[go: up one dir, main page]

Stockinger, 2011 - Google Patents

Implicit authentication on mobile devices

Stockinger, 2011

View PDF
Document ID
1320377172679943091
Author
Stockinger T
Publication year
Publication venue
Ubiquitous Computing

External Links

Snippet

One major disadvantage of mobile devices is their liability to theft. Since people make more intense use of their smart phones to browse the web and store potentially sensitive data, it is proposed to use additional measures to secure one's device. Implicit authentication for …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Similar Documents

Publication Publication Date Title
Rui et al. A survey on biometric authentication: Toward secure and privacy-preserving identification
US11102648B2 (en) System, method, and apparatus for enhanced personal identification
US10868672B1 (en) Establishing and verifying identity using biometrics while protecting user privacy
CN111386514B (en) Expanding secure key storage for transaction confirmation
Meng et al. Surveying the development of biometric user authentication on mobile phones
US20220094550A1 (en) User movement and behavioral tracking for security and suspicious activities
Lee et al. Multi-sensor authentication to improve smartphone security
Li et al. Unobservable re-authentication for smartphones.
US9788203B2 (en) System and method for implicit authentication
US20170227995A1 (en) Method and system for implicit authentication
US20190098503A1 (en) System And Method For Implicit Authentication
Neal et al. Surveying biometric authentication for mobile device security
Alqarni et al. Identifying smartphone users based on how they interact with their phones
Perera et al. Efficient and low latency detection of intruders in mobile active authentication
Amin et al. Biometric and traditional mobile authentication techniques: Overviews and open issues
Witte et al. Context-aware mobile biometric authentication based on support vector machines
Koong et al. A user authentication scheme using physiological and behavioral biometrics for multitouch devices
Benzekki et al. A context-aware authentication system for mobile cloud computing
US20180012005A1 (en) System, Method, and Apparatus for Personal Identification
Alotaibi et al. Transparent authentication systems for mobile device security: A review
US11334658B2 (en) Systems and methods for cloud-based continuous multifactor authentication
Smith-Creasey Continuous biometric authentication systems
US11210384B2 (en) Challenge and response in continuous multifactor authentication on a safe case
Stockinger Implicit authentication on mobile devices
Papaioannou et al. User authentication and authorization for next generation mobile passenger ID devices for land and sea border control