首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Nowadays many systems need a portable media to store some sensible data, such as smart cards. The information can be protected by the user with his Personal Identification Number (PIN), or through biometrics. Unfortunately, there is not a smart card today that can verify the biometric template inside it, performing this task in the terminal. The author has developed the algorithms and data structures needed to solve this problem. Therefore, he has created a smart card with user biometric authentication, based on an Open Platform smart card (in this case, a JavaCard). To achieve these results, different biometric techniques have been studied: speaker verification, hand geometry and iris recognition. Experimental results are given to show the viability of the prototype developed  相似文献   

2.
Due to the great increase in Information Technology (IT) systems where user authentication is needed, security in those systems relies on using PINs or passwords. During recent years, the scientific community has been trying to improve biometric techniques to be accepted as an alternative to other user authentication schemes. One of the sectors where user identity must be verified, is the identification cards sector. In fact, if great security wants to be achieved, smart cards should be used. But cardholder verification is performed using Card Holder Verification Keys (CHV-Keys), which are PIN-based. The authors are trying to integrate fingerprint verification inside a smart card, following their works in the past. The fingerprint scheme used is shown, and the work to achieve the integration inside a commercial smart card is detailed.  相似文献   

3.
Over the past few years, the authors have tried to integrate biometrics into a smart card. In this paper, to improve error rates obtained with hand geometry biometrics and the costs with the iris recognition system, fingerprints are used. This technique, quite well known in the industry and deeply studied for the last century, has improved its electronic sensors, pulling down prices and, therefore, enabling its use in many more applications. The first step, as in every biometric system, is to obtain an image of the user's fingerprint. After this, a pre-processing algorithm is applied, which enables feature extraction to obtain the location and type of all minutiae, i.e., the discontinuities in the ridges and valleys of the fingerprint. Due to the fact that it is not possible to always catch the same number of minutiae, a special matching algorithm should be applied to compare the feature vector with the corresponding user's template. Efforts to integrate this matching algorithm in a low computer power device, such as a smart card, are given, showing the paths that should be followed in order to improve the security of access control and payment systems available today.  相似文献   

4.
A biometric identification system, based on the processing of the human iris by the dyadic wavelet transform, has been introduced. The procedure to obtain an iris signature of 256 bits has been described, as well as the feature extraction block and the verification system. The results have shown that the system can achieve high rates of security.  相似文献   

5.
伴随智能卡EMV迁移,使用智能卡进行交易日趋频繁,应用系统对数据交换提出了高安全要求,特别是对称密钥导入和导出的安全.基于RSA数字信封体系的应用很好的解决了对称密钥的安全性问题,可以有效的防止对称密钥在导入或者导出过程中被窃取.  相似文献   

6.
为满足复杂战场态势下机载数据的安全性需求,需要建立对航空数据存储卡毁钥能力有效评价的方法。 建立航空数据存储卡毁钥能力有效性评价的目的是保证航空装备信息安全的重要措施,是科学、准确评价毁钥 设计是否满足需求的重要手段,是航空装备定型列装前必要的信息安全测评过程。通过对航空数据存储卡的典 型结构和硬件毁钥原理进行分析,对毁钥后电学、物理和化学等技术手段进行深入的研究,提出一种针对航空 数据存储卡毁钥能力的评价方法,从数据存储卡读取能力和存储介质损毁状态两个过程对毁钥效果开展评价, 从而规范了当前测评机构对数据存储卡毁钥能力评价过程中无统一方法的现状。本文利用该评价方法对某样品 航空数据存储卡经硬件毁钥试验后开展毁钥效果分析,验证方法的有效性。航空数据存储卡毁钥能力评价方法 可以很好的评估毁钥设计的效果,确保机载数据的安全。  相似文献   

7.
IriScan Inc. has been developing an identification/verification system capable of positively identifying and verifying the identity of individuals without physical contact or human intervention. A new technology, using the unique patterns of the human iris, shows promise of overcoming previous shortcomings and providing positive identification of an individual without contact or invasion, at extremely high confidence levels. The video-based system locates the eye and iris; evaluates the degree of occlusion by eyelid and spectral reflection; determines the quality of image focus; and determines the center and boundary of the pupil and the limbus (outer edge of the iris) for processing. The iris is zoned, and the features therein measured and encoded into a 256-byte (2048 bit) IrisCode for enrollment or identification. The presented biometric is compared to an extensive database for identification, or to a referenced IrisCode for verification. Computations and decisions are accomplished at extremely high rates of speed, resulting in processing times of less than two seconds. The process is based on the unique nature and extreme richness of the human iris. The multiple features produce a non-duplicable organ with more than 400 degrees of freedom, or measurable variables. The IriScan process typically uses about 200 of these to create a code which can be compared to an entire database in milliseconds, producing a positive identification with “imposter odds” as high as 1 in 1034  相似文献   

8.
Safe, reliable, and low cost space-based navigation is being provided with embedded INS/GPS systems such as the space integrated GPS/INS (SIGI). The SIGI is being used for various space vehicle applications such as launch vehicles, orbital vehicles, and re-entry vehicles. This paper describes current space vehicle navigation capabilities. The SIGI is being enhanced to provide additions to these existing capabilities with such items as higher processing and a commercial-off-the-shelf operating system. This will allow hosting of various software applications such as advanced navigation functions, flight control, guidance and vehicle management algorithms. The SIGI can host redundancy management functions by incorporating a cross channel data link card (CCDL) using a high speed firewire bus. The SIGI can then be used as a redundancy management platform which has application to current space vehicle avionics topologies incorporating distributed processing architectures  相似文献   

9.
介绍了基于FPGA设计并实现了一种雷达信号模拟、采集与处理的系统。系统主要由计算机和带有双路高速A/D和双路高速D/A的信号处理卡组成。信号处理卡以FPGA为核心控制与处理芯片,主要完成雷达信号模拟、雷达信号处理和雷达信号采集等功能,与计算机通讯使用USB2.0接口,采用数据抽取、坐标查表映射和DirectDraw等技术在计算机显示器上以P显和A显方式进行实时显示。该系统提供在线配置功能,用户可通过USB接口对FPGA程序进行配置或升级,无须专用配置芯片,简化了电路板设计,提高了系统的灵活性。  相似文献   

10.
打击恐怖主义首先要预防恐怖分子,生物识别技术有助于将恐怖分子从人群中识别出来.耳朵是长期保持稳定的一个生物特征,并且耳朵的独特性十分明显.介绍了耳朵识别系统的系统功能和设计思路,采用VC 6.0和SQL SERVER 2000数据库,实现耳朵图像数据采集、图像预处理、图像存储等基本功能.  相似文献   

11.
微小型数据采集系统一般是基于微控制器进行设计的,存储设备主要为SD卡,由于微控制器资源有限,因此很难在保证微小型数据采集系统较高采集速度的同时保证采集系统的可靠性.针对该问题,本文分析了影响数据采集系统采集速率及可靠性的主要影响因素,推导了DMA缓冲区设置大小与数据采集系统采集速率及可靠性之间的模型,并设计了数据采集系统主要参数标定与验证试验.试验结果表明,本文提出的数据采集系统设计方法合理、可根据数据采集处理器内存大小、SD卡文件系统性能指标设计数据采集系统,确保数据采集系统的可靠性,对提高系统设计效率、降低微小型数据采集系统的设计成本以及后续改进完善数据采集系统奠定了重要的理论基础.  相似文献   

12.
随着无人化智能移动装备在工业、交通等安全敏感领域的普及应用,民用导航定位系统中的定位安全问题日益突出。位置认证是对终端的物理位置声明进行认证的过程,是导航定位安全技术的重要组成部分。基于第五代(5G)移动通信网络的通导融合位置认证系统具有覆盖范围广、认证精度高、用户容量大、建设运维成本低等多重优势。本文首先介绍了多基站位置认证系统的检测判决原理,提出了漏检平均距离的定义作为位置认证系统精度的量化评价指标。在此基础上,通过数值仿真分析了信号带宽、基站同步误差、信噪比对位置认证系统精度的影响,并利用5G信道模型评估了典型场景下的位置认证系统的性能。结果表明,在具备3个以上的视距基站时,基于5G的通导融合位置认证系统可以实现米级的位置认证精度。  相似文献   

13.
随着无人化智能移动装备在工业、交通等安全敏感领域的普及应用,民用导航定位系统中的定位安全问题日益突出。位置认证是对终端的物理位置声明进行认证的过程,是导航定位安全技术的重要组成部分。基于第五代(5G)移动通信网络的通导融合位置认证系统具有覆盖范围广、认证精度高、用户容量大、建设运维成本低等多重优势。本文首先介绍了多基站位置认证系统的检测判决原理,提出了漏检平均距离的定义作为位置认证系统精度的量化评价指标。在此基础上,通过数值仿真分析了信号带宽、基站同步误差、信噪比对位置认证系统精度的影响,并利用5G信道模型评估了典型场景下的位置认证系统的性能。结果表明,在具备3个以上的视距基站时,基于5G的通导融合位置认证系统可以实现米级的位置认证精度。  相似文献   

14.
When considering biometrics for a Personal Identification System, different modalities can be considered. The final selection will depend on specific application requirements. From the several modalities existing nowadays, vascular systems have appeared on the scene lately. Vein-based identification is claimed to be as reliable as fingerprint or iris identification, but with the usability of hand geometry or even the face. As with any other biometric modalities, vascular solutions have to be deeply analyzed for all relevant factors that could affect their performance or the security level achieved. This will show the analysis of the performance and security achieved by a commercial vascular biometric system, when being applied in several real-world scenarios. These scenarios will cover typical office environments to the more extreme environments, such as extreme light and temperatures, as those suffered in a banking ATM, or with high humidity such as in a gym. The results will show the strengths of this modality, as well as those points where further improvements are needed.  相似文献   

15.
基于JAVA技术的校园“一卡通”管理系统   总被引:4,自引:0,他引:4  
通过分析智能卡的特点,介绍我于JAVA技术构建的"校园一卡通"管理系统的系统分析、系统设计和系统实现,并重点介绍了智能卡商务交易问题的解决方法--电子钱包的基本架构和实现过程.  相似文献   

16.
This work evaluated the performance of a commercially available face recognition algorithm for the verification of an individual's identity pertaining to three enrollment illumination levels. Existing facial recognition technology from still or video sources is becoming a practical tool for law enforcement, security, and counter-terrorist applications despite the limitations of the current technology. At this time, facial recognition has been implemented in limited applications, but has not been exhaustively studied in adverse conditions, which has initiated continuing study aimed at improving algorithms to compare images or representations of images to recognize a suspect (Paul, 2002). Moreover, this evaluation examined the influence of variations in illumination levels on the performance of a face recognition algorithm, specifically testing the significance between verification attempts and enrollment conditions with respect to factors of age, gender, ethnicity, facial characteristics, and facial obstructions. The results of this evaluation showed that for low and medium illuminance enrollments, there was a statistically significant difference between verification attempts made at low, medium, and high illuminance. However, for the high illuminance enrollment, there was no statistically significant difference between verification attempts made at low, medium, or high illuminance. Furthermore, this evaluation showed that the enrollment illumination level is a better indicator of the verification rate than the verification illumination level.  相似文献   

17.
It has always been claimed that smart cards provide a really high level of security, considering them as a tamper-proof device, with the possibility to auto-block some or all of the services it provides. Unfortunately, nowadays some hackers appear to have demonstrated the lack of security involved in some applications where Integrated Circuit Cards (ICC) have been used. This has led to the opinion that smart cards are not secure enough, and their security is only in the minds of the commercial companies involved with the technology. In this paper, the author explains the reasons why this hacking has succeeded. For example, sometimes memory cards have been used instead of smart cards, or very old smart cards have been issued and not renewed, or the development team involved has not used basic security techniques, such as diversified keys. The author also gives clues to achieve a high level of security depending on the final application, and the environment in which it is going to be used  相似文献   

18.
设计了一个基于ARMCortex—M3和USB接口的智能卡读卡器系统,采用具有ARMCortex—M3内核的STM32F103R6T6等芯片进行相关的硬件设计;分别使用Keil和VisualC++6.0进行固件程序和驱动程序开发,实现了计算机与智能卡的准确、高效通信。同时,通过设计测试程序对系统的功能和性能进行测试,证明其有效性。  相似文献   

19.
军用飞机的航空电子系统在飞机飞行过程中所产生和使用的飞行数据因没有相应的保护措施,在某些情况下往往容易被窃取,甚至在危急时只能以毁掉数据存储卡里珍贵的数据为代价来保密。本文分析了几种密码算法的原理及其脆弱性,提出了一种综合运用对称密码技术和非对称密码技术来对飞行数据进行加密的设计方法。  相似文献   

20.
小球型五孔探针在压气机试验中的应用   总被引:2,自引:1,他引:1  
闫久坤  吴昌明 《航空动力学报》1991,6(4):352-354,378
气流在叶片机中的实际流动过程极其复杂,必须利用各种测试手段来了解叶片机级间三元流场。本文介绍一种小球型五孔探针测量系统用于压气机级间参数测量的结果。该系统具有一些突出的特点。其一是探针头部尺寸小,对气流的干扰小;其二是数据处理手段先进,探针校准程序及测量结果的处理程序比较成熟。实践证明,其测试结果与常规探针所测得的结果非常接近,重复性较好。由测量结果整理出的压气机性能参数与设计值也比较接近。   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号