Nelson, 2020 - Google Patents
Access control and biometricsNelson, 2020
- Document ID
- 11786121951336448770
- Author
- Nelson J
- Publication year
- Publication venue
- Handbook of Loss Prevention and Crime Prevention
External Links
Snippet
Access control is defined as the means to control privileges or rights to an asset but can also mean to a resource or to an individual. Having access provides one with the opportunity or means to use or benefit from something having value. Most often in security, it is the access …
- 238000000034 method 0 description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6867683B2 (en) | High security identification system for entry to multiple zones | |
CA2472195C (en) | System and method of reading a security clearance card | |
Lyon | Facing the future: Seeking ethics for everyday surveillance | |
US7494060B2 (en) | Information-based access control system for sea port terminals | |
AU2004278993B2 (en) | Electronic security system for monitoring and recording activity and data relating to persons | |
CA2469797C (en) | Document and bearer verification system | |
US20090266882A1 (en) | Smart passport system for monitoring and recording activity and data relating to persons | |
Norman | Electronic access control | |
Nelson | Access control and biometrics | |
Best et al. | Access control | |
Simukali et al. | Multi Factor Authentication for Student and Staff Access Control | |
Nelson | Access control, access badges, and biometrics characteristics for schools | |
Liu | Scenario study of biometric systems at borders | |
KR102634420B1 (en) | Access control kiosk system to school and access control method using the same | |
Otti | „Why does it fail to operate?,” | |
Spina | Out through the Out Door: Policy Options in the Fight against Visa Overstays | |
Rao et al. | Physical security and biometrics | |
COJOCARIU et al. | THE MANAGEMENT MODEL OF THE PHYSICAL, COMPUTER AND COMMUNICATIONS SECURITY SYSTEM IN HIGHER EDUCATION INSTITUTIONS. | |
Slotnick | Integrated Physical Security Systems | |
Mercer | Using biometrics to help secure UK borders | |
Elliott | Biometrics and airport security | |
Atlantic et al. | Heathrow eyes up iris recognition technology | |
Thibodeau | Identity Documentation and Verification | |
Ruiz | Biometric Systems and Uncertainty: A General Approach | |
Kennedy | Let'em In? |