[go: up one dir, main page]

Lockie, 2009 - Google Patents

Biometric technology

Lockie, 2009

Document ID
6741390441225654206
Author
Lockie M
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships

Similar Documents

Publication Publication Date Title
Ashbourn Biometrics: advanced identity verification: the complete guide
Kindt Privacy and data protection issues of biometric applications
Woodward Biometrics: Privacy's foe or privacy's friend?
Jain et al. An introduction to biometric recognition
Andrejevic et al. Facial recognition
Woodward Biometric scanning, law & policy: identifying the concerns-drafting the biometric blueprint
Kim Biometrics, is it a viable proposition for identity authentication and access control?
Lyon Under my skin: from identification papers to body surveillance
Harper Identity Crisis: How identification is overused and misunderstood
Yun The ‘123’of biometric technology
Boukhonine et al. Future security approaches and biometrics
Kindt An introduction into the use of biometric technology
Sujithra et al. Next generation biometric security system: An approach for mobile device security
Bhatnagar et al. Conventional biometrics and hidden biometric: a comparative study
Kumar et al. Employment of footprint recognition system
Lockie Biometric technology
Adkins Biometrics: weighing convenience and national security against your privacy
Lockie The Biometric Industry Report-Forecasts and Analysis to 2006
Okumura et al. Identity verification using face recognition improved by managing check-in behavior of event attendees
Stanley et al. Biometric authentication: A trustworthy technology for improved authentication
Kindt The Processing of Biometric Data. A comparative legal analysis with a focus on the proportionality principle and recommendations for a legal framework.
Moradoff Biometrics: Proliferation and constraints to emerging and new technologies
Iqbal An overview of leading biometrics technologies used for human identity
Di Nardo Biometric technologies: functionality, emerging trends, and vulnerabilities
Vorobyeva et al. Benefits and issues of biometric technologies. Are biometrics worth using?