Armoogum et al., 2016 - Google Patents
A practical approach for secure biometric template storage for authenticationArmoogum et al., 2016
- Document ID
- 8266301701782273672
- Author
- Armoogum S
- Oozeer A
- Publication year
- Publication venue
- 2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech)
External Links
Snippet
Biometric is being increasingly used for authentication of user. During enrolment, an enrolment biometric template is generated from the user's raw biometric data. This template is typically stored in the authentication database and used for matching with the template …
- 230000001131 transforming 0 description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kholmatov et al. | Realization of correlation attack against the fuzzy vault scheme | |
| US6185316B1 (en) | Self-authentication apparatus and method | |
| EP2813961B1 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
| Joshi et al. | Security vulnerabilities against fingerprint biometric system | |
| Singh et al. | A taxonomy of biometric system vulnerabilities and defences | |
| Bhattasali et al. | A survey of security and privacy issues for biometrics based remote authentication in cloud | |
| Matyáš et al. | Security of biometric authentication systems | |
| Uzun et al. | Cryptographic key derivation from biometric inferences for remote authentication | |
| Gao | Biometric authentication in smart grid | |
| Sharma et al. | Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on blockchain network | |
| Karimovich et al. | Biometric cryptosystems: Open issues and challenges | |
| Mehta et al. | An efficient and lossless fingerprint encryption algorithm using Henon map & Arnold transformation | |
| Morampudi et al. | Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum | |
| Latha et al. | A study on attacks and security against fingerprint template database | |
| Scaria et al. | Enhanced E-commerce application security using three-factor authentication | |
| Ratha | Privacy protection in high security biometrics applications | |
| Balakumar et al. | A survey on biometrics based cryptographic key generation schemes | |
| Lalithamani et al. | Dual encryption algorithm to improve security in hand vein and palm vein-based biometric recognition | |
| Butt et al. | Privacy protection of biometric templates | |
| Armoogum et al. | A practical approach for secure biometric template storage for authentication | |
| Bayly et al. | Fractional biometrics: safeguarding privacy in biometric applications | |
| Cimato et al. | Biometrics and privacy | |
| Jegede et al. | State of the art in biometric key binding and key generation schemes | |
| Ashok et al. | Secure authentication in multimodal biometric systems using cryptographic hash functions | |
| Syta et al. | Private eyes: Secure remote biometric authentication |