[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Cabra et al., 2022 - Google Patents

Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview.

Cabra et al., 2022

View PDF
Document ID
10605187216797499092
Author
Cabra J
Parra C
Mendez D
Arboleda L
Publication year
Publication venue
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.

External Links

Snippet

Smartphones contain access to user-sensitive information such as contacts, e-mails, e- payments among others. Therefore, it is imperative that proper smartphone authentication tools guarantee that only the smartphone proprietary has full control of its mobile features …
Continue reading at isyou.info (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00944Details of construction or manufacture

Similar Documents

Publication Publication Date Title
Abuhamad et al. Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey
US10869620B2 (en) Biometric identification by garments having a plurality of sensors
Arteaga-Falconi et al. ECG authentication for mobile devices
Zheng et al. You are how you touch: User verification on smartphones via tapping behaviors
Neal et al. Surveying biometric authentication for mobile device security
Dahia et al. Continuous authentication using biometrics: An advanced review
Zhu et al. Blinkey: A two-factor user authentication method for virtual reality devices
Cabra et al. Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview.
Wang et al. Context-aware implicit authentication of smartphone users based on multi-sensor behavior
Buriro Behavioral biometrics for smartphone user authentication
WO2022047272A2 (en) Electronic devices with a static artificial intelligence model for contextual situations, including age blocking for vaping and ignition start, using data analysis and operating methods thereof
Al-Naffakh et al. Continuous user authentication using smartwatch motion sensor data
Sae-Bae et al. Emerging NUI-based methods for user authentication: A new taxonomy and survey
Martinovic et al. Pulse-response: Exploring human body impedance for biometric recognition
Cheng et al. Identification With Your Mind: A Hybrid BCI-Based Authentication Approach for Anti-Shoulder-Surfing Attacks Using EEG and Eye Movement Data
Alrawili et al. Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion
Mare et al. Continuous smartphone authentication using wristbands
Li et al. A Survey of PPG's Application in Authentication
Ayeswarya et al. A comprehensive review on secure biometric-based continuous authentication and user profiling
Kang et al. GAN-based patient information hiding for an ECG authentication system
Yao et al. PresSafe: Barometer-based on-screen pressure-assisted implicit authentication for smartphones
Cao et al. Towards nonintrusive and secure mobile two-factor authentication on wearables
Guo et al. Shake, Shake, I Know Who You Are: Authentication Through Smart Wearable Devices
Enamamu Bioelectrical user authentication
Handa et al. Approaches of Behavioural Biometric Traits