[go: up one dir, main page]

Nigam et al., 2022 - Google Patents

[Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare Systems

Nigam et al., 2022

View PDF @Full View
Document ID
9389390759606760748
Author
Nigam D
Patel S
Raj Vincent P
Srinivasan K
Arunmozhi S
Publication year
Publication venue
Journal of Healthcare Engineering

External Links

Snippet

Secure identification is a critical system requirement for patients seeking health‐related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work

Similar Documents

Publication Publication Date Title
Hamidi An approach to develop the smart health using Internet of Things and authentication based on biometric technology
US12488079B2 (en) Systems and methods for a connected computing resource and event/activity identification information infrastructure using near existential or existential biometric identification of humans
Nigam et al. [Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare Systems
Dasgupta et al. Advances in user authentication
US10810290B2 (en) Robust method and an apparatus for authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates
Esther Omolara et al. HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys
Wells et al. Privacy and biometrics for smart healthcare systems: attacks, and techniques
Sharma et al. A survey on blockchain deployment for biometric systems
Moallem Human-Computer Interaction and cybersecurity handbook
Makina et al. Survey on security and privacy in Internet of Things‐based eHealth applications: Challenges, architectures, and future directions
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
Furnell Securing information and communications systems: Principles, technologies, and applications
Kaur et al. Post study of Blockchain in smart health environment
Park et al. Combined authentication-based multilevel access control in mobile application for DailyLifeService
Wójtowicz et al. New challenges for user privacy in cyberspace
Malik Biometric Authentication-Risks and advancements in biometric security systems
Stajano Security issues in ubiquitous computing
Kaul et al. Secure and privacy preserving biometric based user authentication with data access control system in the healthcare environment
Bradish et al. Covichain: A blockchain based covid-19 vaccination passport
Kannavara et al. Topics in biometric human-machine interaction security
Guma Development of a secure multi-factor authentication algorithm for mobile money applications
Wilusz et al. Security analysis of transaction authorization methods for next generation electronic payment services
El Khoury Iris biometric model for secured network access
Rizvi et al. Protecting financial transactions through networks and point of sales
Vithanwattana Securing mHealth: investigating the development of a novel information security framework