Rosenzweig et al., 2004 - Google Patents
Biometric Technologies: Security, legal, and policy implicationsRosenzweig et al., 2004
View HTML- Document ID
- 13802265910579705944
- Author
- Rosenzweig P
- Kochems A
- Schwartz A
- Publication year
- Publication venue
- Legal Memorandum
External Links
Snippet
Since September 11, 2001, there has been agreat deal of interest in using biometrics for verification ofidentity. 1 The interest is particularly acutein the areas of visa and immigration documentation andgovernment-issued identification card programs. 2 Unlike typical …
- 210000000554 Iris 0 abstract description 17
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00107—Detecting the live character of the finger, i.e. distinguishing from a fake or cadaver finger
- G06K9/00114—Detecting the live character of the finger, i.e. distinguishing from a fake or cadaver finger using image processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00885—Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
- G06K9/00892—Use of multiple biometrics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vacca | Biometric technologies and verification systems | |
Millett et al. | Biometric recognition: Challenges and opportunities | |
Nanavati | Biometrics | |
Jain et al. | An introduction to biometric recognition | |
Rosenzweig et al. | Biometric Technologies: Security, legal, and policy implications | |
Das | The science of biometrics: Security technology for identity verification | |
Boukhonine et al. | Future security approaches and biometrics | |
Sabena et al. | A review of vulnerabilities in identity management using biometrics | |
Adkins | Biometrics: weighing convenience and national security against your privacy | |
Mills et al. | Embracing broadscale applications of biometric technologies in hospitality and tourism: is the business ready? | |
Coats | The practitioner's guide to biometrics | |
Heyer | Biometrics technology review 2008 | |
Faundez-Zanuy | Biometric security technology | |
Nakanishi et al. | Advancing the state-of-the-art in transportation security identification and verification technologies: Biometric and multibiometric systems | |
Mills et al. | Cybercrimes against consumers: could biometric technology be the solution? | |
Morgan et al. | Biometric identifiers and border security: 9/11 Commission recommendations and related issues | |
Clement et al. | National Identification Schemes (NIDS) A Remedy Against Terrorist Attack? | |
Oluwatoyin et al. | Effective and Efficient Means to Prevent and Minimize Identity and Identity Cards Theft, Criminal Vices and Unauthorized Access to Places in Nigeria | |
O'Connor | Biometrics and identification after 9/11 | |
Gupta | Biometrics: Enhancing security in organizations | |
Adegbenle et al. | ETHICS IN BIOMETRICS AUTHENTICATION | |
Rhodes | Aviation Security: Challenges in Using Biometric Technologies: Testimony Before the Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives | |
Frye et al. | The body as a password: considerations, uses, and concerns of biometric technologies | |
Woodword | Biometrics: The Ultimate Reference | |
Edo et al. | Perceptions of biometric experts on whether or not biometric modalities will combat identity fraud |