Clarke et al., 2002 - Google Patents
Biometric authentication for mobile devicesClarke et al., 2002
View PDF- Document ID
- 10138555169016444856
- Author
- Clarke N
- Furnell S
- Reynolds P
- Publication year
- Publication venue
- Proceeding of the 3rd Australian information warfare and security conference
External Links
Snippet
The ability to communicate and work whilst on the move has given rise to an explosive growth in mobile devices. Primarily this growth has come out of mobile phone related technologies with worldwide subscribers now in excess of a billion (UMTS Forum, 2002), but …
- 229920001690 polydopamine 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1675—Miscellaneous details related to the relative movement between the different enclosures or enclosure parts which could be adopted independently from the movement typologies specified in G06F1/1615 and subgroups
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Clarke et al. | Advanced user authentication for mobile devices | |
Meng et al. | Surveying the development of biometric user authentication on mobile phones | |
Tolosana et al. | BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networks | |
Tasia et al. | Two novel biometric features in keystroke dynamics authentication systems for touch screen devices | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
Saevanee et al. | User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device | |
KR101201151B1 (en) | User authentication by combining speaker verification and reverse turing test | |
Shanmugapriya et al. | A survey of biometric keystroke dynamics: Approaches, security and challenges | |
Feng et al. | Continuous mobile authentication using virtual key typing biometrics | |
Clarke et al. | Biometric authentication for mobile devices | |
US9213811B2 (en) | Methods and systems for improving the security of secret authentication data during authentication transactions | |
Lu et al. | Safeguard: User reauthentication on smartphones via behavioral biometrics | |
US20070143825A1 (en) | Apparatus and method of tiered authentication | |
Karatzouni et al. | Keystroke analysis for thumb-based keyboards on mobile devices | |
Buriro et al. | Dialerauth: A motion-assisted touch-based smartphone user authentication scheme | |
Saevanee et al. | Text-based active authentication for mobile devices | |
Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
Malek et al. | Novel shoulder-surfing resistant haptic-based graphical password | |
Sun et al. | A 3‐D hand gesture signature based biometric authentication system for smartphones | |
Maiorana et al. | User adaptive fuzzy commitment for signature template protection and renewability | |
Wang et al. | The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time | |
Clarke et al. | The application of signature recognition to transparent handwriting verification for mobile devices | |
Islam et al. | A biometrics-based secure architecture for mobile computing | |
Zaidan et al. | Factors affecting keystroke dynamics for verification data collecting and analysis | |
Clarke et al. | Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets |