Rejman-Greene, 2001 - Google Patents
Biometrics—real identities for a virtual worldRejman-Greene, 2001
View PDF- Document ID
- 2080783256293924443
- Author
- Rejman-Greene M
- Publication year
- Publication venue
- BT Technology Journal
External Links
Snippet
Biometric methods offer an alternative approach to authentication of individuals, using distinctive physical features of the body (such as fingerprints) or characteristic actions of people (eg digitised forms of written signatures). Although systems have been available for …
- 238000011161 development 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00154—Reading or verifying signatures; Writer recognition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jain et al. | Biometrics: a tool for information security | |
Jain et al. | An introduction to biometric recognition | |
Pankanti et al. | Biometrics: The future of identification [guest eeditors' introduction] | |
Millett et al. | Biometric recognition: Challenges and opportunities | |
Vacca | Biometric technologies and verification systems | |
US20080005578A1 (en) | System and method for traceless biometric identification | |
US20100174914A1 (en) | System and method for traceless biometric identification with user selection | |
Zorkadis et al. | On biometrics‐based authentication and identification from a privacy‐protection perspective: Deriving privacy‐enhancing requirements | |
US20060136743A1 (en) | System and method for performing security access control based on modified biometric data | |
Rejman-Greene | Biometrics—real identities for a virtual world | |
Smith | Biometric solutions to identity-related cybercrime | |
Le et al. | A survey of biometrics security systems | |
Podio | Personal authentication through biometric technologies | |
Thakur et al. | Social impact of biometric technology: myth and implications of biometrics: issues and challenges | |
Rejman-Greene | Secure authentication using biometric methods | |
Rejman-Green | Biometrics—Real Identities for a Virtual World | |
Uchenna et al. | Overview of technologies and fingerprint scanner used for biometric capturing | |
Heyer | Biometrics technology review 2008 | |
Thakur | Biometric Authentication System: Techniques and Future | |
Syed et al. | Biometric Authentication Systems in Banking: A Technical Evaluation of Security Measures | |
Tiwari et al. | Biometrics based user authentication | |
Zahidi | Biometrics-evaluation of current situation | |
Frye et al. | The body as a password: considerations, uses, and concerns of biometric technologies | |
Sharma et al. | Biometrics: Introduction and Applications | |
Asani | A review of trends of authentication mechanisms for access control |