Friday, May 18, 2007

Information Security in Computing Project Idea

Information Security in Computing Project Idea


Biological Password

A unique biological feature can definitely represent the certified person who is authorized to have an access to some secure information.
Fingerprint is one of these features, which has been commercialized in some application. For example, in IBM thinkpad T series, the user can record his or her fingerprint through the scanner, set up the fingerprint as the password to log into the computer.
The weakness for the current fingerprint system is that it does not work very well, it is quite time-consuming to scan and store the fingerprint, it is not convenient for the user to use this function.
We need to answer the following questions:
Is the fingerprint stored using the encryption and impossible to some attacker to retrieve successfully?
For other application, wherever the access to some specific information is restricted, can we design some structure to use the unique and impossible feature of the authorized user ,making it is impossible for the unauthorized users to enter the secure place by any force?
The features can not be restricted in the fingerprint only, voice, face, eye can also be considered if we can find a good and excellent way to apply one of those into our application…etc.

Procedure:
1. Select the unique biological feature which is easy to implement and convenient for the users
2. Get the feature scanned or recorded into the database which is encrypted, it is impossible to crack in theory.
3. Test the system


Weizhong Zhang
May 18 2007

No comments: