[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Vildjiounaite et al., 2009 - Google Patents

Software Framework for Multimodal Fusion in Ubiquitous Computing Applications

Vildjiounaite et al., 2009

Document ID
14840723865743920163
Author
Vildjiounaite E
Kyllonen V
Publication year
Publication venue
2009 International Conference on Network and Service Security

External Links

Snippet

As users tend to bypass inconvenient security measures, access control systems can be made more user-friendly and secure by varying verification strength depending on current security risks; by using continuous unobtrusive verification with whatever modalities are …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/0015Access control not involving the use of a pass in combination with an identity-check by means of a handwritten signature

Similar Documents

Publication Publication Date Title
US11789699B2 (en) Systems and methods for private authentication with helper networks
US11394552B2 (en) Systems and methods for privacy-enabled biometric processing
US20230283476A1 (en) Systems and methods for privacy-enabled biometric processing
US10467396B2 (en) Using biometric user-specific attributes
US11501514B2 (en) Universal object recognition
US6735695B1 (en) Methods and apparatus for restricting access of a user using random partial biometrics
KR101997371B1 (en) Identity authentication method and apparatus, terminal and server
US8887259B1 (en) Anonymous biometric verification
Dahia et al. Continuous authentication using biometrics: An advanced review
US20080317292A1 (en) Automatic configuration of devices based on biometric data
US11611881B2 (en) Integrated systems and methods for passive authentication
US20200334346A1 (en) Using biometric user-specific attributes
Patil et al. Multi-modal biometric system using finger knuckle image and retina image with template security using PolyU and DRIVE database
Podio et al. Biometric authentication technology: From the movies to your desktop
Vildjiounaite et al. Software Framework for Multimodal Fusion in Ubiquitous Computing Applications
CA3154853A1 (en) Systems and methods for privacy-enabled biometric processing
KR20220166227A (en) Method and ststem for user authentication
US9674185B2 (en) Authentication using individual's inherent expression as secondary signature
P. R et al. A report on behavior-based implicit continuous biometric authentication for smart phone
AU2021101257A4 (en) Usb: auto data store your gmail and link share your mobile no.) using ai- based programming
Rathore et al. Sonicprint: Discovering the voice of fingerprint for adoptable biometrics
CA3191888A1 (en) Systems and methods for private authentication with helper networks
Duraibi et al. Suitability of Voice Recognition Within the IoT Environment
Nguyen et al. Spatio-Temporal Dual-Attention Transformer for Time-Series Behavioral Biometrics
Anand BIOMETRIC TECHNOLOGIES FOR AMBIENT INTELLIGENCE