Examination of retinal pattern threshold levels and their possible effect on computer access control mechanisms
Helle, Debra K.
Poock, Gary K.
La Patra, J.
MetadataShow full item record
The advent of multi-programming and the proliferation of shared computer systems has increased the need for greater computer security. Computer security can be segmented into six categories: physical, hardware, software, personnel , communications and procedures. Embedded into software security are those features which protect the system against both unauthorized access and denial of service to authorized users. Another term for this is access control. Access control mechanisms verify an individual's identity via three distinct methods: 1) something an individual knows, 2) something an individual possesses or 3) something about the individual. One device which keys on something about the individual is a retinal scan system. This system utilizes the retinal blood vessel pattern as a unique identifier. This thesis studies one such retinal pattern recognition device. For the purposes of this study, an experiment was designed and conducted which determined the reliability of this system as a function of various tolerance levels, as well as its applicability as a computer systems access control mechanism. The Eye Dentify 7.5 system by Eye Dentify Inc., of Portland, Oregon, proved to be a fairly expensive, highly reliable access control device. Its probability for false recognitions is far better than most other known devices. It can be used as a physical access device at virtually any military installation where access devices are used.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Examining the reliability of a retinal recognition device as database size and the number of enrollment scans are varied for application in Command, Control and Communications (C³) Leigh, Anthony M. Jr. (1986-12);As the amount of sensitive information stored in databases increases due to the current trend to automate Command, Control and Communication (C³) systems, the impact of unauthorized access could be very detrimental to ...
Management implications of the use of multiple retinal patterns as a means of personal identification Cox, Amry Stout (1986-09);A group of 51 adults was studied to determine of multiple patterns improved the overall recognition rates of a selected retinal scan device. The experimental mode was a laboratory simulation of a locking door mechanism ...
Examining the effect of transverse motion on retinal biometric identifiers relating to shipboard security mechanisms. Masiero, David Andrew (1986-03);The use of retinal biometric identifiers as security devices in shipboard applications was investigated with the use of the DOT 7.5(new version) and DAISY 7. 5( old version) scanners of the Eye-Dentify Co. of Beaverton, ...