Singh et al., 2022 - Google Patents
Challenges for Electronic Access Control Systems amid pandemic: A SurveySingh et al., 2022
- Document ID
- 9811736233941532871
- Author
- Singh A
- Kaur G
- Singh D
- Chauhan M
- Chitkara S
- Publication year
- Publication venue
- 2022 IEEE World Conference on Applied Intelligence and Computing (AIC)
External Links
Snippet
To meet the demands for highest level security of today's world, a sophisticated security management system is essential. An access control system generally categorized into biometric and non-biometric types based upon contact or contactless in operation. This …
- 200000000015 coronavirus disease 2019 0 description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
- G06K9/0002—Image acquisition by non-optical methods, e.g. by ultrasonic or capacitive sensing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00885—Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11217051B2 (en) | System and method for providing credential activation layered security | |
Vacca | Biometric technologies and verification systems | |
US6819219B1 (en) | Method for biometric-based authentication in wireless communication for access control | |
US7793109B2 (en) | Random biometric authentication apparatus | |
US20170264608A1 (en) | Visual biometric authentication supplemented with a time-based secondary authentication factor | |
US20150015365A1 (en) | Point of entry authorization utilizing rfid enabled profile and biometric data | |
US20100194571A1 (en) | Point of entry authorization utilizing rfid enabled profile and biometric data | |
US20060072793A1 (en) | Security alarm notification using iris detection systems | |
Li et al. | CNN-based continuous authentication on smartphones with conditional Wasserstein generative adversarial network | |
US10482225B1 (en) | Method of authorization dialog organizing | |
Bodepudi et al. | Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review | |
US20220253514A1 (en) | Method and system for seamless biometric system self-enrollment | |
US12118843B2 (en) | Providing digital identifications generated for checkpoint validation based on biometric identification | |
Wells et al. | Privacy and biometrics for smart healthcare systems: attacks, and techniques | |
Podio | Personal authentication through biometric technologies | |
Singh et al. | Challenges for Electronic Access Control Systems amid pandemic: A Survey | |
Lone et al. | Smartphone-based biometric authentication scheme for access control management in client-server environment | |
Sivakumar | Biometric authentication techniques and its future | |
Bobde et al. | Face recognition technology | |
Almuhaideb et al. | Design Recommendations for Gate Security Systems and Health Status: A Systematic Review | |
Dragerengen | Access Control in Critical Infrastructure Control Rooms using Continuous Authentication and Face Recognition | |
Sahana et al. | Multi Biometric Recognition System | |
Ashwini et al. | Deep Biometrics: Exploring the Intersection of Deep Learning and Biometric Applications | |
Tait | Behavioural biometrics authentication tested using eyewriter technology | |
Purohit et al. | Contemporary biometric system design |