Alsaadi, 2021 - Google Patents
Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A reviewAlsaadi, 2021
View PDF- Document ID
- 6856307262092707073
- Author
- Alsaadi I
- Publication year
- Publication venue
- Int. J. Sci. Technol. Res
External Links
Snippet
Reducing the growing risks of an unauthorized access to various sensitive systems is a critical issue nowadays. Examples of such sensitive systems are bank accounts, secure buildings, personal computers, mobile devices and etc. This has increased the need for …
- 230000003542 behavioural 0 title abstract description 32
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alsaadi | Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review | |
Liang et al. | Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective | |
JP6619847B2 (en) | IDENTIFICATION METHOD, TERMINAL DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM {IDENTITY AUTHENTICATION METHOD, TERMINAL EQUIPMENT AND COMPUTER READABLE STORE MEDIUM} | |
US10789343B2 (en) | Identity authentication method and apparatus | |
Dahia et al. | Continuous authentication using biometrics: An advanced review | |
US6810480B1 (en) | Verification of identity and continued presence of computer users | |
Tian et al. | KinWrite: Handwriting-Based Authentication Using Kinect. | |
Sayed et al. | Biometric authentication using mouse gesture dynamics | |
Sukmandhani et al. | Face recognition method for online exams | |
WO2021135685A1 (en) | Identity authentication method and device | |
Abate et al. | I-Am: implicitly authenticate me—person authentication on mobile devices through ear shape and arm gesture | |
Li et al. | CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial network | |
Saeed | New directions in behavioral biometrics | |
Li et al. | Adaptive deep feature fusion for continuous authentication with data augmentation | |
EP3001343B1 (en) | System and method of enhanced identity recognition incorporating random actions | |
Fenu et al. | Controlling user access to cloud-connected mobile applications by means of biometrics | |
Traore et al. | State of the art and perspectives on traditional and emerging biometrics: A survey | |
Ezz et al. | A silent password recognition framework based on lip analysis | |
TW202113685A (en) | Method and device for facial image recognition | |
Alsellami et al. | The recent trends in biometric traits authentication based on internet of things (IoT) | |
Hossain et al. | Human identity verification by using physiological and behavioural biometric traits | |
CN115087973A (en) | System and method for distinguishing user-, motion-, and device-specific features recorded in motion sensor data | |
Abate et al. | Smartphone enabled person authentication based on ear biometrics and arm gesture | |
Kadhim et al. | A multimodal biometric database and case study for face recognition based deep learning | |
Li et al. | Memory-augmented autoencoder based continuous authentication on smartphones with conditional transformer GANs |