Information-telecommunication System with Multibiometric Protection of User's Personal Data

被引:0
|
作者
Volchikhin, Vladimir [1 ]
Ivanov, Alexander [2 ]
Urnev, Ivan [1 ]
Malygin, Alexander [1 ]
机构
[1] Penza State Univ, 40 Krasnaya Str, Penza 440026, Russia
[2] Penza Res Elect Engn Inst, Penza 440000, Russia
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development of digital information technologies has faced a problem of access and protection of information resources from unauthorized access. Penza State University (PSU) together with "Rubin" plc. and "Penza Research Electrical Engineering Institute" plc. is on the final stage of development and preproduction of telecommunication equipment, as well as development of network, applied and special software to build a digital communication network with personal access, maintaining high-level protection of personal data on the basis of biometric methods. The system provides transformation of personal biometric data into the access code and safe storage in a neural network container in accordance with the standard FOCI P526333.0-2006. The authors have used the following image processing methods as personal biometric parameters: processing of papillary finger print; processing of handwritten password; processing of 3D face image. Research and technical solutions offered in the given project are based on the concept of a neural network biometric depersonalized container, which can be created by instructing a neuronet. It is a person with his/her fingers, handwriting and face who is the access key into the informationtelecommunication system. He/she doesn't have to wright down and memorize a pin-code or any other key information vulnerable to external threats and attacks. The developed means of highly reliable multibiometric authentication have to provide the personal authentication index on the level 10-12 in accordance with the standard FOCI P 52633.0 52633.5. American Bio IP systems of standards provide this index on the level 10-5. At the present time PSU in cooperation with its contractors is completing the development of construction and technological documents on component elements of the information-telecommunication system, intended to be applied by corporative structures (schools, universities, organizations, business), as well as by government bodies. Testing samples of components and software have already passed the preliminary testing and are ready for operation testing.
引用
收藏
页码:71 / 74
页数:4
相关论文
共 50 条
  • [1] Information-telecommunication system providing access to data and knowledge bases
    Yakimenko, Yu. I.
    Narytnik, T. N.
    Voytenko, A. G.
    Kazimirenko, V. A.
    Ostapchuk, D. I.
    Strizhak, A. E.
    [J]. 2005 15th International Crimean Conference Microwave & Telecommunication Technology, Vols 1 and 2, Conference Proceedings, 2005, : 287 - 289
  • [2] THE CONCEPT DEFINITION OF MATHEMATICAL MODELLING OF THE SECURED INFORMATION-TELECOMMUNICATION SYSTEM WITH REGARD TO CONDITIONS OF THE POSTERIOR UNCERTAINTY
    Semenov, Sergey
    Dorokhov, Oleksandr
    Grynov, Denys
    [J]. TRANSPORT AND TELECOMMUNICATION JOURNAL, 2013, 14 (02) : 167 - 174
  • [3] The protection of personal data and the security of information
    Ribagorda Garnacho, Arturo
    [J]. REVISTA JURIDICA DE CASTILLA Y LEON, 2008, (16): : 373 - 399
  • [4] Information security and protection of personal data
    Siskin, Dilan Serife
    [J]. TURKISH LIBRARIANSHIP, 2018, 32 (04) : 342 - 345
  • [5] Data Industry and Legislations for Personal Information Protection
    Kwon, Hun Yeong
    Min, Ki Young
    Chun, Soon Ae
    [J]. PROCEEDINGS OF THE 20TH ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH (DGO2019): GOVERNANCE IN THE AGE OF ARTIFICIAL INTELLIGENCE, 2019, : 529 - 531
  • [6] BS 10012:2009 Data Protection - Specification for a Personal Information Management System
    Young, Lynn
    [J]. RECORDS MANAGEMENT JOURNAL, 2010, 20 (01)
  • [7] Protection Profile of Personal Information Security System Designing a Secure Personal Information Security System
    Lee, Hyun-Jung
    Lee, Kwangwoo
    Won, Dongho
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 806 - 811
  • [8] Legal Protection of China's Personal Information Security in the Age of Big Data
    Fan Hong-xia
    Li Qiao-lin
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (12TH) & INTERNATIONAL SYMPOSIUM ON WEST AFRICAN STUDIES (1ST), VOL II, 2017, : 431 - 435
  • [9] Methods of Determining Information Support of Web Community User Personal Data Verification System
    Korobiichuk, Igor
    Fedushko, Solomia
    Jus, Andrzej
    Syerov, Yuriy
    [J]. AUTOMATION 2017: INNOVATIONS IN AUTOMATION, ROBOTICS AND MEASUREMENT TECHNIQUES, 2017, 550 : 144 - 150
  • [10] Children's reflections on privacy and the protection of their personal data: A child-centric approach to data protection information formats
    Milkaite, Ingrida
    De Wolf, Ralf
    Lievens, Eva
    De Leyn, Tom
    Martens, Marijn
    [J]. CHILDREN AND YOUTH SERVICES REVIEW, 2021, 129