O’Gorman, 1999 - Google Patents
Fingerprint verificationO’Gorman, 1999
View PDF- Document ID
- 4676771894908931714
- Author
- O’Gorman L
- Publication year
- Publication venue
- Biometrics: Personal Identification in Networked Society
External Links
Snippet
The use of fingerprints for identification has been employed in law enforcement for about a century. A much broader application of fingerprints is for personal authentication, for instance to access a computer, a network, a bank-machine, a car, or a home. The topic of …
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
- G07C2009/00095—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically comprising a biometric sensor on the pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| O’Gorman | Fingerprint verification | |
| O'Gorman | An overview of fingerprint verification technologies | |
| Jain et al. | An identity-authentication system using fingerprints | |
| Jain et al. | Fingerprint classification and matching | |
| KR102367761B1 (en) | Systems and methods for biometric recognition | |
| Kumar et al. | Personal authentication using hand images | |
| Maltoni | A tutorial on fingerprint recognition | |
| US20080049987A1 (en) | Fingerprint recognition system | |
| Ratha et al. | Effect of controlled image acquisition on fingerprint matching | |
| Chikkerur | Online fingerprint verification system | |
| Jea | Minutiae-based partial fingerprint recognition | |
| Rubella et al. | Fingerprint based license checking for auto-mobiles | |
| Jain et al. | Matching and classification: a case study in fingerprint domain | |
| US20060034497A1 (en) | Protometric authentication system | |
| Sanches et al. | A single sensor hand biometric multimodal system | |
| CN119808054A (en) | Identity authentication system based on biometric fingerprint technology | |
| Chatham | FINGERPRINT VERIFICATION | |
| Barham et al. | Fingerprint recognition using MATLAB | |
| Rawat | A hierarchical fingerprint matching system | |
| Yang et al. | Iris recognition based on location of key points | |
| Nath et al. | Fingerprint recognition system: design & analysis | |
| Aju et al. | An Enhanced Minitiae-based Fingerprint Matching Algorithm | |
| KR100670244B1 (en) | Both Simultaneous Fingerprint Inputs and Their Fingerprint Matching Methods | |
| Khalil et al. | Fingerprint verification using the texture of fingerprint image | |
| Chaudhari et al. | Prevention of spoof attacks in fingerprinting using histogram features |