
159
9
implemeNtatioN of
New methodS
e proposed model described in this chapter is based on the
biometric authentication method using the iris of the eye and the
asymmetric cryptography using the Rivest–Shamir–Adleman
(RSA) algorithm (Stallings 1999). is model is founded on the
use of the biometric iris signature gabarit of a person to access a
computer system. e justification for the choice of the biomet-
ric model based on the iris of the eye is presented in this chapter,
as well as the description of the different modules constitut-
ing this model. In this model the authentication process allows
obtaining a gabarit “diagonal horizontal vertica ...