Nandakumar, 2009 - Google Patents
Security Issues, System DesignNandakumar, 2009
- Document ID
- 5698931656163294928
- Author
- Nandakumar K
- Publication year
- Publication venue
- Encyclopedia of Biometrics
External Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3005202B1 (en) | System and method for biometric authentication with device attestation | |
Kunda et al. | A survey of android mobile phone authentication schemes | |
Alaswad et al. | Vulnerabilities of biometric authentication threats and countermeasures | |
Thomas et al. | Machine learning and cybersecurity | |
Kaiwartya et al. | An Investigation on Biometric Internet Security. | |
Gao | Biometric authentication in smart grid | |
Stokkenes et al. | Biometric authentication protocols on smartphones: An overview | |
Park et al. | Combined authentication-based multilevel access control in mobile application for DailyLifeService | |
Debas et al. | Biometric in cyber security: a mini review | |
Tetteh | A systematic performance review of security methods for the cyberworld | |
Kumar | Biometric systems security and privacy issues | |
Ratha | Privacy protection in high security biometrics applications | |
Bharathi et al. | A review on biometric template security | |
Adler et al. | Biometric vulnerabilities, overview | |
Sabater | Biometrics as password alternative | |
Adler et al. | Security and liveness, overview | |
Abdullayeva et al. | Analysis of security vulnerabilities in biometric systems | |
Alonso-Fernandez et al. | Secure access system using signature verification over tablet PC | |
Nandakumar | Security Issues, System Design | |
Mills et al. | Cybercrimes against consumers: could biometric technology be the solution? | |
Yadav et al. | Website security for detection and prevention of attacks | |
Nandakumar | Encyclopedia of Biometrics Springer Science+ Business Media, LLC 2009 | |
SHIN et al. | A study of cancelable biometrics in the security improvement of biometric authentication system using fault tree analysis | |
Sukaitis et al. | Building a path towards responsible use of Biometrics | |
Erlich et al. | Goals and practices in maintaining information systems security |