[go: up one dir, main page]

Bisht et al., 2025 - Google Patents

Automated Access Control System Using Biometric Authentication Technologies

Bisht et al., 2025

Document ID
493747681863337917
Author
Bisht M
Aman A
Singh S
Gupta J
Singh S
Publication year
Publication venue
2025 8th International Conference on Circuit, Power & Computing Technologies (ICCPCT)

External Links

Snippet

Identification cards and passwords are two examples of traditional access control systems that are becoming more vulnerable to exploitation due to the increase in modern attacks on cyber security. This paper describes an Automated Access Control System (AACS) that …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Dasgupta et al. Advances in user authentication
Clarke Transparent user authentication: biometrics, RFID and behavioural profiling
US20200162451A1 (en) Methods, computer readable media, and systems for authentication using a text file and a one-time password
Yusop et al. Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity
Agidi Biometrics: The future of banking and financial service industry in Nigeria
Yang et al. Security and forensics in the internet of things: Research advances and challenges
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
Lone et al. A novel OTP based tripartite authentication scheme
Aramide AI-Driven Identity Verification and Authentication in Networks: Enhancing Accuracy, Speed, and Security through Biometrics and Behavioral Analytics
Gordon et al. The Official (ISC) 2 guide to the SSCP CBK
Prasad et al. A study on multifactor authentication model using fingerprint hash code, password and OTP
Cavoukian et al. Advances in biometric encryption: Taking privacy by design from academic research to deployment
Kavitha et al. Enhancing digital security: a comprehensive multi-model authentication framework leveraging cryptography and biometrics
Tetteh A systematic performance review of security methods for the cyberworld
Malik Biometric Authentication-Risks and advancements in biometric security systems
Ara et al. An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
Bock Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
Ande AI-Driven Continuous Authentication: Integrating Deep Learning with Multimodal Biometrics for Enhanced Identity Verification
Olalere et al. Bring your own device: security challenges and A theoretical framework for two-factor Authentication
Ng Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities: Emerging Research and Opportunities
Bisht et al. Automated Access Control System Using Biometric Authentication Technologies
Chang et al. [Retracted] Application of Face Recognition in E‐commerce Security Authentication in the Era of Big Data
Kumar et al. Sustainable approach to data security: multi-key biometric encryption and cloud storage for SDG-focused businesses
Sabater Biometrics as password alternative
Aboukadri et al. Machine learning based identity and access management systems (ML I&AM): A taxonomy