[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ayeswarya et al., 2019 - Google Patents

A survey on different continuous authentication systems

Ayeswarya et al., 2019

Document ID
5178499055646315893
Author
Ayeswarya S
Norman J
Publication year
Publication venue
International Journal of Biometrics

External Links

Snippet

There has been significant research in the provision of trustworthy initial login user authentication, however, there is still need for continuous authentication during a user session. Most mobile devices and computer systems authenticate a user only at the initial …
Continue reading at www.inderscienceonline.com (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • G07C2009/00095Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically comprising a biometric sensor on the pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00039Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of a pass-word

Similar Documents

Publication Publication Date Title
Ayeswarya et al. A survey on different continuous authentication systems
Rui et al. A survey on biometric authentication: Toward secure and privacy-preserving identification
Wang et al. User authentication on mobile devices: Approaches, threats and trends
Abuhamad et al. Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey
Lamiche et al. A continuous smartphone authentication method based on gait patterns and keystroke dynamics
Neal et al. Surveying biometric authentication for mobile device security
Mahfouz et al. A survey on behavioral biometric authentication on smartphones
Dahia et al. Continuous authentication using biometrics: An advanced review
Meng et al. Surveying the development of biometric user authentication on mobile phones
Cao et al. PPGPass: Nonintrusive and secure mobile two-factor authentication via wearables
Yeh et al. I walk, therefore i am: continuous user authentication with plantar biometrics
Alqarni et al. Identifying smartphone users based on how they interact with their phones
Amin et al. Biometric and traditional mobile authentication techniques: Overviews and open issues
Koong et al. A user authentication scheme using physiological and behavioral biometrics for multitouch devices
Alotaibi et al. Transparent authentication systems for mobile device security: A review
Wu et al. CaIAuth: Context-aware implicit authentication when the screen is awake
Alrawili et al. Comprehensive survey: Biometric user authentication application, evaluation, and discussion
Fenu et al. Leveraging continuous multi-modal authentication for access control in mobile cloud environments
Ayeswarya et al. A comprehensive review on secure biometric-based continuous authentication and user profiling
Akhtar et al. Multitrait Selfie: Low-Cost Multimodal Smartphone User Authentication
Cao et al. Towards nonintrusive and secure mobile two-factor authentication on wearables
Simske Dynamic biometrics: The case for a real-time solution to the problem of access control, privacy and security
Abdulkader et al. Authentication systems: Principles and threats
Stockinger Implicit authentication on mobile devices
Ekpezu et al. Biometric authentication schemes and methods on mobile devices: a systematic review