Cavoukian et al., 2008 - Google Patents
Keynote paper: Biometric encryption: Technology for strong authentication, security and privacyCavoukian et al., 2008
View PDF- Document ID
- 3835643834003464105
- Author
- Cavoukian A
- Stoianov A
- Carter F
- Publication year
- Publication venue
- Policies and Research in Identity Management: First IFIP WG11. 6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007
External Links
Snippet
This paper looks at privacy-enhanced uses of biometrics, with a particular focus on the privacy and security advantages of Biometric Encryption (BE). It considers the merits of Biometric Encryption for verifying identity, protecting privacy, and ensuring security. In doing …
- 238000005516 engineering process 0 title abstract description 38
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transaction
- G06Q20/40145—Biometric identity checks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhargav-Spantzel et al. | Privacy preserving multi-factor authentication with biometrics | |
Campisi | Security and privacy in biometrics: towards a holistic approach | |
US7024562B1 (en) | Method for carrying out secure digital signature and a system therefor | |
Joshi et al. | Security vulnerabilities against fingerprint biometric system | |
US20140337635A1 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
EP2513834B1 (en) | System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method | |
US9384338B2 (en) | Architectures for privacy protection of biometric templates | |
JP2012044670A (en) | User authentication method based on utilization of biometric identification techniques, and related architecture | |
US11444784B2 (en) | System and method for generation and verification of a subject's identity based on the subject's association with an organization | |
WO1999012144A1 (en) | Digital signature generating server and digital signature generating method | |
Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
Isobe et al. | Development of personal authentication system using fingerprint with digital signature technologies | |
Al-Assam et al. | Automated biometric authentication with cloud computing | |
Cavoukian et al. | Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy | |
KR20030097550A (en) | Authorization Key Escrow Service System and Method | |
WO2023022584A1 (en) | System and method for decentralising digital identification | |
Chizari et al. | Security issues in ATM smart card technology | |
Deswarte et al. | A Proposal for a Privacy-preserving National Identity Card. | |
CN112182527A (en) | Method and device for storing private key of user in block chain wallet | |
Deswarte et al. | The challenges raised by the privacy-preserving identity card | |
Kavitha et al. | A security hybrid mechanism using fuzzy with adaptive ElGamal approach in cloud | |
Maheshwari et al. | Secure authentication using biometric templates in Kerberos | |
Park et al. | Attribute-based access control using combined authentication technologies | |
Deswarte et al. | Towards a privacy-preserving national identity card | |
JPH1188322A (en) | Digital signature generation method |