什么是生物识别安全:定义,系统以及设备
文章目录
生物特征安全装置测量一个人的独特特征,如语音模式、虹膜或视网膜模式或指纹模式。有了生物识别技术,想要侵入一个系统是非常困难的。
生物安全概述
生物特征安全装置通过独特的生物特征来加强访问控制,在验证一个人的身份方面起着至关重要的作用。在这节课中,我们将介绍光学识别、指纹识别和语音识别,这些都是用来识别和认证一个人,以及使用这些设备的优缺点。
视网膜和虹膜识别
视网膜扫描仪利用眼睛后部的血管进行鉴别。眼睛后部的血管图案对个人来说是独一无二的。这种方法具有很强的侵入性,但不被广泛接受,因为它侵犯了一个人的医疗隐私。例如,可能发现的眼部疾病或其他健康状况可能会提醒公司,并可能导致就业问题。
虹膜扫描仪是用来测量个人虹膜模式的,它是非侵入式的。每个人的虹膜都有不同的颜色模式,因此,虹膜扫描仪被用来测量这些特征。它在安全领域更受欢迎。
重放攻击(也称为重放攻击)是指一个人在未经他人许可的情况下使用他人的凭据。在视网膜和虹膜扫描仪上,重放攻击的几率非常低,因为几乎不可能复制别人的视网膜和虹膜来模仿。虽然视网膜和虹膜识别系统的确能保护信息和区域不受入侵者的侵扰,但这些系统的成本非常高昂。
当涉及到医疗隐私时,要记住视网膜扫描仪比两者更具侵入性的一个好方法是:视网膜是侵入性的。
指纹识别
因为指纹扫描仪只测量指纹,所以对人的侵扰最小。他们测量的是每个人手指的螺旋、回圈和拱形图案。指纹扫描仪也是最容易实现和成本效益。指纹扫描仪不会透露任何医疗信息;因此,在访问控制方面,它们在业界得到了广泛的应用。它们是如此的流行和有效,以至于指纹扫描仪现在被用于移动设备,甚至是汽车上。
尽管实现它并不复杂,成本也不高,但是由于这种类型的系统允许轻松模拟,所以重播攻击的几率很高。例如,如果你把拇指压在橡皮糖熊的背上,你就能看到你的拇指指纹。相同的橡皮糖熊与解除的指纹,现在可以用来欺骗指纹扫描仪,并获得未经授权的访问。
声音模式识别
语音模式分析测量一个人声音的音调和音高。注册他或她的声音的人被给予一个奇怪的短语重复几次,以允许语音识别软件捕获认证。例如,完成语音注册的人可能会说这样的话:“蓝山和小草莓。”你能说出这个句子中有几个音调吗?
使用语音识别的缺点是,如果一个人生病了或失去了声音,语音识别软件将无法分辨出这是否是试图进行身份验证的正确的人。使用语音识别的好处是回放攻击是非常不可能的。如今,语音识别将向试图获取信息的人随机显示一个短语。这可以防止人们使用录音设备来欺骗系统。
总结
在这节课中,我们学习了生物识别安全设备,它通过一个人独特的生物特征来加强访问控制,从而验证这个人的身份。我们还了解了重放攻击(也称为重放攻击),即一个人在未经他人许可的情况下使用他人的凭据。
我们了解到指纹扫描仪是最流行的,最容易实现的,也是最便宜的生物识别设备,因为它们只测量指纹。指纹扫描器遭受重放攻击的几率非常高,而且这个系统可能会被骗。虽然测量一个人声音的音调和音高的声音模式分析非常好,但是一个生病或声音紧张的人可能无法验证。
最后,请记住,视网膜扫描仪是利用眼睛后部的血管进行身份验证的,它具有侵入性,可以泄露一个人的医疗状况。另一方面,测量个人虹膜模式的虹膜扫描仪非常安全,不会泄露一个人的医疗状况。这两种眼睛识别设备的实现都很昂贵,但同时,重放攻击的几率非常低。
Biometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or fingerprint patterns. With biometrics, it can be extremely difficult for someone to break into a system.
Biometric Security Overview
Biometric security devices play a crucial role in verifying a person’s identity by enforcing access control methods through their unique biological traits. In this lesson, we will cover optical, fingerprint, and voice recognition, which are used to identify and authenticate a person, as well as cover the pros and cons of using these devices.
Retina and Iris Recognition
Retina scanners use the blood vessels in the back of the eye for authentication. The blood vessel pattern in the back of the eye is unique to the individual. This method is very intrusive and is not widely accepted because it breaches a person’s medical privacy. For example, possible discovery of disease in the eye or other medical conditions may alert the company and can cause employment issues.
The iris scanner, which measures an individual’s iris pattern, is non-intrusive. Each person has a different color pattern in the iris, and therefore, the iris scanner is used to measure these characteristics. It is more popular within the security field.
Replay attack (also known as a playback attack) is when a person uses someone else’s credentials without their permission. The chances of replay attacks are very low on retina and iris scanners because it is nearly impossible to copy the retina and iris of someone else to use for impersonation. While retina and iris recognition systems do keep information and areas safe from intruders, these systems are very expensive.
A good way to remember that the retina scanner is the more intrusive of the two when it comes to medical privacy is: RetINa is INtrusive.
Fingerprint Recognition
Fingerprint scanners are the least intrusive out of the group because they only measure the fingerprint. They measure the whorl, loop, and arch patterns of the finger, which are unique to everyone. Fingerprint scanners are also the easiest to implement and are cost effective. Fingerprint scanners do not disclose any medical information; therefore, they are widely used in the industry in regards to access control. They are so popular and effective that fingerprint scanners are now being used on mobile devices and even on cars.
Although it is uncomplicated and inexpensive to implement, there are high chances for replay attacks since this type of system allows for easy impersonation. For example, if you press your thumb against the back of a gummy bear, you will be able to see your thumb print. The same gummy bear with the lifted fingerprint can now be used to fool a fingerprint scanner and gain unauthorized access.
Voice Pattern Recognition
Voice pattern analysis measures the tone and pitch in a person’s voice. The person who registers his or her voice is given an odd phrase to repeat several times in order to allow the voice recognition software to capture the authentication. For example, a person completing a voice registration process may have to say something like this - ‘blue mountains and teeny tiny strawberries.’ Can you tell that there are several tones and pitches used in this sentence?
The drawback to using voice recognition is that if a person becomes sick or loses his or her voice, the voice recognition software will not be able to tell if its the right person trying to authenticate. The upside to using voice recognition is that replay attacks are very unlikely. Voice recognition nowadays will display a phrase that is generated at random to the person who is trying to gain access. This prevents people from using audio recording devices to fool the system.
Lesson Summary
In this lesson, we learned about biometric security devices, which verify a person’s identity by enforcing access control methods through their unique biological traits. We also learned about replay attacks (also known as a playback attack), which are when a person uses someone else’s credentials without their permission.
We learned that fingerprint scanners are the most popular, easiest to implement, and cheapest biometric device because they only measure the fingerprint. The chances of replay attacks on fingerprint scanners are very high, and this system can be fooled. Although voice pattern analysis, which measures the tone and pitch in a person’s voice is pretty good, a person who is sick or has a strained voice may not be able to authenticate.
Finally, remember that the retina scanner, which uses the blood vessels in the back of the eye for authentication, is intrusive and can give away someone’s medical condition. The iris scanner, which measures an individual’s iris pattern, on the other hand, is very secure and does not give away a person’s medical status. Both eye recognition devices are expensive to implement but at the same time, the chances of replay attacks are very low.
posted on 2019-11-04 03:01 MrCharles在cnblogs 阅读(751) 评论(0) 编辑 收藏 举报