Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Rasmussen et al., 2014 - Google Patents

Authentication Using Pulse− Response Biometrics

Rasmussen et al., 2014

View PDF
Document ID
13988799193776635156
Author
Rasmussen K
Roeschlin M
Martinovic I
Tsudik G
Publication year

External Links

Snippet

We propose a new biometric based on the human body's response to an electric square pulse signal, that we call pulse-response. We explore how this biometric can be used to enhance security in the context of two example applications:(1) as an additional …
Continue reading at ora.ox.ac.uk (PDF) (other versions)
  • 230000004044 response 0 title abstract description 89

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data

Similar Documents

Publication Publication Date Title
Rasmussen et al. Authentication Using Pulse− Response Biometrics
US10869620B2 (en) Biometric identification by garments having a plurality of sensors
Martinovic et al. Authentication using pulse-response biometrics
Ryu et al. Continuous multimodal biometric authentication schemes: a systematic review
Dasgupta et al. Advances in user authentication
Li et al. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns
Meng et al. Surveying the development of biometric user authentication on mobile phones
Zheng et al. You are how you touch: User verification on smartphones via tapping behaviors
Zhu et al. Blinkey: A two-factor user authentication method for virtual reality devices
US10042995B1 (en) Detecting authority for voice-driven devices
Neal et al. Surveying biometric authentication for mobile device security
Martinovic et al. Pulse-response: Exploring human body impedance for biometric recognition
Asha et al. Biometrics: an overview of the technology, issues and applications
Bhattasali et al. A survey of security and privacy issues for biometrics based remote authentication in cloud
Kaczmarek et al. Assentication: user de-authentication and lunchtime attack mitigation with seated posture biometric
Yusuf et al. A survey of biometric approaches of authentication
Bhattasali et al. Two factor remote authentication in healthcare
Wu et al. CaIAuth: Context-aware implicit authentication when the screen is awake
Lone et al. A novel OTP based tripartite authentication scheme
Wu et al. It's All in the Touch: Authenticating Users with HOST Gestures on Multi-Touch Screen Devices
Silasai et al. The study on using biometric authentication on mobile device
Banirostam et al. Functional control of users by biometric behavior features in cloud computing
Vhaduri et al. mWIoTAuth: Multi-wearable data-driven implicit IoT authentication
Blanchard et al. Reflexive memory authenticator: a proposal for effortless renewable biometrics
Sivakumar Biometric authentication techniques and its future