Integrating Smartphone's Intelligent Techniques on Authentication in Mobile Exam Login Process
نویسندگان
چکیده
The emerging build-in sensing techniques create opportunities for Human-Computer Interaction capability of the mobile devices. This investigation explores novel build-in sensing techniques and relevant computation intensive algorithms to enhance the operational efficiency and usability of mobile applications. A case study on mobile application authentication involving touch screen manual input, camera barcode scanning, NFC recognition is implemented. Qualitative and quantitative evaluations on usability, efficiency, stability, and accuracy of user operation are examined on mainstream mobile platforms. Result illustrates the advantage of the proposed scheme and verifies the feasibility to enhance user-mobile interaction with mobile sensing techniques.
منابع مشابه
Intelligent Techniques with GUI by Challenge Keypad for Secure Password
In general, all the keypad based authentication system having several possibilities of password guessing by means of shoulder movements. Shoulder-surfing is an attack on password authentication that has traditionally been hard to defeat. This problem has come up with a new solution. Devising a user authentication scheme based on personal identification numbers (PINs) that is both secure and pra...
متن کاملA Unlinkable Delegation-based Authentication Protocol with Users’ Non- repudiation for Portable Communication Systems
For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, user privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an unreasonable assumption that home location registers are always trusted. To weaken this assumption and enhanc...
متن کاملEnhancing CardSpace Authentication Using a Mobile Device
In this paper we propose a simple, novel scheme for using a mobile device to enhance CardSpace authentication. During the process of user authentication on a PC using CardSpace, a random and shortlived one-time password is sent to the user’s mobile device; this must then be entered into the PC by the user when prompted. The scheme does not require any changes to login servers, the CardSpace ide...
متن کاملA Comprehensive Approach to Cryptographic and Biometric Authentication from a Mobile Perspective Patents Pending
Executive Summary User authentication on the Internet is widely acknowledged to be broken. Ordinary passwords have many vulnerabilities. Third-party login with a password adds a privacy problem while arguably making the security problem worse. Security questions are an invasion of privacy, and their answers can be easily discovered online. Onetime passwords generated by a soft or hard token or ...
متن کاملA Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 networks and 2G: the missing standardized login process. While the 2G standard covers all aspects of the communication process, first IEEE 802.11 standards only targeted the data transmission. Due to this lack of standards ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013