Analysis-by-Synthesis

  • PDF / 1,624,653 Bytes
  • 48 Pages / 547.087 x 737.008 pts Page_size
  • 111 Downloads / 220 Views

DOWNLOAD

REPORT


ACBio instance An ACBio instance is a data structure generated by a Biometric Processing Unit (BPU) and contains data that can be used by an external ‘‘validator’’ process of a biometric verification process to authenticate the BPU and its functional transaction data and other information. The validating data is typically in the form of digitally signed certificates that authenticate the BPU entity and, where appropriate, security relevant aspects of its performance. Examples include: authentication of stored biometric references (templates) used for verification, and certification of the performance capabilities of the biometric technology used in the recognition process. The ACBio instance is digitally signed and bound to #

2009 Springer Science+Business Media, LLC

the functional transaction data from the BPU. The digitally signed certificates are provided by a trusted 3rd party organisation through an evaluation and certification procedure that is not defined by the ACBio standard. A BPU is a functional component of a biometric transaction system that operates at a uniform security level. It contains one or more subprocesses, the last of which generates the ACBio instance for the BPU and outputs it together with the functional transaction data from the BPU. The ACBio instance can be used by a subsequent ‘‘validator’’ process of a biometric verification process to authenticate the BPU and its functional transaction data and other information. ▶ Biometric Security, Standardization

Acceleration Acceleration of pen-movement during the signing process. This feature is used for on-line signature verification. There are two ways to obtain the acceleration feature. One way is to measure the pen acceleration directly with accelerometers integrated into the pen. The other way is to compute the acceleration from other measurements, for example, from the second-order derivative of the pen position signal with respect to time. ▶ Signature Recognition

Access Control ▶ Access Control, Logical ▶ Access Control, Physical

2

A

Access Control, Logical

Access Control, Logical VANCE B JORN DigitalPersona Inc., Redwood City, CA, USA

Synonym Logon, Password management

Definition Logical access control is the means and procedures to protect access to information on PCs, networks, and mobile phones. A variety of credential types may be used, such as passwords, tokens, or biometrics, to authenticate the user. These credentials may represent something the user knows (password), something the user has (token), or a physical trait of the user (biometrics). A logical access control system will implement a method to enroll and associate credentials with the user, and then to request that one or more of the user’s credentials be authenticated for access to the resource (application, network, device, or operating system). The logical access control system may also log all access attempts for use in auditing who and when someone accessed a specific resource.

Introduction The key used to open almost any door in the digital realm has trad

Data Loading...