NCJ Number
36480
Journal
Security World Volume: 12 Issue: 8 Dated: (SEPTEMBER 1975) Pages: 18-19,48-50
Date Published
1975
Length
5 pages
Annotation
DISCUSSION OF SOME APPROACHES TO IDENTIFYING INDIVIDUALS FOR ADMITTANCE TO LIMITED ACCESS AREAS, INCLUDING METHODS OF USER IDENTIFICATION AND THE RELATIVE DESIRABILITY OF LOCAL OR CENTRAL ACCESS CONTROL DECISIONMAKING.
Abstract
THREE TYPES OF USER IDENTIFICATION ARE CONSIDERED: THOSE INVOLVING MACHINE RECOGNITION OF PHYSICAL CHARACTERISTICS (FINGERPRINTS OR VOICEPRINTS); THOSE INVOLVING POSSESSION OF A PHYSICAL OBJECT, SUCH AS A METAL KEY; AND THOSE INVOLVING SOMETHING REMEMBERED BY THE USER (THE 'PASSWORD' CONCEPT). IT IS SUGGESTED THAT THE 'PERFECT' ACCESS CONTROL SYSTEM (ONE CONTAINING EQUALLY HIGH LEVELS OF SECURITY AND RELIABILITY) WOULD BE ONE COMBINING THE MAGNETIC STRIPE CARD AND LINKED MICRO-COMPUTER STATIONS.