Biometric Handshake Protocol on Telebiometric System Mechanism for National Infrastructure

The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Yong-Nyuo Shin, Yong-Jun Lee, Woochang Shin, Jin-Young Choi
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 60
container_issue
container_start_page 57
container_title
container_volume
creator Yong-Nyuo Shin
Yong-Jun Lee
Woochang Shin
Jin-Young Choi
description The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing biometric handshake protocols and biometric transfer protocols through the extension of TLS (transport layer security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.
doi_str_mv 10.1109/ISA.2008.24
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4511534</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4511534</ieee_id><sourcerecordid>4511534</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-df982b67b8d4f8356204b9807c4ee367c93b6cd99458a2a1c1128c33be81b2d43</originalsourceid><addsrcrecordid>eNo9j0tLAzEYRQNSUGtXLt3kD3TMa_JY1qK2UB_QunFTksw3NDozkSRd9N93QPFu7uIeLhyEbimpKCXmfr1dVIwQXTFxgWZGaaKkqTllUk3Q9bgoI7hk-hLNcv4iY4SouWBX6PMhxB5KCh6v7NDkg_0G_J5iiT52OA54Bx24f2Z7ygV6_AL-YIeQe9zGhF9tCXGwHV4PbbK5pKMvxwQ3aNLaLsPsr6fo4-lxt1zNN2_P6-ViMw9U1WXetEYzJ5XTjWg1ryUjwpnRwAsALpU33EnfGCNqbZmlnlKmPecONHWsEXyK7n5_AwDsf1LobTrtRU3pqMjP7jdS7g</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Biometric Handshake Protocol on Telebiometric System Mechanism for National Infrastructure</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yong-Nyuo Shin ; Yong-Jun Lee ; Woochang Shin ; Jin-Young Choi</creator><creatorcontrib>Yong-Nyuo Shin ; Yong-Jun Lee ; Woochang Shin ; Jin-Young Choi</creatorcontrib><description>The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing biometric handshake protocols and biometric transfer protocols through the extension of TLS (transport layer security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.</description><identifier>ISBN: 9780769531267</identifier><identifier>ISBN: 0769531261</identifier><identifier>DOI: 10.1109/ISA.2008.24</identifier><identifier>LCCN: 2007943628</identifier><language>eng</language><publisher>IEEE</publisher><subject>AFIS ; Authentication ; Biometric Handshake Protocol ; Biometrics ; Certification ; Control system synthesis ; Cryptography ; Information security ; National security ; Open systems ; Smart cards ; Telebiometric System Mechanism ; Transport protocols</subject><ispartof>2008 International Conference on Information Security and Assurance (isa 2008), 2008, p.57-60</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4511534$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4511534$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yong-Nyuo Shin</creatorcontrib><creatorcontrib>Yong-Jun Lee</creatorcontrib><creatorcontrib>Woochang Shin</creatorcontrib><creatorcontrib>Jin-Young Choi</creatorcontrib><title>Biometric Handshake Protocol on Telebiometric System Mechanism for National Infrastructure</title><title>2008 International Conference on Information Security and Assurance (isa 2008)</title><addtitle>ISA</addtitle><description>The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing biometric handshake protocols and biometric transfer protocols through the extension of TLS (transport layer security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.</description><subject>AFIS</subject><subject>Authentication</subject><subject>Biometric Handshake Protocol</subject><subject>Biometrics</subject><subject>Certification</subject><subject>Control system synthesis</subject><subject>Cryptography</subject><subject>Information security</subject><subject>National security</subject><subject>Open systems</subject><subject>Smart cards</subject><subject>Telebiometric System Mechanism</subject><subject>Transport protocols</subject><isbn>9780769531267</isbn><isbn>0769531261</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9j0tLAzEYRQNSUGtXLt3kD3TMa_JY1qK2UB_QunFTksw3NDozkSRd9N93QPFu7uIeLhyEbimpKCXmfr1dVIwQXTFxgWZGaaKkqTllUk3Q9bgoI7hk-hLNcv4iY4SouWBX6PMhxB5KCh6v7NDkg_0G_J5iiT52OA54Bx24f2Z7ygV6_AL-YIeQe9zGhF9tCXGwHV4PbbK5pKMvxwQ3aNLaLsPsr6fo4-lxt1zNN2_P6-ViMw9U1WXetEYzJ5XTjWg1ryUjwpnRwAsALpU33EnfGCNqbZmlnlKmPecONHWsEXyK7n5_AwDsf1LobTrtRU3pqMjP7jdS7g</recordid><startdate>200804</startdate><enddate>200804</enddate><creator>Yong-Nyuo Shin</creator><creator>Yong-Jun Lee</creator><creator>Woochang Shin</creator><creator>Jin-Young Choi</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200804</creationdate><title>Biometric Handshake Protocol on Telebiometric System Mechanism for National Infrastructure</title><author>Yong-Nyuo Shin ; Yong-Jun Lee ; Woochang Shin ; Jin-Young Choi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-df982b67b8d4f8356204b9807c4ee367c93b6cd99458a2a1c1128c33be81b2d43</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>AFIS</topic><topic>Authentication</topic><topic>Biometric Handshake Protocol</topic><topic>Biometrics</topic><topic>Certification</topic><topic>Control system synthesis</topic><topic>Cryptography</topic><topic>Information security</topic><topic>National security</topic><topic>Open systems</topic><topic>Smart cards</topic><topic>Telebiometric System Mechanism</topic><topic>Transport protocols</topic><toplevel>online_resources</toplevel><creatorcontrib>Yong-Nyuo Shin</creatorcontrib><creatorcontrib>Yong-Jun Lee</creatorcontrib><creatorcontrib>Woochang Shin</creatorcontrib><creatorcontrib>Jin-Young Choi</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yong-Nyuo Shin</au><au>Yong-Jun Lee</au><au>Woochang Shin</au><au>Jin-Young Choi</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Biometric Handshake Protocol on Telebiometric System Mechanism for National Infrastructure</atitle><btitle>2008 International Conference on Information Security and Assurance (isa 2008)</btitle><stitle>ISA</stitle><date>2008-04</date><risdate>2008</risdate><spage>57</spage><epage>60</epage><pages>57-60</pages><isbn>9780769531267</isbn><isbn>0769531261</isbn><abstract>The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing biometric handshake protocols and biometric transfer protocols through the extension of TLS (transport layer security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.</abstract><pub>IEEE</pub><doi>10.1109/ISA.2008.24</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769531267
ispartof 2008 International Conference on Information Security and Assurance (isa 2008), 2008, p.57-60
issn
language eng
recordid cdi_ieee_primary_4511534
source IEEE Electronic Library (IEL) Conference Proceedings
subjects AFIS
Authentication
Biometric Handshake Protocol
Biometrics
Certification
Control system synthesis
Cryptography
Information security
National security
Open systems
Smart cards
Telebiometric System Mechanism
Transport protocols
title Biometric Handshake Protocol on Telebiometric System Mechanism for National Infrastructure
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T02%3A36%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Biometric%20Handshake%20Protocol%20on%20Telebiometric%20System%20Mechanism%20for%20National%20Infrastructure&rft.btitle=2008%20International%20Conference%20on%20Information%20Security%20and%20Assurance%20(isa%202008)&rft.au=Yong-Nyuo%20Shin&rft.date=2008-04&rft.spage=57&rft.epage=60&rft.pages=57-60&rft.isbn=9780769531267&rft.isbn_list=0769531261&rft_id=info:doi/10.1109/ISA.2008.24&rft_dat=%3Cieee_6IE%3E4511534%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4511534&rfr_iscdi=true