[go: up one dir, main page]

Liou et al., 2016 - Google Patents

A study of biometric feature for a recall-based behavioral graphical mobile authentication

Liou et al., 2016

View PDF
Document ID
17115232961549078430
Author
Liou J
Scaduto Jr A
Publication year
Publication venue
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016

External Links

Snippet

With the increasing use of mobile devices, including smart phones and tablets, in today's IT infrastructure, the paradigms of computer applications have been significantly changed. One area of studies is to utilize a new authentication scheme that will provide a better protection …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Barkadehi et al. Authentication systems: A literature review and classification
EP3257194B1 (en) Systems and methods for securely managing biometric data
US8775814B2 (en) Personalized biometric identification and non-repudiation system
US9152779B2 (en) Protecting codes, keys and user credentials with identity and patterns
Abhishek et al. A comprehensive study on multifactor authentication schemes
JP2017175244A (en) 1:n biometric authentication, encryption, and signature system
Schlöglhofer et al. Secure and usable authentication on mobile devices
Nath et al. Issues and challenges in two factor authentication algorithms
Cavoukian et al. Advances in biometric encryption: Taking privacy by design from academic research to deployment
Abiodun et al. Securing digital transaction using a three-level authentication system
Mohamed Security of multifactor authentication model to improve authentication systems
Wong et al. An enhanced user authentication solution for mobile payment systems using wearables
Abraheem et al. Survey of various graphical password techniques and their schemes
Alghathbar et al. Noisy password scheme: A new one time password system
US10771970B2 (en) Method of authenticating communication of an authentication device and at least one authentication server using local factor
CA2611549C (en) Method and system for providing a secure login solution using one-time passwords
Liou et al. A study of biometric feature for a recall-based behavioral graphical mobile authentication
Guma Development of a secure multi-factor authentication algorithm for mobile money applications
Istyaq et al. Encoding passwords using QR image for authentication
Bhardwaj et al. Wearable security-authentication using smartwatches
Liou Performance measures for evaluating the dynamic authentication techniques
WO2016042473A1 (en) Secure authentication using dynamic passcode
WO2014039763A1 (en) Visual image authentication and transaction authorization using non-determinism
Hajjisaaid et al. Secure Electronic Banking Authentication-Survey
Ojo Development of a Three Factor Authentication System for Online Banking