ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Vein Map Technology in Combination with Kerberos Authentication Protocol

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 2002-2004

Keywords : Vein map technology; Authentication Protocol; Biometric; Kerberos; Token Granting;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In the twenty first era the protection of data or information has become a very critical subject. There is increasing demand from every private as well as government agencies for the stronger authentication system that will be difficult to breach. So the idea of biometric authentication came into picture. There are various types of biometric authentication that are used over the times, such as finger print recognition, facial recognition, retina scanning and iris scanning. These biometrics all found with the different flaws. So the vein map technology came into existence. The vein map technology uses sensors that are only able to recognize vein patterns, if hemoglobin is actively flowing through the person's veins. More over each person's vein map is unique, no two person in the world can have the same vein map. For additional security purpose we can combine vein map technology with the Kerberos authentication protocol. The use of such a unique biometrics in combination with encryption of that biometric along with different registration server and authentication server the system will be very difficult to breach.

Last modified: 2021-06-30 21:12:54