CN1441380A - Vital fingerprint distinguishing technology for identity antifake and resisting forcing - Google Patents

Vital fingerprint distinguishing technology for identity antifake and resisting forcing Download PDF

Info

Publication number
CN1441380A
CN1441380A CN 03112630 CN03112630A CN1441380A CN 1441380 A CN1441380 A CN 1441380A CN 03112630 CN03112630 CN 03112630 CN 03112630 A CN03112630 A CN 03112630A CN 1441380 A CN1441380 A CN 1441380A
Authority
CN
China
Prior art keywords
identity
coerce
proof
identification
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 03112630
Other languages
Chinese (zh)
Inventor
章映东
章映辉
章忠
张燕
Original Assignee
章映东
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 章映东 filed Critical 章映东
Priority to CN 03112630 priority Critical patent/CN1441380A/en
Publication of CN1441380A publication Critical patent/CN1441380A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The present invention relates to vital fingerprint distinguishing technology for identify anti-fake and resisting forcing. The present invention provides technology to avoid identify fake and forcing, to alarm timely and thus to ensure the safety of life and property. The present invention is based on vital fingerprint distinction and behavior distinction. The present invention may be used widely in door guard, bank and other places with identity and authority requirement.

Description

False proof and the coerce-proof technology of identity of living body finger print identification
What the present invention relates to is a kind of novel live body exclusiveness identity characteristic identification and the biological identification technology of coerce-proof---the false proof and coerce-proof technology of identity of living body finger print identification.
The live body identification of fingerprint has ensured the authenticity of identity, and refusal is forged; Solved defectives such as electronic code identity recognizing technologies such as existing bar code, magnetic card, IC-card are easily stolen effectively, also solved the hidden danger that common finger print image identification is easily duplicated by the holder seal, guaranteed that authentication must on-the-spot parent be property.But the thing followed is coerced problem, and this is still a technical difficult problem current, and the applicability technology that also not have effectively identification automatically to coerce at present all is the ancillary technique measure basically, intervene realization down artificially.Typical similar techniques can reduce following 3 classes substantially:
1. the field monitor technology with the means that image is monitored in real time, is carried out the scene activity at scene
The faithful record is observed, and is had or not by artificial judgment and illegally coerces generation.
2. technology is intercepted at the scene, with the means of sound real-time listening, the sound of site activity is carried out
Intercept, have or not by artificial judgment and illegally coerce generation.
3. the scene manually starts and posts a letter, and when having when illegally coercing, initiatively forces by the scene is artificial
Starting transmitting device alarms.
Each above-mentioned method all will be made some movements very in the scene when implementing the coerce-proof alarm, wish that the monitor staff can seize the opportunity the information of capturing and also in time respond; Though certain coerce-proof effect is arranged, defective also clearly.Preceding 2 class technology have just adopted the method for static deploy to ensure effective monitoring and control of illegal activities passive electronic surveillance and monitoring, not only depend on manually in time the obtaining and judge of field data, very easily erroneous judgement takes place and fail to judge, also easy deploy to ensure effective monitoring and control of illegal activities a little blind area hidden danger of existence; In fact exist the place that this 2 class technology is housed illegally to be coerced the case of intrusion always.Back one class technology has adopted artificial active to trigger the means that alarm is coerced, though on the accuracy that judgement is coerced, make moderate progress, but still exist and deploy to ensure effective monitoring and control of illegal activities a blind area and the easy ruined hidden danger of transmitting device and can't implement alarm.This 3 class technology exists common defects, not only erroneous judgement and the vigilance that people's strick precautions have taken place repeatedly, benumbed of reporting phenomenon by mistake, and also the phenomenon of failing to report but makes criminal have an opportunity to reach the purpose that it is coerced; Even the condition that can in time implement on-the-spot alarm is arranged being coerced in the process (near deploy to ensure effective monitoring and control of illegal activities device), or the very important person makes unusual movement (sound or action), this all will emit is realized by criminal and encroaches on the danger of life security.These technical defectives that self can't overcome that exist will be to pay the damaged cost of property and life security, and reality just like this.
The objective of the invention is to defective at above-mentioned existence; a kind of coerce-proof alarm method of living body finger print behavior identification is proposed; find in time that in carrying out authentication it is coerced; and implement snugly automatically to report to the police; one is convenient to benumb criminal and subdues criminal under unguard, and two protect by the life of intimidator and property safety.Not only contained the personation identity technically, and penetrated the behavior of deceiving people identity in the mode of coercing, really reached and ensure the false proof purpose with coerce-proof of identity.
The invention solves the safety guarantee of true identity authentication and the puzzlement on the technology application coerce-proof mechanism, guarantee the uniqueness and the exclusiveness feature of legal identity with fingerprint identification technology, with the vivo identification of fingerprint ensure identity can not forge with irreplaceable parent be property; And the consciousness of the behavior during with on-site verification changes, and judges automatically to be under the normal operating state or to be coerced down, and reaches incorporate coerce-proof safeguards technique with warning; This can't comprehensively be embodied in above-mentioned existing method, and also the technology of the present invention can realize true identity identification safely, distinguish the characteristic place of coercing, reporting to the police automatically just.
The present invention is with the initiatively technical guarantee measure of finger print identification verification of scene, implements containment timely and illegally falsely uses identity and the strick precaution warning countermeasure of coercing.This also is different from after the case in the police criminal detection passive collection fingerprint and technological means such as detect a lie is investigated the suspect.Public security is the back to take place in order to arrest criminal in case; And this patent is in order to implement contingent illegal act to be discerned and further harm of containment ahead of time, accomplishes to prevent trouble before it happens.
The solution of the technology of the present invention:
As the identify label feature, and get rid of fingerprint by the characteristics of being ask seal to duplicate with the uniqueness of somatic fingerprint, exclusiveness biological characteristic, thereby reaching that I must be in the action could be by the purpose of authentication with the live body biological identification technology; And the behavioural characteristic when resolving authentication, find to coerce, realize that automatically identity is false proof, the warning of coerce-proof.The present invention proposes just with such technical method, and by multi-disciplinary organically blending such as infotech, biotechnology, behavior recognition technologies, realize authentication with living body finger print identification, coercive act identification, warning countermeasure to the legal authorization identity, and, ensure the safety of people and property to coercing and forged identity enforcement warning.
The living body finger print identity false proof with the coerce-proof alarm technique mainly by legal authorization, authentication, coerce identification and four processing procedures of illegally reporting to the police form:
One, legal authorization processing procedure is to legal authorized person's individual fingerprint characteristic, live body biology
Feature and behavioural characteristic are united portrayal and are described, and allow authorized person's recognition feature get
Activation to system.
Two, authentication processing procedure is carried out biopsy to certified people's fingerprint, passes through Recognition and Acquisition
The biological characteristic of fingerprint, and its legitimacy compared, identify forgery, falsely use body
Part.
Three, coerce identification processing procedure, the parsing of behavioural characteristic identifies by to authenticating identity the time
The situation of being coerced.
Four, the processing procedure of illegally reporting to the police, according to the illegal forgery of identity, the property falsely used or by coercive,
Implement relevant warning countermeasure.
At last, by the interaction mechanism of warning countermeasure and safety-protection system, comprehensive enforcement realizes the guarantee of legitimate rights and interests to the automatic monitoring of identity veritification behavioral activity.
False proof and the coerce-proof warning system of living body finger print identity, both partly (coerce-proof), status differentiation part (anti-personation), countermeasure control section are differentiated in legal authorization part, fingerprint identity part, vivo identification part (anti-counterfeiting), behavior to divide six parts.
Legal authorization partly is people's living body finger print identity characteristic and behavioural characteristic are activated and to find application, mainly contain legal identity characterize 1 with legal authorization identity sample 2; The fingerprint that fingerprint characteristic partly obtains people to be certified characterizes, and mainly contains fingerprint collecting 3 and sample characteristics 4; The vivo identification part characterizes and discerns the active bio feature of human body, mainly contains the parsing 5 of active bio feature and differentiates 6 with live body; Behavior is differentiated partly people's to be certified behavioural characteristic variation is analyzed and discerned, and mainly contains behavioural characteristic analysis 7 and differentiates 8 with behavior; The status differentiation part is discerned the legitimacy of people's fingerprint identity to be certified, mainly contains legal sample search 9 and fingerprint identity validation 10; The countermeasure control section is then implemented legal normal process and to illegal identity and the warning joint control of coercing identity, is mainly contained legal processes 11 and illegal warning 12.
Relevance between them: fingerprint collecting 3 characterizes 1 with sample characteristics 4 and identity and is associated, and is associated with active bio feature parsing 5, behavioural characteristic analysis 7 again; Fingerprint identity validation 10 respectively with feature samples 4, live body discriminating 8, legal processes 11, illegal 12 associated of reporting to the police, and be associated with legal authorization identity sample 2 by legal sample search 9; Legal authorization identity sample 2 characterizes 1 with identity again and is associated; Live body discriminating 6 also respectively with the active bio feature resolve 5 and illegal the warning 12 be associated, and differentiate 8 by behavior and be associated with fingerprint identity validation 10; Behavior is differentiated 8 and is associated with behavioural characteristic analysis 7 and illegal warning 12 respectively again.
The present invention is with identification people's living body finger print feature and the identity legitimacy that behavioural characteristic is guaranteed the people, can find illegal identity and coercive act accurately and timely, and can implement automatically to report to the police, and ensures the safety of people and property.The face that the present invention is suitable for is wider, so long as have the place of requirement all to be fit to identity and authority and property safety: as gate inhibition, proof box, bank capital use, admission card for entrance examination, safe-guard door lock, automobile burglar etc.Be not subjected to the condition restriction of application system, do not pollute the environment, its advantage concentrates on:
With living body finger print identification biotechnology, the identity of stopping the people is forged and palms off.
The Collaborative Control of coerce-proof behavioural characteristic identification ensures and in time finds to coerce.
Figure A0311263000073
Form the alarm monitoring interaction that links with safety-protection system, realize false proof and coerce-proof identity
Complete monitoring.
Be connected with the close friend of gps satellite location and all kinds of communication systems, can realize illegal warning side
The diversity of formula and treatment Countermeasures.
Easy to use, the responding fast of fingerprint identity, safety, reliable.
Be that the environmental type technology is used, in use can not produce any harmful material.
Accompanying drawing 1 is a functional-block diagram of the present invention.
Accompanying drawing 2 is system architecture synoptic diagram of the present invention.
Accompanying drawing 3 is fingerprint of administrator login process flow processs of the present invention.
Accompanying drawing 4 is the legal authentication processing flow processs of living body finger print identity of the present invention.
Accompanying drawing 5 is legal identity authorisation process flow processs of the present invention.
Accompanying drawing 6 is treatment schemees of the easy people of keeper of the present invention.
Accompanying drawing 7 is that anti-identity of the present invention is forged processing flow chart.
Accompanying drawing 8 is coerce-proof treatment Countermeasures process flow diagrams of the present invention.
A among the figure is the legal authorization part, and B is the fingerprint characteristic, and C is a vivo identification part (anti-counterfeiting), and D is that part (coerce-proof) is differentiated in behavior, and E is the status differentiation part, and F is the countermeasure control section.1 is identification authorization, and 2 are legal authorization identity sample, and 3 is fingerprint collecting, and 4 is feature samples, 5 are the parsing of active bio feature, and 6 is the live body discriminating, and 7 is the behavioural characteristic analysis, and 8 is that behavior is differentiated, 9 is legal sample search, and 10 is fingerprint identity validation, and 11 is legal processes, and 12 is illegal the warning.
Contrast accompanying drawing 1, people's to be certified authentication is successively by just obtaining the result of legitimacy after the processing of above-mentioned six parts.Partly allow the identity information of legal authorization obtain activating by legal authorization; By the fingerprint identity information feature samplesization of fingerprint characteristic part with people to be certified; And vivo identification is partly carried out the activity discriminating with people's to be certified finger print information; The behavior identification division then carries out the attitude parsing to the behavior biological characteristic vestige of latent type, judges whether its behavior violates normality; Respectively these information are sent in the legal authentication section then; The correspondence that obtains identity legitimacy through comparison characterizes; At last, implement monitoring by treatment Countermeasures part according to the legitimacy situation of authentication to it.
Contrast accompanying drawing 2 people to be certified specifically discharges (being called the legal authorization part) by the activation of identification authorization 1 through legal mandate identity sample 2; Carry out the sign (being called the fingerprint characteristic part) of people's fingerprint to be certified to feature samples 4 by fingerprint collecting 3; Differentiate that through parsing 5 of active bio feature and live body 6 obtain the identification (being called the vivo identification part) that identity are forged then; Differentiate 8 acquisition identity coercives identifications (be called behavior and differentiate part) through behavioural characteristic analysis 7 and behavior again; And by legal sample search 9 and fingerprint identity validation 10 obtain the legitimacy identification (being called the status differentiation part) of identity; False proof corresponding result with coerce-proof identification changes legal processes 11 over to or illegally reports to the police 12 enforcement control processing (being called the countermeasure control section) with identity.Efficient real time interlock with system such as guard monitor realizes in time checking criminal, the safety of protection life and property.
The present invention is applicable to variously have strictness to check and approve the application places of requirement to identity; ensure the legitimacy and the security of people's normal activity with this; can self-organizing system finish authentication and warning to identity; also be convenient to be embedded into (as gate inhibition, national treasury safety, automobile burglar, proof box, bank debits etc.) among the existing types of applications system, and support to be connected, can satisfy the different application needs of socialization with peripheral communication warning and locating and monitoring system close friend.

Claims (9)

1. the false proof core with the coerce-proof technology of the identity of living body finger print identification; be the living body finger print personalized biological feature identity anti-counterfeit recognition of personnel selection, the coerce-proof identification of behavioural characteristic and the method for the countermeasure of illegally reporting to the police; stopping identity forges; coerce process in on-the-spot discovery of authentication and control; monitor and the containment criminal by the countermeasure enforcement of warning, reach identity false proof and coerce-proof and the purpose of protecting people and property safety.
2. the identity of living body finger print identification is false proof can work with the types of applications system mutual by self-organizing system with the coerce-proof technology, also can its member organically be embedded among the application system by the different business requirement, realize the false proof and coerce-proof countermeasure of identity, the containment criminal makes the operation security of application system obtain technical guarantee.
3. the identity of living body finger print identification is false proof is characterized in that with the identity antifalsification coerce-proof technology: discern with finger print image, the live body bio-identification, and the safe handling mechanism of identity legal authorization activation, the refusal forged identity, Fan Fei live finger and without the legal authorization login all be used as illegal identity, become the identity false proof technical guarantee of identification automatically.
4. the identity of living body finger print identification is false proof is characterised in that with the coerce-proof identity coerce-proof technology: with the behavioural characteristic recognition methods, automatically catch and find to be coerced the factor change such as behavior psychology of people when the authenticating identity, and do not have under the preparation coerce-proof of enforcement treatment Countermeasures criminal, become the precautionary technology guarantee that automatic identification is coerced.
The identity of living body finger print identification false proof with the coerce-proof technology, it is characterized in that by legal authorization, authentication, coerce identification and four processing procedures of illegally reporting to the police form: one, legal authorization processing procedure, legal authorized person's individual fingerprint characteristic, live body biological characteristic and behavioural characteristic are united portrayal and described, and allow authorized person's recognition feature obtain the activation of system.Two, authentication processing procedure is carried out biopsy to certified people's fingerprint, by the biological characteristic of Recognition and Acquisition fingerprint, and its legitimacy is compared, and identifies forgery, falsely uses identity.Three, coerce identification processing procedure, the parsing of behavioural characteristic identifies the situation of being coerced by to authenticating identity the time.Four, the processing procedure of illegally reporting to the police according to the illegal forgery of identity, the property falsely used or by coercive, is implemented relevant warning countermeasure.At last, by the interaction mechanism of warning countermeasure and safety-protection system, comprehensive enforcement realizes the guarantee of legitimate rights and interests to the automatic monitoring of identity veritification behavioral activity.At last, by the interaction mechanism of warning countermeasure with the monitoring security system, comprehensive enforcement is emitted control with the coercive act activity to the identity puppet, in time contains criminal, realizes the guarantee of people and property safety.
6. the false proof system applies with the coerce-proof technology of the identity of living body finger print identification is characterized in that containing both legal authorization parts of six modular structureizations parts, mainly contains legal identity and characterizes (1) and legal authorization identity sample (2); The fingerprint characteristic part mainly contains fingerprint collecting (3) and sample characteristics (4); The vivo identification part mainly contains the active bio feature and resolves (5) and live body discriminating (6); Part is differentiated in behavior, mainly contains behavioural characteristic analysis (7) and differentiates (8) with behavior; The status differentiation part mainly contains legal sample search (9) and fingerprint identity validation (10); The countermeasure control section mainly contains legal processes (11) and illegal report to the police (12).Relevance between them: fingerprint collecting (3) characterizes (1) with sample characteristics (4) and identity and is associated, and is associated with active bio feature parsing (5), behavioural characteristic analysis (7) again; Fingerprint identity validation (10) respectively with feature samples (4), live body discriminating (8), legal processes (11), illegal (12) associated of reporting to the police, and be associated with legal authorization identity sample (2) by legal sample search (9); Legal authorization identity sample (2) characterizes (1) with identity again and is associated; Live body discriminating (6) also resolves (5) with the active bio feature respectively and illegal report to the police (12) are associated, and is associated with fingerprint identity validation (10) by behavior differentiation (8); Behavior is differentiated (8) and is associated with behavioural characteristic analysis (7) and illegal report to the police (12) respectively again.According to concrete Business Stream, realize that by these related members identity is false proof, the automatic identification of coerce-proof harmoniously, the mature technology guarantee.
7. the identity of living body finger print identification is false proof provides the keeper licensing scheme with the coerce-proof technology for the types of applications system, and the talent who has only the acquisition legal authorization to login can obtain the affirmation of identity, has solved the technical guarantee of the system that the authorizes activation of legal use.
As the identity of living body finger print identification as described in claim 1 and 2 false proof with the coerce-proof technical method, it is characterized in that, prevent outside identity forgery and coerce the recognition technology guarantee of carrying out legal authorization, and be the legal mechanism on duty of finger print identifying that prevents that the illegal hackers invasive system from authorizing personnel's person of managing on duty.
9. the system applies of and coerce-proof technology false proof according to the false proof identity of the identity of claim 5 and the identification of 6 described living body finger prints with coerce-proof technology and living body finger print identification, the segmentation and the structural change of merger can be arranged, be still and meet the described feature instantiation that contains of claim 1-4.
CN 03112630 2003-01-08 2003-01-08 Vital fingerprint distinguishing technology for identity antifake and resisting forcing Pending CN1441380A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03112630 CN1441380A (en) 2003-01-08 2003-01-08 Vital fingerprint distinguishing technology for identity antifake and resisting forcing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03112630 CN1441380A (en) 2003-01-08 2003-01-08 Vital fingerprint distinguishing technology for identity antifake and resisting forcing

Publications (1)

Publication Number Publication Date
CN1441380A true CN1441380A (en) 2003-09-10

Family

ID=27770335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03112630 Pending CN1441380A (en) 2003-01-08 2003-01-08 Vital fingerprint distinguishing technology for identity antifake and resisting forcing

Country Status (1)

Country Link
CN (1) CN1441380A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100389723C (en) * 2004-12-24 2008-05-28 富士通株式会社 Personal authentication apparatus
CN104574088A (en) * 2015-02-04 2015-04-29 华为技术有限公司 Payment authorization method and device
CN105761378A (en) * 2016-01-29 2016-07-13 广州御银科技股份有限公司 Device and method for automatically identifying abnormal transactions and reducing losses
CN106696897A (en) * 2015-11-13 2017-05-24 孟超龙 Safety processing method and system for automobile fingerprints
CN107395357A (en) * 2017-06-21 2017-11-24 安徽众喜科技有限公司 A kind of individual soldier's encryption communication system
CN107743131A (en) * 2017-11-20 2018-02-27 张博 A kind of identity identifying method and device based on a variety of different types input composite sequence
CN107944242A (en) * 2017-11-22 2018-04-20 维沃移动通信有限公司 A kind of bio-identification function prohibited method and mobile terminal
CN111698215A (en) * 2020-05-18 2020-09-22 北京中科虹霸科技有限公司 Security prevention and control method, device and system based on biological feature recognition
CN113168741A (en) * 2018-11-20 2021-07-23 亚萨合莱有限公司 Signaling duress
CN114862405A (en) * 2022-05-09 2022-08-05 城锦策划(广州)有限公司 Internet transaction safety management device and management method thereof

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7818583B2 (en) 2004-12-24 2010-10-19 Fujitsu Limited Personal authentication apparatus
CN100389723C (en) * 2004-12-24 2008-05-28 富士通株式会社 Personal authentication apparatus
CN104574088A (en) * 2015-02-04 2015-04-29 华为技术有限公司 Payment authorization method and device
WO2016124063A1 (en) * 2015-02-04 2016-08-11 华为技术有限公司 Payment authorization method and device
US20170357969A1 (en) * 2015-02-04 2017-12-14 Huawei Technologies Co., Ltd. Payment Authentication Method and Apparatus
US10853807B2 (en) 2015-02-04 2020-12-01 Huawei Technologies Co., Ltd. Payment authentication method and apparatus
CN104574088B (en) * 2015-02-04 2018-10-19 华为技术有限公司 The method and apparatus of payment authentication
CN106696897A (en) * 2015-11-13 2017-05-24 孟超龙 Safety processing method and system for automobile fingerprints
CN105761378A (en) * 2016-01-29 2016-07-13 广州御银科技股份有限公司 Device and method for automatically identifying abnormal transactions and reducing losses
CN107395357B (en) * 2017-06-21 2020-07-17 安徽众喜科技有限公司 Individual soldier encryption communication system
CN107395357A (en) * 2017-06-21 2017-11-24 安徽众喜科技有限公司 A kind of individual soldier's encryption communication system
CN107743131A (en) * 2017-11-20 2018-02-27 张博 A kind of identity identifying method and device based on a variety of different types input composite sequence
CN107944242A (en) * 2017-11-22 2018-04-20 维沃移动通信有限公司 A kind of bio-identification function prohibited method and mobile terminal
CN107944242B (en) * 2017-11-22 2024-01-16 维沃移动通信有限公司 Biological identification function disabling method and mobile terminal
CN113168741A (en) * 2018-11-20 2021-07-23 亚萨合莱有限公司 Signaling duress
CN113168741B (en) * 2018-11-20 2023-09-01 亚萨合莱有限公司 Signaling stress
CN111698215A (en) * 2020-05-18 2020-09-22 北京中科虹霸科技有限公司 Security prevention and control method, device and system based on biological feature recognition
CN114862405A (en) * 2022-05-09 2022-08-05 城锦策划(广州)有限公司 Internet transaction safety management device and management method thereof

Similar Documents

Publication Publication Date Title
US7762456B2 (en) Systems and methods for reading a security clearance card
CN101059878A (en) Secondary door access system adopting biological character identification technology and control method
JP2005513639A (en) Form and owner verification system
CN1441380A (en) Vital fingerprint distinguishing technology for identity antifake and resisting forcing
Sabena et al. A review of vulnerabilities in identity management using biometrics
CN1393823A (en) Apparatus and method for auxiliary recognizing of human biological character
Epstein Embodying risk: Using biometrics to protect the borders
CN111462417A (en) Multi-information verification system and multi-information verification method for unmanned bank
Roots The new EURODAC regulation: Fingerprints as a source of Informal discrimination
Buhan et al. The state of the art in abuse of biometrics
Etzioni A communitarian approach: a viewpoint on the study of the legal, ethical and policy considerations raised by DNA tests and databases
EP1760678A2 (en) Security system
Ackleson Border security in risk society
CN1424687A (en) Fingerprint identifying security technology for accounts of banks
Loveček et al. Biometric Identity Verification as Part of Physical Protection Systems
Abdullayeva et al. Analysis of security vulnerabilities in biometric systems
Challita et al. Biometric authentication for intrusion detection systems
Smith Trends & issues in crime and criminal justice.
Pocs Legally compatible design of future biometric systems for crime prevention
RU2792788C1 (en) Combined set of checkpoints for the physical protection system (pps) of critical facilities with automation of access control and management processes
Tomaszewska-Michalak Biometric Technology 20 Years After 9/11–Opportunities and Threats
Amadi et al. Artificial Intelligence and Terrorism Prevention: Finding a Balance between Privacy Right and National Security
CN117765593A (en) Digital community management method, device and equipment based on intelligent access control
D Woodward Facing Up to Terrorism
Buhan et al. A false rejection oriented threat model for the design of biometric authentication systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication