Skip to main content

Secure Biometric Multi-Logon System Based on Current Authentication Technologies

  • Conference paper
  • 1135 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 92))

Abstract

The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.

This paper introduces a system developed to assist an average user with the host of passwords and pins that are needed for authentication. The system introduced will merge password and pin technologies with existing biometric technologies. These technologies will, in this system, interact with each other to provide optimum authentication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Secrets and Lies, digital security in a Networked world, ISBN 0-471-25311-1

    Google Scholar 

  2. von Solms, S.H., Eloff, J.H., Smith, E.: Information Security, p. 8, ISBN 1-919774-39-4

    Google Scholar 

  3. Stein, L.D.: Wen Security, A step-by-step reference guide, pp. 245–275, ISBN 0-201-63489-9

    Google Scholar 

  4. LoptCrack security system, http://www.l0phtcrack.com/

  5. http://www.scan-r.eu/modules/pages/index.php?pagenum=6

  6. The International Biometric Industry Association, http://www.ibia.org

  7. Miller, B.: Biometric consortium Listserv (August 2, 2002)

    Google Scholar 

  8. http://www.transcendusa.com/Products/ShowImg.asp?ModNo=169&vplay=yes

  9. Get started using Remote Desktop with Windows (July 25, 2006), http://www.microsoft.com/windowsxp/using/mobility/getstarted/remoteintro.mspx

  10. Whitman, M.E., Mattord, H.J.: Principles of Secure Information security, 3rd edn., pp. 382–383, 385, ISBN 978-0-8400-3116-7

    Google Scholar 

  11. Woodward, J.D., Orleans, N.M., Higgins, P.: Biometrics: Identity assurance in the information age, pp. 31–33, ISBN 0-07-222227-1

    Google Scholar 

  12. Liu, S., Silverman, M.: A Practical Guide to Biometric Security Technology. IT Pro, 27–32 (January/February 2001), IEEE 1520-9202/01

    Google Scholar 

  13. Facebook community site, http://www.facebook.com

  14. Transend security series USB Flash Drives, http://www.transcendusa.com/Products/ModDetail.asp?ModNo=169&LangNo=0&Func1No=1&Func2No=76

  15. Free Rainbow Tables, http://www.freerainbowtables.com/

  16. Banff, A.: A large-scale study of web password habits. In: Proceedings of the 16th international conference on WWWeb, pp. 657–666, ISBN:978-1-59593-654-7

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tait, B.L. (2010). Secure Biometric Multi-Logon System Based on Current Authentication Technologies. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15717-2_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15716-5

  • Online ISBN: 978-3-642-15717-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics