Architecture for synchronous multiparty authentication using biometrics

被引:0
|
作者
Noronha, SJ [1 ]
Dorai, C [1 ]
Ratha, NK [1 ]
Bolle, RM [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometrics-based remote individual authentication has become widespread recently. However, several existing business systems and processes often require participation of multiple parties synchronously in real time. Further, new e-business processes can be enabled by technology that allows multiple participants to authenticate themselves synchronously and persistently. In this paper, we make distinction between traditional workflow processes that require multiparty authentication from synchronous multiparty authentication needed in business and consumer scenarios. A new system and method for multiparty authentication and authorization using real-time biometrics is proposed. We define real-time biometrics to include concepts that cover certificates that witness the simultaneous acquisition of biometrics signal from multiple parties and certificates that prove that the parties continuously provided the biometrics signal over an unbroken interval of time. We also present novel business processes based on this technology such as remote (web-based) owner access to bank lockers controlled by a designated bank officer even when the officer is not physically present at the bank, notarization of a document remotely, and signing "e-Will" without being present in the attorney's office.
引用
收藏
页码:609 / 616
页数:8
相关论文
共 50 条
  • [1] A Novel Architecture for Continuous Authentication using Behavioural Biometrics
    Oak, Rajvardhan
    Khare, Mrunmayec
    [J]. 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 767 - 771
  • [2] Synchronous One Time Biometrics With Pattern Based Authentication
    Lacharme, Patrick
    Rosenberger, Christophe
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 260 - 265
  • [3] Password Authentication using Keystroke Biometrics
    D'Lima, Nathan
    Mittal, Jayashri
    [J]. 2015 International Conference on Communication, Information & Computing Technology (ICCICT), 2015,
  • [4] Continuous Authentication Using Behavioral Biometrics
    Deutschmann, Ingo
    Nordstrom, Peder
    Nilsson, Linus
    [J]. IT PROFESSIONAL, 2013, 15 (04) : 12 - 15
  • [5] Seamless Personal Authentication using Biometrics
    Ayeswarya, S.
    Norman, Jasmine
    [J]. 2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [6] Synchronous Authentication with Bimodal Biometrics for e-Assessment A Theoretical Model
    Sabbah, Yousef
    Saroit, Imane
    Kotb, Amira
    [J]. 2012 6TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT), 2012, : 139 - 145
  • [7] Cloud Computing Authentication using Cancellable Biometrics
    Soyjaudah, Krishnaraj Madhavjee Sunjiv
    Ramsawock, Gianeswar
    Khodabacchus, Muhammad Yaasir
    [J]. AFRICON, 2013, 2013, : 533 - 536
  • [8] Authentication Using Pulse-Response Biometrics
    Martinovic, Ivan
    Rasmussen, Kasper
    Roeschlin, Marc
    Tsudik, Gene
    [J]. COMMUNICATIONS OF THE ACM, 2017, 60 (02) : 108 - 115
  • [9] Activity related authentication using prehension biometrics
    Drosou, Anastasios
    Ioannidis, Dimosthenis
    Tzovaras, Dimitrios
    Moustakas, Konstantinos
    Petrou, Maria
    [J]. PATTERN RECOGNITION, 2015, 48 (05) : 1743 - 1759
  • [10] Human Authentication Using Face and Fingerprint Biometrics
    Darwish, Ashraf A.
    Zaki, Walaa M.
    Saad, Omar M.
    Nassar, Nadia M.
    Schaefer, Gerald
    [J]. 2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2010, : 274 - 278