Sharma et al., 2024 - Google Patents
Biometrics: Introduction and applicationsSharma et al., 2024
- Document ID
- 15508028033645068991
- Author
- Sharma D
- Selwal A
- Publication year
- Publication venue
- Leveraging Computer Vision to Biometric Applications
External Links
Snippet
Reliable human recognition techniques are essential for a wide range of systems to verify or ascertain the identity of an individual. Consequently, secured biometric-based authentication systems are replacing the traditional token-and password-based methods of …
- 238000000034 method 0 abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dahia et al. | Continuous authentication using biometrics: An advanced review | |
Jain et al. | Biometrics: a tool for information security | |
Jain et al. | An introduction to biometric recognition | |
Bolle et al. | Guide to biometrics | |
Jain et al. | Introduction to biometrics | |
Ortega-Garcia et al. | Authentication gets personal with biometrics | |
US20080005578A1 (en) | System and method for traceless biometric identification | |
US20100174914A1 (en) | System and method for traceless biometric identification with user selection | |
Das | Biometric technology: authentication, biocryptography, and cloud-based architecture | |
Boukhonine et al. | Future security approaches and biometrics | |
Dasgupta et al. | Biometric Authentication: Authentication through human characteristics | |
Sharma et al. | Biometrics: Introduction and applications | |
Upadhyaya | Advancements in Computer Vision for Biometrics Enhancing Security and Identification | |
Dadakhanov | Analyze and development system with multiple biometric identification | |
Sahana et al. | Multi Biometric Recognition System | |
Boonkrong | Biometric Authentication | |
Uchenna et al. | Overview of technologies and fingerprint scanner used for biometric capturing | |
Mitra et al. | ◾ Overview of Biometric Authentication | |
Meghanathan | Biometric systems for user authentication | |
Dhakal | Multi-biometric systems their application and security | |
Pandiaraja et al. | An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology | |
Uchenna et al. | Evaluation of a fingerprint recognition technology for a biometric security system | |
Jain et al. | Signal processing for biometric systems [DSP Forum] | |
Kumar et al. | Biometric Security System for Identification and Verification | |
Ross et al. | Handbook |