[go: up one dir, main page]

Nandakumar, 2009 - Google Patents

Security Issues, System Design

Nandakumar, 2009

Document ID
5698931656163294928
Author
Nandakumar K
Publication year
Publication venue
Encyclopedia of Biometrics

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Similar Documents

Publication Publication Date Title
EP3005202B1 (en) System and method for biometric authentication with device attestation
Kunda et al. A survey of android mobile phone authentication schemes
Alaswad et al. Vulnerabilities of biometric authentication threats and countermeasures
Thomas et al. Machine learning and cybersecurity
Kaiwartya et al. An Investigation on Biometric Internet Security.
Gao Biometric authentication in smart grid
Stokkenes et al. Biometric authentication protocols on smartphones: An overview
Park et al. Combined authentication-based multilevel access control in mobile application for DailyLifeService
Debas et al. Biometric in cyber security: a mini review
Tetteh A systematic performance review of security methods for the cyberworld
Kumar Biometric systems security and privacy issues
Ratha Privacy protection in high security biometrics applications
Bharathi et al. A review on biometric template security
Adler et al. Biometric vulnerabilities, overview
Sabater Biometrics as password alternative
Adler et al. Security and liveness, overview
Abdullayeva et al. Analysis of security vulnerabilities in biometric systems
Alonso-Fernandez et al. Secure access system using signature verification over tablet PC
Nandakumar Security Issues, System Design
Mills et al. Cybercrimes against consumers: could biometric technology be the solution?
Yadav et al. Website security for detection and prevention of attacks
Nandakumar Encyclopedia of Biometrics Springer Science+ Business Media, LLC 2009
SHIN et al. A study of cancelable biometrics in the security improvement of biometric authentication system using fault tree analysis
Sukaitis et al. Building a path towards responsible use of Biometrics
Erlich et al. Goals and practices in maintaining information systems security