Biometric System of Access to Information Resources

被引:0
作者
Klym, Halyna [1 ]
Vasylchyshyn, Ivanna [2 ]
机构
[1] Lviv Polytech Natl Univ, Specialized Comp Syst Dept, Lvov, Ukraine
[2] Lviv Polytech Natl Univ, Theoret & Gen Elect Engn Dept, Lvov, Ukraine
来源
PROCEEDINGS OF 2020 IEEE 21ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL PROBLEMS OF ELECTRICAL ENGINEERING (CPEE) | 2020年
关键词
biometric system; identification; information resourses; software and hardware complex; AUTHENTICATION;
D O I
10.1109/cpee50798.2020.9238745
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The biometric system of access to information resources has been developed. The software and hardware complex are designed to protect information resources and personal data from unauthorized access using the principle of user authentication by fingerprints. In the developed complex, the traditional input of login and password was replaced by applying a finger to the fingerprint scanner. The system automatically recognizes the fingerprint and provides access to the information resource, provides encryption of personal data and automation of the authorization process on the web resource. The web application was implemented using the Bootstrap framework, the 000webhost web server, the phpMyAdmin database server, the PHP scripting language, the HTML hypertext markup language, along with cascading style sheets and embedded scripts (JavaScript), which created a full-fledged web-site and Google Chrome extension with the ability to integrate it into other systems. The structural schematic diagram was performed. The design of the device is offered. The algorithm of the program operation and the program of the device operation in the C language are developed.
引用
收藏
页数:4
相关论文
共 15 条
[1]   A multibiometric cryptosystem for user authentication in client-server networks [J].
Babamir, Faezeh Sadat ;
Kirci, Murvet .
COMPUTER NETWORKS, 2020, 181
[2]  
Dasgupta D., 2017, ADV USER AUTHENTICAT, P185, DOI [10.1007/978-3-319-58808-7_5, DOI 10.1007/978-3-319-58808-7_5, 10.1007/978-3-319-58808-7_5.]
[3]   Predicting Exploitations of Information Systems Vulnerabilities Through Attackers' Characteristics [J].
Dobrovoljc, Andrej ;
Trcek, Denis ;
Likar, Borut .
IEEE ACCESS, 2017, 5 :26063-26075
[4]   Privacy-preserving data aggregation scheme against internal attackers in smart grids [J].
He, Debiao ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
WIRELESS NETWORKS, 2016, 22 (02) :491-502
[5]   Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing [J].
Huh, Jun-Ho ;
Seo, Kyungryong .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (06) :3123-3139
[6]   Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security [J].
Khan, Saad ;
Parkinson, Simon ;
Grant, Liam ;
Liu, Na ;
McGuire, Stephen .
ACM COMPUTING SURVEYS, 2020, 53 (04)
[7]   Development and Validation of a Deep Neural Network Model for Prediction of Postoperative In-hospital Mortality [J].
Lee, Christine K. ;
Hofer, Ira ;
Gabel, Eilon ;
Baldi, Pierre ;
Cannesson, Maxime .
ANESTHESIOLOGY, 2018, 129 (04) :649-662
[8]   Honey authentication based on physicochemical parameters and phenolic compounds [J].
Oroian, Mircea ;
Sorina, Ropciuc .
COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2017, 138 :148-156
[9]  
Shan S, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1589
[10]  
Stemler L., 2020, J INFORM SYSTEMS ED, V9, P3