[go: up one dir, main page]

Hutchins et al., 2018 - Google Patents

Beat-pin: A user authentication mechanism for wearable devices through secret beats

Hutchins et al., 2018

View PDF
Document ID
14749323656069985636
Author
Hutchins B
Reddy A
Jin W
Zhou M
Li M
Yang L
Publication year
Publication venue
Proceedings of the 2018 on Asia Conference on Computer and Communications Security

External Links

Snippet

Wearable devices that capture users' rich information regarding their daily activities have unmet authentication needs. Today's solutions, which primarily rely on indirect authentication mechanisms via users' smartphones, thus cumbersome and susceptible to …
Continue reading at ranger.uta.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/0304Detection arrangements using opto-electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Hutchins et al. Beat-pin: A user authentication mechanism for wearable devices through secret beats
Sitová et al. HMOG: New behavioral biometric features for continuous authentication of smartphone users
Song et al. Multi-touch authentication using hand geometry and behavioral information
Giuffrida et al. I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics
US10868672B1 (en) Establishing and verifying identity using biometrics while protecting user privacy
Li et al. Velody: Nonlinear vibration challenge-response for resilient user authentication
US10075846B1 (en) Method for continuous user authentication with wearables
Gupta et al. Demystifying authentication concepts in smartphones: Ways and types to secure access
Serwadda et al. Examining a large keystroke biometrics dataset for statistical-attack openings
Yeh et al. I walk, therefore i am: continuous user authentication with plantar biometrics
Acar et al. A usable and robust continuous authentication framework using wearables
Zhou et al. You think, therefore you are: Transparent authentication system with brainwave-oriented bio-features for IoT networks
Buriro et al. Dialerauth: A motion-assisted touch-based smartphone user authentication scheme
Wu et al. It's all in the touch: Authenticating users with HOST gestures on multi-touch screen devices
Sun et al. A 3‐D hand gesture signature based biometric authentication system for smartphones
Wu et al. CaiAuth: Context-aware implicit authentication when the screen is awake
Cao et al. Evidence in hand: Passive vibration response-based continuous user authentication
Yang et al. PersonaIA: A lightweight implicit authentication system based on customized user behavior selection
Li et al. Wrist in motion: A seamless context-aware continuous authentication framework using your clickings and typings
Mare et al. Continuous smartphone authentication using wristbands
Allen An analysis of pressure-based keystroke dynamics algorithms
Lone et al. Smartphone-based biometric authentication scheme for access control management in client-server environment
Cao et al. Towards nonintrusive and secure mobile two-factor authentication on wearables
Eglitis et al. Data behind mobile behavioural biometrics–a survey
Maes et al. Hybrid smartwatch multi-factor authentication