[go: up one dir, main page]

Tolosana et al., 2020 - Google Patents

BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networks

Tolosana et al., 2020

View PDF
Document ID
1832424135913428143
Author
Tolosana R
Vera-Rodriguez R
Fierrez J
Ortega-Garcia J
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

Passwords are still used on a daily basis for all kind of applications. However, they are not secure enough by themselves in many cases. This work enhances password scenarios through two-factor authentication asking the users to draw each character of the password …
Continue reading at biometrics.eps.uam.es (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/0015Access control not involving the use of a pass in combination with an identity-check by means of a handwritten signature
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00103Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system

Similar Documents

Publication Publication Date Title
Tolosana et al. BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networks
Wang et al. Attacks and defenses in user authentication systems: A survey
Roy et al. Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems
Van Nguyen et al. DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices
Aumi et al. Airauth: evaluating in-air hand gestures for authentication
Tolosana et al. BioTouchPass: Handwritten passwords for touchscreen biometrics
Sen et al. Putting ‘pressure’on mobile authentication
Thomas et al. A broad review on non-intrusive active user authentication in biometrics
Azimpourkivi et al. Camera based two factor authentication through mobile and wearable devices
Koong et al. A user authentication scheme using physiological and behavioral biometrics for multitouch devices
Liu et al. Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone
Wang et al. Improving reliability: User authentication on smartphones using keystroke biometrics
JP6745009B1 (en) Authentication system, authentication device, authentication method, and program
Teh et al. Recognizing your touch: Towards strengthening mobile device authentication via touch dynamics integration
Sinha et al. A pattern-based multi-factor authentication system
Malatji et al. Acceptance of biometric authentication security technology on mobile devices
Abiew et al. Design and implementation of cost effective multi-factor authentication framework for ATM systems
Mohamed Security of multifactor authentication model to improve authentication systems
Stragapede et al. Mobile passive authentication through touchscreen and background sensor data
Rahman et al. Web user authentication using chosen word keystroke dynamics
Tolosana et al. MobileTouchDB: Mobile touch character database in the wild and biometric benchmark
Johansen Keystroke dynamics on a device with touch screen
Gao et al. Usability and security of the recall-based graphical password schemes
Tangawar et al. Survey paper on graphical password authentication system in terms of usability and security attribute
Thullier et al. Exploring mobile authentication mechanisms from personal identification numbers to biometrics including the future trend