[go: up one dir, main page]

Levonevskiy et al., 2022 - Google Patents

Complex User Identification and Behavior Anomaly Detection in Corporate Smart Spaces

Levonevskiy et al., 2022

Document ID
14768043046728772269
Author
Levonevskiy D
Motienko A
Vinogradov M
Publication year
Publication venue
International Conference on Interactive Collaborative Robotics

External Links

Snippet

This research deals with the task of detecting security anomalies and incidents in corporate smart spaces equipped with physical access control systems that support simultaneous implementation of various user identification and/or authentication methods and are often …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00103Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system

Similar Documents

Publication Publication Date Title
JP4905657B2 (en) Security monitoring device, security monitoring system, and security monitoring method
Bircan et al. Big data for whose sake? Governing migration through artificial intelligence
US20210196169A1 (en) Methods and System for Monitoring and Assessing Employee Moods
Eastwood et al. Biometric-enabled authentication machines: A survey of open-set real-world applications
JP6081859B2 (en) Entrance / exit management system and entrance / exit management method
Bowling et al. Automated policing: the case of body-worn video
Halboob et al. Crowd management intelligence framework: Umrah use case
Gorodnichy et al. Automated border control: Problem formalization
Fugini et al. A web-based cooperative tool for risk management with adaptive security
KR102602862B1 (en) Integrated Access-security management control system based on mobile pass-certificate for visitor-visit vehicle
Kyriazanos et al. Automated decision making in airport checkpoints: Bias detection toward smarter security and fairness
Altameem et al. RETRACTED ARTICLE: Crime activities prediction using hybridization of firefly optimization technique and fuzzy cognitive map neural networks
Levonevskiy et al. Complex User Identification and Behavior Anomaly Detection in Corporate Smart Spaces
Levonevskiy et al. Approach to physical access management, control and analytics using multimodal and heterogeneous data
Sager Big data, surveillance, and migration: a neo-republican account
di Bella et al. Smart Security: Integrated systems for security policies in urban environments
Zharova et al. The Bayes model for the protection of human interests
Fujii Verifiable record of AI output for privacy protection: public space watched by AI-connected cameras as a target example
Monteiro et al. An overview of artificial intelligence technology directed at smart sensors and devices from a modern perspective
KR102647002B1 (en) Anomaly detection method for Individual user using AI variable threshold
Hintz AI, big data and bias: governing datafication through a data justice lens
Alshawish et al. G-DPS: A game-theoretical decision-making framework for physical surveillance games
Cheh et al. Leveraging physical access logs to identify tailgating: Limitations and solutions
Albu et al. Three sides of the same coin: datafied transparency, biometric surveillance, and algorithmic governmentalities
Jiang et al. Development of personnel epidemic prevention monitoring access control system