Examination of retinal pattern threshold levels and their possible effect on computer access control mechanisms

Loading...
Thumbnail Image
Authors
Helle, Debra K.
Advisors
Poock, Gary K.
Second Readers
La Patra, J.
Subjects
Access control
Computer security
Retinal pattern recognitions
Authorization techniques
Identity verifications
Date of Issue
1985-09
Date
September 1985
Publisher
Language
en_US
Abstract
The advent of multi-programming and the proliferation of shared computer systems has increased the need for greater computer security. Computer security can be segmented into six categories: physical, hardware, software, personnel , communications and procedures. Embedded into software security are those features which protect the system against both unauthorized access and denial of service to authorized users. Another term for this is access control. Access control mechanisms verify an individual's identity via three distinct methods: 1) something an individual knows, 2) something an individual possesses or 3) something about the individual. One device which keys on something about the individual is a retinal scan system. This system utilizes the retinal blood vessel pattern as a unique identifier. This thesis studies one such retinal pattern recognition device. For the purposes of this study, an experiment was designed and conducted which determined the reliability of this system as a function of various tolerance levels, as well as its applicability as a computer systems access control mechanism. The Eye Dentify 7.5 system by Eye Dentify Inc., of Portland, Oregon, proved to be a fairly expensive, highly reliable access control device. Its probability for false recognitions is far better than most other known devices. It can be used as a physical access device at virtually any military installation where access devices are used.
Type
Thesis
Description
Series/Report No
Department
Administrative Sciences
Organization
Naval Postgraduate School (U.S.)
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections