[go: up one dir, main page]

Alotaibi et al., 2011 - Google Patents

FingerID: A new security model based on fingerprint recognition for personal learning environments (PLEs)

Alotaibi et al., 2011

View PDF
Document ID
13094009023218781405
Author
Alotaibi S
Argles D
Publication year
Publication venue
2011 IEEE Global Engineering Education Conference (EDUCON)

External Links

Snippet

The current practice of password based security for PLEs in general and the Internet in particular is inadequate. The widespread authentication mechanism of username and password is out-dated, and does not meet current needs. Intruders and hackers have also …
Continue reading at eprints.soton.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints

Similar Documents

Publication Publication Date Title
Lyastani et al. Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication
Cranor Security and usability: designing secure systems that people can use
Renaud Quantifying the quality of web authentication mechanisms a usability perspective
Parkin et al. A stealth approach to usable security: helping IT security managers to identify workable security solutions
Sinclair et al. Preventative directions for insider threat mitigation via access control
Bakar et al. Adaptive authentication based on analysis of user behavior
Martín-Ruíz et al. Developing a system for processing health data of children using digitalized toys: ethical and privacy concerns for the internet of things paradigm
Malkin et al. Optimistic access control for the smart home
Alotaibi et al. FingerID: A new security model based on fingerprint recognition for personal learning environments (PLEs)
Fritsch et al. Towards inclusive identity management
Garibyan et al. Access and identity management for libraries: controlling access to online information
Ide et al. Personhood Credentials: Human-Centered Design Recommendation Balancing Security, Usability, and Trust
Karegar et al. User evaluations of an app interface for cloud-based identity management
Mujeye An Experimental Study on the Role of Password Strength and Cognitive Load on Employee Productivity
Saxena Security and online content management: balancing access and security
Bernabe et al. An overview on aries: reliable european identity ecosystem
Kim et al. Security and access control for a human-centric collaborative commerce system
Cespiva Factors Influencing the Decision to Adopt a Digital Identity: A Correlational Study
Lin et al. Coding behavior of authentication code on the internet
Ouko Identity management and user authentication approach for the implementation of bring your own device in organizations
Alotaibi et al. FingerID: A new security model based on fingerprint recognition for distributed systems
Papanikolaou Restricting Authentication Token Sharing: Holder-Binding
Katuk et al. Authenticate Yourself Once Using OpenID.
Krol The role of effort in security and privacy behaviours online
Knight Strategies to Reduce Small Business Data Security Breaches