Karanikiotis et al., 2020 - Google Patents
Continuous implicit authentication through touch traces modellingKaranikiotis et al., 2020
View PDF- Document ID
 - 1495579672966570741
 - Author
 - Karanikiotis T
 - Papamichail M
 - Chatzidimitriou K
 - Oikonomou N
 - Symeonidis A
 - Saripalle S
 - Publication year
 - Publication venue
 - 2020 IEEE 20th International conference on software quality, reliability and security (QRS)
 
External Links
Snippet
Nowadays, the continuously increasing use of smart-phones as the primary way of dealing  with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this  context and given the known limitations and deficiencies of traditional authentication … 
    - 238000000034 method 0 abstract description 34
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
 - G06F21/31—User authentication
 - G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
 - G06F21/31—User authentication
 - G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
 - G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
 - G06F21/31—User authentication
 - G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
 - G06F21/31—User authentication
 - G06F21/36—User authentication by graphic or iconic representation
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/60—Protecting data
 - G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
 - G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/2133—Verifying human interaction, e.g., Captcha
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
 - G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
 - G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
 - G06K9/46—Extraction of features or characteristics of the image
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
 - G06F21/82—Protecting input, output or interconnection devices
 - G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
 - G06N99/00—Subject matter not provided for in other groups of this subclass
 - G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
 - G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
 - G06K9/62—Methods or arrangements for recognition using electronic means
 - G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
 - G06N3/00—Computer systems based on biological models
 - G06N3/02—Computer systems based on biological models using neural network models
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Lamiche et al. | A continuous smartphone authentication method based on gait patterns and keystroke dynamics | |
| Incel et al. | DAKOTA: Sensor and touch screen-based continuous authentication on a mobile banking application | |
| US10877568B2 (en) | Three-dimensional in-the-air finger motion based user login framework for gesture interface | |
| Krishnamoorthy et al. | Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning | |
| Song et al. | Multi-touch authentication using hand geometry and behavioral information | |
| Thomas et al. | A broad review on non-intrusive active user authentication in biometrics | |
| Li et al. | Unobservable re-authentication for smartphones. | |
| Deb et al. | Actions speak louder than (pass) words: Passive authentication of smartphone users via deep temporal features | |
| Karanikiotis et al. | Continuous implicit authentication through touch traces modelling | |
| Centeno et al. | Smartphone continuous authentication using deep learning autoencoders | |
| Kumar et al. | Authenticating users through their arm movement patterns | |
| Buriro et al. | Itsme: Multi-modal and unobtrusive behavioural user authentication for smartphones | |
| Acien et al. | BeCAPTCHA: Detecting human behavior in smartphone interaction using multiple inbuilt sensors | |
| Smith-Creasey et al. | A continuous user authentication scheme for mobile devices | |
| Temper et al. | Touch to authenticate—Continuous biometric authentication on mobile devices | |
| Pozo et al. | Exploring a statistical method for touchscreen swipe biometrics | |
| Giot et al. | Keystroke dynamics authentication | |
| Stragapede et al. | Mobile Passive Authentication through Touchscreen and Background Sensor Data. | |
| Lee et al. | Touch based active user authentication using deep belief networks and random forests | |
| Leyfer et al. | Continuous user authentication by the classification method based on the dynamic touchscreen biometrics | |
| Bhattarai et al. | Increasing accuracy of hand-motion based continuous authentication systems | |
| Shen et al. | Handedness recognition through keystroke-typing behavior in computer forensics analysis | |
| Levi et al. | Behavioral embedding for continuous user verification in global settings | |
| Tornai et al. | Gesture-based user identity verification as an open set problem for smartphones | |
| Janik et al. | Sgfa: A two-factor smartphone authentication mechanism using touch behavioral biometrics |