Downloads: 88 | Views: 129
Survey Paper | Software Engineering | India | Volume 3 Issue 11, November 2014
A Vein Map Technology in Combination with Kerberos Authentication Protocol
Abstract: In the twenty first era the protection of data or information has become a very critical subject. There is increasing demand from every private as well as government agencies for the stronger authentication system that will be difficult to breach. So the idea of biometric authentication came into picture. There are various types of biometric authentication that are used over the times, such as finger print recognition, facial recognition, retina scanning and iris scanning. These biometrics all found with the different flaws. So the vein map technology came into existence. The vein map technology uses sensors that are only able to recognize vein patterns, if hemoglobin is actively flowing through the person's veins. More over each person's vein map is unique, no two person in the world can have the same vein map. For additional security purpose we can combine vein map technology with the Kerberos authentication protocol. The use of such a unique biometrics in combination with encryption of that biometric along with different registration server and authentication server the system will be very difficult to breach.
Keywords: Vein map technology, Authentication Protocol, Biometric, Kerberos, Token Granting
Edition: Volume 3 Issue 11, November 2014,
Pages: 2002 - 2004