4 research outputs found

    The Mechanism of Contactless Smartcard Systems

    Get PDF
    非接触型を初めとするICカードは、それ自身が一種の計算機であるといえる。一方でそれ単体では機能せず、リーダと呼ばれる読み取り機を備えたシステムとの協調により種々のサービスを実現する。本論文では、非接触ICカードおよびそれを用いたシステムの原理と設計の根拠を整理する

    Finger Movements Based on Biometric Authentication for Touch Devices

    Get PDF
    The primary goal of this thesis is to collect and compare the touch parameters of finger movements on touch devices and build personal profile with good-recognition parameters to indicate the touch characteristics of individual users using the touch devices. In order to study the possibility of implementation of touch-style identification for touch devices, this work mainly focuses on finding and testing the possible touch parameters which could be used to compose a profile to verify the users. A full test with an developed anroid application on tablet was performed by 20 subjects to collect touch information, including location of finger points, finger pressure force and speed of finger movements. Statistical analysis was applied on each dataset of the users. The finding has shown that each user can be identified by the discriminative information of finger movements on the touch screen. The results show huge difference in mean, standard deviation and skewness for the dataset of each user giving a reason to hope the implementation of finger movements based on biometric authentication for touch devices. Hopefully, the result of this project will be valuable for further research of implementation of biometric authentication on touch devices based on the finger movements

    On Authentication between Human and Computer

    No full text
    Electronic authentication with a portable device such as a smart card has been receiving increasing attention. In an authentication, the portable device is regarded as the human user himself. However, in an open environment like authentication systems, it is necessary to have a way of secure communication between the portable device and the human user. This paper considers an authentication of a server computer of a service provider by a human with a portable device as a part of the authentication and an attack by a client computer which relays the communication between the portable device and the server computer. As a defense against the attack, we introduce a system with a portable device which has an interface to show information to a human

    On Authentication between Human and Computer

    No full text
    Electronic authentication with a portable device such as a smart card has been receiving increasing attention. In an authentication, the portable device is regarded as the human user himself. However, in an open environment like authentication systems, it is necessary to have a way of secure communication between the portable device and the human user. This paper considers an authentication of a server computer of a service provider by a human with a portable device as a part of the authentication and an attack by a client computer which relays the communication between the portable device and the server computer. As a defense against the attack, we introduce a system with a portable device which has an interface to show information to a human
    corecore