Du Preez, 2006 - Google Patents
Liveness assurance in biometric systemsDu Preez, 2006
View PDF- Document ID
- 16842538507419121219
- Author
- Du Preez J
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
The need for a more secure cyber future is apparent in the information age that we live in. Information is fast becoming, and already is, one of the biggest assets in all domains of life. Access to information and specifically personal information must be regulated and secured …
- 230000001105 regulatory effect 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kindt | Privacy and data protection issues of biometric applications | |
Wayman et al. | An introduction to biometric authentication systems | |
Yun | The ‘123’of biometric technology | |
Drahanský et al. | Challenges for fingerprint recognition—Spoofing, skin diseases, and environmental effects: Is fingerprint recognition really so reliable and secure? | |
Wang | Some issues of biometrics: technology intelligence, progress and challenges | |
Ibrahim et al. | Trends in Biometric Authentication: A review | |
Mohammed et al. | Human biometric identification: Application and evaluation | |
Kindt | An introduction into the use of biometric technology | |
Mubeen | Biometric authentication: Past, present, and future perspectives | |
Bhatnagar et al. | Conventional biometrics and hidden biometric: a comparative study | |
Goel et al. | Securing biometric framework with cryptanalysis | |
Vallabh | Authentication using finger-vein recognition | |
El-Bakry et al. | Personal identification through biometric technology | |
Pandey et al. | Supervised and unsupervised learning techniques for biometric systems | |
Du Preez | Liveness assurance in biometric systems | |
Sepasian et al. | Liveness and spoofing in fingerprint identification: Issues and challenges | |
Moradoff | Biometrics: Proliferation and constraints to emerging and new technologies | |
Sepasian et al. | Vitality detection in fingerprint identification | |
Di Nardo | Biometric technologies: functionality, emerging trends, and vulnerabilities | |
Kindt | The Processing of Biometric Data. A comparative legal analysis with a focus on the proportionality principle and recommendations for a legal framework. | |
OMONAYAJO | Advancements In Biometric TECHNOLOGY | |
Salice et al. | Foundations and Opportunities of Biometrics | |
Bhatnagar et al. | Biometric: A Comparative Study | |
du Preez et al. | Personal identification and authentication by using the way the heart beats | |
Manikpuri | Biometric Security Systems for Beginner |