There is more to biometrics than user identification: Making mobile interactions personal, secure and representative
نویسنده
چکیده
This essay contributes an extended view on user information inferred by personal devices to motivate applications of biometrics beyond user identification. We unfold a new design space in two parts: First, we take inspiration from the shared focus on individuality in both biometrics and Belk’s Extended Self (ES, [1, 2]). ES describes that people use (digital) objects to define and reflect on their identities. Following this, we propose that personal devices can use biometrics to assess individual user attributes and behaviour for three application areas related to the core aspects of ES: privacy and security (Having), UI personalisation (Doing), digital self-presentation (Being). Second, we propose to view biometrics as part of a larger class of Implicit Information. Such information is inferred from interactions and sensors to be used across these application domains. We discuss implications and limitations of this view. ACM CCS: Security and privacy → Human and societal aspects of security and privacy → Usability in security and privacy
منابع مشابه
لبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملDistributed Speaker Recognition Using the ETSI Distributed Speech Recognition Standard
Biometrics is gaining strong support for the personalization of and the securing of mobile devices. It is not uncommon for individual users to be faced with a half-dozen or more passwords and personal identification numbers. The ubiquity of passwords actually relaxes system security since many users tend to use the same password across all applications, or collect the various passwords in a sin...
متن کاملAuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless (mobile) devices. In this paper, we propose a new mobile authentication system, not yet...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملASEMC: Authentication for a SEcure M-Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless (mobile) devices. In this paper, we propose a new mobile authentication system, not yet...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- it - Information Technology
دوره 58 شماره
صفحات -
تاریخ انتشار 2016