Vatsa et al., 2005 - Google Patents
Biometric TechnologiesVatsa et al., 2005
- Document ID
- 15527047365582133434
- Author
- Vatsa M
- Singh R
- Gupta P
- Kaushik A
- Publication year
- Publication venue
- Encyclopedia of Multimedia Technology and Networking
External Links
Snippet
Identity verification in computer systems is done based on measures like keys, cards, passwords, PIN and so forth. Unfortunately, these may often be forgotten, disclosed or changed. A reliable and accurate identification/verification technique may be designed …
- 210000000554 Iris 0 abstract description 16
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00039—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of a pass-word
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Delac et al. | A survey of biometric recognition methods | |
Jain et al. | An introduction to biometric recognition | |
Jain et al. | Biometric identification | |
Adeoye | A survey of emerging biometric technologies | |
Bhattacharyya et al. | Biometric authentication: A review | |
JP3356144B2 (en) | User authentication device using biometrics and user authentication method used therefor | |
Ross et al. | Human recognition using biometrics: an overview | |
Matyáš et al. | Biometric authentication systems | |
Angle et al. | Biometrics: A further echelon of security | |
Ibrahim et al. | Trends in Biometric Authentication: A review | |
Mubeen | Biometric authentication: Past, present, and future perspectives | |
Ho et al. | Biometric authentication adoption issues | |
Arora et al. | Multimodal biometrics for improvised security | |
Dhir et al. | Biometric recognition: A modern era for security | |
Pankanti et al. | Biometrics: Promising frontiers for emerging identification market | |
Boonkrong | Biometric Authentication | |
Ives et al. | An Introduction to Biometrics | |
Braghin | Biometric authentication | |
Manivannan et al. | Fingerprint biometric for identity management | |
Vatsa et al. | Biometric Technologies | |
Kizza | Biometric technologies and ethics | |
Gupta | Advances in multi modal biometric systems: a brief review | |
Pandey et al. | Supervised and unsupervised learning techniques for biometric systems | |
Tait | Behavioural biometrics authentication tested using eyewriter technology | |
Kaushik Vipul et al. | Process of Biometric Authentication and Its Application-A Review |