Tolosana et al., 2020 - Google Patents
BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networksTolosana et al., 2020
View PDF- Document ID
- 1832424135913428143
- Author
- Tolosana R
- Vera-Rodriguez R
- Fierrez J
- Ortega-Garcia J
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Passwords are still used on a daily basis for all kind of applications. However, they are not secure enough by themselves in many cases. This work enhances password scenarios through two-factor authentication asking the users to draw each character of the password …
- 230000001537 neural 0 title abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/0015—Access control not involving the use of a pass in combination with an identity-check by means of a handwritten signature
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tolosana et al. | BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networks | |
Wang et al. | Attacks and defenses in user authentication systems: A survey | |
Roy et al. | Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems | |
Van Nguyen et al. | DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices | |
Aumi et al. | Airauth: evaluating in-air hand gestures for authentication | |
Tolosana et al. | BioTouchPass: Handwritten passwords for touchscreen biometrics | |
Sen et al. | Putting ‘pressure’on mobile authentication | |
Thomas et al. | A broad review on non-intrusive active user authentication in biometrics | |
Azimpourkivi et al. | Camera based two factor authentication through mobile and wearable devices | |
Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
Liu et al. | Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone | |
Wang et al. | Improving reliability: User authentication on smartphones using keystroke biometrics | |
JP6745009B1 (en) | Authentication system, authentication device, authentication method, and program | |
Teh et al. | Recognizing your touch: Towards strengthening mobile device authentication via touch dynamics integration | |
Sinha et al. | A pattern-based multi-factor authentication system | |
Malatji et al. | Acceptance of biometric authentication security technology on mobile devices | |
Abiew et al. | Design and implementation of cost effective multi-factor authentication framework for ATM systems | |
Mohamed | Security of multifactor authentication model to improve authentication systems | |
Stragapede et al. | Mobile passive authentication through touchscreen and background sensor data | |
Rahman et al. | Web user authentication using chosen word keystroke dynamics | |
Tolosana et al. | MobileTouchDB: Mobile touch character database in the wild and biometric benchmark | |
Johansen | Keystroke dynamics on a device with touch screen | |
Gao et al. | Usability and security of the recall-based graphical password schemes | |
Tangawar et al. | Survey paper on graphical password authentication system in terms of usability and security attribute | |
Thullier et al. | Exploring mobile authentication mechanisms from personal identification numbers to biometrics including the future trend |