[go: up one dir, main page]

Leong et al., 2000 - Google Patents

Implementation of smart-card access control with threshold scheme

Leong et al., 2000

Document ID
11030299337245149395
Author
Leong P
Tan E
Publication year
Publication venue
International Journal of Electronics

External Links

Snippet

We describe an electronic implementation of a security scheme to control access to a building. Access to the building by a person alone is not possible but access by a group of authorized people whose number satisfies a prescribed threshold is permissible. The …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00103Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data

Similar Documents

Publication Publication Date Title
Schneier et al. Cryptographic support for secure logs on untrusted machines.
Schneier et al. Secure audit logs to support computer forensics
JP2528895B2 (en) Key management method for public communication
CA2023872C (en) Databaseless security system
US5144667A (en) Method of secure remote access
US5557765A (en) System and method for data recovery
JP4463979B2 (en) Apparatus and method for storing, verifying and using cryptographically camouflaged cryptographic keys
US5109152A (en) Communication apparatus
EP0848315B1 (en) Securely generating a computer system password by utilizing an external encryption algorithm
CN100365641C (en) Method for protecting computer login using disposable password
EP0912919B1 (en) Immobilisation protection system for electronic components and method therefor
US20010054147A1 (en) Electronic identifier
EP1992101A2 (en) Secure data transmission using undiscoverable or black data
JP2000502532A (en) Application level security system and method
JPH0675251B2 (en) Method for authenticating a portable object connected to an external medium via a transmission line by the external medium, and a system for implementing the method
Denning Secure personal computing in an insecure network
TW201141172A (en) Methods, circuits, devices, and systems for provisioning of cryptographic data to one or more electronic devices
JP2004501458A (en) Secure biometric authentication / identification method, biometric data entry module and verification module
US5007083A (en) Secure computer
Leong et al. Implementation of smart-card access control with threshold scheme
Kumar Some remarks on a remote user authentication scheme using smart cards with forward secrecy
Wong et al. Polonius: An identity authentication system
Smid Integrating the Data Encryption Standard into computer networks
CN113468565A (en) Intelligent door lock control method and system
Chor et al. Group accesses with smart card and threshold scheme