MoViSign: A novel authentication mechanism using mobile virtual signatures

نویسندگان

  • Nikhil Handigol
  • Te-Yuan Huang
  • Gene Chi Liu
چکیده

Signatures are a popular means of authentication. They, ideally, are unique to a person and, therefore, hard to copy. Two common types of signatures are traditional “pen-on-paper” signatures and electronic signatures. Electronic signatures are done on a custom-built electronic board using a stylus. The electronic board records information such as pressure, acceleration, and angle of the stylus in addition to the standard signature “image”. This information is used by a signature recognition system to differentiate authentic signatures from fraudulent ones. Both types of signatures have their drawbacks. While traditional “pen-on-paper” signatures are prone to forgery by expert humans, electronic signatures require a special electronic board to record the signature. In this project, we design and implement a novel mechanism of authentication, called mobile virtual signature, using mobile phones. Modern mobile phones such as the Apple iPhone and the Google G-phone are equipped with multiple sensors including accelerometers, orientation sensors, temperature sensors, proximity sensors, and multi-touch sensors. In our authentication mechanism, a person authenticates by signing “in the air” with the phone. The sensors on the phone, primarily the accelerometer and the orientation sensor, continuously record various parameters such as position, acceleration and angle. This information is then used by a Machine Learning program running on the mobile phone to recognize the signature. The authentication mechanism has several advantages. First, just like the traditional signatures, mobile virtual signatures stay unique to each person and can be changed if necessary. Second, it makes forgery hard as the signature is made “in the air” and without producing any tangible output

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A Design of local resource access control for mobile agent in PDA

Personal Device Assistance (PDA) devices are becoming popular, and some such devices have extended their capability to run a mobile agent platform. This paper describes a new security mechanism for mobile agent platforms running on PDAs. Our security mechanism is based on PDAgentSecurityManager built upon a Java virtual machine environment and provides dynamic authentication and flexible access...

متن کامل

A Novel Multimode Mobile Robot with Adaptable Wheel Geometry for Maneuverability Improvement

In this paper, an innovative mobile platform is presented which is equipped by three new wheels. The core of the new idea is to establish a new design of rigid circular structure which can be implemented as a wheel by variable radius. The structure of wheel includes a circular pattern of a simple two-link mechanism assembled to obtain a wheel shape. Each wheel has two degrees of freedom. The fi...

متن کامل

Web Authentication using Graphical Virtual Environment

Authentication has become integral part of 90% of web sites. The major issue in web authentication is the limitation of human memory to remember the password string for longer period. Almost all websites are still using traditional recall-based textual password to identify their remote users. Vulnerability of this authentication mechanism due to the sophistication of online identity theft has l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009