Identity authentication technology based on fingerprint recognition in CSCW

Author(s):  
Nan Zhang ◽  
Zhi-min Yang
2011 ◽  
Vol 63-64 ◽  
pp. 21-24
Author(s):  
You Chan Zhu ◽  
Xiao Fang Zhang

As the development of network the grid will be widely used. To choose a suitable authentication mechanism in a large grid is very important. Identity authentication is one of the important mechanisms that can achieve grid security. It is the first line in the grid applications. It is also a portal in the security system. In the light of the advantages and disadvantages of PKI and ID-PKI, this paper provides a new technology. Presently, PKI and ID-PKI authentication technology is a popular authentication technology. This technology uses the identity certification to reduce the overhead in the domain, and uses CA authentication between domains to guarantee the security of the system.


2015 ◽  
Vol 738-739 ◽  
pp. 1323-1327 ◽  
Author(s):  
Jun Ke Song ◽  
Xian Zhong Liu

Rapid development of information technology in education not only leads to great changes in the field of education, but also results in some security risks. How to ensure the safety of teaching resources has become a hot topic in current research in the teaching system with the cloud-terminal integrated digital classroom as scene. In the paper, importance of identity authentication mechanism is proposed by analyzing defects of cloud computing firstly, multiple identity authentication technologies are adopted for privacy protection of data. Features of four technologies, password authentication, smart card authentication, USB key authentication and biometric authentication, are analyzed in details. A set of multiple identity authentication system is designed and realized. The system is designed in Detailed system architecture is designed in the system for improving dynamic password technology and fingerprint recognition technology for ensuring data operation of legitimate users. Mobile terminals should be combined as example, and actual test can be conducted aiming at account recovery, remote data destruction and other demand after unexpected loss of smart terminal equipment. The result shows that the system can ensure accuracy and reliability of account and hardware equipment with excellent test effect.


2011 ◽  
Vol 135-136 ◽  
pp. 739-742
Author(s):  
Jin Hai Zhang

Fingerprint recognition has wide application prospect in all fields which contain identity authentication. Construction of accurate and reliable,safe and Practical automatic fingerprint identification system(AFIS) has become researc hotspot. Although theoretical research and application developmen of AFIS have got a significant Progress,accuracy of the algorithm and proeessing speeds till need to be improved. In this paper, fingerprint image preprocessing algorithms,fingerprint singular Points and minutiae extraction algorithm and fingerprint matching algorithm are analyzed and discussed in detail.


Sign in / Sign up

Export Citation Format

Share Document