TY - GEN
T1 - A proposal of one-time biometric authentication
AU - Ueshige, Yoshifumi
AU - Sakurai, Kouichi
PY - 2006
Y1 - 2006
N2 - In biométrie authentication, feature information of each enrolled person's biométrie information is enrolled as templates. Secure databases or anti-tampered devices store the templates in general. The biométrie information, however, is irreplaceable information, when it is compromised. Thereby, one must give a special attention to protection of such information. On the other hands, increasing internet economical services causes a motivation of implementing online biométrie authentication. We propose a novel protection technique for the biométrie information, especially the feature information and the templates. The point of our proposal is that the extracted features and the enrolled templates are transformed by one-time transformation that is generated in each authentication. The transformed features and templates travel through insecure communication line like the internet, and they are used in matching process. This technique causes security against eavesdropping and replay attacks on the internet, because the transmitted feature information and the templates are different every time.
AB - In biométrie authentication, feature information of each enrolled person's biométrie information is enrolled as templates. Secure databases or anti-tampered devices store the templates in general. The biométrie information, however, is irreplaceable information, when it is compromised. Thereby, one must give a special attention to protection of such information. On the other hands, increasing internet economical services causes a motivation of implementing online biométrie authentication. We propose a novel protection technique for the biométrie information, especially the feature information and the templates. The point of our proposal is that the extracted features and the enrolled templates are transformed by one-time transformation that is generated in each authentication. The transformed features and templates travel through insecure communication line like the internet, and they are used in matching process. This technique causes security against eavesdropping and replay attacks on the internet, because the transmitted feature information and the templates are different every time.
UR - http://www.scopus.com/inward/record.url?scp=66149159221&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=66149159221&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:66149159221
SN - 1601320019
SN - 9781601320018
T3 - Proceedings of The 2006 International Conference on Security and Management, SAM'06
BT - Proceedings of The 2006 International Conference on Security and Management, SAM'06
T2 - 2006 International Conference on Security and Management, SAM'06
Y2 - 26 June 2006 through 29 June 2006
ER -