Damaševičius et al., 2021 - Google Patents
Smartphones Verification and Identification by the Use of FingerprintDamaševičius et al., 2021
- Document ID
- 3580333419764542532
- Author
- Damaševičius R
- Maskeliūnas R
- Publication year
- Publication venue
- Advanced Techniques for IoT Applications: Proceedings of EAIT 2020
External Links
Snippet
The use of fingerprints as a form of identification is authentic, accurate and reliable in smart phones. Due to privacy, and people feel safe that their information is secured by using locks on their android phones and can be accessed through fingerprints and other methods. An …
- 238000005516 engineering process 0 description 6
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C11/00—Arrangements, systems, or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10872135B2 (en) | User authentication method and authentication system using match with junk data | |
CN102638447B (en) | Method and device for system login based on autonomously generated password of user | |
US20180247483A1 (en) | Security systems for protecting an asset | |
Gupta et al. | Demystifying authentication concepts in smartphones: Ways and types to secure access | |
Bartłomiejczyk et al. | Multifactor authentication protocol in a mobile environment | |
Schlöglhofer et al. | Secure and usable authentication on mobile devices | |
JP2009543176A (en) | Traceless biometric identification system and method | |
CN106462706A (en) | A method and apparatus for providing client-side score-based authentication | |
CN107851148A (en) | Coding method and system | |
CN107733973A (en) | Method of controlling security, terminal, server and computer-readable medium | |
Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
JPWO2020261545A1 (en) | Authentication system, authentication device, authentication method, and program | |
Afah et al. | Smartphones verification and identification by the use of fingerprint | |
Nath et al. | Issues and challenges in two factor authentication algorithms | |
Mohamed | Security of Multifactor Authentication Model to Improve Authentication Systems | |
Paul et al. | IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't | |
Algarni | An Extra Security Measurement for Android Mobile Applications Using the Fingerprint Authentication Methodology | |
Chetalam | Enhancing Security of MPesa Transactions by Use of Voice Biometrics | |
CN108701183B (en) | User authentication method and system using whether junk data are consistent | |
Damaševičius et al. | Smartphones Verification and Identification by the Use of Fingerprint | |
Gao et al. | Usability and security of the recall-based graphical password schemes | |
Rahman et al. | Highly secured and effective management of app-based online voting system using RSA encryption and decryption | |
CN104009843A (en) | Token terminal and method | |
Guma | Development of a secure multi-factor authentication algorithm for mobile money applications | |
Goyal et al. | Design of improved algorithm for mobile payments using biometrics |