Nothing Special   »   [go: up one dir, main page]

Alsaadi, 2021 - Google Patents

Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review

Alsaadi, 2021

View PDF
Document ID
6856307262092707073
Author
Alsaadi I
Publication year
Publication venue
Int. J. Sci. Technol. Res

External Links

Snippet

Reducing the growing risks of an unauthorized access to various sensitive systems is a critical issue nowadays. Examples of such sensitive systems are bank accounts, secure buildings, personal computers, mobile devices and etc. This has increased the need for …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Alsaadi Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review
Liang et al. Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective
JP6619847B2 (en) IDENTIFICATION METHOD, TERMINAL DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM {IDENTITY AUTHENTICATION METHOD, TERMINAL EQUIPMENT AND COMPUTER READABLE STORE MEDIUM}
US10789343B2 (en) Identity authentication method and apparatus
Dahia et al. Continuous authentication using biometrics: An advanced review
US6810480B1 (en) Verification of identity and continued presence of computer users
Tian et al. KinWrite: Handwriting-Based Authentication Using Kinect.
Sayed et al. Biometric authentication using mouse gesture dynamics
Sukmandhani et al. Face recognition method for online exams
WO2021135685A1 (en) Identity authentication method and device
Abate et al. I-Am: implicitly authenticate me—person authentication on mobile devices through ear shape and arm gesture
Li et al. CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial network
Saeed New directions in behavioral biometrics
Li et al. Adaptive deep feature fusion for continuous authentication with data augmentation
EP3001343B1 (en) System and method of enhanced identity recognition incorporating random actions
Fenu et al. Controlling user access to cloud-connected mobile applications by means of biometrics
Traore et al. State of the art and perspectives on traditional and emerging biometrics: A survey
Ezz et al. A silent password recognition framework based on lip analysis
TW202113685A (en) Method and device for facial image recognition
Alsellami et al. The recent trends in biometric traits authentication based on internet of things (IoT)
Hossain et al. Human identity verification by using physiological and behavioural biometric traits
CN115087973A (en) System and method for distinguishing user-, motion-, and device-specific features recorded in motion sensor data
Abate et al. Smartphone enabled person authentication based on ear biometrics and arm gesture
Kadhim et al. A multimodal biometric database and case study for face recognition based deep learning
Li et al. Memory-augmented autoencoder based continuous authentication on smartphones with conditional transformer GANs