Thomas et al., 2023 - Google Patents
A broad review on non-intrusive active user authentication in biometricsThomas et al., 2023
View HTML- Document ID
- 1995939469511859373
- Author
- Thomas P
- Preetha Mathew K
- Publication year
- Publication venue
- Journal of Ambient Intelligence and Humanized Computing
External Links
Snippet
Authentication is the process of keeping the user's personal information as confidential in digital applications. Moreover, the user authentication process in the digital platform is employed to verify the own users by some authentication methods like biometrics, voice …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thomas et al. | A broad review on non-intrusive active user authentication in biometrics | |
Fierrez et al. | Benchmarking touchscreen biometrics for mobile authentication | |
Alzubaidi et al. | Authentication of smartphone users using behavioral biometrics | |
Buschek et al. | Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices | |
Peng et al. | Continuous authentication with touch behavioral biometrics and voice on wearable glasses | |
Raul et al. | A comprehensive review of keystroke dynamics-based authentication mechanism | |
Ellavarason et al. | Touch-dynamics based behavioural biometrics on mobile devices–a review from a usability and performance perspective | |
Neal et al. | Surveying biometric authentication for mobile device security | |
Shukla et al. | Stealing passwords by observing hands movement | |
Alqarni et al. | Identifying smartphone users based on how they interact with their phones | |
Buriro et al. | Itsme: Multi-modal and unobtrusive behavioural user authentication for smartphones | |
Serwadda et al. | Toward robotic robbery on the touch screen | |
Ayeswarya et al. | A comprehensive review on secure biometric-based continuous authentication and user profiling | |
Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
Maiorana et al. | Mobile keystroke dynamics for biometric recognition: An overview | |
Giot et al. | Keystroke dynamics authentication | |
Alsuhibany et al. | Analyzing the effectiveness of touch keystroke dynamic authentication for the Arabic language | |
Rashid et al. | Clicking your way to security: a review of continuous authentication with mouse dynamics | |
Roy et al. | Enhanced knowledge-based user authentication technique via keystroke dynamics | |
Dasgupta et al. | Continuous Authentication: Authenticating individuals frequently during sessions to assure valid identity | |
Lin et al. | Developing cloud-based intelligent touch behavioral authentication on mobile phones | |
Kek et al. | User Authentication with Keystroke Dynamics: Performance Evaluation in Neural Network | |
Grenga | Android based behavioral biometric authentication via multi-modal fusion | |
Elmaghraby et al. | Cybersecurity enhancement using recurrent neural networks and keystroke dynamics | |
Alsuhibany et al. | Investigating the accuracy of free-text keystroke dynamics authentication in touchscreen devices |