[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rejman-Greene, 2001 - Google Patents

Biometrics—real identities for a virtual world

Rejman-Greene, 2001

View PDF
Document ID
2080783256293924443
Author
Rejman-Greene M
Publication year
Publication venue
BT Technology Journal

External Links

Snippet

Biometric methods offer an alternative approach to authentication of individuals, using distinctive physical features of the body (such as fingerprints) or characteristic actions of people (eg digitised forms of written signatures). Although systems have been available for …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00154Reading or verifying signatures; Writer recognition

Similar Documents

Publication Publication Date Title
Jain et al. Biometrics: a tool for information security
Jain et al. An introduction to biometric recognition
Pankanti et al. Biometrics: The future of identification [guest eeditors' introduction]
Millett et al. Biometric recognition: Challenges and opportunities
Vacca Biometric technologies and verification systems
US20080005578A1 (en) System and method for traceless biometric identification
US20100174914A1 (en) System and method for traceless biometric identification with user selection
Zorkadis et al. On biometrics‐based authentication and identification from a privacy‐protection perspective: Deriving privacy‐enhancing requirements
US20060136743A1 (en) System and method for performing security access control based on modified biometric data
Rejman-Greene Biometrics—real identities for a virtual world
Smith Biometric solutions to identity-related cybercrime
Le et al. A survey of biometrics security systems
Podio Personal authentication through biometric technologies
Thakur et al. Social impact of biometric technology: myth and implications of biometrics: issues and challenges
Rejman-Greene Secure authentication using biometric methods
Rejman-Green Biometrics—Real Identities for a Virtual World
Uchenna et al. Overview of technologies and fingerprint scanner used for biometric capturing
Heyer Biometrics technology review 2008
Thakur Biometric Authentication System: Techniques and Future
Syed et al. Biometric Authentication Systems in Banking: A Technical Evaluation of Security Measures
Tiwari et al. Biometrics based user authentication
Zahidi Biometrics-evaluation of current situation
Frye et al. The body as a password: considerations, uses, and concerns of biometric technologies
Sharma et al. Biometrics: Introduction and Applications
Asani A review of trends of authentication mechanisms for access control