Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Kumar et al., 2017 - Google Patents

A bio-signal based framework to secure mobile devices

Kumar et al., 2017

Document ID
345061191949910230
Author
Kumar P
Saini R
Roy P
Dogra D
Publication year
Publication venue
Journal of Network and Computer Applications

External Links

Snippet

Nowadays, mobile devices are often equipped with high-end processing units and large storage space. Mobile users usually store personal, official, and large amount of multimedia data. Security of such devices are mainly dependent on PIN (personal identification …
Continue reading at www.sciencedirect.com (other versions)
  • 238000000537 electroencephalography 0 abstract description 92

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Kumar et al. A bio-signal based framework to secure mobile devices
Ali et al. Edge-centric multimodal authentication system using encrypted biometric templates
Rahman et al. Multimodal EEG and keystroke dynamics based biometric system using machine learning algorithms
Kaur et al. A novel framework of EEG-based user identification by analyzing music-listening behavior
Huang et al. Practical privacy-preserving ECG-based authentication for IoT-based healthcare
Yang et al. Task sensitivity in EEG biometric recognition
Li et al. Velody: Nonlinear vibration challenge-response for resilient user authentication
Bajwa et al. Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms
Sundararajan et al. A survey on modality characteristics, performance evaluation metrics, and security for traditional and wearable biometric systems
Seha et al. Human recognition using transient auditory evoked potentials: a preliminary study
Sohankar et al. E-bias: A pervasive eeg-based identification and authentication system
Zhang et al. Review on EEG‐Based Authentication Technology
US20140188770A1 (en) System and method for enabling continuous or instantaneous identity recognition based on physiological biometric signals
Huang et al. Human identification with electroencephalogram (EEG) signal processing
Al-Naffakh et al. Unobtrusive gait recognition using smartwatches
Suppiah et al. Biometric identification using single channel EEG during relaxed resting state
Pham et al. EEG-based user authentication in multilevel security systems
Arias-Cabarcos et al. Inexpensive brainwave authentication: new techniques and insights on user acceptance
Fidas et al. A review of EEG-based user authentication: trends and future research directions
Neupane et al. Peep: Passively eavesdropping private input via brainwave signals
Shin et al. Arm movement activity based user authentication in P2P systems
Almehmadi et al. The state of the art in electroencephalogram and access control
Shukla et al. Thinking unveiled: An inference and correlation model to attack eeg biometrics
Kumar et al. A pervasive electroencephalography-based person authentication system for cloud environment
Mukai et al. Introduction of fractal dimension feature and reduction of calculation amount in person authentication using evoked EEG by ultrasound