fullrecord |
[{"key": "dc.contributor.advisor", "value": "Koskelainen, Tiina", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Liljander, Akseli", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-04-19T07:39:50Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-04-19T07:39:50Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/49366", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ihmiset joutuvat p\u00e4ivitt\u00e4in todentamaan identiteettins\u00e4 erilaisin keinon saadakseen p\u00e4\u00e4syn esimerkiksi johonkin palveluun tai laitteeseen. Perinteisten, esimerkiksi k\u00e4ytt\u00e4j\u00e4nimeen ja salasanaan tai ulkoisesti generoitavaan koodiin perustuvien todennusmenetelmien lis\u00e4ksi erilaiset k\u00e4ytt\u00e4j\u00e4n luonnollisiin piirteisiin perustuvat biometriset todennusmenetelm\u00e4t ovat kasvattaneet suosiotaan viime vuosina. Biometriaa hy\u00f6dynnet\u00e4\u00e4n esimerkiksi korkean turvatason kulunvalvonnassa, valtioiden rajavalvonnassa ja yksityishenkil\u00f6iden matkapuhelimissa. Tietoturvan ja k\u00e4ytett\u00e4vyyden n\u00e4k\u00f6kulmat ovat t\u00e4rkeit\u00e4, jotta voidaan luoda biometrisia todennusj\u00e4rjestelmi\u00e4, joissa saavutetaan tyydytt\u00e4v\u00e4 turvataso ja s\u00e4ilytet\u00e4\u00e4n kuitenkin palvelun k\u00e4yt\u00f6n ja todentamistilanteen k\u00e4ytt\u00e4j\u00e4yst\u00e4v\u00e4llisyys sek\u00e4 mielekkyys. Puutteellinen tietoturva voi aiheuttaa arkaluontoisten tietojen ja toimintojen p\u00e4\u00e4tymisen v\u00e4\u00e4riin k\u00e4siin. Tietoturvan taso voi kuitenkin olla joillekin k\u00e4ytt\u00e4jille n\u00e4kym\u00e4t\u00f6n ja tuntematon aihe, kun taas k\u00e4ytett\u00e4vyys on suoraan vaikutuksessa k\u00e4ytt\u00e4j\u00e4n tyytyv\u00e4isyyteen ja vaikuttaa my\u00f6s suuresti ostop\u00e4\u00e4t\u00f6kseen. T\u00e4ss\u00e4 tutkielmassa k\u00e4sitell\u00e4\u00e4n tietoturvaa ja k\u00e4ytett\u00e4vyytt\u00e4 biometrisiss\u00e4 sormenj\u00e4ljen ja iiriksen tunnistuksen menetelmiss\u00e4. Tutkielman tavoitteena on selvitt\u00e4\u00e4 n\u00e4iden todennusmenetelmien tietoturvan ja k\u00e4ytett\u00e4vyyden suurimpia ongelmia, sek\u00e4 pyrkimyksi\u00e4 niiden ratkaisemiseen. Lis\u00e4ksi pyrit\u00e4\u00e4n selvitt\u00e4m\u00e4\u00e4n, miten tietoturvaa ja k\u00e4ytett\u00e4vyytt\u00e4 mitataan biometrisessa k\u00e4ytt\u00e4j\u00e4ntodentamisessa. Tutkielma on kirjallisuuskatsaus, jonka p\u00e4\u00e4asiallisia l\u00e4hteit\u00e4 ovat alan konferenssi- ja lehtiartikkelit. Tutkielmassa havaitaan biometrisess\u00e4 todennuksessa esiintyv\u00e4n k\u00e4ytett\u00e4vyyden ongelmia, jotka johtuvat esimerkiksi k\u00e4ytt\u00e4j\u00e4n syntyper\u00e4st\u00e4, ik\u00e4\u00e4ntymisest\u00e4, ty\u00f6historiasta, onnettomuudesta tai ymp\u00e4rist\u00f6olosuhteista. Pyrkimyksi\u00e4 n\u00e4iden ongelmien ratkaisemiseksi l\u00f6ydet\u00e4\u00e4n menetelmien tunnistuksen algoritmien, k\u00e4ytt\u00f6liittymien, laitteiden ja kuvaustekniikoiden kehitt\u00e4misen saralta. Tietoturvan suurimmaksi ongelmaksi taas havaitaan ihmisen biometristen, yksil\u00f6ivien tunnisteiden rajallinen m\u00e4\u00e4r\u00e4, sek\u00e4 niiden vaihdettavuuden ja korvattavuuden puute. Ongelman korjaamiseksi havaitaan olevan kehitetty erilaisia kumottavissa olevan biometrian menetelmi\u00e4 ja algoritmeja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "People run into different kinds of identity-claim scenarios in their daily lives. Traditional means of user authentication include usernames and passwords or externally generated codes. However, lately biometric methods, which are based on user\u2019s natural features, have gained popularity as well. Biometry is utilized, for an example, in high-security access control, national border control and personal mobile phones.The aspects of data security and usability are crucial for creating biometric systems, which achieve the required security level, while maintaining the user-friendliness and reasonableness of using the service. Lack of proper security might cause sensitive data to end up in the wrong hands. However, data security might be an invisible and unknown area for some users, while usability is tightly connected to user satisfaction and also affects buying decisions greatly. This thesis studies data security and usability in biometric user authentication technologies, emphasizing the methods of user authentication via fingerprint and iris recognition. The thesis aims to identify the main problems of data security and usability in these methods, and the steps, which have been taken to adjust them. The meters of evaluating data security and usability on biometry was also researched. The thesis was conducted as a literary review mainly based on conference and journal articles on the field of information systems. It was perceived, that biometric authentication includes usability problems which are caused by innate features, aging, working history, accidents or environmental effects. To adjust these problems, methods of improving the algorithms, user interfaces, devices and imaging have been suggested. The greatest problem in the area of data security was found to be the lack of different, unique biometric samples in a human being, and the absence of possibilities in changing and replacing those samples. To overcome this problem, many methods and algorithms of cancelable biometrics have been created.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Akseli Liljander (akpealli) on 2016-04-19 07:39:49.752833. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-04-19T07:39:50Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201604192241.pdf: 582375 bytes, checksum: ec21da89c52acc3bda6fbbf51e24a0a8 (MD5)\nlicense.html: 4870 bytes, checksum: 00a5bae825b3abb7dbbbcff99fb0cae3 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-04-19T07:39:50Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201604192241.pdf: 582375 bytes, checksum: ec21da89c52acc3bda6fbbf51e24a0a8 (MD5)\nlicense.html: 4870 bytes, checksum: 00a5bae825b3abb7dbbbcff99fb0cae3 (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "33", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "biometria", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "todentaminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytett\u00e4vyys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "sormenj\u00e4ljet", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Biometristen todennusmenetelmien tietoturva ja k\u00e4ytett\u00e4vyys \u2013 sormenj\u00e4lki ja silm\u00e4n iiris biometrisin\u00e4 tunnisteina", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201604192241", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-04-19T07:39:50Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|