Font Size: a A A

The Scenario And Application Of Fingerprint Authentication With Electronic Request-Authorization System In Traffic Business

Posted on:2007-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:C LiangFull Text:PDF
GTID:2178360185994439Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Identification technology is an important sector in computer network security .It is the first safety - pass for the whole network and the information systems, and the basis for access controlling .It also confirm its authorized user with the system information. The means of user authentication varies many, such as password, smart card, cryptography and biometric character. Nowadays, with the development of the computer science and network technology, Bio-Authentication attracts more and more eye-balls. Biometrics is a kind of science of verifying identity through individual characteristics or physical characteristics or behavioral characteristics. With its enormous advantages, it can enhance the security of network dramatically. Identification attestation based on Fingerprint has so many advantages such as low-cost, high rates of identification, mature recognition technology and effective way to solve user authentication, we believe its outlook can be widely. The governments are building their informational system urgently. The question now is how effectively apply fingerprint identification technology to the enterprise network system.In the Inspect-Collect system of the Traffic Department business, the correct and effective authentication directly relates to the security and the reliability of the whole system. The traditional username– password method is easy to forget or illegally broken, but the fingerprint authentication technology has the uniqueness and the invariability, it is the simplest and most effective till present. We can safely say it is a hotspot in computer science research field due to its convenience, quickness and reliability. This...
Keywords/Search Tags:Identification Attestation, Fingerprint authentication, Traffic, Inspect-collect, Request authorization
PDF Full Text Request
Related items