Cabra et al., 2022 - Google Patents
Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview.Cabra et al., 2022
View PDF- Document ID
- 10605187216797499092
- Author
- Cabra J
- Parra C
- Mendez D
- Arboleda L
- Publication year
- Publication venue
- J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
External Links
Snippet
Smartphones contain access to user-sensitive information such as contacts, e-mails, e- payments among others. Therefore, it is imperative that proper smartphone authentication tools guarantee that only the smartphone proprietary has full control of its mobile features …
- 230000003542 behavioural 0 abstract description 32
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00944—Details of construction or manufacture
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abuhamad et al. | Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey | |
US10869620B2 (en) | Biometric identification by garments having a plurality of sensors | |
Arteaga-Falconi et al. | ECG authentication for mobile devices | |
Zheng et al. | You are how you touch: User verification on smartphones via tapping behaviors | |
Neal et al. | Surveying biometric authentication for mobile device security | |
Dahia et al. | Continuous authentication using biometrics: An advanced review | |
Zhu et al. | Blinkey: A two-factor user authentication method for virtual reality devices | |
Cabra et al. | Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview. | |
Wang et al. | Context-aware implicit authentication of smartphone users based on multi-sensor behavior | |
Buriro | Behavioral biometrics for smartphone user authentication | |
WO2022047272A2 (en) | Electronic devices with a static artificial intelligence model for contextual situations, including age blocking for vaping and ignition start, using data analysis and operating methods thereof | |
Al-Naffakh et al. | Continuous user authentication using smartwatch motion sensor data | |
Sae-Bae et al. | Emerging NUI-based methods for user authentication: A new taxonomy and survey | |
Martinovic et al. | Pulse-response: Exploring human body impedance for biometric recognition | |
Cheng et al. | Identification With Your Mind: A Hybrid BCI-Based Authentication Approach for Anti-Shoulder-Surfing Attacks Using EEG and Eye Movement Data | |
Alrawili et al. | Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion | |
Mare et al. | Continuous smartphone authentication using wristbands | |
Li et al. | A Survey of PPG's Application in Authentication | |
Ayeswarya et al. | A comprehensive review on secure biometric-based continuous authentication and user profiling | |
Kang et al. | GAN-based patient information hiding for an ECG authentication system | |
Yao et al. | PresSafe: Barometer-based on-screen pressure-assisted implicit authentication for smartphones | |
Cao et al. | Towards nonintrusive and secure mobile two-factor authentication on wearables | |
Guo et al. | Shake, Shake, I Know Who You Are: Authentication Through Smart Wearable Devices | |
Enamamu | Bioelectrical user authentication | |
Handa et al. | Approaches of Behavioural Biometric Traits |