[go: up one dir, main page]

Revett et al., 2008 - Google Patents

A survey of user authentication based on mouse dynamics

Revett et al., 2008

View PDF
Document ID
16462171953761059491
Author
Revett K
Jahankhani H
De Magalhaes S
Santos H
Publication year
Publication venue
International Conference on Global e-Security

External Links

Snippet

This work surveys biometric based authentication systems that deploy mouse movements. Typically, timing and movement direction, along with clicking actions are used to build a profile of a user, which is then used for authentication purposes. Most system relies on a …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)

Similar Documents

Publication Publication Date Title
Revett et al. A survey of user authentication based on mouse dynamics
Feher et al. User identity verification via mouse dynamics
Bailey et al. User identification and authentication using multi-modal behavioral biometrics
Sayed et al. Biometric authentication using mouse gesture dynamics
Gamboa et al. A behavioral biometric system based on human-computer interaction
Killourhy et al. Comparing anomaly-detection algorithms for keystroke dynamics
CN103530546B (en) A kind of identity identifying method based on the behavior of user's mouse
US9275345B1 (en) System level user behavior biometrics using feature extraction and modeling
CN101833619A (en) Method for judging identity based on keyboard-mouse crossed certification
US20150169854A1 (en) Capturing cognitive fingerprints from keystroke dynamics for active authentication
Shen et al. Performance evaluation of anomaly-detection algorithms for mouse dynamics
CN104809377A (en) Method for monitoring network user identity based on webpage input behavior characteristics
Chang et al. Capturing cognitive fingerprints from keystroke dynamics
Tolosana et al. Exploiting complexity in pen-and touch-based signature biometrics
Alariki et al. TOUCH GESTURE AUTHENTICATION FRAMEWORK FOR TOUCH SCREEN MOBILE DEVICES.
Cai et al. Mobile authentication through touch-behavior features
CN107430653B (en) A method for identifying a user's interactive signature
Quraishi et al. Secure system of continuous user authentication using mouse dynamics
EP2490149A1 (en) System for verifying user identity via mouse dynamics
Yaacob et al. Decision making process in keystroke dynamics
Ma et al. A kind of mouse behavior authentication method on dynamic soft keyboard
Lamb et al. Swipe dynamics as a means of authentication: Results from a bayesian unsupervised approach
Alshehri et al. Accurate continuous and non-intrusive user authentication with multivariate keystroke streaming
Shen et al. A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring
Gonzalez-Garcia et al. Introduction to presentation attacks in signature biometrics and recent advances