Using biometric data to protect information

K. N. Vlasov, O. V. Tolstykh, O. V. Isaev
{"title":"Using biometric data to protect information","authors":"K. N. Vlasov, O. V. Tolstykh, O. V. Isaev","doi":"10.21822/2073-6185-2023-50-3-46-56","DOIUrl":null,"url":null,"abstract":"Objective . An urgent task is to evaluate the system for protecting access to information while minimizing errors, based on the use of human biometric data. It is necessary to evaluate and compare methods and solutions of biometric authentication, and the possibility of combining them. Method . The method for assessing and comparing biometric authentication methods and solutions is based on practical experience and regulatory and technical documentation on the use of biometric data for information security purposes. It is necessary to complicate the possibility of unauthorized access to information. At the same time, improving the system should not worsen the comfort of a legitimate user when trying to access. The remaining tasks are to reduce entry time and simplify the system. Result . An assessment of biometric authentication methods and solutions was carried out and a solution was proposed for the development of biometric authentication systems to protect against unauthorized access, the key criteria in which were the complexity of hacking, user comfort, login time and simplification of the system. Conclusion . The optimal solution in the development of biometric authentication systems would be to use multi-factor authentication using dynamic parameters of the access subject. A modern biometric authentication system should be installed taking into account the level of security required at the time.","PeriodicalId":31714,"journal":{"name":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","volume":"36 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vestnik Dagestanskogo Gosudarstvennogo Tehniceskogo Universiteta Tehniceskie Nauki","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21822/2073-6185-2023-50-3-46-56","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Objective . An urgent task is to evaluate the system for protecting access to information while minimizing errors, based on the use of human biometric data. It is necessary to evaluate and compare methods and solutions of biometric authentication, and the possibility of combining them. Method . The method for assessing and comparing biometric authentication methods and solutions is based on practical experience and regulatory and technical documentation on the use of biometric data for information security purposes. It is necessary to complicate the possibility of unauthorized access to information. At the same time, improving the system should not worsen the comfort of a legitimate user when trying to access. The remaining tasks are to reduce entry time and simplify the system. Result . An assessment of biometric authentication methods and solutions was carried out and a solution was proposed for the development of biometric authentication systems to protect against unauthorized access, the key criteria in which were the complexity of hacking, user comfort, login time and simplification of the system. Conclusion . The optimal solution in the development of biometric authentication systems would be to use multi-factor authentication using dynamic parameters of the access subject. A modern biometric authentication system should be installed taking into account the level of security required at the time.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用生物特征数据保护信息
目标。一项紧迫的任务是评估基于人类生物特征数据的使用,在保护信息获取的同时最大限度地减少错误的系统。有必要评估和比较生物识别认证的方法和解决方案,以及它们组合的可能性。方法。评估和比较生物识别认证方法和解决方案的方法是基于实践经验以及为信息安全目的使用生物识别数据的法规和技术文件。有必要使未经授权访问信息的可能性复杂化。与此同时,改进系统不应降低合法用户尝试访问时的舒适度。剩下的任务是减少输入时间和简化系统。结果。对生物识别认证方法和解决方案进行了评估,并提出了一种开发生物识别认证系统的解决方案,以防止未经授权的访问,其关键标准是黑客的复杂性,用户舒适性,登录时间和系统的简化。结论。开发生物特征认证系统的最佳方案是利用访问主体的动态参数进行多因素认证。考虑到当时需要的安全级别,应该安装现代生物识别认证系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
59
审稿时长
8 weeks
期刊最新文献
Adaptive Earthquake-resistant Systems Automated Control Systems in Greenhouses Technologies and materials for repair, restoration and restoration of historical and cultural monuments Algorithmization for calculating the security assessment of AIS operating systems of internal affairs bodies, developed on the basis of an analysis of security requirements GOST R ISO/IEC 15408 and possible threats Research and development of data compression methods for technical monitoring systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1