Nigam et al., 2022 - Google Patents
[Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare SystemsNigam et al., 2022
View PDF- Document ID
- 9389390759606760748
- Author
- Nigam D
- Patel S
- Raj Vincent P
- Srinivasan K
- Arunmozhi S
- Publication year
- Publication venue
- Journal of Healthcare Engineering
External Links
Snippet
Secure identification is a critical system requirement for patients seeking health‐related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the …
- 238000000034 method 0 abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hamidi | An approach to develop the smart health using Internet of Things and authentication based on biometric technology | |
| US12488079B2 (en) | Systems and methods for a connected computing resource and event/activity identification information infrastructure using near existential or existential biometric identification of humans | |
| Nigam et al. | [Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare Systems | |
| Dasgupta et al. | Advances in user authentication | |
| US10810290B2 (en) | Robust method and an apparatus for authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates | |
| Esther Omolara et al. | HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys | |
| Wells et al. | Privacy and biometrics for smart healthcare systems: attacks, and techniques | |
| Sharma et al. | A survey on blockchain deployment for biometric systems | |
| Moallem | Human-Computer Interaction and cybersecurity handbook | |
| Makina et al. | Survey on security and privacy in Internet of Things‐based eHealth applications: Challenges, architectures, and future directions | |
| Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
| Furnell | Securing information and communications systems: Principles, technologies, and applications | |
| Kaur et al. | Post study of Blockchain in smart health environment | |
| Park et al. | Combined authentication-based multilevel access control in mobile application for DailyLifeService | |
| Wójtowicz et al. | New challenges for user privacy in cyberspace | |
| Malik | Biometric Authentication-Risks and advancements in biometric security systems | |
| Stajano | Security issues in ubiquitous computing | |
| Kaul et al. | Secure and privacy preserving biometric based user authentication with data access control system in the healthcare environment | |
| Bradish et al. | Covichain: A blockchain based covid-19 vaccination passport | |
| Kannavara et al. | Topics in biometric human-machine interaction security | |
| Guma | Development of a secure multi-factor authentication algorithm for mobile money applications | |
| Wilusz et al. | Security analysis of transaction authorization methods for next generation electronic payment services | |
| El Khoury | Iris biometric model for secured network access | |
| Rizvi et al. | Protecting financial transactions through networks and point of sales | |
| Vithanwattana | Securing mHealth: investigating the development of a novel information security framework |