Access Control


Identification vs Authentication



tải về 2.19 Mb.
trang6/15
Chuyển đổi dữ liệu01.03.2024
Kích2.19 Mb.
#56689
1   2   3   4   5   6   7   8   9   ...   15
Lecture 04 Access control new (1)

Identification vs Authentication

  • Identification  Who goes there?
    • Compare one-to-many
    • Example: FBI fingerprint database
  • Authentication  Are you who you say you are?
    • Compare one-to-one
    • Example: Thumbprint mouse
  • Identification problem is more difficult
  • We are (mostly) interested in authentication

Enrollment vs Recognition

  • Enrollment phase
    • Subject’s biometric info put into database
    • Must carefully measure the required info
    • OK if slow and repeated measurement needed
    • Must be very precise
    • May be a weak point in real-world use
  • Recognition phase

Cooperative Subjects?

  • Authentication  cooperative subjects
  • Identification  uncooperative subjects
  • For example, facial recognition
    • Used in Las Vegas casinos to detect known cheaters (also, terrorists in airports, etc.)
    • Often, less than ideal enrollment conditions
    • Subject will try to confuse recognition phase
  • Cooperative subject makes it much easier
    • We are focused on authentication
    • So, we can assume subjects are cooperative

Biometric Errors

  • Fraud rate versus insult rate
  • For any biometric, can decrease fraud or insult, but other one will increase
  • For example
    • 99% voiceprint match  low fraud, high insult
    • 30% voiceprint match  high fraud, low insult
  • Equal error rate: rate where fraud == insult
    • A way to compare different biometrics

tải về 2.19 Mb.

Chia sẻ với bạn bè của bạn:
1   2   3   4   5   6   7   8   9   ...   15




Cơ sở dữ liệu được bảo vệ bởi bản quyền ©hocday.com 2024
được sử dụng cho việc quản lý

    Quê hương