[go: up one dir, main page]

Cavoukian et al., 2008 - Google Patents

Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy

Cavoukian et al., 2008

View PDF
Document ID
3835643834003464105
Author
Cavoukian A
Stoianov A
Carter F
Publication year
Publication venue
Policies and Research in Identity Management: First IFIP WG11. 6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

External Links

Snippet

This paper looks at privacy-enhanced uses of biometrics, with a particular focus on the privacy and security advantages of Biometric Encryption (BE). It considers the merits of Biometric Encryption for verifying identity, protecting privacy, and ensuring security. In doing …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • G06Q20/40145Biometric identity checks

Similar Documents

Publication Publication Date Title
Bhargav-Spantzel et al. Privacy preserving multi-factor authentication with biometrics
Campisi Security and privacy in biometrics: towards a holistic approach
US7024562B1 (en) Method for carrying out secure digital signature and a system therefor
Joshi et al. Security vulnerabilities against fingerprint biometric system
US20140337635A1 (en) Biometric verification with improved privacy and network performance in client-server networks
EP2513834B1 (en) System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method
US9384338B2 (en) Architectures for privacy protection of biometric templates
JP2012044670A (en) User authentication method based on utilization of biometric identification techniques, and related architecture
US11444784B2 (en) System and method for generation and verification of a subject's identity based on the subject's association with an organization
WO1999012144A1 (en) Digital signature generating server and digital signature generating method
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
Isobe et al. Development of personal authentication system using fingerprint with digital signature technologies
Al-Assam et al. Automated biometric authentication with cloud computing
Cavoukian et al. Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy
KR20030097550A (en) Authorization Key Escrow Service System and Method
WO2023022584A1 (en) System and method for decentralising digital identification
Chizari et al. Security issues in ATM smart card technology
Deswarte et al. A Proposal for a Privacy-preserving National Identity Card.
CN112182527A (en) Method and device for storing private key of user in block chain wallet
Deswarte et al. The challenges raised by the privacy-preserving identity card
Kavitha et al. A security hybrid mechanism using fuzzy with adaptive ElGamal approach in cloud
Maheshwari et al. Secure authentication using biometric templates in Kerberos
Park et al. Attribute-based access control using combined authentication technologies
Deswarte et al. Towards a privacy-preserving national identity card
JPH1188322A (en) Digital signature generation method