Bisht et al., 2025 - Google Patents
Automated Access Control System Using Biometric Authentication TechnologiesBisht et al., 2025
- Document ID
- 493747681863337917
- Author
- Bisht M
- Aman A
- Singh S
- Gupta J
- Singh S
- Publication year
- Publication venue
- 2025 8th International Conference on Circuit, Power & Computing Technologies (ICCPCT)
External Links
Snippet
Identification cards and passwords are two examples of traditional access control systems that are becoming more vulnerable to exploitation due to the increase in modern attacks on cyber security. This paper describes an Automated Access Control System (AACS) that …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Dasgupta et al. | Advances in user authentication | |
| Clarke | Transparent user authentication: biometrics, RFID and behavioural profiling | |
| US20200162451A1 (en) | Methods, computer readable media, and systems for authentication using a text file and a one-time password | |
| Yusop et al. | Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity | |
| Agidi | Biometrics: The future of banking and financial service industry in Nigeria | |
| Yang et al. | Security and forensics in the internet of things: Research advances and challenges | |
| Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
| Lone et al. | A novel OTP based tripartite authentication scheme | |
| Aramide | AI-Driven Identity Verification and Authentication in Networks: Enhancing Accuracy, Speed, and Security through Biometrics and Behavioral Analytics | |
| Gordon et al. | The Official (ISC) 2 guide to the SSCP CBK | |
| Prasad et al. | A study on multifactor authentication model using fingerprint hash code, password and OTP | |
| Cavoukian et al. | Advances in biometric encryption: Taking privacy by design from academic research to deployment | |
| Kavitha et al. | Enhancing digital security: a comprehensive multi-model authentication framework leveraging cryptography and biometrics | |
| Tetteh | A systematic performance review of security methods for the cyberworld | |
| Malik | Biometric Authentication-Risks and advancements in biometric security systems | |
| Ara et al. | An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies | |
| Bock | Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication | |
| Ande | AI-Driven Continuous Authentication: Integrating Deep Learning with Multimodal Biometrics for Enhanced Identity Verification | |
| Olalere et al. | Bring your own device: security challenges and A theoretical framework for two-factor Authentication | |
| Ng | Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities: Emerging Research and Opportunities | |
| Bisht et al. | Automated Access Control System Using Biometric Authentication Technologies | |
| Chang et al. | [Retracted] Application of Face Recognition in E‐commerce Security Authentication in the Era of Big Data | |
| Kumar et al. | Sustainable approach to data security: multi-key biometric encryption and cloud storage for SDG-focused businesses | |
| Sabater | Biometrics as password alternative | |
| Aboukadri et al. | Machine learning based identity and access management systems (ML I&AM): A taxonomy |