[go: up one dir, main page]

Fenu et al., 2018 - Google Patents

Controlling user access to cloud-connected mobile applications by means of biometrics

Fenu et al., 2018

View PDF
Document ID
4998963606280910821
Author
Fenu G
Marras M
Publication year
Publication venue
IEEE Cloud Computing

External Links

Snippet

Cloud-connected mobile applications are becoming a popular solution for ubiquitous access to online services, such as cloud data storage platforms. The adoption of such applications has security and privacy implications that are making individuals hesitant to migrate …
Continue reading at drive.google.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data

Similar Documents

Publication Publication Date Title
US10877568B2 (en) Three-dimensional in-the-air finger motion based user login framework for gesture interface
Dahia et al. Continuous authentication using biometrics: An advanced review
Mahfouz et al. A survey on behavioral biometric authentication on smartphones
Jain et al. 50 years of biometric research: Accomplishments, challenges, and opportunities
Hadid et al. Biometrics systems under spoofing attack: an evaluation methodology and lessons learned
Tian et al. KinWrite: Handwriting-Based Authentication Using Kinect.
Crouse et al. Continuous authentication of mobile user: Fusion of face image and inertial measurement unit data
Fenu et al. Controlling user access to cloud-connected mobile applications by means of biometrics
Das et al. Recent advances in biometric technology for mobile devices
Centeno et al. Mobile based continuous authentication using deep features
US10922399B2 (en) Authentication verification using soft biometric traits
Corcoran Biometrics and consumer electronics: A brave new world or the road to dystopia?[Soapbox]
CN111310149A (en) Method and system for authentication based on correlation of multiple pulse signals
Amin et al. Biometric and traditional mobile authentication techniques: Overviews and open issues
US10552596B2 (en) Biometric authentication
Li et al. CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial network
Cherifi et al. Robust multimodal biometric authentication on IoT device through ear shape and arm gesture
US9292752B2 (en) Image processing device and image processing method
Dieter Findling et al. Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices
Messerschmidt et al. Biometric systems utilizing neural networks in the authentication for e-learning platforms
Samatha et al. Securesense: Enhancing person verification through multimodal biometrics for robust authentication
Srinivasa et al. Continuous multimodal user authentication: coupling hard and soft biometrics with support vector machines to attenuate noise
Akhtar et al. Multitrait Selfie: Low-Cost Multimodal Smartphone User Authentication
Mishra et al. Integrating state-of-the-art face recognition and anti-spoofing techniques into enterprise information systems
Terfa et al. Multi-modal biometrics systems: Concepts, strengths, challenges and solutions