Combine fingerprint with RFID to promote the computer information security
碩士 === 國立高雄應用科技大學 === 電子工程系 === 97 === Computer and Internet applications, has become indispensable to daily life and work are closely related to one, so there are many things must be done through the computer. Although the computer has a lot of convenience, but in the information security, there ar...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/18668638910598308947 |
id |
ndltd-TW-097KUAS8393095 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097KUAS83930952016-04-29T04:19:16Z http://ndltd.ncl.edu.tw/handle/18668638910598308947 Combine fingerprint with RFID to promote the computer information security 結合指紋辨識與RFID以提升電腦資訊安全 Hai-Chen Liu 劉海真 碩士 國立高雄應用科技大學 電子工程系 97 Computer and Internet applications, has become indispensable to daily life and work are closely related to one, so there are many things must be done through the computer. Although the computer has a lot of convenience, but in the information security, there are still many doubts, because the network can be determined hacker or theft of computer hardware in order to obtain inside information on the computer, and then a lot of personal data leaks social cases. Therefore in order to improve computer security, this study was the use of technical maturity and popularity of the RFID system to identify the identity of knowledge as a database log on to the computer can improve the current account password to log in only the shortcomings of the system, only RFID system as a boarding into the computer database, and can not really distinguish the identity of the cardholder, it has a unique combination of fingerprint recognition technology, used in computer and information security systems, can effectively enhance the security of information stored in computer security. The purpose of this system is to enhance security of computer database, using RFID technology that is the most popular and easy to carry be a first login system, and has a unique combination of fingerprint recognition technology as a second checkpoint. Use this double-crossing as the identity of the user, and so will be more to protect computer database security, great results. Keywords: theft-proof, fingerprint distinguished, RFID. Ping-Shou Cheng 鄭平守 2009 學位論文 ; thesis 68 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立高雄應用科技大學 === 電子工程系 === 97 === Computer and Internet applications, has become indispensable to daily life and work are closely related to one, so there are many things must be done through the computer. Although the computer has a lot of convenience, but in the information security, there are still many doubts, because the network can be determined hacker or theft of computer hardware in order to obtain inside information on the computer, and then a lot of personal data leaks social cases. Therefore in order to improve computer security, this study was the use of technical maturity and popularity of the RFID system to identify the identity of knowledge as a database log on to the computer can improve the current account password to log in only the shortcomings of the system, only RFID system as a boarding into the computer database, and can not really distinguish the identity of the cardholder, it has a unique combination of fingerprint recognition technology, used in computer and information security systems, can effectively enhance the security of information stored in computer security.
The purpose of this system is to enhance security of computer database, using RFID technology that is the most popular and easy to carry be a first login system, and has a unique combination of fingerprint recognition technology as a second checkpoint. Use this double-crossing as the identity of the user, and so will be more to protect computer database security, great results.
Keywords: theft-proof, fingerprint distinguished, RFID.
|
author2 |
Ping-Shou Cheng |
author_facet |
Ping-Shou Cheng Hai-Chen Liu 劉海真 |
author |
Hai-Chen Liu 劉海真 |
spellingShingle |
Hai-Chen Liu 劉海真 Combine fingerprint with RFID to promote the computer information security |
author_sort |
Hai-Chen Liu |
title |
Combine fingerprint with RFID to promote the computer information security |
title_short |
Combine fingerprint with RFID to promote the computer information security |
title_full |
Combine fingerprint with RFID to promote the computer information security |
title_fullStr |
Combine fingerprint with RFID to promote the computer information security |
title_full_unstemmed |
Combine fingerprint with RFID to promote the computer information security |
title_sort |
combine fingerprint with rfid to promote the computer information security |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/18668638910598308947 |
work_keys_str_mv |
AT haichenliu combinefingerprintwithrfidtopromotethecomputerinformationsecurity AT liúhǎizhēn combinefingerprintwithrfidtopromotethecomputerinformationsecurity AT haichenliu jiéhézhǐwénbiànshíyǔrfidyǐtíshēngdiànnǎozīxùnānquán AT liúhǎizhēn jiéhézhǐwénbiànshíyǔrfidyǐtíshēngdiànnǎozīxùnānquán |
_version_ |
1718251094295969792 |