[go: up one dir, main page]

Clarke et al., 2002 - Google Patents

Biometric authentication for mobile devices

Clarke et al., 2002

View PDF
Document ID
10138555169016444856
Author
Clarke N
Furnell S
Reynolds P
Publication year
Publication venue
Proceeding of the 3rd Australian information warfare and security conference

External Links

Snippet

The ability to communicate and work whilst on the move has given rise to an explosive growth in mobile devices. Primarily this growth has come out of mobile phone related technologies with worldwide subscribers now in excess of a billion (UMTS Forum, 2002), but …
Continue reading at ro.ecu.edu.au (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1633Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
    • G06F1/1675Miscellaneous details related to the relative movement between the different enclosures or enclosure parts which could be adopted independently from the movement typologies specified in G06F1/1615 and subgroups

Similar Documents

Publication Publication Date Title
Clarke et al. Advanced user authentication for mobile devices
Meng et al. Surveying the development of biometric user authentication on mobile phones
Tolosana et al. BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networks
Tasia et al. Two novel biometric features in keystroke dynamics authentication systems for touch screen devices
US20130263240A1 (en) Method for authentication and verification of user identity
Saevanee et al. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device
KR101201151B1 (en) User authentication by combining speaker verification and reverse turing test
Shanmugapriya et al. A survey of biometric keystroke dynamics: Approaches, security and challenges
Feng et al. Continuous mobile authentication using virtual key typing biometrics
Clarke et al. Biometric authentication for mobile devices
US9213811B2 (en) Methods and systems for improving the security of secret authentication data during authentication transactions
Lu et al. Safeguard: User reauthentication on smartphones via behavioral biometrics
US20070143825A1 (en) Apparatus and method of tiered authentication
Karatzouni et al. Keystroke analysis for thumb-based keyboards on mobile devices
Buriro et al. Dialerauth: A motion-assisted touch-based smartphone user authentication scheme
Saevanee et al. Text-based active authentication for mobile devices
Koong et al. A user authentication scheme using physiological and behavioral biometrics for multitouch devices
Malek et al. Novel shoulder-surfing resistant haptic-based graphical password
Sun et al. A 3‐D hand gesture signature based biometric authentication system for smartphones
Maiorana et al. User adaptive fuzzy commitment for signature template protection and renewability
Wang et al. The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time
Clarke et al. The application of signature recognition to transparent handwriting verification for mobile devices
Islam et al. A biometrics-based secure architecture for mobile computing
Zaidan et al. Factors affecting keystroke dynamics for verification data collecting and analysis
Clarke et al. Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets