Alexandrou, 2019 - Google Patents
Physical Security: Interior Applications–Doors, Access ControlAlexandrou, 2019
- Document ID
- 4606667001849550290
- Author
- Alexandrou A
- Publication year
- Publication venue
- Encyclopedia of Security and Emergency Management
External Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12425479B2 (en) | Web-cloud hosted unified physical security system | |
| JP7051766B2 (en) | Self-provisioning access control | |
| US8941465B2 (en) | System and method for secure entry using door tokens | |
| US9118656B2 (en) | Systems and methods for multi-factor authentication | |
| US8907763B2 (en) | System, station and method for mustering | |
| US8549584B2 (en) | Physical security triggered dynamic network authentication and authorization | |
| US20140002236A1 (en) | Door Lock, System and Method for Remotely Controlled Access | |
| US20140019768A1 (en) | System and Method for Shunting Alarms Using Identifying Tokens | |
| US20130214902A1 (en) | Systems and methods for networks using token based location | |
| US20030005326A1 (en) | Method and system for implementing a security application services provider | |
| US20190080538A1 (en) | Novel high assurance identity authentication and granular access oversight and management system based on indoor tracking, gps and biometric identification | |
| JP2016515784A5 (en) | ||
| EP4217978A1 (en) | Access system with an electronical lock | |
| Alexandrou | Physical Security: Interior Applications–Doors, Access Control | |
| Alexandrou | Physical Security: Interior Applications–Doors, Access Control | |
| Alexandrou | Physical Security: Interior Applications | |
| Essien | Enhancing Role-Based Access Control with Embedded Facial Recognition RBAC-EFR System | |
| Ismail et al. | Intelligent door locking system | |
| US20250316122A1 (en) | Systems, apparatus, and methods for access resolution based on situational awareness | |
| Vitla | Securing the physical and digital frontier: leveraging identity and access management (IAM) to address the lack of controls on physical access to sensitive systems | |
| Saharedan | Prototype Security Door Access System | |
| Chapman | A Dynamic, Perimeter Based, Community-centric Access Control System | |
| BG67192B1 (en) | Biometric system for wireless remote administration of access rights and method performing its functioning | |
| de Gregorio Noblejas | Perimeter Security 2.0 | |
| BG2747U1 (en) | Biometric system for wireless remote administration of access rights |