12.07.2015 Views

buletin ştiin ific - Facultatea de Stiinte Economice - Universitatea din ...

buletin ştiin ific - Facultatea de Stiinte Economice - Universitatea din ...

buletin ştiin ific - Facultatea de Stiinte Economice - Universitatea din ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Problems of biometric methods in Authentication and Authorization InfrastructuresA solution of the problems mentioned above can be offered by authentication and authorizationinfrastructures (called AAIs from now on), which are combinations of services and methods thatallow customers of different web services access to protected contents stored on differentservers. In this case, the authentication does not take place on every server, nor in some centralplace, but on the server of one single company, which later submits the authorization to anotherrequested web service.Although the AAI represents the successor to single sign on technology, its principles offunctioning are not yet clearly <strong>de</strong>fined and many questions are still to be answered [7]. So far,there are implementations of different AAIs based on password technology. Nevertheless, thesehave all the disadvantages implied by the knowledge factor of password. In case of AAIs, wherewith one authentication a user is granted access to all of his accounts (thus having one singlei<strong>de</strong>ntity), it is mandatory that no user is able to authenticate as someone else. This request makespassword and token based authentications ina<strong>de</strong>quate in the use with future AAIs. The onlyauthentication method which can provi<strong>de</strong> protection against transmission of cre<strong>de</strong>ntials isbiometric authentication.This paper gives a short overview of potential problems that can occur upon using biometricauthentication technologies within AAIs. While biometric systems provi<strong>de</strong> an authenticationtechnology which is already used in software applications, their implementation within an AAIwill raise a set of special problems, which are of architectural, security and quality nature andaffect every type of biometrics.2. Design researchIn or<strong>de</strong>r to <strong>de</strong>sign an AAI system based on two-factor authentication that combines passwordand biometrics, two possible main AAI architectures are consi<strong>de</strong>red:• Central Single Sign On server (SSO)This architecture implies that only one <strong>de</strong>dicated server is responsible for the authenticationprocess and for the ticket-generation process. From the flow-logic point of view it is possiblethat the user first logs in at the central server and then chooses which resources he wants to use.It is also possible that the user first requires the access to one resource and, if he does not have aticket yet, he will be redirected to the central server.The advantage of this architecture relies in its low redundancy in the authentication process andticket generation, while its disadvantage is the single point of failure: if the central server isunavailable, no online resource can be accessed.• Circle of Trust (CoT)The CoT-architecture is <strong>de</strong>fined as a union of resources where each one of them is able togenerate online tickets valid for any resource from the circle. While being more difficult toimplement than the Central SSO Server, the circle of trust has the advantage of being failsafewhen one of the resources is unavailable.The AAI presented uses the typing-ca<strong>de</strong>nce biometrics based on the Psylock method ofrecognition [1], <strong>de</strong>veloped since 1993 at the University of Regensburg. This biometric methoduses as input parameters the keys events that were pressed or released (from a standard computerkeyboard), together with the time when the events occurred (in milliseconds). From this data twotypes of features are extracted: dynamic attributes (like speed or rhythm) and static attributes(like the preference for left and right hand, agility, use of shift keys, ways or making orcorrecting mistakes, etc.). By means of neural networks and support vector machines, theseattributes are compared to those stored in the user profile [3] and a match score between 0% and18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!