Next Level User Authentication in Android

نویسندگان

  • Pulkit Tandon
  • Geogen George
چکیده

1 Pulkit Tandon, 2 Geogen George 1 M.Tech Scholar, 2 Assistant Professor 1 I.T Dept., SRM University, Chennai, Tamil Nadu, India 2 I.T Dept., SRM University, Chennai, Tamil Nadu, India [email protected], [email protected] ________________________________________________________________________________________________________ Abstract: Device security are the major challenges faced by the smartphone developers in the recent era to secure the E-Data from security breaches. The finest possible alternative present due to limited range of current methods is to concatenate existing data security method with novel procedures which should be quick-to-implement and at the same time should be highly secure. The paper aims to strengthen the data security on the device by creating a custom user for the device other than the device administrator. The administrator is authenticated through speech recognition and pattern recognition methods whereas the custom user is verified using PIBRAS.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards secure and usable user athentication on mobile devices

Nowadays, mobile devices like smartphones and tablets can be found everywhere, they are truly ubiquitous. These devices often contain many private information, such as contact data, pictures, and emails. Interestingly, many users do not realize the true value of their data. However, such data plays an important role not only for secret services or companies in order to create user profiles but ...

متن کامل

Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android

Next generation IP telephony such as the IP Multimedia Subsystem (IMS) framework has been used to create Internet calling services which let cellular users make and receive calls even when without cellular reception. In this paper, we look at the security aspects of Internet calling services and other systems that use the 3GPP Authentication and Key Agreement (AKA) protocol for authentication, ...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones

Nowadays, touchscreen mobile phones make up a larger and larger share in the mobile market. Users also often use their mobile phones (e.g., Android phones) to store personal and sensitive data. It is therefore important to safeguard mobile phones by authenticating legitimate users and detecting impostors. In this paper, we propose a novel user authentication scheme based on touch dynamics that ...

متن کامل

Poster: Preliminary Investigation of an NFC-Unlock Mechanism for Android

Protecting mobile phones with password, pins, gestures and other types of authentication mechanisms is a hot topic, since ever more sensitive information is stored on peoples’ phones and the usability of current systems still leaves much to be desired[3]. New techniques of authentication to a phone unlocking it which are fast, easy to use and secure are needed [1]. In this poster we present a p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014