[go: up one dir, main page]

Du Preez, 2006 - Google Patents

Liveness assurance in biometric systems

Du Preez, 2006

View PDF
Document ID
16842538507419121219
Author
Du Preez J
Publication year
Publication venue
PQDT-Global

External Links

Snippet

The need for a more secure cyber future is apparent in the information age that we live in. Information is fast becoming, and already is, one of the biggest assets in all domains of life. Access to information and specifically personal information must be regulated and secured …
Continue reading at ujcontent.uj.ac.za (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Similar Documents

Publication Publication Date Title
Kindt Privacy and data protection issues of biometric applications
Wayman et al. An introduction to biometric authentication systems
Yun The ‘123’of biometric technology
Drahanský et al. Challenges for fingerprint recognition—Spoofing, skin diseases, and environmental effects: Is fingerprint recognition really so reliable and secure?
Wang Some issues of biometrics: technology intelligence, progress and challenges
Ibrahim et al. Trends in Biometric Authentication: A review
Mohammed et al. Human biometric identification: Application and evaluation
Kindt An introduction into the use of biometric technology
Mubeen Biometric authentication: Past, present, and future perspectives
Bhatnagar et al. Conventional biometrics and hidden biometric: a comparative study
Goel et al. Securing biometric framework with cryptanalysis
Vallabh Authentication using finger-vein recognition
El-Bakry et al. Personal identification through biometric technology
Pandey et al. Supervised and unsupervised learning techniques for biometric systems
Du Preez Liveness assurance in biometric systems
Sepasian et al. Liveness and spoofing in fingerprint identification: Issues and challenges
Moradoff Biometrics: Proliferation and constraints to emerging and new technologies
Sepasian et al. Vitality detection in fingerprint identification
Di Nardo Biometric technologies: functionality, emerging trends, and vulnerabilities
Kindt The Processing of Biometric Data. A comparative legal analysis with a focus on the proportionality principle and recommendations for a legal framework.
OMONAYAJO Advancements In Biometric TECHNOLOGY
Salice et al. Foundations and Opportunities of Biometrics
Bhatnagar et al. Biometric: A Comparative Study
du Preez et al. Personal identification and authentication by using the way the heart beats
Manikpuri Biometric Security Systems for Beginner