Smart Authentication for Smart Phones
نویسندگان
چکیده
since past few years there has been a remarkable rise in the popularity of touch screen mobile phone devices. With respect to the data and information that can be stored on the mobiles as well as mobiles are nowadays are also used for accessing mail and connecting to social media, it is necessary to ensure the security of the data and information that is stored on the mobiles. User authentication is an important security measure for protecting the information stored on the mobile phone devices, because these devices have a higher risk of theft. In order to prevent unauthorized access to these devices, passwords and other pattern based authentication method are being used in recent time. However, password-based authentication has an intrinsic weakness in password leakage. While the patterns are easy to steal and reproduce. In this paper, we introduce an implicit authentication approach that enhanced the password pattern with additional security layer. We provide three security checks in two steps. The three authentication methods used are time taken to draw the pattern which is a behavioral biometric authentication method, password pattern (shape) and match the angle (3 dimensions) of mobile. Keywords-component; password pattern; implecit authenticatio; Angle of mobile
منابع مشابه
VFA: A Variable-Factor Authentication Framework for Mobile Users
—Multi-factor authentication (MFA) has been widely used in various scenarios. By combining multiple forms of authentication, MFA effectively provides security assurance. Due to the rapid developments of mobile devices, especially smart phones, more and more sensitive information is now stored or accessible on smart phones. How to protect smart phones' security is now more important than ever. ...
متن کاملA Review on Android Authentication System Vulnerabilities
Mobile security has become a crucial aspect of mobile computing. People are maintaining their confidential and valuable information on smart phones. Most of the users and businesses use smart phones as message tools, and means of scheduling and establishing their work and private life. Smart phones contain increasing amount of exposed information to which access must be prohibited. But security...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملA Personal Authentication Scheme Using Mobile Technology
Security is a major concern in mobile commerce where information is send over the air. Authentication is possibly the most important property since achieving privacy and integrity may have no sense without the guaranty of the receiver identity. Cryptographic strong authentication protocols are known but the hard problem is to protect secret information, like shared or private keys, used in thes...
متن کاملEnhanced Authentication Mechanisms for Desktop Platform and Smart Phones
With hundreds of millions using computers and mobile devices all over the globe, these devices have an established position in modern society. Nevertheless, most of these devices use weak authentication techniques with passwords and PINs which can be easily hacked. Thus, stronger identification is needed to ensure data security and privacy. In this paper, we will explain the employment of biome...
متن کاملSecurely Derived Identity Credentials on Smart Phones via Self-enrolment
In the last decade traditional identity documents have been equipped with an embedded NFC-chip to enable wireless access to the relevant data. This applies in particular to passports, following the ICAO standard, but increasingly also to other identification documents, such as driver’s licenses. Such electronic identity (eID) documents can now be used as “mother cards” by the users to remotely ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014