文章目录

  • 生物安全概述
  • 视网膜和虹膜识别
  • 指纹识别
  • 声音模式识别
  • 总结
  • Biometric Security Overview
  • Retina and Iris Recognition
  • Fingerprint Recognition
  • Voice Pattern Recognition
  • Lesson Summary

生物特征安全装置测量一个人的独特特征,如语音模式、虹膜或视网膜模式或指纹模式。有了生物识别技术,想要侵入一个系统是非常困难的。

生物安全概述

生物特征安全装置通过独特的生物特征来加强访问控制,在验证一个人的身份方面起着至关重要的作用。在这节课中,我们将介绍光学识别、指纹识别和语音识别,这些都是用来识别和认证一个人,以及使用这些设备的优缺点。

视网膜和虹膜识别

视网膜扫描仪利用眼睛后部的血管进行鉴别。眼睛后部的血管图案对个人来说是独一无二的。这种方法具有很强的侵入性,但不被广泛接受,因为它侵犯了一个人的医疗隐私。例如,可能发现的眼部疾病或其他健康状况可能会提醒公司,并可能导致就业问题。

虹膜扫描仪是用来测量个人虹膜模式的,它是非侵入式的。每个人的虹膜都有不同的颜色模式,因此,虹膜扫描仪被用来测量这些特征。它在安全领域更受欢迎。

重放攻击(也称为重放攻击)是指一个人在未经他人许可的情况下使用他人的凭据。在视网膜和虹膜扫描仪上,重放攻击的几率非常低,因为几乎不可能复制别人的视网膜和虹膜来模仿。虽然视网膜和虹膜识别系统的确能保护信息和区域不受入侵者的侵扰,但这些系统的成本非常高昂。

当涉及到医疗隐私时,要记住视网膜扫描仪比两者更具侵入性的一个好方法是:视网膜是侵入性的。

指纹识别

因为指纹扫描仪只测量指纹,所以对人的侵扰最小。他们测量的是每个人手指的螺旋、回圈和拱形图案。指纹扫描仪也是最容易实现和成本效益。指纹扫描仪不会透露任何医疗信息;因此,在访问控制方面,它们在业界得到了广泛的应用。它们是如此的流行和有效,以至于指纹扫描仪现在被用于移动设备,甚至是汽车上。

尽管实现它并不复杂,成本也不高,但是由于这种类型的系统允许轻松模拟,所以重播攻击的几率很高。例如,如果你把拇指压在橡皮糖熊的背上,你就能看到你的拇指指纹。相同的橡皮糖熊与解除的指纹,现在可以用来欺骗指纹扫描仪,并获得未经授权的访问。

声音模式识别

语音模式分析测量一个人声音的音调和音高。注册他或她的声音的人被给予一个奇怪的短语重复几次,以允许语音识别软件捕获认证。例如,完成语音注册的人可能会说这样的话:“蓝山和小草莓。”你能说出这个句子中有几个音调吗?

使用语音识别的缺点是,如果一个人生病了或失去了声音,语音识别软件将无法分辨出这是否是试图进行身份验证的正确的人。使用语音识别的好处是回放攻击是非常不可能的。如今,语音识别将向试图获取信息的人随机显示一个短语。这可以防止人们使用录音设备来欺骗系统。

总结

在这节课中,我们学习了生物识别安全设备,它通过一个人独特的生物特征来加强访问控制,从而验证这个人的身份。我们还了解了重放攻击(也称为重放攻击),即一个人在未经他人许可的情况下使用他人的凭据。

我们了解到指纹扫描仪是最流行的,最容易实现的,也是最便宜的生物识别设备,因为它们只测量指纹。指纹扫描器遭受重放攻击的几率非常高,而且这个系统可能会被骗。虽然测量一个人声音的音调和音高的声音模式分析非常好,但是一个生病或声音紧张的人可能无法验证。

最后,请记住,视网膜扫描仪是利用眼睛后部的血管进行身份验证的,它具有侵入性,可以泄露一个人的医疗状况。另一方面,测量个人虹膜模式的虹膜扫描仪非常安全,不会泄露一个人的医疗状况。这两种眼睛识别设备的实现都很昂贵,但同时,重放攻击的几率非常低。

Biometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or fingerprint patterns. With biometrics, it can be extremely difficult for someone to break into a system.

Biometric Security Overview

Biometric security devices play a crucial role in verifying a person’s identity by enforcing access control methods through their unique biological traits. In this lesson, we will cover optical, fingerprint, and voice recognition, which are used to identify and authenticate a person, as well as cover the pros and cons of using these devices.

Retina and Iris Recognition

Retina scanners use the blood vessels in the back of the eye for authentication. The blood vessel pattern in the back of the eye is unique to the individual. This method is very intrusive and is not widely accepted because it breaches a person’s medical privacy. For example, possible discovery of disease in the eye or other medical conditions may alert the company and can cause employment issues.

The iris scanner, which measures an individual’s iris pattern, is non-intrusive. Each person has a different color pattern in the iris, and therefore, the iris scanner is used to measure these characteristics. It is more popular within the security field.

Replay attack (also known as a playback attack) is when a person uses someone else’s credentials without their permission. The chances of replay attacks are very low on retina and iris scanners because it is nearly impossible to copy the retina and iris of someone else to use for impersonation. While retina and iris recognition systems do keep information and areas safe from intruders, these systems are very expensive.

A good way to remember that the retina scanner is the more intrusive of the two when it comes to medical privacy is: RetINa is INtrusive.

Fingerprint Recognition

Fingerprint scanners are the least intrusive out of the group because they only measure the fingerprint. They measure the whorl, loop, and arch patterns of the finger, which are unique to everyone. Fingerprint scanners are also the easiest to implement and are cost effective. Fingerprint scanners do not disclose any medical information; therefore, they are widely used in the industry in regards to access control. They are so popular and effective that fingerprint scanners are now being used on mobile devices and even on cars.

Although it is uncomplicated and inexpensive to implement, there are high chances for replay attacks since this type of system allows for easy impersonation. For example, if you press your thumb against the back of a gummy bear, you will be able to see your thumb print. The same gummy bear with the lifted fingerprint can now be used to fool a fingerprint scanner and gain unauthorized access.

Voice Pattern Recognition

Voice pattern analysis measures the tone and pitch in a person’s voice. The person who registers his or her voice is given an odd phrase to repeat several times in order to allow the voice recognition software to capture the authentication. For example, a person completing a voice registration process may have to say something like this - ‘blue mountains and teeny tiny strawberries.’ Can you tell that there are several tones and pitches used in this sentence?

The drawback to using voice recognition is that if a person becomes sick or loses his or her voice, the voice recognition software will not be able to tell if its the right person trying to authenticate. The upside to using voice recognition is that replay attacks are very unlikely. Voice recognition nowadays will display a phrase that is generated at random to the person who is trying to gain access. This prevents people from using audio recording devices to fool the system.

Lesson Summary

In this lesson, we learned about biometric security devices, which verify a person’s identity by enforcing access control methods through their unique biological traits. We also learned about replay attacks (also known as a playback attack), which are when a person uses someone else’s credentials without their permission.

We learned that fingerprint scanners are the most popular, easiest to implement, and cheapest biometric device because they only measure the fingerprint. The chances of replay attacks on fingerprint scanners are very high, and this system can be fooled. Although voice pattern analysis, which measures the tone and pitch in a person’s voice is pretty good, a person who is sick or has a strained voice may not be able to authenticate.

Finally, remember that the retina scanner, which uses the blood vessels in the back of the eye for authentication, is intrusive and can give away someone’s medical condition. The iris scanner, which measures an individual’s iris pattern, on the other hand, is very secure and does not give away a person’s medical status. Both eye recognition devices are expensive to implement but at the same time, the chances of replay attacks are very low.

Monash call:什么是生物识别安全 - 定义,系统以及设备相关推荐

  1. 人脸、指纹、虹膜、行为,你需要的人工智能生物识别AI数据集全在这里

    一.生物识别技术定义 生物识别技术主要是指通过人类生物特征进行身份认证的一种技术,即利用人体固有的生物特性,如人脸,指纹.虹膜.掌纹.指静脉等和行为特征,如笔迹.声音.步态等来进行个人身份的鉴定.由于 ...

  2. 生物识别技术在我们日常生活中的应用

    在数字时代,对安全性的需求比以往任何时候都高,因为我们大多数人将很大一部分生活都放在移动设备上.因此,移动电话和技术开发人员将生物识别技术集成到这些设备中,以防止盗窃并确保我们的财物安全.在本文中,我 ...

  3. [济南考勤机专题]考勤机类型(六)生物识别考勤机

    [济南考勤机专题]考勤机类型(六)生物识别考勤机 目前,市场上生物识别类考勤机主要包括指纹识别考勤机.静脉识别.虹膜识别考勤机.人脸识别考勤机等.生物识别考勤机是利用人的生物特征来进行识别的,这种考勤 ...

  4. python人脸识别门禁系统生产厂家_人脸识别门禁硬件生产厂家

    随着现代科技的不断发展,现在的中国已经迈入5G时代,人工智能技术也正逐步广泛运用到了各行各业中,尤其人脸识别技术,已在各大行业中广泛使用. 人脸识别技术是基于人的脸部特征信息进行身份识别的生物识别技术 ...

  5. 人脸服务器如何与门禁系统对接,人脸识别门禁系统终端设备接口说明

    1.上传识别结果 人脸识别门禁系统设备识别后把识别结果上传到服务器(单包数据数量小于5条) (一) 人脸识别门禁系统请求(设备->服务器): 1. 人脸识别门禁系统请求命令: 0x19 2. 人 ...

  6. 物联网生物识别技术在工作场所中发挥更大作用

    组织可以使用生物识别技术通过传感器和监视来提高工作场所的安全性和员工安全性,但雇主还必须评估其潜在影响. 随着健康和安全问题成为每个企业未来的核心,人们将发现一个新的数字接口:他们的身体. 生物识别交 ...

  7. 全球及中国生物识别车辆访问技术行业十四五应用现状及未来展望规划报告2022-2027年

    全球及中国生物识别车辆访问技术行业十四五应用现状及未来展望规划报告2022-2027年 [搜索鸿晟信合查看官网更多内容!]  生物识别车辆访问技术位于起步阶段,指纹识别.虹膜扫描.面部识别等技术可以取 ...

  8. ASP.NET Core 3.0中支持AI的生物识别安全

    本文共两个部分,这是第一部分,其中介绍了 ASP.NET Core 3 中旨在将授权逻辑与基本的用户角色相分离的基于策略的授权模型. 此部分提供了此授权进程的基于生物识别信息(如人脸识别或语音识别)的 ...

  9. 新思科技网络安全研究中心分析手机中的生物识别数据泄露漏洞

    OnePlus 7 Pro 信息泄露漏洞在近日被披露.OnePlus 7 Pro 10.0.3.GM21BA之前的版本中存在安全漏洞.攻击者可利用该漏洞从指纹感应器中获取指纹图像(位图).新思科技对此 ...

  10. 技术漫谈|DOE实验设计系列:关键工艺参数的如何识别、定义?

    在QbD理念中,关键工艺参数(Critical process parameters, CPPs)贯穿整个制剂生命周期,从研发.放大到验证,涉及每个工艺流程操作环节.ICH Q8文件中也提到" ...

最新文章

  1. @Conditional派生注解
  2. 【 仿真 】基于多维相似性分析的移动定位方法仿真
  3. 关于IR21的自举电路
  4. ubuntu安装百度云客户端
  5. Flex调用as文件中的类
  6. 16、分布式文档系统--document的_source元数据以及定制返回结果解析(来自学习资料+自己整理)
  7. JS数组遍历-forEach()、map()方法
  8. php cli 判断,php cli 命令行详解【转】
  9. matlab将struct和cell转换成matrices
  10. python缩进来分组语句_Python中的语句,缩进和注释
  11. mysql单个表_mysql – 哪个更有效:一个长单表还是分布表?为什么?
  12. js日期减去日期算出剩余的天数
  13. WIN10+VS2015部署PanddleOCR
  14. 5G NTN进展简述
  15. ERP 系统的应用对企业财务会计信息系统内部控制的影响
  16. OpenCV—直线拟合fitLine
  17. 此图形驱动程序无法找到兼容的图形硬件的解决方案(复制粘贴源于百度http://jingyan.baidu.com/article...
  18. CAD碎片化学习教程 @3. 设置当前字体
  19. java-php-python-ssm图书馆座位预约管理系统服务端计算机毕业设计
  20. Spring-boot中使用nutz实践

热门文章

  1. 专有名词或英文缩写释义
  2. Snapper 基本入门简介 - 快速浏览和监听
  3. [Vue]缓存路由组件 activated()与deactivated()
  4. ttl接地是高电平还是低电平_说明图3.12中各门电路的输出是高电平还是低电平。已知它们都是74HC系列的CMOS电路 简单的逻辑门电路 判断各门电路...
  5. 如何“谨慎”使用“数据驱动”的风控模型(三)——监控篇
  6. 20.P153课后习题6-13 背包问题。设有一个背包可以放入物品的重量为s,现有n件物品,重量分别为w[0],w[1],...w[n-1]。问题是能否从这n件物品中选择若干件放入此背包中使得放入的重
  7. Ngnix 配置文件快速入门
  8. The certificate used to sign “XXX“ has either expired or has been revoked.
  9. rough set_Rough.js使用Canvas和SVG制作手绘图形
  10. 解决AndroidStudio中使用.9图片不生效的问题