Bonaci et al., 2014 - Google Patents
Securing the exocortex: A twenty-first century cybernetics challengeBonaci et al., 2014
- Document ID
- 12766192116784283214
- Author
- Bonaci T
- Herron J
- Matlack C
- Chizeck H
- Publication year
- Publication venue
- 2014 IEEE conference on Norbert Wiener in the 21st century (21CW)
External Links
Snippet
An exocortex is a wearable (or implanted) computer, used to augment a brain's biological high-level cognitive processes and inform a user's decisions and actions. In this paper, we focus on Brain-Computer Interfaces (BCIs), a special type of exocortex used to interact with …
- 230000001537 neural 0 abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
- G06F3/015—Input arrangements based on nervous system activity detection, e.g. brain waves [EEG] detection, electromyograms [EMG] detection, electrodermal response detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/033—Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/016—Input arrangements with force or tactile feedback as computer generated output to the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61N—ELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
- A61N1/00—Electrotherapy; Circuits therefor
- A61N1/18—Applying electric currents by contact electrodes
- A61N1/32—Applying electric currents by contact electrodes alternating or intermittent currents
- A61N1/36—Applying electric currents by contact electrodes alternating or intermittent currents for stimulation, e.g. heart pace-makers
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Detecting, measuring or recording for diagnostic purposes; Identification of persons
- A61B5/04—Detecting, measuring or recording bioelectric signals of the body of parts thereof
- A61B5/0476—Electroencephalography
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bonaci et al. | Securing the exocortex: A twenty-first century cybernetics challenge | |
Bonaci et al. | App stores for the brain: Privacy & security in Brain-Computer Interfaces | |
Klein et al. | Engineering the brain: ethical issues and the introduction of neural devices | |
Krombholz et al. | Use the force: Evaluating {Force-Sensitive} authentication for mobile devices | |
US8516568B2 (en) | Neural network data filtering and monitoring systems and methods | |
Li et al. | Deepobfuscator: Adversarial training framework for privacy-preserving image classification | |
Xia et al. | Privacy-preserving brain–computer interfaces: A systematic review | |
Xiao et al. | I can see your brain: Investigating home-use electroencephalography system security | |
Jain et al. | Securing E‐Healthcare Images Using an Efficient Image Encryption Model | |
Renieris | Beyond data: Reclaiming human rights at the dawn of the metaverse | |
Bonnail et al. | Memory manipulations in extended reality | |
Dixit et al. | Human bond communication: the holy grail of holistic communication and immersive experience | |
Sempreboni et al. | Privacy, security and trust in the internet of neurons | |
Botes | Brain Computer Interfaces and Human Rights: Brave new rights for a brave new world | |
Bernal et al. | Cybersecurity in brain-computer interfaces: State-of-the-art, opportunities, and future challenges | |
Ogiela | Cognitive solutions for security and cryptography | |
Gazzari et al. | My (o) armband leaks passwords: An emg and imu based keylogging side-channel attack | |
Kapitonova et al. | A framework for preserving privacy and cybersecurity in brain-computer interfacing applications | |
Zheng et al. | Fingerprint access control for wireless insulin pump systems using cancelable delaunay triangulations | |
Liv et al. | Cyberneurosecurity | |
Jiang et al. | Cybersecurity in neural interfaces: Survey and future trends | |
Alkaeed et al. | Privacy Preservation in Artificial Intelligence and Extended Reality (AI-XR) Metaverses: A Survey | |
Chiu et al. | I can think like you! towards reaction spoofing attack on brainwave-based authentication | |
Chaudhry et al. | Discovering trends for the development of novel authentication applications for dementia patients | |
Yue | Privacy and Ethical Concerns of Brain-Computer Interfaces |