TY - GEN
T1 - Biometric handshake protocol on telebiometric system mechanism for national infrastructure
AU - Shin, Yong Nyuo
AU - Lee, Yong Jun
AU - Shin, Woochang
AU - Choi, Jin Young
PY - 2008
Y1 - 2008
N2 - The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing Biometric Handshake protocols and Biometric Transfer protocols through the extension of TLS (Transport Layer Security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.
AB - The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing Biometric Handshake protocols and Biometric Transfer protocols through the extension of TLS (Transport Layer Security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.
UR - http://www.scopus.com/inward/record.url?scp=51349161233&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51349161233&partnerID=8YFLogxK
U2 - 10.1109/ISA.2008.24
DO - 10.1109/ISA.2008.24
M3 - Conference contribution
AN - SCOPUS:51349161233
SN - 9780769531267
T3 - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
SP - 57
EP - 60
BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
T2 - 2nd International Conference on Information Security and Assurance, ISA 2008
Y2 - 24 April 2008 through 26 April 2008
ER -