Janik et al., 2020 - Google Patents
Sgfa: A two-factor smartphone authentication mechanism using touch behavioral biometricsJanik et al., 2020
- Document ID
 - 11735299107530471641
 - Author
 - Janik L
 - Chuda D
 - Burda K
 - Publication year
 - Publication venue
 - Proceedings of the 21st International Conference on Computer Systems and Technologies
 
External Links
Snippet
In this paper we propose a user authentication method on smartphone devices based on the  popular pattern lock mechanism, called the Simple Game For Authentication (SGFA). The  SGFA mechanism resembles a simple game involving connecting points on the touch … 
    - 230000003542 behavioural 0 title abstract description 19
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
 - G06F21/31—User authentication
 - G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
 - G06F21/31—User authentication
 - G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
 - G06F21/31—User authentication
 - G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
 - G06F21/31—User authentication
 - G06F21/36—User authentication by graphic or iconic representation
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Krishnamoorthy et al. | Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning | |
| Song et al. | Multi-touch authentication using hand geometry and behavioral information | |
| US10586036B2 (en) | System, device, and method of recovery and resetting of user authentication factor | |
| Buschek et al. | Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices | |
| Kambourakis et al. | Introducing touchstroke: keystroke‐based authentication system for smartphones | |
| Serwadda et al. | When kids' toys breach mobile phone security | |
| US10476873B2 (en) | Device, system, and method of password-less user authentication and password-less detection of user identity | |
| US10164985B2 (en) | Device, system, and method of recovery and resetting of user authentication factor | |
| Sae-Bae et al. | Biometric-rich gestures: a novel approach to authentication on multi-touch devices | |
| Serwadda et al. | Examining a large keystroke biometrics dataset for statistical-attack openings | |
| Khan et al. | Augmented reality-based mimicry attacks on behaviour-based smartphone authentication | |
| Bours et al. | A login system using mouse dynamics | |
| Mahadi et al. | A survey of machine learning techniques for behavioral-based biometric user authentication | |
| Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
| Wang et al. | Improving reliability: User authentication on smartphones using keystroke biometrics | |
| Niu et al. | Gesture authentication with touch input for mobile devices | |
| Tse et al. | Behavioral biometrics scheme with keystroke and swipe dynamics for user authentication on mobile platform | |
| Van Nguyen et al. | Finger-drawn pin authentication on touch devices | |
| Karanikiotis et al. | Continuous implicit authentication through touch traces modelling | |
| Rybnik et al. | An exploration of keystroke dynamics authentication using non-fixed text of various length | |
| Alpar | Biometric touchstroke authentication by fuzzy proximity of touch locations | |
| Alshanketi et al. | Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords | |
| Rybnik et al. | User authentication with keystroke dynamics using fixed text | |
| Hasan et al. | IoT devices authentication using artificial neural network | |
| Janik et al. | Sgfa: A two-factor smartphone authentication mechanism using touch behavioral biometrics |