Font Size: a A A

Based On The Authorization Of The Fingerprint Authentication System Design And Implementation

Posted on:2012-07-05Degree:MasterType:Thesis
Country:ChinaCandidate:X H PanFull Text:PDF
GTID:2248330371961059Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, and the increasing popularity of internet applications, network security is increasingly important. Network user identity verification technology that verifies and identifies a variety of roles on the network becomes an important research topic in the field of Internet applications. Article on the network authentication issues have been studied.Considering some of the shortcomings of the authorization mechanism based on the "password" to authenticate in the e-commerce and e-government applications, in this thesis I put forward innovative fingerprint authentication based on the license, and build a technology-based fingerprint authentication authorization system, and the verify performance of the proposed method.Fingerprint identification of users as important as true and false documents, our proposed authorization system based on fingerprint authentication technology that applies fingerprint identification as an important evidence for identifying user’s identity changed the traditional authority system that uses "password" for authenticating the existence of deficiencies.First this paper outlines the background knowledge about fingerprint authentication and the state-of-the-art related work. We then review the fingerprint recognition technology focused on analysis of the fingerprint identification system architecture and then review the main technology used for development: the lightweight J2EE framework, role-based access control, cryptography, and communication mechanisms.Next, in Chapter III, we analyze the functional non-functional requirements for building the authorization system based on fingerprint authentication tech. We then design overall framework of the system, which contains six function modules (the user information and fingerprint characteristic information collection module, user information encryption module with fingerprint features, server-side decryption module, the server-side decryption module, the user authentication information matches with the fingerprint feature matching module, the license management module), and describe the design specifications of the six modules. Chapter IV describes implementation of the proposed system. We implement the system framework by using a lightweight architecture for J2EE tech, authentication, automatic fingerprint recognition tech, and encryption tech. We then implement the private key cryptosystem using IDEA, implement public key cryptography using RSA, and authorize the use of role-based access control. Next we briefly describe the system evaluation. Last full Summary and Outlook are listed.Considering that we only test our proposed fingerprint authorization system on a small range of users (50 people), we prefer to further verify how the performance and stability of the system on the larger user range in our future work.
Keywords/Search Tags:Fingerprint feature, J2EE lightweight framework, encryption, decryption, identity authentication
PDF Full Text Request
Related items