Biometric Authentication in Infrastructure Security

  • Authors:
  • John Armington;Purdy Ho;Paul Koznek;Richard Martinez

  • Affiliations:
  • -;-;-;-

  • Venue:
  • InfraSec '02 Proceedings of the International Conference on Infrastructure Security
  • Year:
  • 2002

Quantified Score

Hi-index 0.02

Visualization

Abstract

This paper will identify and recommend biometric technologies that provide strong authentication, convenient usability, and versatility, in order to meet the demand of enterprise infrastructure security systems. We aim at validating suitability for one or more mainstream applications. Finger scan technology is mature and widely available. The combination of a finger scan and smart card gives true dual-factor authentication that provides a greater degree of security and simplifies authentication for end users while preserving privacy. Speaker Verification is the most natural biometric technology to use with voice-based systems. It takes advantage of the ubiquitous voice-grade telephone channel. The combination of speaker verification and token technology can provide convenient and secure access to voice portal applications. We also discuss cultural, legal, and privacy issues based on religious objections, health concerns, legal restrictions, and regulations on the use of biometric technology.