Guerra-Casanova et al., 2012 - Google Patents
Authentication in mobile devices through hand gesture recognitionGuerra-Casanova et al., 2012
View PDF- Document ID
- 5476008489913267411
- Author
- Guerra-Casanova J
- Sánchez-Ávila C
- Bailador G
- de Santos Sierra A
- Publication year
- Publication venue
- International Journal of Information Security
External Links
Snippet
This article proposes an innovative biometric technique based on the idea of authenticating a person on a mobile device by gesture recognition. To accomplish this aim, a user is prompted to be recognized by a gesture he/she performs moving his/her hand while holding …
- 238000000034 method 0 abstract description 62
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/0015—Access control not involving the use of a pass in combination with an identity-check by means of a handwritten signature
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guerra-Casanova et al. | Authentication in mobile devices through hand gesture recognition | |
Tolosana et al. | DeepSign: Deep on-line signature verification | |
Sun et al. | Accelerometer-based speed-adaptive gait authentication method for wearable IoT devices | |
Wu et al. | Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks | |
Hadid et al. | Biometrics systems under spoofing attack: an evaluation methodology and lessons learned | |
Gafurov et al. | Spoof attacks on gait authentication system | |
Bhattacharyya et al. | Biometric authentication: A review | |
Bailador et al. | Analysis of pattern recognition techniques for in-air signature biometrics | |
EP2523149B1 (en) | A method and system for association and decision fusion of multimodal inputs | |
Qin et al. | A fuzzy authentication system based on neural network learning and extreme value statistics | |
US20100254578A1 (en) | Handwriting authentication method, system and computer program | |
Hashia et al. | On using mouse movements as a biometric | |
Guerra-Casanova et al. | Time series distances measures to analyze in-air signatures to authenticate users on mobile phones | |
El Saddik et al. | A novel biometric system for identification and verification of haptic users | |
Igarza et al. | Online handwritten signature verification using hidden markov models | |
Guerra-Casanova et al. | Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures | |
Casanova et al. | A real-time in-air signature biometric technique using a mobile device embedding an accelerometer | |
Choudhary | Survey of different biometrics techniques | |
Bharadi et al. | Multi-modal biometric recognition using human iris and dynamic pressure variation of handwritten signatures | |
Ye et al. | A study on the individuality of finger vein based on statistical analysis | |
Kumar et al. | Analysis of various biometric techniques | |
Saini et al. | Authenticating mobile phone user using keystroke dynamics | |
Guerra-Casanova et al. | A robustness verification system for mobile phone authentication based on gestures using Linear Discriminant Analysis | |
Ducray et al. | Authentication based on a changeable biometric using gesture recognition with the kinect™ | |
Guerra-Casanova et al. | A sequence alignment approach applied to a mobile authentication technique based on gestures |