Thawre et al., 2021 - Google Patents
Survey on security of biometric data using cryptographyThawre et al., 2021
- Document ID
- 839312448201030278
- Author
- Thawre A
- Hariyale A
- Chandavarkar B
- Publication year
- Publication venue
- 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC)
External Links
Snippet
Biometric Cryptography is the biometric tokenization used for authentication with public-key infrastructure (PKI). In particular, biometric cryptography provides the convenience of authentication via fingerprint, face, eye, voice, palm, etc.—with none of the risks posed by …
- 230000000007 visual effect 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11803633B1 (en) | Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates | |
US10681025B2 (en) | Systems and methods for securely managing biometric data | |
US11824991B2 (en) | Securing transactions with a blockchain network | |
US6185316B1 (en) | Self-authentication apparatus and method | |
US9235697B2 (en) | One-time passcodes with asymmetric keys | |
KR101226651B1 (en) | User authentication method based on the utilization of biometric identification techniques and related architecture | |
US9152779B2 (en) | Protecting codes, keys and user credentials with identity and patterns | |
US20020056043A1 (en) | Method and apparatus for securely transmitting and authenticating biometric data over a network | |
US20110126024A1 (en) | Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device | |
US20140337635A1 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
Thawre et al. | Survey on security of biometric data using cryptography | |
US11444784B2 (en) | System and method for generation and verification of a subject's identity based on the subject's association with an organization | |
Mohammed et al. | Current multi-factor of authentication: Approaches, requirements, attacks and challenges | |
CN113826096A (en) | User authentication and signature apparatus and method using user biometric identification data | |
KR101468192B1 (en) | Secure User Authentication Scheme Based on Facial Recognition for Smartwork Environment | |
Cavoukian et al. | Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy | |
Habibu et al. | Developing an algorithm for securing the biometric data template in the database | |
US20240169350A1 (en) | Securing transactions with a blockchain network | |
Piper et al. | Identities and authentication | |
Kalaiarasi et al. | Stegnographic Mechanism Using Biometrics | |
Abidin | Enhancing the Security of E-Passports using a Secure Key Management Framework. | |
Chandgude et al. | Implementation Using Chaotic Encryption Over Biometric Image For Remote Authentication | |
Banday et al. | Multi Unit Iris Biometric Encrypted Template Formation and Authentication | |
Sukumaran et al. | Critical File Access in Wireless Networks Using Multifactor Authentication | |
Alsulami et al. | Combining Iris Biometric System and Cryptography Provide a Strong Security Authentication |