Revett et al., 2008 - Google Patents
A survey of user authentication based on mouse dynamicsRevett et al., 2008
View PDF- Document ID
- 16462171953761059491
- Author
- Revett K
- Jahankhani H
- De Magalhaes S
- Santos H
- Publication year
- Publication venue
- International Conference on Global e-Security
External Links
Snippet
This work surveys biometric based authentication systems that deploy mouse movements. Typically, timing and movement direction, along with clicking actions are used to build a profile of a user, which is then used for authentication purposes. Most system relies on a …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Revett et al. | A survey of user authentication based on mouse dynamics | |
| Feher et al. | User identity verification via mouse dynamics | |
| Bailey et al. | User identification and authentication using multi-modal behavioral biometrics | |
| Sayed et al. | Biometric authentication using mouse gesture dynamics | |
| Gamboa et al. | A behavioral biometric system based on human-computer interaction | |
| Killourhy et al. | Comparing anomaly-detection algorithms for keystroke dynamics | |
| CN103530546B (en) | A kind of identity identifying method based on the behavior of user's mouse | |
| US9275345B1 (en) | System level user behavior biometrics using feature extraction and modeling | |
| CN101833619A (en) | Method for judging identity based on keyboard-mouse crossed certification | |
| US20150169854A1 (en) | Capturing cognitive fingerprints from keystroke dynamics for active authentication | |
| Shen et al. | Performance evaluation of anomaly-detection algorithms for mouse dynamics | |
| CN104809377A (en) | Method for monitoring network user identity based on webpage input behavior characteristics | |
| Chang et al. | Capturing cognitive fingerprints from keystroke dynamics | |
| Tolosana et al. | Exploiting complexity in pen-and touch-based signature biometrics | |
| Alariki et al. | TOUCH GESTURE AUTHENTICATION FRAMEWORK FOR TOUCH SCREEN MOBILE DEVICES. | |
| Cai et al. | Mobile authentication through touch-behavior features | |
| CN107430653B (en) | A method for identifying a user's interactive signature | |
| Quraishi et al. | Secure system of continuous user authentication using mouse dynamics | |
| EP2490149A1 (en) | System for verifying user identity via mouse dynamics | |
| Yaacob et al. | Decision making process in keystroke dynamics | |
| Ma et al. | A kind of mouse behavior authentication method on dynamic soft keyboard | |
| Lamb et al. | Swipe dynamics as a means of authentication: Results from a bayesian unsupervised approach | |
| Alshehri et al. | Accurate continuous and non-intrusive user authentication with multivariate keystroke streaming | |
| Shen et al. | A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring | |
| Gonzalez-Garcia et al. | Introduction to presentation attacks in signature biometrics and recent advances |