R. Sánchez-Reillo, A. Vazquez-Navarro, J. Liu-Jimenez
{"title":"Tamper-proof operating system for biometric ID tokens","authors":"R. Sánchez-Reillo, A. Vazquez-Navarro, J. Liu-Jimenez","doi":"10.1109/CCST.2005.1594848","DOIUrl":null,"url":null,"abstract":"In many applications there is the need of authenticate the user of a service in an automatic way. If this is done under a distributed architecture, the need of each user to have an ID token arises. Improving security and usage through biometrics, forces some requirements in the token, such as being a tamperproof device and being able to perform some processing task. Previous works by the authors have shown the architecture needed for developing these tokens. In this paper, authors describe the operating system running inside the token, to allow the above mentioned functionalities. Details about the data structures, security architecture and commands used are given, as well as results in implementing this biometric identification token operating system (BTTOS) under a low cost DSP.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594848","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In many applications there is the need of authenticate the user of a service in an automatic way. If this is done under a distributed architecture, the need of each user to have an ID token arises. Improving security and usage through biometrics, forces some requirements in the token, such as being a tamperproof device and being able to perform some processing task. Previous works by the authors have shown the architecture needed for developing these tokens. In this paper, authors describe the operating system running inside the token, to allow the above mentioned functionalities. Details about the data structures, security architecture and commands used are given, as well as results in implementing this biometric identification token operating system (BTTOS) under a low cost DSP.