z-logo
open-access-imgOpen Access
ANALYSIS AND APPLICATION OF BIOMETRIC AUTHENTICATION METHODS IN AUTOMATED SYSTEM OF INDUSTRIAL ENTERPRISE RESOURCE PROTECTION
Author(s) -
Nataliya Kuznetsova,
Tatyana Karlova,
A.Yu. Bekmeshov
Publication year - 2020
Publication title -
vestnik brânskogo gosudarstvennogo tehničeskogo universiteta
Language(s) - English
Resource type - Journals
ISSN - 1999-8775
DOI - 10.30987/1999-8775-2020-8-47-52
Subject(s) - biometrics , authentication (law) , computer science , point (geometry) , computer security , resource (disambiguation) , computer network , mathematics , geometry
The work purpose consists in the efficiency increase of automated system operation for industrial enterprise resource protection at the expense of the optimization of authentication method application, in particular, biometric one. To achieve the purpose it is necessary to solve the problem of efficient joint use of modern authentication methods, particularly, a static and dynamic biometric authentication. But biometric methods are most expensive from the point of view of their realization. In this connection, within the limits of the paper there is carried out the analysis of modern methods of biological authentication from the point of view of a special order of introduction and joint use. In the paper there is shown a classification of static and dynamic methods for biometric authentication, an example of method combination in the authentication module is presented, there are considered and analyzed the latest methods, in particular, those based on DNA investigations, thermograms of a face and hands (static), gestures (dynamic). The work novelty consists in the presented diagram of authentication module operation. As a conclusion it should be noted that modern authentication systems offer the application of a complex approach: use both biometric methods and other ones for authentication in modules, in particular, based on secret knowledge and material carrier possession. The approach mentioned will allow minimizing the errors of the first and the second kinds, increasing a general level of safety.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here