Auflistung nach Autor:in "Breithaupt, Ralph"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- Konferenzbeitrag”On-card“ user authentication for contactless smart cards based on gesture recognition(SICHERHEIT 2012 – Sicherheit, Schutz und Zuverlässigkeit, 2012) Ullmann, Markus; Breithaupt, Ralph; Gehring, FrankSmart cards are widely used for security purposes. To protect smart cards against misuse an authentication process (e.g. entering a pin or password) is necessary. Due to missing input interfaces “on-card”, an external terminal is required to input the password. Unfortunately the required external hardware (e.g. keypads, etc.) opens up new security issues by being vulnerable against attacks like side channel, forgery & tampering, man in the middle, eavesdropping and others. An elegant solution for such problems is an authentication process “on-card” without the need for external devices. This paper presents a new class of contactless, ISO 14443 compliant smart cards which are equipped with a multipurpose user input interface as 2D gesture recognition sensor together with an optical feedback component. This offers new “on-card” authentication, card configuration and even front end interface capabilities. We will describe the basics of the general hardware design and discuss the gesture recognition process.
- KonferenzbeitragVolumetric fingerprint data analysis using optical coherence tomography(BIOSIG 2013, 2013) Sousedik, Ctirad; Breithaupt, Ralph; Busch, ChristophThe increasing usage of fingerprint biometrics as a security technology requires the biometric systems to be resistant against moderate or even high attack potential. To date, state-of-the-art fingerprint sensors can be deceived by using an accurate imitation of the ridge/valley pattern of an enrolled fingerprint that can be produced utilizing low-cost, commonly available materials and techniques. The structure of high-resolution 3D volumetric scans of fingertips, acquired by using the Optical Coherence Tomography (OCT), has been analyzed by this work so that a Presentation Attack Detection method could be developed that would render the artefact production process extremely difficult or even practically impossible.