"Zl\u00EDn" . "Syst\u00E9my identifikace vstupu a biometrick\u00E9 syst\u00E9my"@cs . "291733" . "Optimalization and Simulation Methods" . . "[329B4769EFB1]" . . "978-80-7318-989-1" . "Tato pr\u00E1ce se zab\u00FDv\u00E1 identifikac\u00ED osoby, kter\u00E9 jsou v dne\u0161n\u00ED dob\u011B hojn\u011B pou\u017E\u00EDv\u00E1ny pro zabezpe\u010Den\u00ED objekt\u016F a p\u0159\u00EDpadn\u00E9mu zabr\u00E1n\u011Bn\u00ED vstupu ne\u017E\u00E1douc\u00ED osoby. Tyto syst\u00E9my maj\u00ED testovanou osobu identifikovat a posl\u00E9ze i prov\u00E9st autorizaci, kter\u00E1 ur\u010D\u00ED jednotliv\u00FDm osob\u00E1m jejich pr\u00E1va a co mohou prov\u00E1d\u011Bt. B\u011B\u017En\u011B k tomuto \u00FA\u010Delu slou\u017E\u00ED p\u0159\u00EDstupov\u00E1 hesla, jen\u017Ee v dne\u0161n\u00ED dob\u011B jsou nahrazov\u00E1ny RFID syst\u00E9my, kter\u00E9 maj\u00ED identifikaci a autorizaci zjednodu\u0161it. Osoba si pak nemus\u00ED pamatovat \u017E\u00E1dn\u00E9 hesla a sta\u010D\u00ED pouze m\u00EDt u sebe RFID \u010Dip. Nev\u00FDhoda RFID je ta, \u017Ee m\u016F\u017Ee b\u00FDt \u010Dip zneu\u017Eit stejn\u00FDm zp\u016Fsobem jako heslo (odcizen\u00ED, ztr\u00E1ta), proto jsou pou\u017E\u00EDv\u00E1ny dra\u017E\u0161\u00ED a modern\u011Bj\u0161\u00ED biometrick\u00E9 syst\u00E9my, kter\u00E9 tyto nev\u00FDhody odstra\u0148uj\u00ED za cenu vy\u0161\u0161\u00EDch po\u0159izovac\u00EDch n\u00E1klad\u016F, slo\u017Eit\u011Bj\u0161\u00EDho procesu identifikace a del\u0161\u00ED doby identifikace. Tato pr\u00E1ce se zam\u011B\u0159uje p\u0159edev\u0161\u00EDm na p\u0159ehled t\u011Bchto metod a jejich princip. Jsou zde zohledn\u011Bny v\u00FDhody a nev\u00FDhody jednotliv\u00FDch syst\u00E9m\u016F a jejich pou\u017Eit\u00ED v praxi."@cs . . "28120" . . . . . . "RIV/70883521:28120/10:63509659" . "RIV/70883521:28120/10:63509659!RIV11-MSM-28120___" . . "Syst\u00E9my identifikace vstupu a biometrick\u00E9 syst\u00E9my" . . "Entry identifivation systems and biometric systems"@en . . "2010-01-01+01:00"^^ . . "Syst\u00E9my identifikace vstupu a biometrick\u00E9 syst\u00E9my"@cs . . "Tato pr\u00E1ce se zab\u00FDv\u00E1 identifikac\u00ED osoby, kter\u00E9 jsou v dne\u0161n\u00ED dob\u011B hojn\u011B pou\u017E\u00EDv\u00E1ny pro zabezpe\u010Den\u00ED objekt\u016F a p\u0159\u00EDpadn\u00E9mu zabr\u00E1n\u011Bn\u00ED vstupu ne\u017E\u00E1douc\u00ED osoby. Tyto syst\u00E9my maj\u00ED testovanou osobu identifikovat a posl\u00E9ze i prov\u00E9st autorizaci, kter\u00E1 ur\u010D\u00ED jednotliv\u00FDm osob\u00E1m jejich pr\u00E1va a co mohou prov\u00E1d\u011Bt. B\u011B\u017En\u011B k tomuto \u00FA\u010Delu slou\u017E\u00ED p\u0159\u00EDstupov\u00E1 hesla, jen\u017Ee v dne\u0161n\u00ED dob\u011B jsou nahrazov\u00E1ny RFID syst\u00E9my, kter\u00E9 maj\u00ED identifikaci a autorizaci zjednodu\u0161it. Osoba si pak nemus\u00ED pamatovat \u017E\u00E1dn\u00E9 hesla a sta\u010D\u00ED pouze m\u00EDt u sebe RFID \u010Dip. Nev\u00FDhoda RFID je ta, \u017Ee m\u016F\u017Ee b\u00FDt \u010Dip zneu\u017Eit stejn\u00FDm zp\u016Fsobem jako heslo (odcizen\u00ED, ztr\u00E1ta), proto jsou pou\u017E\u00EDv\u00E1ny dra\u017E\u0161\u00ED a modern\u011Bj\u0161\u00ED biometrick\u00E9 syst\u00E9my, kter\u00E9 tyto nev\u00FDhody odstra\u0148uj\u00ED za cenu vy\u0161\u0161\u00EDch po\u0159izovac\u00EDch n\u00E1klad\u016F, slo\u017Eit\u011Bj\u0161\u00EDho procesu identifikace a del\u0161\u00ED doby identifikace. Tato pr\u00E1ce se zam\u011B\u0159uje p\u0159edev\u0161\u00EDm na p\u0159ehled t\u011Bchto metod a jejich princip. Jsou zde zohledn\u011Bny v\u00FDhody a nev\u00FDhody jednotliv\u00FDch syst\u00E9m\u016F a jejich pou\u017Eit\u00ED v praxi." . "Identification; authorization; RFID; biometrics"@en . . . "1"^^ . "Benda, Radek" . "Entry identifivation systems and biometric systems"@en . "Syst\u00E9my identifikace vstupu a biometrick\u00E9 syst\u00E9my" . . "1"^^ . "Univerzita Tom\u00E1\u0161e Bati ve Zl\u00EDn\u011B, Fakulta aplikovan\u00E9 informatiky" . "10"^^ . "Zl\u00EDn" . "V" . "This work is dedicated about identification of person, which is nowadays widely used for building security and any prevent entry of the undesirable persons. These systems have to identify tested person and then make the authorization, which designates to individual persons theirs rights and what they can do. For this purpose are served the passwords, but nowadays they are replaced by RFID systems, which have to facilitate the indentification and authorization. The person then can n6t remember any passwords and you can carry a RFID chip only. The disadvantage of RFID is that the chip can be abused in the same way as the password (theft or loss), so they are more expensive and use more modern biometric systems that eliminate these problems at higher cost, complex process of identification and identification of a longer period. This term focuses on an overview of these methods and their principles. They are considered the advantages and disadvantages of different systems and their using in pract"@en .