Vildjiounaite et al., 2009 - Google Patents
Software Framework for Multimodal Fusion in Ubiquitous Computing ApplicationsVildjiounaite et al., 2009
- Document ID
- 14840723865743920163
- Author
- Vildjiounaite E
- Kyllonen V
- Publication year
- Publication venue
- 2009 International Conference on Network and Service Security
External Links
Snippet
As users tend to bypass inconvenient security measures, access control systems can be made more user-friendly and secure by varying verification strength depending on current security risks; by using continuous unobtrusive verification with whatever modalities are …
- 230000004927 fusion 0 title abstract description 94
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/0015—Access control not involving the use of a pass in combination with an identity-check by means of a handwritten signature
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11789699B2 (en) | Systems and methods for private authentication with helper networks | |
US11394552B2 (en) | Systems and methods for privacy-enabled biometric processing | |
US20230283476A1 (en) | Systems and methods for privacy-enabled biometric processing | |
US10467396B2 (en) | Using biometric user-specific attributes | |
US11501514B2 (en) | Universal object recognition | |
US6735695B1 (en) | Methods and apparatus for restricting access of a user using random partial biometrics | |
KR101997371B1 (en) | Identity authentication method and apparatus, terminal and server | |
US8887259B1 (en) | Anonymous biometric verification | |
Dahia et al. | Continuous authentication using biometrics: An advanced review | |
US20080317292A1 (en) | Automatic configuration of devices based on biometric data | |
US11611881B2 (en) | Integrated systems and methods for passive authentication | |
US20200334346A1 (en) | Using biometric user-specific attributes | |
Patil et al. | Multi-modal biometric system using finger knuckle image and retina image with template security using PolyU and DRIVE database | |
Podio et al. | Biometric authentication technology: From the movies to your desktop | |
Vildjiounaite et al. | Software Framework for Multimodal Fusion in Ubiquitous Computing Applications | |
CA3154853A1 (en) | Systems and methods for privacy-enabled biometric processing | |
KR20220166227A (en) | Method and ststem for user authentication | |
US9674185B2 (en) | Authentication using individual's inherent expression as secondary signature | |
P. R et al. | A report on behavior-based implicit continuous biometric authentication for smart phone | |
AU2021101257A4 (en) | Usb: auto data store your gmail and link share your mobile no.) using ai- based programming | |
Rathore et al. | Sonicprint: Discovering the voice of fingerprint for adoptable biometrics | |
CA3191888A1 (en) | Systems and methods for private authentication with helper networks | |
Duraibi et al. | Suitability of Voice Recognition Within the IoT Environment | |
Nguyen et al. | Spatio-Temporal Dual-Attention Transformer for Time-Series Behavioral Biometrics | |
Anand | BIOMETRIC TECHNOLOGIES FOR AMBIENT INTELLIGENCE |