Hutchins et al., 2018 - Google Patents
Beat-pin: A user authentication mechanism for wearable devices through secret beatsHutchins et al., 2018
View PDF- Document ID
- 14749323656069985636
- Author
- Hutchins B
- Reddy A
- Jin W
- Zhou M
- Li M
- Yang L
- Publication year
- Publication venue
- Proceedings of the 2018 on Asia Conference on Computer and Communications Security
External Links
Snippet
Wearable devices that capture users' rich information regarding their daily activities have unmet authentication needs. Today's solutions, which primarily rely on indirect authentication mechanisms via users' smartphones, thus cumbersome and susceptible to …
- 230000000694 effects 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/033—Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/0304—Detection arrangements using opto-electronic means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hutchins et al. | Beat-pin: A user authentication mechanism for wearable devices through secret beats | |
Sitová et al. | HMOG: New behavioral biometric features for continuous authentication of smartphone users | |
Song et al. | Multi-touch authentication using hand geometry and behavioral information | |
Giuffrida et al. | I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics | |
US10868672B1 (en) | Establishing and verifying identity using biometrics while protecting user privacy | |
Li et al. | Velody: Nonlinear vibration challenge-response for resilient user authentication | |
US10075846B1 (en) | Method for continuous user authentication with wearables | |
Gupta et al. | Demystifying authentication concepts in smartphones: Ways and types to secure access | |
Serwadda et al. | Examining a large keystroke biometrics dataset for statistical-attack openings | |
Yeh et al. | I walk, therefore i am: continuous user authentication with plantar biometrics | |
Acar et al. | A usable and robust continuous authentication framework using wearables | |
Zhou et al. | You think, therefore you are: Transparent authentication system with brainwave-oriented bio-features for IoT networks | |
Buriro et al. | Dialerauth: A motion-assisted touch-based smartphone user authentication scheme | |
Wu et al. | It's all in the touch: Authenticating users with HOST gestures on multi-touch screen devices | |
Sun et al. | A 3‐D hand gesture signature based biometric authentication system for smartphones | |
Wu et al. | CaiAuth: Context-aware implicit authentication when the screen is awake | |
Cao et al. | Evidence in hand: Passive vibration response-based continuous user authentication | |
Yang et al. | PersonaIA: A lightweight implicit authentication system based on customized user behavior selection | |
Li et al. | Wrist in motion: A seamless context-aware continuous authentication framework using your clickings and typings | |
Mare et al. | Continuous smartphone authentication using wristbands | |
Allen | An analysis of pressure-based keystroke dynamics algorithms | |
Lone et al. | Smartphone-based biometric authentication scheme for access control management in client-server environment | |
Cao et al. | Towards nonintrusive and secure mobile two-factor authentication on wearables | |
Eglitis et al. | Data behind mobile behavioural biometrics–a survey | |
Maes et al. | Hybrid smartwatch multi-factor authentication |