Fenu et al., 2018 - Google Patents
Controlling user access to cloud-connected mobile applications by means of biometricsFenu et al., 2018
View PDF- Document ID
- 4998963606280910821
- Author
- Fenu G
- Marras M
- Publication year
- Publication venue
- IEEE Cloud Computing
External Links
Snippet
Cloud-connected mobile applications are becoming a popular solution for ubiquitous access to online services, such as cloud data storage platforms. The adoption of such applications has security and privacy implications that are making individuals hesitant to migrate …
- 230000001276 controlling effect 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10877568B2 (en) | Three-dimensional in-the-air finger motion based user login framework for gesture interface | |
Dahia et al. | Continuous authentication using biometrics: An advanced review | |
Mahfouz et al. | A survey on behavioral biometric authentication on smartphones | |
Jain et al. | 50 years of biometric research: Accomplishments, challenges, and opportunities | |
Hadid et al. | Biometrics systems under spoofing attack: an evaluation methodology and lessons learned | |
Tian et al. | KinWrite: Handwriting-Based Authentication Using Kinect. | |
Crouse et al. | Continuous authentication of mobile user: Fusion of face image and inertial measurement unit data | |
Fenu et al. | Controlling user access to cloud-connected mobile applications by means of biometrics | |
Das et al. | Recent advances in biometric technology for mobile devices | |
Centeno et al. | Mobile based continuous authentication using deep features | |
US10922399B2 (en) | Authentication verification using soft biometric traits | |
Corcoran | Biometrics and consumer electronics: A brave new world or the road to dystopia?[Soapbox] | |
CN111310149A (en) | Method and system for authentication based on correlation of multiple pulse signals | |
Amin et al. | Biometric and traditional mobile authentication techniques: Overviews and open issues | |
US10552596B2 (en) | Biometric authentication | |
Li et al. | CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial network | |
Cherifi et al. | Robust multimodal biometric authentication on IoT device through ear shape and arm gesture | |
US9292752B2 (en) | Image processing device and image processing method | |
Dieter Findling et al. | Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices | |
Messerschmidt et al. | Biometric systems utilizing neural networks in the authentication for e-learning platforms | |
Samatha et al. | Securesense: Enhancing person verification through multimodal biometrics for robust authentication | |
Srinivasa et al. | Continuous multimodal user authentication: coupling hard and soft biometrics with support vector machines to attenuate noise | |
Akhtar et al. | Multitrait Selfie: Low-Cost Multimodal Smartphone User Authentication | |
Mishra et al. | Integrating state-of-the-art face recognition and anti-spoofing techniques into enterprise information systems | |
Terfa et al. | Multi-modal biometrics systems: Concepts, strengths, challenges and solutions |