A Secure Mechanism for Network Authentication Combining Hand Shapes Verification and Encryption

B He,ZD Qiu,DM Sun
DOI: https://doi.org/10.1109/icosp.2002.1180164
2002-01-01
Abstract:With the rapid growth of information technologies, biometrics is being used more and more widely in applications for accessing databases or business systems. These applications need to implement measures to counter threats to security. In the case of authentication through an open network, such as non-face-to-face trading, cryptography techniques are adopted (public key cryptography and digital signature) to avoid unauthorized use of the biometric information and guarantee the integrity of data. This paper presents a trusted third party authentication architecture in which hand shape verification techniques and cryptography techniques are combined. We have developed a prototype system in which the system is applied to a network-based workflow. Initial evaluation of the prototype system is encouraging. Similar techniques can be used to authenticate people for more flexible application.
What problem does this paper attempt to address?