authentication system based on Biometric Certificate is introduced. Finally, by designing a highly secure biometric smart card which can realize identity authentication and privileges management, proved the ability and operation of the currency biometric identity authentication system based on PKI and PMI technology.
  • loading
  • National Institute of Standards and Technology. AdvancedEncryption Standard (AES).Federal Information ProcessingStandards Publication 197[S], 2001.[2]Klein D V. Foiling the cracker: a survey of, and improvementsto password security. USENIX Workshop Security , Portland,1990(2): 5-14.[3]Jain A K, Bolle R, and Pankanti S. Biometrics: personalidentification in networked society. Norwell: KluwerAcademic Publishers, 1998: 1-407.[4][4] ISO/IEC. ITU-T X.509 Information technology. Public-Keyand Attribute Certificate Frameworks[S], 2000.[5]Wayman J L. Fundamentals of biometric authenticationtechnologies[J].Int. J. Image Graph.2001, 1(1):93-113[6][6] ANSI/INCITS. ANSI/INCITS 358-2002. BioAPI SpecificationVersion 1.1[S], 2001.[7][7] ANSI. ANSI X9.84-2003.Biometric information managementand security for the financial services industry[S], 2003.[8][8] NIST. NISTIR 6529: Common Biometric Exchange FileFormat (CBEFF)[S], 2004.[9][9] ISO/IEC. ITU-T X.501|ISO/IEC 9594-2.InformationTechnology. Open Systems Interconnection [S], 2004.[10][10] ISO/IEC. ITU-T Recommendation X.680 | ISO/IEC 8824-1.Information TechnologyAbstract Syntax Notation One(ASN.1): Specification of basic Notation[S], 2002.[11]Struif B and Scheuermann D. Smart cards with biometricuser verification[J]. Multimedia and Expo, 2002. ICMEProceedings. 2002 IEEE International Conference, MaebashiCity, Japan, 2002, Vol.2: 589-592.[12]Moon Y S and Ho H C. A secure card system with biometricscapability[J]. Electrical and Computer Engineering, 1999IEEE Canadian Conference, Edmonton, Alberta, Canada,1999, Vol.1: 261-266.[13]Schuckers S A C. Spoofing and anti-spoofing measures[J].Information Security Technical Report.2002, 7(4):56-62
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3476) PDF downloads(1363) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return