Tovar-Rivera, 2019 - Google Patents
Assessing the Use and Acceptance of Combined Biometric and Smart Card Technologies in Current Forms of Identification in the United StatesTovar-Rivera, 2019
- Document ID
- 16257152040353188695
- Author
- Tovar-Rivera S
- Publication year
External Links
Snippet
Abstract In the Unites States, law enforcement agencies and the US public are increasingly concerned with battling identity theft and fraud crimes. One potential preventing approach is the utilization of biometric (BIO) and smart card (SC) technologies in current forms of …
- 238000005516 engineering process 0 abstract description 161
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Solove et al. | A model regime of privacy protection | |
Dempsey et al. | Commercial data and national security | |
US20100161816A1 (en) | Identity information services, methods, devices, and systems | |
Chan | Towards a calibrated trust-based approach to the use of facial recognition technology | |
Donkin et al. | Effective Recruitment or Bot Attack? The Challenge of Internet-Based Research Surveys and Recommendations to Reduce Risk and Improve Robustness | |
Mabee | Healthcare Data Breaches in South Dakota: Post-Breach Legislation Is Not Enough | |
Archer et al. | Identity theft and fraud: Evaluating and managing risk | |
Shaw et al. | Insider risk evaluation and audit | |
Tovar-Rivera | Assessing the Use and Acceptance of Combined Biometric and Smart Card Technologies in Current Forms of Identification in the United States | |
UWEMEDIMO | AN ANALYSIS OF THE LEGAL AND ETHICAL ISSUES ON THE USE OF BIOMETRIC DATA IN CONTEMPORARY NIGERIAN SOCIETY | |
Krishnan et al. | Aadhaar: The National Identity System of India | |
Maxwell | Information policy, data mining, and national security: false positives and unidentified negatives | |
Alliance | Privacy and Secure Identification Systems: The role of smart cards as a privacy-enabling technology | |
Nwatu | Biometrics technology: Understanding dynamics influencing adoption for control of identification deception within Nigeria | |
Solove et al. | A model regime of privacy protection (Version 2.0) | |
Shaw et al. | Preventing corporate embezzlement | |
Hole | Identity theft and its effects on victims, commerce, and society: Ideal systematic approach combatting identity theft involving a combination of prevention, education/outreach, detection, recovery, and enforcement components. | |
Boyce | Identifying and Protecting Senior Citizens and Vulnerable Adults from Financial Exploitation | |
Martin | Data Privacy Issues in West Virginia and Beyond: A Comprehensive Overview | |
Dube | An Exploration of the Use of Fingerprints Identification Systems on Latent Prints of First-Time Offenders in South Africa | |
Martin | Data Privacy Issues in West Virginia and Beyond: An Overview | |
Bitonti | Assessing the relationship between demographic attributes with the acceptance of biometric security devices | |
Duruiheoma | Analyzing the Privacy, Racial and Gender Concerns in Facial Recognition Technology for Effective Regulation | |
Palazzolo | A Prototype Application for the Measurement of Data Breach Event Intensity | |
O'Brien | Homeland security presidential directive-12, background investigations, and informational privacy rights |