[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Guerra-Casanova et al., 2012 - Google Patents

Authentication in mobile devices through hand gesture recognition

Guerra-Casanova et al., 2012

View PDF
Document ID
5476008489913267411
Author
Guerra-Casanova J
Sánchez-Ávila C
Bailador G
de Santos Sierra A
Publication year
Publication venue
International Journal of Information Security

External Links

Snippet

This article proposes an innovative biometric technique based on the idea of authenticating a person on a mobile device by gesture recognition. To accomplish this aim, a user is prompted to be recognized by a gesture he/she performs moving his/her hand while holding …
Continue reading at oa.upm.es (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/0015Access control not involving the use of a pass in combination with an identity-check by means of a handwritten signature
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Similar Documents

Publication Publication Date Title
Guerra-Casanova et al. Authentication in mobile devices through hand gesture recognition
Tolosana et al. DeepSign: Deep on-line signature verification
Sun et al. Accelerometer-based speed-adaptive gait authentication method for wearable IoT devices
Wu et al. Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks
Hadid et al. Biometrics systems under spoofing attack: an evaluation methodology and lessons learned
Gafurov et al. Spoof attacks on gait authentication system
Bhattacharyya et al. Biometric authentication: A review
Bailador et al. Analysis of pattern recognition techniques for in-air signature biometrics
EP2523149B1 (en) A method and system for association and decision fusion of multimodal inputs
Qin et al. A fuzzy authentication system based on neural network learning and extreme value statistics
US20100254578A1 (en) Handwriting authentication method, system and computer program
Hashia et al. On using mouse movements as a biometric
Guerra-Casanova et al. Time series distances measures to analyze in-air signatures to authenticate users on mobile phones
El Saddik et al. A novel biometric system for identification and verification of haptic users
Igarza et al. Online handwritten signature verification using hidden markov models
Guerra-Casanova et al. Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures
Casanova et al. A real-time in-air signature biometric technique using a mobile device embedding an accelerometer
Choudhary Survey of different biometrics techniques
Bharadi et al. Multi-modal biometric recognition using human iris and dynamic pressure variation of handwritten signatures
Ye et al. A study on the individuality of finger vein based on statistical analysis
Kumar et al. Analysis of various biometric techniques
Saini et al. Authenticating mobile phone user using keystroke dynamics
Guerra-Casanova et al. A robustness verification system for mobile phone authentication based on gestures using Linear Discriminant Analysis
Ducray et al. Authentication based on a changeable biometric using gesture recognition with the kinect™
Guerra-Casanova et al. A sequence alignment approach applied to a mobile authentication technique based on gestures