DOI QR코드

DOI QR Code

Implementation of Telebiometrics Application System Using Mobile Device

  • Received : 2014.02.11
  • Accepted : 2014.03.20
  • Published : 2014.03.25

Abstract

Today, with the wide use of mobile devices, the amount of business transactions conducted through such devices is increasing drastically. However, there are several limitations in the area of authentication for mobile use, which requires strong authentication mechanisms to satisfy security and convenience requirements. The proposed model and application system provide a framework to ensure the security and reliability of the flow of biometric information for telebiometric applications using mobile devices. We also specify protocols for each model and implement a mobile telebiometric application to improve security vulnerabilities compared to storage in a microSD match on card (MOC) based on the proposed model. As a consequence of this implementation, we propose substantial guidelines for security countermeasures from both technical and managerial perspectives in order to establish a safe mobile environment for the use of telebiometric systems.

Keywords

References

  1. Y. N. Shin, M. J. Kwon, Y. J. Lee, J. I. Park, and M. G. Chun, "Biometric and identity reference protection," Journal of Korean Institute of Intelligent Systems, vol. 19, no. 2, pp. 160-167, Apr. 2009. https://doi.org/10.5391/JKIIS.2009.19.2.160
  2. "Why Apple really bought AuthenTec: It wanted "new technology" for upcoming products, and quickly," Available, http://thenextweb.com/apple/2012/08/16/thereal-reason-apple-acquired-authentec-because-needednew-technology-quickly-products/2012/
  3. J. Claessens, V. Dem, D. De Cock, B. Preneel, and J. Vandewalle, "On the security of todays online electronic banking systems," Computers & Security, vol. 21, no. 3, pp. 253-265, Jun. 2002. http://dx.doi.org/10.1016/S0167-4048(02)00312-7
  4. M. Soltane and M. Bakhti, "Multi-modal biometric authentications: concept issues and applications strategies," International Journal of Advanced Science and Technology, vol. 48, pp. 23-60, Nov. 2012.
  5. Y. N. Shin and W. C. Shin, "A security reference model for the construction of mobile banking services based on smart phon," International Journal of Fuzzy Logic and Intelligent Systems, vol. 11, no. 4, pp. 229-237, Dec. 2011. http://dx.doi.org/10.5391/IJFIS.2011.11.4.229
  6. Y. N. Shin, "Standard implementation for privacy framework and privacy reference architecture for protecting personally identifiable information," International Journal of Fuzzy Logic and Intelligent Systems, vol. 11, no. 3, pp. 197-203, Sep. 2011. http://dx.doi.org/10.5391/IJFIS.2011.11.3.197
  7. Y. N. Shin, "Framework for the telebiometric systems using mobile biometrics," International Journal of Bio-Science & Bio-Technology, vol. 5, no. 2, pp. 77-88, Apr. 2013.