{"title":"复杂事件的概念是生物识别系统实现的合适手段","authors":"K. Rabuzin, M. Baca, M. Schatten","doi":"10.1109/ICCGI.2007.59","DOIUrl":null,"url":null,"abstract":"Generally speaking, a user (person) can be authorised in three different ways (or their combinations): one can use something that a user knows, something that a user possesses or by measuring some physical or psychological characteristics which are immanent and unique to each person i.e. biometric characteristics. In this paper we are going to put accent on this third possibility. We are going to show how active databases could be used in order to implement multimodal biometric systems, and, due to some capabilities which they possess, reduce the time needed for authorisation (identification). Especially, we will put accent on complex events and show how they can be used for identification (authorisation) purposes.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The Concept of Complex Events as Suitable Means for Biometric System Implementation\",\"authors\":\"K. Rabuzin, M. Baca, M. Schatten\",\"doi\":\"10.1109/ICCGI.2007.59\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Generally speaking, a user (person) can be authorised in three different ways (or their combinations): one can use something that a user knows, something that a user possesses or by measuring some physical or psychological characteristics which are immanent and unique to each person i.e. biometric characteristics. In this paper we are going to put accent on this third possibility. We are going to show how active databases could be used in order to implement multimodal biometric systems, and, due to some capabilities which they possess, reduce the time needed for authorisation (identification). Especially, we will put accent on complex events and show how they can be used for identification (authorisation) purposes.\",\"PeriodicalId\":102568,\"journal\":{\"name\":\"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCGI.2007.59\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCGI.2007.59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Concept of Complex Events as Suitable Means for Biometric System Implementation
Generally speaking, a user (person) can be authorised in three different ways (or their combinations): one can use something that a user knows, something that a user possesses or by measuring some physical or psychological characteristics which are immanent and unique to each person i.e. biometric characteristics. In this paper we are going to put accent on this third possibility. We are going to show how active databases could be used in order to implement multimodal biometric systems, and, due to some capabilities which they possess, reduce the time needed for authorisation (identification). Especially, we will put accent on complex events and show how they can be used for identification (authorisation) purposes.