[go: up one dir, main page]

Sharma et al., 2024 - Google Patents

Biometrics: Introduction and applications

Sharma et al., 2024

Document ID
15508028033645068991
Author
Sharma D
Selwal A
Publication year
Publication venue
Leveraging Computer Vision to Biometric Applications

External Links

Snippet

Reliable human recognition techniques are essential for a wide range of systems to verify or ascertain the identity of an individual. Consequently, secured biometric-based authentication systems are replacing the traditional token-and password-based methods of …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Dahia et al. Continuous authentication using biometrics: An advanced review
Jain et al. Biometrics: a tool for information security
Jain et al. An introduction to biometric recognition
Bolle et al. Guide to biometrics
Jain et al. Introduction to biometrics
Ortega-Garcia et al. Authentication gets personal with biometrics
US20080005578A1 (en) System and method for traceless biometric identification
US20100174914A1 (en) System and method for traceless biometric identification with user selection
Das Biometric technology: authentication, biocryptography, and cloud-based architecture
Boukhonine et al. Future security approaches and biometrics
Dasgupta et al. Biometric Authentication: Authentication through human characteristics
Sharma et al. Biometrics: Introduction and applications
Upadhyaya Advancements in Computer Vision for Biometrics Enhancing Security and Identification
Dadakhanov Analyze and development system with multiple biometric identification
Sahana et al. Multi Biometric Recognition System
Boonkrong Biometric Authentication
Uchenna et al. Overview of technologies and fingerprint scanner used for biometric capturing
Mitra et al. ◾ Overview of Biometric Authentication
Meghanathan Biometric systems for user authentication
Dhakal Multi-biometric systems their application and security
Pandiaraja et al. An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology
Uchenna et al. Evaluation of a fingerprint recognition technology for a biometric security system
Jain et al. Signal processing for biometric systems [DSP Forum]
Kumar et al. Biometric Security System for Identification and Verification
Ross et al. Handbook