Abstract
The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.
This paper introduces a system developed to assist an average user with the host of passwords and pins that are needed for authentication. The system introduced will merge password and pin technologies with existing biometric technologies. These technologies will, in this system, interact with each other to provide optimum authentication.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Secrets and Lies, digital security in a Networked world, ISBN 0-471-25311-1
von Solms, S.H., Eloff, J.H., Smith, E.: Information Security, p. 8, ISBN 1-919774-39-4
Stein, L.D.: Wen Security, A step-by-step reference guide, pp. 245–275, ISBN 0-201-63489-9
LoptCrack security system, http://www.l0phtcrack.com/
The International Biometric Industry Association, http://www.ibia.org
Miller, B.: Biometric consortium Listserv (August 2, 2002)
http://www.transcendusa.com/Products/ShowImg.asp?ModNo=169&vplay=yes
Get started using Remote Desktop with Windows (July 25, 2006), http://www.microsoft.com/windowsxp/using/mobility/getstarted/remoteintro.mspx
Whitman, M.E., Mattord, H.J.: Principles of Secure Information security, 3rd edn., pp. 382–383, 385, ISBN 978-0-8400-3116-7
Woodward, J.D., Orleans, N.M., Higgins, P.: Biometrics: Identity assurance in the information age, pp. 31–33, ISBN 0-07-222227-1
Liu, S., Silverman, M.: A Practical Guide to Biometric Security Technology. IT Pro, 27–32 (January/February 2001), IEEE 1520-9202/01
Facebook community site, http://www.facebook.com
Transend security series USB Flash Drives, http://www.transcendusa.com/Products/ModDetail.asp?ModNo=169&LangNo=0&Func1No=1&Func2No=76
Free Rainbow Tables, http://www.freerainbowtables.com/
Banff, A.: A large-scale study of web password habits. In: Proceedings of the 16th international conference on WWWeb, pp. 657–666, ISBN:978-1-59593-654-7
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tait, B.L. (2010). Secure Biometric Multi-Logon System Based on Current Authentication Technologies. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-15717-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15716-5
Online ISBN: 978-3-642-15717-2
eBook Packages: Computer ScienceComputer Science (R0)