+

Karanikiotis et al., 2020 - Google Patents

Continuous implicit authentication through touch traces modelling

Karanikiotis et al., 2020

View PDF
Document ID
1495579672966570741
Author
Karanikiotis T
Papamichail M
Chatzidimitriou K
Oikonomou N
Symeonidis A
Saripalle S
Publication year
Publication venue
2020 IEEE 20th International conference on software quality, reliability and security (QRS)

External Links

Snippet

Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this context and given the known limitations and deficiencies of traditional authentication …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models

Similar Documents

Publication Publication Date Title
Lamiche et al. A continuous smartphone authentication method based on gait patterns and keystroke dynamics
Incel et al. DAKOTA: Sensor and touch screen-based continuous authentication on a mobile banking application
US10877568B2 (en) Three-dimensional in-the-air finger motion based user login framework for gesture interface
Krishnamoorthy et al. Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning
Song et al. Multi-touch authentication using hand geometry and behavioral information
Thomas et al. A broad review on non-intrusive active user authentication in biometrics
Li et al. Unobservable re-authentication for smartphones.
Deb et al. Actions speak louder than (pass) words: Passive authentication of smartphone users via deep temporal features
Karanikiotis et al. Continuous implicit authentication through touch traces modelling
Centeno et al. Smartphone continuous authentication using deep learning autoencoders
Kumar et al. Authenticating users through their arm movement patterns
Buriro et al. Itsme: Multi-modal and unobtrusive behavioural user authentication for smartphones
Acien et al. BeCAPTCHA: Detecting human behavior in smartphone interaction using multiple inbuilt sensors
Smith-Creasey et al. A continuous user authentication scheme for mobile devices
Temper et al. Touch to authenticate—Continuous biometric authentication on mobile devices
Pozo et al. Exploring a statistical method for touchscreen swipe biometrics
Giot et al. Keystroke dynamics authentication
Stragapede et al. Mobile Passive Authentication through Touchscreen and Background Sensor Data.
Lee et al. Touch based active user authentication using deep belief networks and random forests
Leyfer et al. Continuous user authentication by the classification method based on the dynamic touchscreen biometrics
Bhattarai et al. Increasing accuracy of hand-motion based continuous authentication systems
Shen et al. Handedness recognition through keystroke-typing behavior in computer forensics analysis
Levi et al. Behavioral embedding for continuous user verification in global settings
Tornai et al. Gesture-based user identity verification as an open set problem for smartphones
Janik et al. Sgfa: A two-factor smartphone authentication mechanism using touch behavioral biometrics
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载