[go: up one dir, main page]

Tovar-Rivera, 2019 - Google Patents

Assessing the Use and Acceptance of Combined Biometric and Smart Card Technologies in Current Forms of Identification in the United States

Tovar-Rivera, 2019

Document ID
16257152040353188695
Author
Tovar-Rivera S
Publication year

External Links

Snippet

Abstract In the Unites States, law enforcement agencies and the US public are increasingly concerned with battling identity theft and fraud crimes. One potential preventing approach is the utilization of biometric (BIO) and smart card (SC) technologies in current forms of …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00103Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting

Similar Documents

Publication Publication Date Title
Solove et al. A model regime of privacy protection
Dempsey et al. Commercial data and national security
US20100161816A1 (en) Identity information services, methods, devices, and systems
Chan Towards a calibrated trust-based approach to the use of facial recognition technology
Donkin et al. Effective Recruitment or Bot Attack? The Challenge of Internet-Based Research Surveys and Recommendations to Reduce Risk and Improve Robustness
Mabee Healthcare Data Breaches in South Dakota: Post-Breach Legislation Is Not Enough
Archer et al. Identity theft and fraud: Evaluating and managing risk
Shaw et al. Insider risk evaluation and audit
Tovar-Rivera Assessing the Use and Acceptance of Combined Biometric and Smart Card Technologies in Current Forms of Identification in the United States
UWEMEDIMO AN ANALYSIS OF THE LEGAL AND ETHICAL ISSUES ON THE USE OF BIOMETRIC DATA IN CONTEMPORARY NIGERIAN SOCIETY
Krishnan et al. Aadhaar: The National Identity System of India
Maxwell Information policy, data mining, and national security: false positives and unidentified negatives
Alliance Privacy and Secure Identification Systems: The role of smart cards as a privacy-enabling technology
Nwatu Biometrics technology: Understanding dynamics influencing adoption for control of identification deception within Nigeria
Solove et al. A model regime of privacy protection (Version 2.0)
Shaw et al. Preventing corporate embezzlement
Hole Identity theft and its effects on victims, commerce, and society: Ideal systematic approach combatting identity theft involving a combination of prevention, education/outreach, detection, recovery, and enforcement components.
Boyce Identifying and Protecting Senior Citizens and Vulnerable Adults from Financial Exploitation
Martin Data Privacy Issues in West Virginia and Beyond: A Comprehensive Overview
Dube An Exploration of the Use of Fingerprints Identification Systems on Latent Prints of First-Time Offenders in South Africa
Martin Data Privacy Issues in West Virginia and Beyond: An Overview
Bitonti Assessing the relationship between demographic attributes with the acceptance of biometric security devices
Duruiheoma Analyzing the Privacy, Racial and Gender Concerns in Facial Recognition Technology for Effective Regulation
Palazzolo A Prototype Application for the Measurement of Data Breach Event Intensity
O'Brien Homeland security presidential directive-12, background investigations, and informational privacy rights