Real identity authentication

作者: Janarthanan Senthurpandi

DOI:

关键词:

摘要: A real identity biometric authentication device includes a USB thumb drive form factor, with sensor and designated processor stored instructions in firmware which perform secure manner, independent of processing storage resources on host platform. The process require data are secured against effects malware or other security risks presented by applications running the During an enrollment process, unique encrypted token is created using uploaded securely to server. downloaded decrypted device. obtained from compared live, real-time user, for example, fingerprint scan. If enrolled, match, user authenticated.

参考文章(10)
Roger Cattin-Liebl, Lorenz Müller, Alain Rollier, Marcel Jacomet, Security token and method for authentication of a user with the security token ,(2006)
Robert A. Sartini, Paul T. Schultz, Mark J. Hahn, Identity management and single sign-on in a heterogeneous composite service scenario ,(2010)
Kenneth W. Aull, James B. Rekas, William Gravell, Secure local or remote biometric(s) identity and privilege (BIOTOKEN) ,(2005)
Brent A. Lowensohn, William J. Woodmancy, Richard C. Grosser, David A. Bellenger, David L. Thompson, Jimmy E. Braun, Steven R. Pomerantz, Portable wireless access to computer-based systems ,(2002)
Jonathan Simon Black, Steven James Birnie, Shaun McWhinnie, Using biometric tokens to pre-stage and complete transactions ,(2006)