Font Size: a A A

The Design And Implementation Of A Hybrid Personal Identity Authentication System

Posted on:2007-02-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z J WangFull Text:PDF
GTID:2178360182490456Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Personal identity authentication is a key part in information security architecture and also the premise of the integral information security. Traditionally the way to verify a person's identity is based on what he or she knows (e.g., a password) or what he or she possesses (e.g., an ID card). These methods have been well applied because their implementation is simple and can be achieved at low costs. The shortcomings of traditional methods include inadequate security performance and some discomfort in use. Biometrics, which emerged in recent years, confirms or determines the identity of individuals by measuring their unique physiological and/or behavioral characteristics, and has the advantage of high security performance and simple authentication process. However, Biometrics has its own limitations such as recognition performance, the permanence of physiological characteristics, the social acceptance and privacy issues.In this dissertation, we purposed the idea of constructing a hybrid identity authentication system by using multiple identity authentication manners, which took effort to combine the advantages of both traditional authentication methods and biometrics and to overcome their respective weaknesses. One of the key issues of constructing a hybrid identity authentication system is the design of the authentication strategy, a barrier model was purposed which can be used in the design of the security strategy of a hybrid identity authentication, and this model has the universal guidance value of the design of the above strategy. This model also possesses the characteristic of versatile combination of authentication manners and can achieve flexible authentication safety rank. Finally, a prototype authentication system for Auto Teller Machine (ATM) was developed based on face and speaker recognition as well as traditional password way to verify our idea and strategy. This system has versatile usability, can achieve flexible safety rank and restrain illegal access.
Keywords/Search Tags:hybrid identity verification, barrier model, biometric recognition, face recognition, speaker recognition, ATM
PDF Full Text Request
Related items