Abstract
Biometric Authentication Systems face several problems related to the security and the users’ potential rejection. Most of those problems comes from the high sensitivity of biometric data (whose manipulation could damage the system security or the users’ privacy), and the feeling of governmental control when central databases are used. The authors have been working in providing solutions to these problems, by promoting the idea of using tokens that could perform the biometric verification internally, not allowing the template to travel through communication lines, nor the memory of an open terminal. To achieve this, a general architecture, based on a set of requirements previously defined, will be outlined. At the end, directives for the implementation of such an architecture using smartcards and USB-Tokens will be given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Campbell Jr., J.P.: Speaker Recognition: A Tutorial. Proceedings of the IEEE 85(9), 1437–1462 (1997)
Daugman, J.G.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Trans. on Pattern Analysis and Machine Intelligence 15(11), 1148–1161 (1993)
Maio, D., Maltoni, D.: Direct Gray-Scale Minutiae Detection in Fingerprints. IEEE Trans. on Pattern Analysis and Machine Intelligence 19(1) (January 1997)
Jain, A.K., Hong, L., Pankanti, S., Bolle, R.: An Identity-Authentication System Using Fingerprints. Proceedings of the IEEEÂ 85(9) (September 1997)
Jain, A.K., Bolle, R., Pankanti, S., et al.: Biometrics: Personal Identificacion in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)
Reynolds, D.A., Rose, R.C.: Robust Text-Independent Speaker Identification Using Gaus-sian Mixture Speaker Models. IEEE Trans. on Speech and Audio Processing 3(1), 72–83 (1995)
Sanchez-Reillo, R., Gonzalez-Marcos, A.: Access Control System with Hand Geometry Verification and Smart Cards. In: Proc. 33rd Annual 1999 International Carnahan Conference on Security Technology, Madrid, Spain, October 5-7, pp. 485–487 (1999)
Sanchez-Reillo, R., Sanchez-Avila, C., Gonzalez-Marcos, A.: Biometric Identification through Hand Geometry Measurements. IEEE Trans. on Pattern Analysis and Machine Intelligence 22(10), 1168–1171 (2000)
Sanchez-Reillo, R.: Securing Information and Operations in a Smart Card through Biometrics. In: Proc. 34rd Annual 2000 International Carnahan Conference on Security Technology, Ottawa, Canada, October 23-25, pp. 52–55 (2000)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1995)
Sun Microsystems, Inc., http://java.sun.com/products/javacard
Zoreda, J.L., Oton, J.M.: Smart Cards. Artech House, Norwood (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sanchez-Reillo, R., Liu-Jimenez, J., Entrena, L. (2004). Architectures for Biometric Match-on-Token Solutions. In: Maltoni, D., Jain, A.K. (eds) Biometric Authentication. BioAW 2004. Lecture Notes in Computer Science, vol 3087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25976-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-25976-3_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22499-0
Online ISBN: 978-3-540-25976-3
eBook Packages: Springer Book Archive