Integrating biometric authentication into multiple applications

Please be advised that the site will be down for maintenance on Sunday, September 1, 2024, from 08:00 to 18:00, and again on Monday, September 2, 2024, from 08:00 to 09:00. We apologize for any inconvenience this may cause.

Show simple item record

dc.contributor.advisor Olivier, Marco en
dc.contributor.postgraduate Breedt, Morne en
dc.date.accessioned 2013-09-07T11:49:48Z
dc.date.available 2007-09-10 en
dc.date.available 2013-09-07T11:49:48Z
dc.date.created 2006-08-01 en
dc.date.issued 2005 en
dc.date.submitted 2007-08-28 en
dc.description Dissertation (MSc (Computer Engineering))--University of Pretoria, 2005. en
dc.description.abstract The Internet has grown from its modest academic beginnings into an important, global communication medium. It has become a significant, intrinsic part of our lives, how we distribute information and how we transact. It is used for a variety of purposes, including: banking; home shopping; commercial trade - using EDI (Electronic Data Interchange); and to gather information for market research and other activities. Owing to its academic origins, the early developers of the Internet did not focus on security. However, now that it has rapidly evolved into an extensively used, global commercial transaction and distribution channel, security has become a big concern. Fortunately, the field of information security has started to evolve in response and is fast becoming an important discipline with a sound theoretical basis. The discipline views the twin processes of identification and authentication as crucial aspects of information security. An individual access attempt must be identifiable prior to access being authorised otherwise system confidentiality cannot be enforced nor integrity safeguarded. Similarly, non-denial becomes impossible to instigate since the system is unable to log an identity against specific transactions. Consequently, identification and authentication should always be viewed as the first step to successfully enforcing information security. The process of identification and authorisation is, in essence, the ability to prove or verify an identity. This is usually accomplished using either one or a combination of the following three traditional identification techniques: something you possess; something you know; or something you are. A critical consideration when designing an application is which identification method, or combination of methods, from the three described above to use. Each method offers its own pros and cons and there are many ways to compare and contrast them. The comparison made in this study identifies biometrics as the best solution in a distributed application environment. There are, however, two over-arching hindrances to its widespread adoption. The first is the environment’s complexity - with multiple applications being accessed by both the public and the private sectors - and the second is that not all biometrics are popular and no single method has universe appeal. The more significant hindrance of the two is the latter, that of acceptance and trust, because it matters little how good or efficient a system is if nobody is willing to use it. This observation suggests that the identification system needs to be made as flexible as possible. In a democratic society, it could be argued that the best way of ensuring the successful adoption of a biometric system would be to allow maximum freedom of choice and let users decide which biometric method they would like to use. Although this approach is likely to go a long way towards solving the acceptance issue, it increases the complexity of the environment significantly. This study attempts to solve this problem by reducing the environment’s complexity while simultaneously ensuring the user retains maximum biometric freedom of choice. This can be achieved by creating a number of central biometric repositories. Each repository would be responsible for maintaining a biometric template data store for a type of biometric. These repositories or “Biometric Authorities” would act as authentication facilitators for a wide variety of applications and free them from that responsibility. en
dc.description.availability unrestricted en
dc.description.degree MSc
dc.description.department Electrical, Electronic and Computer Engineering en
dc.identifier.citation Breedt, M 2005, Integrating biometric authentication into multiple applications, MSc Dissertation, University of Pretoria, Pretoria, viewed yymmdd <http://hdl.handle.net/2263/27605>
dc.identifier.other Pretoria en
dc.identifier.upetdurl http://upetd.up.ac.za/thesis/available/etd-08282007-135540/ en
dc.identifier.uri http://hdl.handle.net/2263/27605
dc.language.iso en
dc.publisher University of Pretoria en_ZA
dc.rights © University of Pretor en
dc.subject Passport en
dc.subject Biometric authority en
dc.subject Visa en
dc.subject Bioapi en
dc.subject Iris recognition en
dc.subject Fingerprint en
dc.subject Hand recognition en
dc.subject Privacy en
dc.subject Security en
dc.subject Authentication en
dc.subject UCTD en_US
dc.title Integrating biometric authentication into multiple applications en
dc.type Dissertation en


Files in this item

This item appears in the following Collection(s)

Show simple item record