Levonevskiy et al., 2022 - Google Patents
Complex User Identification and Behavior Anomaly Detection in Corporate Smart SpacesLevonevskiy et al., 2022
- Document ID
- 14768043046728772269
- Author
- Levonevskiy D
- Motienko A
- Vinogradov M
- Publication year
- Publication venue
- International Conference on Interactive Collaborative Robotics
External Links
Snippet
This research deals with the task of detecting security anomalies and incidents in corporate smart spaces equipped with physical access control systems that support simultaneous implementation of various user identification and/or authentication methods and are often …
- 238000001514 detection method 0 title description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4905657B2 (en) | Security monitoring device, security monitoring system, and security monitoring method | |
Bircan et al. | Big data for whose sake? Governing migration through artificial intelligence | |
US20210196169A1 (en) | Methods and System for Monitoring and Assessing Employee Moods | |
Eastwood et al. | Biometric-enabled authentication machines: A survey of open-set real-world applications | |
JP6081859B2 (en) | Entrance / exit management system and entrance / exit management method | |
Bowling et al. | Automated policing: the case of body-worn video | |
Halboob et al. | Crowd management intelligence framework: Umrah use case | |
Gorodnichy et al. | Automated border control: Problem formalization | |
Fugini et al. | A web-based cooperative tool for risk management with adaptive security | |
KR102602862B1 (en) | Integrated Access-security management control system based on mobile pass-certificate for visitor-visit vehicle | |
Kyriazanos et al. | Automated decision making in airport checkpoints: Bias detection toward smarter security and fairness | |
Altameem et al. | RETRACTED ARTICLE: Crime activities prediction using hybridization of firefly optimization technique and fuzzy cognitive map neural networks | |
Levonevskiy et al. | Complex User Identification and Behavior Anomaly Detection in Corporate Smart Spaces | |
Levonevskiy et al. | Approach to physical access management, control and analytics using multimodal and heterogeneous data | |
Sager | Big data, surveillance, and migration: a neo-republican account | |
di Bella et al. | Smart Security: Integrated systems for security policies in urban environments | |
Zharova et al. | The Bayes model for the protection of human interests | |
Fujii | Verifiable record of AI output for privacy protection: public space watched by AI-connected cameras as a target example | |
Monteiro et al. | An overview of artificial intelligence technology directed at smart sensors and devices from a modern perspective | |
KR102647002B1 (en) | Anomaly detection method for Individual user using AI variable threshold | |
Hintz | AI, big data and bias: governing datafication through a data justice lens | |
Alshawish et al. | G-DPS: A game-theoretical decision-making framework for physical surveillance games | |
Cheh et al. | Leveraging physical access logs to identify tailgating: Limitations and solutions | |
Albu et al. | Three sides of the same coin: datafied transparency, biometric surveillance, and algorithmic governmentalities | |
Jiang et al. | Development of personnel epidemic prevention monitoring access control system |