Translator Disclaimer
1 May 2014 Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system
Author Affiliations +
We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned “two-step verification” strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Wenqi He, Hongji Lai, Meng Wang, Zeyi Liu, Yongkai Yin, and Xiang Peng "Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system", Proc. SPIE 9132, Optical Micro- and Nanometrology V, 91321C (1 May 2014);


Considering IIOT and security for the DoD
Proceedings of SPIE (May 12 2016)
Protecting sensitive data: lessons learned
Proceedings of SPIE (March 12 1996)
NetWall distributed firewall in the use of campus network
Proceedings of SPIE (October 29 2011)
Security architecture of the M&M mobile agent framework
Proceedings of SPIE (July 12 2001)
A universal trust framework for pervasive computing
Proceedings of SPIE (March 29 2004)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)

Back to Top