[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Lin et al., 2021 - Google Patents

Establishment of Biometric Verification System Based on Design Science Research Methodology and Sensing System for Smart Border Control.

Lin et al., 2021

View PDF
Document ID
13467213824418315449
Author
Lin I
Hung W
Publication year
Publication venue
Sensors & Materials

External Links

Snippet

Rapidly increasing traveler traffic has burdened the border security and clearance service. Therefore, assisting border guards and travelers to carry out sustainable border strategies is becoming more crucial. The key of such strategies centers on the interaction between …
Continue reading at sensors.myu-group.co.jp (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00103Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00885Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
    • G06K9/00892Use of multiple biometrics
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00885Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
    • G06K9/00899Spoof detection

Similar Documents

Publication Publication Date Title
Khan et al. The use of biometric technology at airports: The case of customs and border protection (CBP)
Singh et al. Biometric identification system: security and privacy concern
Wayman et al. Biometric systems: Technology, design and performance evaluation
Millett et al. Biometric recognition: Challenges and opportunities
Patel Airport passenger processing technology: a biometric airport journey
Lyon Technology vs ‘terrorism’: circuits of city surveillance since September 11th
Sutrop et al. From identity verification to behavior prediction: Ethical implications of second generation biometrics
Das Biometric technology: authentication, biocryptography, and cloud-based architecture
Lin et al. Establishment of Biometric Verification System Based on Design Science Research Methodology and Sensing System for Smart Border Control.
Ruhrmann Facing the future: protecting human rights in policy strategies for facial recognition technology in law enforcement
Lai et al. Mass evidence accumulation and traveler risk scoring engine in e-border infrastructure
Girelli Laterally Reversed Fingerprints Detected in Fake Documents.
Parsheera Adoption and Regulation of Facial Recognition Technologies in India: Why and Why Not?
Marakalala et al. Border management identification: The biometric technology to detect criminals and terrorists often travel using falsified identity documents
Mills et al. Embracing broadscale applications of biometric technologies in hospitality and tourism: is the business ready?
Crumpler et al. How Does Facial Recognition Work
Marinović et al. Personal identification by eyes
Al-Alawi et al. Evaluating the effectiveness of biometric technologies in controlling the border ports of the state of Kuwait
Nakanishi et al. Advancing the state-of-the-art in transportation security identification and verification technologies: Biometric and multibiometric systems
Maeko et al. Technical Requirements Survey on Multimodal Biometric Selection for Deployment in Governments
Roorda “Facial Recognition for Public Safety”: a supportive tool for the municipal decision-making process on using facial recognition for public safety, the FRPS risk governance method.
Reddy et al. Reinforced Voting Security Through Iris Recognition and Deep Learning Models
Chethana et al. Domain Specific Information Based Learning for Facial Image Forensics
Common Myths
Ochora et al. The Role of Biometric Identification Management System to Uganda’s Rwamwanja Refugee Settlement Food Assistance Programme