Nothing Special   »   [go: up one dir, main page]

Damaševičius et al., 2021 - Google Patents

Smartphones Verification and Identification by the Use of Fingerprint

Damaševičius et al., 2021

Document ID
3580333419764542532
Author
Damaševičius R
Maskeliūnas R
Publication year
Publication venue
Advanced Techniques for IoT Applications: Proceedings of EAIT 2020

External Links

Snippet

The use of fingerprints as a form of identification is authentic, accurate and reliable in smart phones. Due to privacy, and people feel safe that their information is secured by using locks on their android phones and can be accessed through fingerprints and other methods. An …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C11/00Arrangements, systems, or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere

Similar Documents

Publication Publication Date Title
US10872135B2 (en) User authentication method and authentication system using match with junk data
CN102638447B (en) Method and device for system login based on autonomously generated password of user
US20180247483A1 (en) Security systems for protecting an asset
Gupta et al. Demystifying authentication concepts in smartphones: Ways and types to secure access
Bartłomiejczyk et al. Multifactor authentication protocol in a mobile environment
Schlöglhofer et al. Secure and usable authentication on mobile devices
JP2009543176A (en) Traceless biometric identification system and method
CN106462706A (en) A method and apparatus for providing client-side score-based authentication
CN107851148A (en) Coding method and system
CN107733973A (en) Method of controlling security, terminal, server and computer-readable medium
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
JPWO2020261545A1 (en) Authentication system, authentication device, authentication method, and program
Afah et al. Smartphones verification and identification by the use of fingerprint
Nath et al. Issues and challenges in two factor authentication algorithms
Mohamed Security of Multifactor Authentication Model to Improve Authentication Systems
Paul et al. IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't
Algarni An Extra Security Measurement for Android Mobile Applications Using the Fingerprint Authentication Methodology
Chetalam Enhancing Security of MPesa Transactions by Use of Voice Biometrics
CN108701183B (en) User authentication method and system using whether junk data are consistent
Damaševičius et al. Smartphones Verification and Identification by the Use of Fingerprint
Gao et al. Usability and security of the recall-based graphical password schemes
Rahman et al. Highly secured and effective management of app-based online voting system using RSA encryption and decryption
CN104009843A (en) Token terminal and method
Guma Development of a secure multi-factor authentication algorithm for mobile money applications
Goyal et al. Design of improved algorithm for mobile payments using biometrics