1 May 2014 Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system
Author Affiliations +
We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned “two-step verification” strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Wenqi He, Wenqi He, Hongji Lai, Hongji Lai, Meng Wang, Meng Wang, Zeyi Liu, Zeyi Liu, Yongkai Yin, Yongkai Yin, Xiang Peng, Xiang Peng, "Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system", Proc. SPIE 9132, Optical Micro- and Nanometrology V, 91321C (1 May 2014); doi: 10.1117/12.2052154; https://doi.org/10.1117/12.2052154


Considering IIOT and security for the DoD
Proceedings of SPIE (May 11 2016)
Cyber defense through hardware security
Proceedings of SPIE (May 08 2018)
NetWall distributed firewall in the use of campus network
Proceedings of SPIE (October 29 2011)
A universal trust framework for pervasive computing
Proceedings of SPIE (March 28 2004)
Bot armies as threats to network security
Proceedings of SPIE (April 08 2007)

Back to Top