Kumar et al., 2017 - Google Patents
A bio-signal based framework to secure mobile devicesKumar et al., 2017
- Document ID
- 345061191949910230
- Author
- Kumar P
- Saini R
- Roy P
- Dogra D
- Publication year
- Publication venue
- Journal of Network and Computer Applications
External Links
Snippet
Nowadays, mobile devices are often equipped with high-end processing units and large storage space. Mobile users usually store personal, official, and large amount of multimedia data. Security of such devices are mainly dependent on PIN (personal identification …
- 238000000537 electroencephalography 0 abstract description 92
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | A bio-signal based framework to secure mobile devices | |
Ali et al. | Edge-centric multimodal authentication system using encrypted biometric templates | |
Rahman et al. | Multimodal EEG and keystroke dynamics based biometric system using machine learning algorithms | |
Kaur et al. | A novel framework of EEG-based user identification by analyzing music-listening behavior | |
Huang et al. | Practical privacy-preserving ECG-based authentication for IoT-based healthcare | |
Yang et al. | Task sensitivity in EEG biometric recognition | |
Li et al. | Velody: Nonlinear vibration challenge-response for resilient user authentication | |
Bajwa et al. | Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms | |
Sundararajan et al. | A survey on modality characteristics, performance evaluation metrics, and security for traditional and wearable biometric systems | |
Seha et al. | Human recognition using transient auditory evoked potentials: a preliminary study | |
Sohankar et al. | E-bias: A pervasive eeg-based identification and authentication system | |
Zhang et al. | Review on EEG‐Based Authentication Technology | |
US20140188770A1 (en) | System and method for enabling continuous or instantaneous identity recognition based on physiological biometric signals | |
Huang et al. | Human identification with electroencephalogram (EEG) signal processing | |
Al-Naffakh et al. | Unobtrusive gait recognition using smartwatches | |
Suppiah et al. | Biometric identification using single channel EEG during relaxed resting state | |
Pham et al. | EEG-based user authentication in multilevel security systems | |
Arias-Cabarcos et al. | Inexpensive brainwave authentication: new techniques and insights on user acceptance | |
Fidas et al. | A review of EEG-based user authentication: trends and future research directions | |
Neupane et al. | Peep: Passively eavesdropping private input via brainwave signals | |
Shin et al. | Arm movement activity based user authentication in P2P systems | |
Almehmadi et al. | The state of the art in electroencephalogram and access control | |
Shukla et al. | Thinking unveiled: An inference and correlation model to attack eeg biometrics | |
Kumar et al. | A pervasive electroencephalography-based person authentication system for cloud environment | |
Mukai et al. | Introduction of fractal dimension feature and reduction of calculation amount in person authentication using evoked EEG by ultrasound |