Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part II.
The RFID Systems
This work is licensed under a Creative Commons Attribution 4.0 International License.
The copyright to this article is transferred to the University of Public Service Budapest, Hungary (for U.S. government employees: to the extent transferable) effective if and when the article is accepted for publication. The copyright transfer covers the exclusive right to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or any other reproductions of similar nature.
The author warrants that this contribution is original and that he/she has full power to make this grant. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors.
An author may make an article published by University of Public Service available on a personal home page provided the source of the published article is cited and University of Public Service is mentioned as copyright holder
Abstract
The actuality of the topic indicated in the title comes from more and more events where the verification of identity might be required. Health-care is an important part of critical national infrastructures. A primary task of the protection of critical information infrastructures consists in the access control of data managed by IT system where the identity-authentication forms an important part. For this reason, the technologies considered suitable for use and their supporting means are listed. After examining and comparing the relevant parameters, the optimum solution for the authentication procedures in the Hungarian health care system is specified. First of all, the modern and efficient biometric identification processes are examined; however, the possession-based Radio Frequency Identification (RFID) as an additional system is also studied. Due to the well-known problems of passwords and chip cards. They were deliberately omitted during the system planning and efforts were made to exclude the human factors from the planned authentication system as much as possible.