CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
research
Microelectronics Time-Space Authentication Techniques
Authors
David Jaro
Publication date
1 January 2015
Publisher
Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií
Abstract
DizertaÄn prce se zabv vyuitm informace o poloze uivatele pi provÄovn uivatelovi identity v prosted poÄtaÄovch st. S nrstem mobilnch poÄtaÄovch zazen v poslednch dvou desetiletch se poloha uivatele stv jednou ze stÄejnch informac v syst©mech pro sprvu pstupu. Prce pedkld reeri stvajcch een, kter se dÄl na dvÄ skupiny v zvislosti na zdroji polohov© informace (een vyuvajc satelitn navigaÄn syst©mu nap. GPS a een zaloen na komunikaci s aktivn infrastrukturou nap. GSM, Wi-Fi). Prce uvd metodiku pro vyhodnocovn autentizaÄnch dat, kter vyuv princip fuzzy logiky. V porovnn s bivalentn logikou je mon© autentizaÄn data vyhodnotit relnÄji. Vsledek procesu autentizace m tak vy informaÄn hodnotu, kter me bt zohlednÄna pi stanoven rovnÄ pstupovch prv uivatele. Dleitm aspektem pi prci s informac o poloze uivatele je prokzn faktu, e uivatel se nachz na stejn©m mstÄ, ze kter©ho se d o pstup do syst©mu. eenm t©to otzky me bt spojen polohov© informace uivatele s jeho biometrikou, napklad otiskem prstu. Tento princip je vyuit i ve dvou verzch mikroelektronickch autentizaÄnch terminl, kter© byly v souvislosti s eenm dizertaÄn prce realizovny. Prvn verze autentizaÄnho terminlu vyuv jako zdroje polohov© informace pijmaÄe satelitnho navigaÄnho a bezdrtov komunikaÄnho modulu pro psmo ISM. Na prvn verzi autentizaÄnho terminlu byla ovÄena funkÄnost novÄ navrench mikroelektronickch autentizaÄnch technik. Pro provÄen biometriky uivatele je zde vyuito snmaÄe otisku prst s vestavÄnm vyhodnocenm. Ve druh© verzi byl autentizaÄn terminl doplnÄn o zdroje polohov© informace moduly Wi-Fi a GSM. V zvÄru prce je uvedeno testovn navren© metodiky vyhodnocovn autentizaÄnch dat pomoc druh© verze mikroelektronick©ho autentizaÄnho terminlu, kter© ovÄuje vyuitelnost navren© metodiky a celkovÄ ÄasovÄ-prostorov© informace v procesu autentizace.This dissertation work focusses on using information about the location of the user during the authentication process on computer networks. With the growth of mobile computer devices over the last two decades the physical location of users is becoming one of the main issues for access management. This work researches existing solutions which are divided in to two groups related to the source of location information (SATNAV systems for example GPS and based on communication with active infrastructure such as GSM, Wi-Fi). This work shows the methodology for evaluating authentication data which use the principle of fuzzy logic. In comparison with binary logic it is possible to evaluate authentication data accurately. As a result of the authentication process the information is of a higher value, which can be taken into account when setting the levels of user privileges. An important aspect of working with location information is that the user is located in the same place and from where they are asking for access to the system. Solving this question could be linking user biometrics for example finger prints. This principle is used in two types of microelectronic authentication terminals which were developed in conjunction with this work. The first type of terminal uses a SATNAV receiver and an ISM wireless communication module as a source of location information. On the first type of authentication terminal newly developed authentication techniques were tested. The users biometrics are checked by finger print sensor with embedded processing. In the second type authentication terminal a Wi-Fi and GSM module were added for location purposes. In the conclusion of this dissertation the testing methodology of the data authorization and evaluation process of the second type of microelectronic authentication terminal is shown. This confirms the practicality of the suggested methodology and the time-space information in the authentication process.
Similar works
Full text
Open in the Core reader
Download PDF
Available Versions
National Repository of Grey Literature
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:invenio.nusl.cz:591901
Last time updated on 21/06/2024
National Repository of Grey Literature
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:invenio.nusl.cz:234525
Last time updated on 10/08/2016