[go: up one dir, main page]

Vatsa et al., 2005 - Google Patents

Biometric Technologies

Vatsa et al., 2005

Document ID
15527047365582133434
Author
Vatsa M
Singh R
Gupta P
Kaushik A
Publication year
Publication venue
Encyclopedia of Multimedia Technology and Networking

External Links

Snippet

Identity verification in computer systems is done based on measures like keys, cards, passwords, PIN and so forth. Unfortunately, these may often be forgotten, disclosed or changed. A reliable and accurate identification/verification technique may be designed …
Continue reading at www.igi-global.com (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00039Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of a pass-word
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Delac et al. A survey of biometric recognition methods
Jain et al. An introduction to biometric recognition
Jain et al. Biometric identification
Adeoye A survey of emerging biometric technologies
Bhattacharyya et al. Biometric authentication: A review
JP3356144B2 (en) User authentication device using biometrics and user authentication method used therefor
Ross et al. Human recognition using biometrics: an overview
Matyáš et al. Biometric authentication systems
Angle et al. Biometrics: A further echelon of security
Ibrahim et al. Trends in Biometric Authentication: A review
Mubeen Biometric authentication: Past, present, and future perspectives
Ho et al. Biometric authentication adoption issues
Arora et al. Multimodal biometrics for improvised security
Dhir et al. Biometric recognition: A modern era for security
Pankanti et al. Biometrics: Promising frontiers for emerging identification market
Boonkrong Biometric Authentication
Ives et al. An Introduction to Biometrics
Braghin Biometric authentication
Manivannan et al. Fingerprint biometric for identity management
Vatsa et al. Biometric Technologies
Kizza Biometric technologies and ethics
Gupta Advances in multi modal biometric systems: a brief review
Pandey et al. Supervised and unsupervised learning techniques for biometric systems
Tait Behavioural biometrics authentication tested using eyewriter technology
Kaushik Vipul et al. Process of Biometric Authentication and Its Application-A Review