[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Nelson, 2020 - Google Patents

Access control and biometrics

Nelson, 2020

Document ID
11786121951336448770
Author
Nelson J
Publication year
Publication venue
Handbook of Loss Prevention and Crime Prevention

External Links

Snippet

Access control is defined as the means to control privileges or rights to an asset but can also mean to a resource or to an individual. Having access provides one with the opportunity or means to use or benefit from something having value. Most often in security, it is the access …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
US6867683B2 (en) High security identification system for entry to multiple zones
CA2472195C (en) System and method of reading a security clearance card
Lyon Facing the future: Seeking ethics for everyday surveillance
US7494060B2 (en) Information-based access control system for sea port terminals
AU2004278993B2 (en) Electronic security system for monitoring and recording activity and data relating to persons
CA2469797C (en) Document and bearer verification system
US20090266882A1 (en) Smart passport system for monitoring and recording activity and data relating to persons
Norman Electronic access control
Nelson Access control and biometrics
Best et al. Access control
Simukali et al. Multi Factor Authentication for Student and Staff Access Control
Nelson Access control, access badges, and biometrics characteristics for schools
Liu Scenario study of biometric systems at borders
KR102634420B1 (en) Access control kiosk system to school and access control method using the same
Otti „Why does it fail to operate?,”
Spina Out through the Out Door: Policy Options in the Fight against Visa Overstays
Rao et al. Physical security and biometrics
COJOCARIU et al. THE MANAGEMENT MODEL OF THE PHYSICAL, COMPUTER AND COMMUNICATIONS SECURITY SYSTEM IN HIGHER EDUCATION INSTITUTIONS.
Slotnick Integrated Physical Security Systems
Mercer Using biometrics to help secure UK borders
Elliott Biometrics and airport security
Atlantic et al. Heathrow eyes up iris recognition technology
Thibodeau Identity Documentation and Verification
Ruiz Biometric Systems and Uncertainty: A General Approach
Kennedy Let'em In?