Liou et al., 2016 - Google Patents
A study of biometric feature for a recall-based behavioral graphical mobile authenticationLiou et al., 2016
View PDF- Document ID
- 17115232961549078430
- Author
- Liou J
- Scaduto Jr A
- Publication year
- Publication venue
- Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016
External Links
Snippet
With the increasing use of mobile devices, including smart phones and tablets, in today's IT infrastructure, the paradigms of computer applications have been significantly changed. One area of studies is to utilize a new authentication scheme that will provide a better protection …
- 230000003542 behavioural 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Barkadehi et al. | Authentication systems: A literature review and classification | |
| EP3257194B1 (en) | Systems and methods for securely managing biometric data | |
| US8775814B2 (en) | Personalized biometric identification and non-repudiation system | |
| US9152779B2 (en) | Protecting codes, keys and user credentials with identity and patterns | |
| Abhishek et al. | A comprehensive study on multifactor authentication schemes | |
| JP2017175244A (en) | 1:n biometric authentication, encryption, and signature system | |
| Schlöglhofer et al. | Secure and usable authentication on mobile devices | |
| Nath et al. | Issues and challenges in two factor authentication algorithms | |
| Cavoukian et al. | Advances in biometric encryption: Taking privacy by design from academic research to deployment | |
| Abiodun et al. | Securing digital transaction using a three-level authentication system | |
| Mohamed | Security of multifactor authentication model to improve authentication systems | |
| Wong et al. | An enhanced user authentication solution for mobile payment systems using wearables | |
| Abraheem et al. | Survey of various graphical password techniques and their schemes | |
| Alghathbar et al. | Noisy password scheme: A new one time password system | |
| US10771970B2 (en) | Method of authenticating communication of an authentication device and at least one authentication server using local factor | |
| CA2611549C (en) | Method and system for providing a secure login solution using one-time passwords | |
| Liou et al. | A study of biometric feature for a recall-based behavioral graphical mobile authentication | |
| Guma | Development of a secure multi-factor authentication algorithm for mobile money applications | |
| Istyaq et al. | Encoding passwords using QR image for authentication | |
| Bhardwaj et al. | Wearable security-authentication using smartwatches | |
| Liou | Performance measures for evaluating the dynamic authentication techniques | |
| WO2016042473A1 (en) | Secure authentication using dynamic passcode | |
| WO2014039763A1 (en) | Visual image authentication and transaction authorization using non-determinism | |
| Hajjisaaid et al. | Secure Electronic Banking Authentication-Survey | |
| Ojo | Development of a Three Factor Authentication System for Online Banking |