Rathi et al., 2020 - Google Patents
Brain signatures perspective for high-security authenticationRathi et al., 2020
- Document ID
- 1470247916080081999
- Author
- Rathi N
- Singla R
- Tiwari S
- Publication year
- Publication venue
- Biomedical Engineering: Applications, Basis and Communications
External Links
Snippet
In the recent past, the web (internet) has emerged as the most interactive authentication system for all of us (ie Internet banking passwords, system or building access, and e- payment platforms, etc.) and as a result, traditional authentication systems (like passwords …
- 210000004556 Brain 0 title abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wang et al. | Convolutional neural networks using dynamic functional connectivity for EEG-based person identification in diverse human states | |
| Ruiz-Blondet et al. | CEREBRE: A novel method for very high accuracy event-related potential biometric identification | |
| Jayarathne et al. | BrainID: Development of an EEG-based biometric authentication system | |
| Chen et al. | A high-security EEG-based login system with RSVP stimuli and dry electrodes | |
| Lin et al. | Brain password: A secure and truly cancelable brain biometrics for smart headwear | |
| Singh et al. | Bioelectrical signals as emerging biometrics: Issues and challenges | |
| Campisi et al. | EEG for automatic person recognition | |
| Rathi et al. | A novel approach for designing authentication system using a picture based P300 speller | |
| Min et al. | Individual identification using cognitive electroencephalographic neurodynamics | |
| Jayarathne et al. | Survey of EEG-based biometric authentication | |
| Thomas et al. | Biometric identification of persons using sample entropy features of EEG during rest state | |
| Debie et al. | Session invariant EEG signatures using elicitation protocol fusion and convolutional neural network | |
| Revett | Cognitive biometrics: a novel approach to person authentication | |
| WO2017201972A1 (en) | Identity recognition method and device based on electroencephalogram signal | |
| Casanova et al. | User recognition based on periocular biometrics and touch dynamics | |
| Serwadda et al. | fNIRS: A new modality for brain activity-based biometric authentication | |
| Pham et al. | A study on the feasibility of using EEG signals for authentication purpose | |
| Pham et al. | A study on the stability of EEG signals for user authentication | |
| Gui et al. | Multichannel EEG-based biometric using improved RBF neural networks | |
| Rathi et al. | Brain signatures perspective for high-security authentication | |
| Jianfeng et al. | Multi-feature authentication system based on event evoked electroencephalogram | |
| Rathi et al. | Towards a role-based authentication system based on SSVEP-P300 hybrid brain–computer interfacing | |
| Alsunaidi et al. | A comparison of human brainwaves-based biometric authentication systems | |
| Rathi et al. | Authentication framework for security application developed using a pictorial P300 speller | |
| Rathi et al. | A comparative study of classification methods for designing a pictorial P300-based authentication system |