Xin Yang, Wei Jing-zhi, Li Chao, Yang Yi-xian . Research on the Telebiometric Authentication System Based on PKI and PMI[J]. Journal of Electronics & Information Technology, 2008, 30(1): 1-5. doi: 10.3724/SP.J.1146.2007.00780
Citation:
Xin Yang, Wei Jing-zhi, Li Chao, Yang Yi-xian . Research on the Telebiometric Authentication System Based on PKI and PMI[J]. Journal of Electronics & Information Technology, 2008, 30(1): 1-5. doi: 10.3724/SP.J.1146.2007.00780
Xin Yang, Wei Jing-zhi, Li Chao, Yang Yi-xian . Research on the Telebiometric Authentication System Based on PKI and PMI[J]. Journal of Electronics & Information Technology, 2008, 30(1): 1-5. doi: 10.3724/SP.J.1146.2007.00780
Citation:
Xin Yang, Wei Jing-zhi, Li Chao, Yang Yi-xian . Research on the Telebiometric Authentication System Based on PKI and PMI[J]. Journal of Electronics & Information Technology, 2008, 30(1): 1-5. doi: 10.3724/SP.J.1146.2007.00780
The biometric technologies for user authentication have been applied widely to identity authentication fields. But at present, the result of research on a biometric authentication system which is used for open networks has not been found. Identity authentication based on X.509 Public Key Infrastructure(PKI) and Privileges Management Infrastructure(PMI) are used widely and effectively in open network fields for authentication and privileges management. So on the basement of PKI and PMI technology, with the function of identity authentication and privileges management, the currency biometric identity authentication system based on Biometric Certificate is introduced. Finally, by designing a highly secure biometric smart card which can realize identity authentication and privileges management, proved the ability and operation of the currency biometric identity authentication system based on PKI and PMI technology.
National Institute of Standards and Technology. AdvancedEncryption Standard (AES).Federal Information ProcessingStandards Publication 197[S], 2001.[2]Klein D V. Foiling the cracker: a survey of, and improvementsto password security. USENIX Workshop Security , Portland,1990(2): 5-14.[3]Jain A K, Bolle R, and Pankanti S. Biometrics: personalidentification in networked society. Norwell: KluwerAcademic Publishers, 1998: 1-407.[4][4] ISO/IEC. ITU-T X.509 Information technology. Public-Keyand Attribute Certificate Frameworks[S], 2000.[5]Wayman J L. Fundamentals of biometric authenticationtechnologies[J].Int. J. Image Graph.2001, 1(1):93-113[6][6] ANSI/INCITS. ANSI/INCITS 358-2002. BioAPI SpecificationVersion 1.1[S], 2001.[7][7] ANSI. ANSI X9.84-2003.Biometric information managementand security for the financial services industry[S], 2003.[8][8] NIST. NISTIR 6529: Common Biometric Exchange FileFormat (CBEFF)[S], 2004.[9][9] ISO/IEC. ITU-T X.501|ISO/IEC 9594-2.InformationTechnology. Open Systems Interconnection [S], 2004.[10][10] ISO/IEC. ITU-T Recommendation X.680 | ISO/IEC 8824-1.Information TechnologyAbstract Syntax Notation One(ASN.1): Specification of basic Notation[S], 2002.[11]Struif B and Scheuermann D. Smart cards with biometricuser verification[J]. Multimedia and Expo, 2002. ICMEProceedings. 2002 IEEE International Conference, MaebashiCity, Japan, 2002, Vol.2: 589-592.[12]Moon Y S and Ho H C. A secure card system with biometricscapability[J]. Electrical and Computer Engineering, 1999IEEE Canadian Conference, Edmonton, Alberta, Canada,1999, Vol.1: 261-266.[13]Schuckers S A C. Spoofing and anti-spoofing measures[J].Information Security Technical Report.2002, 7(4):56-62