Information system of biometric authentication in mobile banking
Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
Подобные документы
Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
статья, добавлен 26.01.2018Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.
статья, добавлен 26.01.2021The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021The approaches to the information system construction for analyzing work complexity. Business logic and access logic to the database, as a basis of software implementation and in future presentation logic. The block diagram of the information system.
статья, добавлен 26.06.2016Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
статья, добавлен 01.02.2024Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
диссертация, добавлен 01.09.2018Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
статья, добавлен 31.08.2022Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.
статья, добавлен 11.03.2019The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
книга, добавлен 08.03.2014The development of the document "functional requirements" for an automated system of monitoring program execution in company related to oil industry. The process of implementation of information system. The importance of proper writing of such a paper.
статья, добавлен 13.02.2016Analysis of trends in search of directions and priorities for processing electronic documents on the Internet. Technical principles of building an information retrieval system and use of the linguistic processor and neural networks for solving problems.
статья, добавлен 20.01.2017Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
презентация, добавлен 18.11.2015Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
курс лекций, добавлен 20.10.2016Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.
курс лекций, добавлен 08.03.2014The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
книга, добавлен 08.03.2014The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.
статья, добавлен 30.04.2018Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.
реферат, добавлен 20.03.2016The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
статья, добавлен 27.07.2016Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.
книга, добавлен 08.03.2014The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
статья, добавлен 28.09.2016Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
учебное пособие, добавлен 08.03.2014