Skip to main content

Verisoft – secure biometric identification system

  • Conference paper
Digital Excellence

The Verisoft project is a long–term research project, funded by the German Federal Ministry of Education and Research. It aims at verifying the correctness of concrete application tasks, one from academic and up to four from industrial backgrounds. This paper gives an introduction to one of the industrial applications, subproject 4 “Chipcard Based Biometric Identification System (CBI system)”. Firstly, biometric systems in general are discussed in order to define security requirements of a more secure system. Then the security functions and the overall design of the CBI system as well as verification task are identified. Finally a more detailed view of the implemented function is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Dolev D, Yao AC (1983), On security of public key protocols. In Transactions of Information Theory, volume 29 of IEEE, pages 198-208

    Google Scholar 

  • Giampaolo B, Lawrence C (2001), Paulson Mechanical Proofs about a Non-Repudiation protocol. In Richard J. Boulton and Paul B. Jackson, editors, Proc. of TPHOL 2001, 14th international conference on Theorem Proving in Higher Order Logics, volume 2152 of LNCS, pages 91-104

    Google Scholar 

  • Hutter D et al. (1996), Verification Support Environment (VSE). High Integrity Systems, 1(6):523-530

    Google Scholar 

  • Lassmann G et al. (2004), Übersichtsspezifikation: Verisoft - Chipkartenbasiertes Biometrisches Identifikationssystem. Technical Report, T-Systems Nova

    Google Scholar 

  • Lassmann G (Ed.) (2006), Bewertungskriterien zur Vergleichbarkeit biometischer Verfahren, TeleTrusT Working Group 6, 2002 &1998, new in 2006, http://www.teletrust.de

  • Paulson LC (1998), The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rock, G., Lassmann, G., Schwan, M., Cheikhrouhou, L. (2008). Verisoft – secure biometric identification system. In: Welfens, P.J.J., Walther-Klaus, E. (eds) Digital Excellence. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72621-0_8

Download citation

Publish with us

Policies and ethics