Mason, 2004 - Google Patents
Validating identity for the electronic environmentMason, 2004
- Document ID
- 14777111571619884358
- Author
- Mason S
- Publication year
- Publication venue
- Computer Law & Security Review
External Links
Snippet
Many politicians the world over consider that it is cheaper and more effective for government agencies to communicate with citizens electronically, via the internet, in the future. For example, it will be compulsory for all businesses in the United Kingdom to submit certain …
- 238000010200 validation analysis 0 abstract description 3
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transaction
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Newman et al. | Identity theft literature review | |
| LoPucki | Human identification theory and the identity theft problem | |
| US9202026B1 (en) | Managing real time access management to personal information | |
| Sobel | The Demeaning of Identity and Personhood in National Indentification Systems | |
| Wang et al. | A contextual framework for combating identity theft | |
| Sullivan | Digital identity: An emergent legal concept | |
| White et al. | Assessing our knowledge of identity theft: The challenges to effective prevention and control efforts | |
| Gordon et al. | Identity fraud: A critical national and global threat | |
| Wijaya et al. | Cyber Crime in International Legal Instrument: How Indonesia and International Deal with This Crime? | |
| Ahmed | Preventing identity crime: identity theft and identity fraud: an identity crime model and legislative analysis with recommendations for preventing identity crime | |
| US20140244510A1 (en) | Privacy protection system and method | |
| Mason | Validating identity for the electronic environment | |
| Dinerstein | IDs for illegals: The'matricula consular'advances Mexico's immigration agenda | |
| Winterdyk et al. | Student and non-student perceptions and awareness of identity theft | |
| Camp | Economics of Identity Theft: Avoidance, Causes and Possible Cures | |
| US20070271221A1 (en) | Securing social security numbers with pins | |
| Thomson | Critical issues in identity management-challenges for Homeland Security | |
| Glynn | Computer abuse: the emerging crime and the need for legislation | |
| Roberts | Cyber identity theft | |
| Omotubora | Old wine in new bottles? critical and comparative perspectives on identity crimes under the Nigerian cybercrime Act 2015 | |
| Smith | International identity crime 1 | |
| Bump | Immigration, technology, and the worksite: The challenges of electronic employment verification | |
| Hemphill | Identity theft: A cost of business? | |
| Philippsohn | ID and the Law | |
| Haque et al. | Identity Theft in South-East Asia: Causes and Precautions |