Rahman et al., 2017 - Google Patents
Implement fingerprint authentication for employee automation systemRahman et al., 2017
View PDF- Document ID
- 18056373688198248566
- Author
- Rahman M
- Mishu T
- Islam M
- Akanda M
- Publication year
- Publication venue
- Int J Innov Res Inf Secur
External Links
Snippet
The project work is concerned with the implementation of biometric fingerprint authentication system which is an automated method of verifying a match between two human fingerprints for validating identity. The modern computer security is a battle between high security and …
- 230000000694 effects 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transaction
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7690032B1 (en) | Method and system for confirming the identity of a user | |
US7216803B2 (en) | Biometric delegation and authentication of financial transactions | |
Whitley et al. | Global challenges for identity policies | |
Olagunju et al. | Staff attendance monitoring system using fingerprint biometrics | |
Harris et al. | Biometric authentication: assuring access to information | |
Adewole et al. | Development of fingerprint biometric attendance system for non-academic staff in a tertiary institution | |
CN102243773A (en) | Entrance control system supported by multiple identities recognition | |
Rahman et al. | Implement fingerprint authentication for employee automation system | |
Boriev et al. | Review of modern biometric user authentication and their development prospects | |
US10304266B1 (en) | System, method and apparatus for creating and maintaining biometric secure safe deposit boxes, and similar containers and facilities | |
WO2013000128A1 (en) | Multi-channel attendance management system | |
EP2254093B1 (en) | Method and system for confirming the identity of a user | |
JP2009235763A (en) | Room entrance/exit management system | |
Rodgers | Biometric and auditing issues addressed in a throughput model | |
Krishna Prasad | ABCD Analysis of Fingerprint Biometric Attendance Maintenance System | |
KR20240160589A (en) | Identity Verification and Related Platforms | |
Goldstein et al. | Large-scale biometrics deployment in Europe: Identifying challenges and threats | |
Sabater | Biometrics as password alternative | |
JP2008027177A (en) | Split information processing apparatus, program and method | |
Kachurina et al. | Biometric identification in ehealthcare: learning from the cases of Russia and Italy | |
Maggay | Biometric attendance monitoring system of Cagayan State University–Lasam Campus, Philippines | |
US8826389B2 (en) | Multi-media identity management system | |
Hussain et al. | BSC: A Novel Scheme for Providing Security using Biometric Smart Card | |
Osei et al. | Fingerprint Employee Clocking System | |
Narsaiah et al. | Fingerprint Recognition for Future ATM Security |