A Vein Map Technology in Combination with Kerberos Authentication Protocol
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Asmita B. Kalamkar; K. N. Honwadkar;
Page : 2002-2004
Keywords : Vein map technology; Authentication Protocol; Biometric; Kerberos; Token Granting;
Abstract
In the twenty first era the protection of data or information has become a very critical subject. There is increasing demand from every private as well as government agencies for the stronger authentication system that will be difficult to breach. So the idea of biometric authentication came into picture. There are various types of biometric authentication that are used over the times, such as finger print recognition, facial recognition, retina scanning and iris scanning. These biometrics all found with the different flaws. So the vein map technology came into existence. The vein map technology uses sensors that are only able to recognize vein patterns, if hemoglobin is actively flowing through the person's veins. More over each person's vein map is unique, no two person in the world can have the same vein map. For additional security purpose we can combine vein map technology with the Kerberos authentication protocol. The use of such a unique biometrics in combination with encryption of that biometric along with different registration server and authentication server the system will be very difficult to breach.
Other Latest Articles
- Nasal Septal Perforation Due to Button Battery - A Case Report
- Next Generation Cloud Recruiting App Using force.com Platform
- Employees are Motivated through Financial Reward
- Pre-Pregnancy Hormonal Contraception Use: A Potential Risk Factor for Development of Gestational Diabetes
- Review: Firewall Privacy Preservation By Packet Filtering Management
Last modified: 2021-06-30 21:12:54