Stockinger, 2011 - Google Patents
Implicit authentication on mobile devicesStockinger, 2011
View PDF- Document ID
- 1320377172679943091
- Author
- Stockinger T
- Publication year
- Publication venue
- Ubiquitous Computing
External Links
Snippet
One major disadvantage of mobile devices is their liability to theft. Since people make more intense use of their smart phones to browse the web and store potentially sensitive data, it is proposed to use additional measures to secure one's device. Implicit authentication for …
- 238000000034 method 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rui et al. | A survey on biometric authentication: Toward secure and privacy-preserving identification | |
| US11102648B2 (en) | System, method, and apparatus for enhanced personal identification | |
| US10868672B1 (en) | Establishing and verifying identity using biometrics while protecting user privacy | |
| CN111386514B (en) | Expanding secure key storage for transaction confirmation | |
| Meng et al. | Surveying the development of biometric user authentication on mobile phones | |
| US20220094550A1 (en) | User movement and behavioral tracking for security and suspicious activities | |
| Lee et al. | Multi-sensor authentication to improve smartphone security | |
| Li et al. | Unobservable re-authentication for smartphones. | |
| US9788203B2 (en) | System and method for implicit authentication | |
| US20170227995A1 (en) | Method and system for implicit authentication | |
| US20190098503A1 (en) | System And Method For Implicit Authentication | |
| Neal et al. | Surveying biometric authentication for mobile device security | |
| Alqarni et al. | Identifying smartphone users based on how they interact with their phones | |
| Perera et al. | Efficient and low latency detection of intruders in mobile active authentication | |
| Amin et al. | Biometric and traditional mobile authentication techniques: Overviews and open issues | |
| Witte et al. | Context-aware mobile biometric authentication based on support vector machines | |
| Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
| Benzekki et al. | A context-aware authentication system for mobile cloud computing | |
| US20180012005A1 (en) | System, Method, and Apparatus for Personal Identification | |
| Alotaibi et al. | Transparent authentication systems for mobile device security: A review | |
| US11334658B2 (en) | Systems and methods for cloud-based continuous multifactor authentication | |
| Smith-Creasey | Continuous biometric authentication systems | |
| US11210384B2 (en) | Challenge and response in continuous multifactor authentication on a safe case | |
| Stockinger | Implicit authentication on mobile devices | |
| Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control |