[go: up one dir, main page]

Mason, 2004 - Google Patents

Validating identity for the electronic environment

Mason, 2004

Document ID
14777111571619884358
Author
Mason S
Publication year
Publication venue
Computer Law & Security Review

External Links

Snippet

Many politicians the world over consider that it is cheaper and more effective for government agencies to communicate with citizens electronically, via the internet, in the future. For example, it will be compulsory for all businesses in the United Kingdom to submit certain …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Similar Documents

Publication Publication Date Title
Newman et al. Identity theft literature review
LoPucki Human identification theory and the identity theft problem
US9202026B1 (en) Managing real time access management to personal information
Sobel The Demeaning of Identity and Personhood in National Indentification Systems
Wang et al. A contextual framework for combating identity theft
Sullivan Digital identity: An emergent legal concept
White et al. Assessing our knowledge of identity theft: The challenges to effective prevention and control efforts
Gordon et al. Identity fraud: A critical national and global threat
Wijaya et al. Cyber Crime in International Legal Instrument: How Indonesia and International Deal with This Crime?
Ahmed Preventing identity crime: identity theft and identity fraud: an identity crime model and legislative analysis with recommendations for preventing identity crime
US20140244510A1 (en) Privacy protection system and method
Mason Validating identity for the electronic environment
Dinerstein IDs for illegals: The'matricula consular'advances Mexico's immigration agenda
Winterdyk et al. Student and non-student perceptions and awareness of identity theft
Camp Economics of Identity Theft: Avoidance, Causes and Possible Cures
US20070271221A1 (en) Securing social security numbers with pins
Thomson Critical issues in identity management-challenges for Homeland Security
Glynn Computer abuse: the emerging crime and the need for legislation
Roberts Cyber identity theft
Omotubora Old wine in new bottles? critical and comparative perspectives on identity crimes under the Nigerian cybercrime Act 2015
Smith International identity crime 1
Bump Immigration, technology, and the worksite: The challenges of electronic employment verification
Hemphill Identity theft: A cost of business?
Philippsohn ID and the Law
Haque et al. Identity Theft in South-East Asia: Causes and Precautions